Introduction
SecureAuth IdP RADIUS server lets you configure two-factor authentication login access to a VPN and remote resources via RADIUS. This optional component of the SecureAuth IdP product is typically installed on a stand-alone server or on a SecureAuth IdP appliance.
Using the RADIUS feature, enterprises can provide strong adaptive authentication for RADIUS clients, such as VPNs and other applications, that leverage RADIUS for two-factor authentication used with SecureAuth IdP.
See the Release notes to learn about new features, enhancements, Resolved issues, and known issues.
See SecureAuth IdP RADIUS server v2.4 integration guide for information about the previous product release.
This document is organized into four parts:
- Topics in this guide include:
- Installation – see Installation guide - v2.5 - SecureAuth IdP RADIUS server
- Configuration – see Configuration guide - v2.5 - SecureAuth IdP RADIUS server
- End-user experience – see End-user experience - v2.5 - SecureAuth IdP RADIUS server
Prerequisites
- SecureAuth IdP version 9.1 or later
- Authentication API (v9.1+) configured and enabled on the realm
Supported SecureAuth IdP components and integrated components
SecureAuth IdP features | SecureAuth IdP version | Configuration notes | ||||||||||||||||
Adaptive Authentication | Configure threat checking for:
| |||||||||||||||||
Push-to-Accept | ||||||||||||||||||
Attribute Mapping | Configure and enable Identity Management API (v9.1+) on the realm to grant / deny end-user logon access. Group based authentication – Optionally configure Membership Connection Settings to grant / deny logon access:
| |||||||||||||||||
UPN Logon | ||||||||||||||||||
Multi-Factor Authentication methods | SecureAuth IdP version | SecureAuth IdP v9.x supported server and required components | ||||||||||||||||
Time-based One-Time Passcode (TOTP) | v9.1+ | NetMotion Wireless VPN:
NOTE: Refer to the NetMotion Mobility RADIUS configuration guide. | ||||||||||||||||
HMAC-based One-Time Passcode (HOTP) | v9.1+ | |||||||||||||||||
SMS (OTP only) | v9.1+ | |||||||||||||||||
Phone | v9.1+ | |||||||||||||||||
Email (OTP only) | v9.1+ | |||||||||||||||||
Passcode OTP (Push Notification) | v9.1+ | |||||||||||||||||
Mobile Login Request | v9.1+ | |||||||||||||||||
PIN | v9.1+ | |||||||||||||||||
Supported platforms | ||||||||||||||||||
Server:
| Protocols:
| SecureAuth IdP Adaptive Authentication IP Checking feature:
| ||||||||||||||||
Port settings | ||||||||||||||||||
Inbound:
| ||||||||||||||||||
RADIUS VPN and product support | ||||||||||||||||||
Supported RADIUS clients:
| Other compatible RADIUS clients include:
Contact SecureAuth Professional Services with inquiries. | To configure a Palo Alto Networks GlobalProtect VPN to send the client IP to SecureAuth IdP RADIUS server:
| ||||||||||||||||
RADIUS client configuration | ||||||||||||||||||
Though not all RADIUS clients are configured in the same manner, the following basic connectivity parameters must be configured on RADIUS clients to be used with SecureAuth IdP:
NOTE: A valid certificate must be installed if using NetMotion Wireless VPN. Sample RADIUS authentication server configuration:
| ||||||||||||||||||
SecureAuth IdP RADIUS server v2.5 installation | ||||||||||||||||||
Upgrade If SecureAuth RADIUS v1.0.x is currently installed, review the upgrade instructions in the Installation guide before installing the newer version of RADIUS. If SecureAuth IdP RADIUS server v2.0.x - v2.2.x is currently installed, use the install instructions in Install SecureAuth IdP RADIUS server v2.5 to upgrade while retaining the current configuration settings. If SecureAuth IdP RADIUS server v2.3.9 / v2.3.12 is currently installed, use the install instructions in Install SecureAuth IdP RADIUS server v2.5 to upgrade while retaining the current configuration settings . If SecureAuth IdP RADIUS server v2.4.x is currently installed, use the install instructions in Install SecureAuth IdP RADIUS server v2.5 to upgrade while retaining the current configuration settings. New installation If installing SecureAuth IdP RADIUS server v2.5.x for the first time on the designated appliance, follow the install instructions in the installation guide. SecureAuth IdP RADIUS logs for troubleshooting See SecureAuth IdP RADIUS server logs for information about using the RADIUS logs for troubleshooting. |
Adaptive Authentication
If Adaptive Authentication is used with the user group check feature enabled, RADIUS responds accordingly in these login failure scenarios based on the authentication workflow.
Note that the following workflows do not correlate exactly to the workflows in SecureAuth IdP. Some of the following workflows are not included in SecureAuth IdP "Login Screen Options" and vice versa. For example, RADIUS does not have an option for "Username only" (while SecureAuth IdP does) and SecureAuth IdP does not have an option for "PIN + OTP" (while RADIUS does).
