- Go to Apps Click on Add Application button.
- click on RADIUS as Application type.
- Click on your required application tab. If you don’t find your application click on the Radius Client application tab.
- Configure the below details to add Radius Client.
- Configure the following Policy details for the Radius Client.
- After configuring the given above details, Click on Save button.
- Copy and save the Radius server IPs which will be required to configure your Radius client.
|Client Name:||Any name for your reference.|
|Client IP:||IP address of VPN server which will send Radius authentication
|Shared Secret:||Security key. For Eg. “sharedsecret”
(Keep this with you, you will need to configure same on VPN Server).
|Include Password &
OTP in same Request
|Check this option for clients which takes password and the OTP in
same request. Otherwise keep it unchecked.
|Send Groups in
|Enable this to send user groups as Vendor-Specific Group Attributes.|
|Group Name:||Group for which the policy will apply.|
|Policy Name:||Any Identifier that specifies policy name.|
|Login Method||Login Method for the users associated with this policy.|
|Enable 2-Factor Authentication||Enables Second Factor during Login for users associated with this policy.|
|Enable Adaptive Authentication||Enables Adaptive Authentication for Login of users associated with this policy.|
- Open Firewall Ports.
- In order to receive the RADIUS request, it is necessary to open UDP traffic on ports 1812 and 1813 for the machine where On-Premise IdP is deployed.
- If the hosting machine is a Windows Machine then you can follow this document.
- If the hosting machine is a Linux Machine then you can follow this document.
NOTE: Follow the below steps before testing the connectivity.