Authorization: Authorized personnel only The first article in our series described the authentication process, whereby the RADIUS server prevents unauthorized users from accessing the system. In today’s article, we’ll examine the second link...
Authentication: Is it really you? RADIUS security is composed of three components: authentication, authorization, and accounting. These three links in the RADIUS security chain are often referred to by their acronym, “AAA”. The first ... Network Security Protocols
Client Case Study: RADIUS proxy consolidation for efficiency When an ISP is running a large number of systems at 99% idle capacity "just in case," you know there's room for optimization. We worked with a multi-service provider that had built four separate RADIU... Network Architecture
RADIUS standards compliance: from RFC to WiFi Alliance We believe that standards compliance is critical for customer satisfaction and vendor interoperability. Systems that follow standards have known, documented behaviour, so there are few surprises. Our ... IETF and RADIUS Standards
How to configure a RADIUS server Even though clients may prefer to configure their own system, some clients are unsure of how to configure a RADIUS server. Although the process can be complex, clients can learn how to setup a RADIUS ... FreeRADIUS Technical Guides
Client Case Study: 802.1X implementation When months of 802.1X implementation attempts failed, we diagnosed firmware bugs and leveraged vendor relationships to deliver a working solution. One of our clients had customer-visible issues in the... Enterprises
Client Case Study: Slow SQL server performance When a major ISPs RADIUS database slowed to a crawl under growing data loads, we restored full performance without replacing a single system. Here's how proper database architecture beat a hardware up... Network Architecture
How a RADIUS server works A RADIUS server utilizes a central database to authenticate remote users. RADIUS functions as a client-server protocol, authenticating each user with a unique encryption key when access is granted. Ho... Network Security Protocols
Client Case Study: RADIUS SQL We were called in to help our client who had database performance issues with their custom schema and queries. We made updates to the database tables and indices and reconfigured the RADIUS server app... Network Architecture
RADIUS Server Proxying We have extensive experience in the WiFi roaming arena, and we are actively involved in vendor forums. Proxying is a key part of most RADIUS infrastructures. We foster relationships with numerous comp... Internet Service Providers Network Architecture
User Authentication Performance The current Covid-19 crisis has created an unprecedented situation for businesses. More people are working remotely than ever before, in order to maintain corporate productivity in the face of this cr... Network Architecture
How Does RADIUS Authentication Work? RADIUS authentication starts when the user requests access to a network resource through the Remote Access Server (RAS). The user submits a username and a password, which are encrypted by the RADIUS s... Network Security Protocols