- Workflow 1 = Password | One-Time Passcode (TOTP/HOTP) or Second Factor
- Workflow 2 = Password & Mobile Login Request (Approve / Deny)
- Workflow 3 = Password Only
- Workflow 4 = One-Time Passcode (TOTP/HOTP) Only
- Workflow 5 = One-Time Passcode (TOTP/HOTP) / Password
- Workflow 6 = Password | One-Time Passcode (TOTP/HOTP)
- Workflow 7 = One-Time Passcode (TOTP/HOTP) | Password
- Workflow 8 = Username | Second Factor
- Workflow 9 = Username | Second Factor | Password
- Workflow 10 = PIN + TOTP
- Workflow 11 = Password & One-Time Passcode (TOTP/HOTP)
Login failure scenario | End-user experience from RADIUS | End-user experience from RADIUS |
---|---|---|
Hard stop; refuse authentication request | Login failed message received | Login failed message received |
Step up, require two-factor authentication | Prompt received for second authentication factor | Login request fulfilled |
Step down, skip two-factor authentication | Second authentication factor skipped; login request fulfilled | Login request fulfilled |
Resume authentication workflow | Prompt received for second authentication factor | Login request fulfilled |
Skip to post-authentication | Second authentication factor skipped; login request fulfilled | Login request fulfilled |
Redirect to realm or URL | Login failed message delivered | Login failed message received |
No failure | Prompt received for second authentication factor | Login request fulfilled |
SecureAuth IdP RADIUS server logs
Enable logs
Set up logs for the SecureAuth IdP RADIUS server by completing the following:
- Download the following log configuration file, and place it in a temporary folder on the SecureAuth RADIUS server.
- Rename C:\idpRADIUS\bin\conf\log4j2.xml so you can use it to disable logging when you finish debugging.
The paths you use might be different, depending on your RADIUS server version or the destination folder selected when you installed the RADIUS server. The following are examples of default paths:- C:\idpRADIUS\bin\conf\log4j2.xml
- C:\Program Files (x86)\SecureAuth Corporation\SecureAuth IdP RADIUS Agent\bin\conf\log4j2.xml
- C:\Program Files\SecureAuth Corporation\SecureAuth IdP RADIUS Agent\bin\conf\log4j2.xml
- Place the downloaded log4j2.xml file in the *\bin\conf folder, which is the same folder used in step 2.
- Run the services.msc application, then restart the SecureAuth RADIUS service.
- Replicate the issue you have encountered.
- Find log files stored in *\bin\Logs\saRadiusServer.log.
- Receive assistance with resolving the issue by forwarding log files to the SecureAuth Support team when you create a support ticket.
- Restore the original log4j2.xml after debugging is completed.
Trace level logging uses a substantial amount of disk space and can create disk space issues over time.
Sample logs for different RADIUS failover scenarios
Failover to a SecureAuth IdP RADIUS backup server is configured under Step B: IdP Realms configuration, Add IdP Realm in the Configuration guide - v2.5 - SecureAuth IdP RADIUS server.
Release notes
New features and enhancements
Version: 2.5
Release Date: April 23, 2019
Compatibility: SecureAuth IdP versions 9.0 - 9.3
RAD-83 | A warning is displayed when an installation of an older version of RADIUS is attempted while a newer version is installed. |
RAD-150 | End-users' phone numbers and email addresses displayed in authentication applications are hidden consistently with asterisks. |
RAD-218 | TOTP and HOTP with YubiKey as second factor is supported in RADIUS version 2.5.1. |
RAD-237 | RADIUS client user interface and documentation were refreshed with the latest brand logo and color. |
RAD-238 | SecureAuth RADIUS supports Windows Server 2016. |
Resolved issues
RAD-179 | SonicWall NetExtender created a hotfix to resolve a RADIUS client problem with 2FA methods. All 2FA methods are available. |
RAD-202 | Editing and saving a disabled realm no longer enables the realm. |
RAD-204 | The Static Value field is empty by default in the RADIUS Client tab, in the Static Value Mapping section. |
RAD-206 | The Static Value field allows up to 247 characters in the RADIUS Client tab, in the Static Value Mapping section. |
RAD-208 | Uppercase letters are allowed in the Static Value field, in the RADIUS Client tab, in the Static Value Mapping section. |
RAD-212 | Clicking the context-sensitive help (small i) over a disabled client setting shows information for disabled clients in the RADIUS Client tab. |
RAD-249 | Numerous minor bug fixes were completed. |
RAD-252 | When creating a RADIUS client and clicking the Add Attribute button, the client is no longer saved when the Add Client button is not selected. |
RAD-253 | RADIUS client attribute values are restricted to the supported RADIUS protocol length of 253 bytes. |
Known issues
RAD-210 | When running the RADIUS client with the Pulse Secure client and 2FA options, Pulse Secure limits the maximum number of characters to 210. End-users can see all options in the Pulse Secure web client when the number of characters is less than 210. A second Pulse Secure limitation causes options 5 - 8 to be cut off from end-users' view on the 2FA list. End-users can select options 5 - 8, even though they are off-screen and there is no scrollbar. Optionally, modify text in the RADIUS uiTextsBundle.properties configuration file to shorten messages from the multi-factors message. See "Modify text showing on client user interface during login" in Configuration guide - v2.5 - SecureAuth IdP RADIUS server. |
RAD-485 | Invalid characters in user IDs sent to the RADIUS server cause a RADIUS server failure. Workaround: Ensure that user IDs contain the following valid characters only:
|
Next step...
Install SecureAuth IdP RADIUS server v2.5
Related documentation
Installation guide - v2.5 - SecureAuth IdP RADIUS server
Configuration guide - v2.5 - SecureAuth IdP RADIUS server
End-user experience - v2.5 - SecureAuth IdP RADIUS server
Prior version
SecureAuth IdP RADIUS server v2.4 integration guide
Installation guide - v2.4 - SecureAuth IdP RADIUS server