Traditional logins to resources on an organizational network involve only a username and password. However, if all the data breaches in recent years teach us anything, it is that they are not sufficient. Multi-factor authentication (MFA) has become an indispensable part of logins and implementing it is mandatory to meet regulatory standards such as the GDPR and the HIPAA. RADIUS or Remote Authentication Dial-In User Service is one of the methods that can be used for MFA.
When RADIUS is used for MFA, users first need to provide their username and password. They are then asked to enter the unique RADIUS password that is mapped to their account to authenticate themselves. If the password provided is valid, they will be allowed to access the service. Implementing MFA using RADIUS and other methods during Active Directory-based actions like domain logins, password changes, and self-service password resets and account unlocks can be extremely beneficial to domain user accounts and network security.
ADSelfService Plus, an identity management solution, offers RADIUS along with 20 other authentication methods including FIDO Passkeys, Biometric Authentication, and Zoho OneAuth TOTP, to secure users during:
client <xyz> |
where,
<xyz> refers to the ADSelfService Plus server name.
<xxx.xxx.xxx.xxx> refers to the ADSelfService Plus server's IP address. and, <abc> refers to the secret key value created by the admin.
Note: ADSelfService Plus allows you to create OU and group-based policies. To create a policy, go to Configuration → Self-Service → Policy Configuration → Add New Policy. Click Select OUs/Groups, and make the selection based on your requirements. You need to select at least one self-service feature. Finally, click Save Policy.