Objective
This article explains how to enable MFA for Wi-Fi connections using RADIUS authentication with ADSelfService Plus. Enabling MFA for Wi-Fi strengthens network security by verifying user identities before granting access.
Organizations implement MFA for Wi-Fi to:
Meet compliance requirements: Major regulations (e.g., HIPAA, the GDPR, and the PCI DSS) require strong authentication controls for network access.
Secure BYOD environments: MFA ensures that employees using personal devices must verify their identity before network access is granted.
Protect against insider threats: MFA reduces the risk from compromised accounts by requiring an extra verification step for all users.
Enhance data protection: By securing the initial point of network entry, MFA helps prevent data breaches and unauthorized access to internal systems.
Prerequisites
The Wi-Fi network must be set up to use RADIUS authentication (e.g., via a Network Policy Server [NPS]).
The ADSelfService Plus NPS extension connector should be available for installation.
Configure your Wi-Fi access point or controller to authenticate users via a RADIUS server.
Log in to the ADSelfService Plus portal with administrator credentials.
Navigate to Configuration > Self-Service > Multi-factor Authentication > MFA for Endpoints.
In the MFA for VPN logins section, select VPN Client Verification.
Enable MFA and specify the number of authenticators required for VPN login.
Choose the type of authenticators required for VPN login verification.
Install the ADSelfService Plus NPS extension connector on the RADIUS server.
Upon Wi-Fi authentication, the NPS extension will trigger MFA based on the user’s configured authentication methods in ADSelfService Plus.
How to reach support
If the issue persists, contact our support team here.