> RADIUS 2FA

RADIUS 2FA

The Protectimus RADIUS 2FA solution can be used to enable two-factor authentication for any software or equipment that supports RADIUS authentication protocol.


The Protectimus RADIUS Server connector works as a RADIUS server. It transfers authentication requests from the RADIUS device to the Protectimus multi-factor authentication (MFA) server and returns the answer permitting or denying access.


Protectimus 2FA integration via RADIUS scheme

Add two-factor authentication (2FA / MFA) to protect your VPN, Wi-Fi, and any other software or device that supports RADIUS. To do that, integrate with Protectimus Cloud MFA Service or On-Premise Platform via RADIUS authentication protocol.


The list of software and devices that can be integrated with Protectimus via RADIUS authentication protocol includes but is not limited to:


  • Ubuntu;
  • macOS;
  • Cisco ACS / ISE / ISR / Catalyst / SSH Network Device Access;
  • Citrix ADC (NetScaler ADC), Citrix Gateway (NetScaler Gateway), Citrix Virtual Desktops (XenDesktop), Citrix Virtual Apps (XenApp);
  • VMware Horizon View (VDI), VMware Horizon Cloud DaaS (VDI), VMware vCenter Server;
  • OpenVPN;
  • Juniper and Pulse Secure SSL VPN;
  • F5 BIG-IP VPN;
  • Palo Alto IPSEC and SSL VPN;
  • FortiGate VPN;
  • Check Point Remote Access VPN;
  • Huawei SSL VPN;
  • UserGate VPN;
  • Windows VPN;
  • Mikrotik;
  • SonicWALL TZ, NSA, Aventail series;
  • Wi-Fi hotspots, etc.

The Protectimus RADIUS 2FA software is easy to set up. But if you have any questions, our team is always ready to help you with deploying RADIUS two-factor authentication (2FA) even in the most complex infrastructure. Get in touch with our support team here.



To integrate Protectimus 2FA solution with your RADIUS supporting device or software you need to set up and configure Protectimus RADIUS Server, and then configure the authentication policies on the device or application you want to add Protectimus 2FA to:
  1. You allow the transmission of an authentication request over the RADIUS protocol to Protectimus RADIUS Server;
  2. The Protectimus RADIUS Server component receives and processes the authentication request;
  3. Then Protectimus RADIUS Server contacts the Protectimus authentication server to verify the one-time password entered by the user.

1. Install Protectimus RADIUS Server to enable RADIUS 2FA

1.1. Protectimus RADIUS Server Installation on any OS

To receive the latest version of Protectimus RADIUS Server, contact Protectimus customer service at [email protected].

For Protectimus RADIUS Server to function, Java 8 must be installed.

Protectimus RADIUS Server can be started using the following command:
java -jar RProxy.jar

1.2. Protectimus RADIUS Server Installation on Windows

  1. Download the installer here.
  2. Run the installer as administrator.
  3. Check the RProxy checkbox.

    ATTENTION!
    If you plan to use the Protectimus On-Premise Platform, keep the Platform checkbox checked.
    If you plan to use the Protectimus SAAS Service, uncheck the Platform checkbox.

If you plan to use the Protectimus On-Premise Platform

If you use plan to use the Protectimus SAAS Service

How to install Protectimus RADIUS Server and Protectimus Platform How to install Protectimus RADIUS Server is you will use the Protectimus Cloud Service
  1. Java (JDK 7 and above) must be installed on the machine, if not, it will be installed automatically, click Install.
How to install Protectimus RADIUS Server - install Java
  1. When Java is installed, click Next.
How to install Protectimus RADIUS Server - update Java and click Next
  1. Choose the folder to install the Protectimus components and click Install.
How to install Protectimus RADIUS Server - select folder
  1. When the installation is complete, you’ll see this message.
How to install Protectimus RADIUS Server - the installation was successful  

2. Get Registered and Configure Basic Settings

  1. Register with the Protectimus Cloud Service and activate API or the Protectimus On-Premise Platform.
  2. Add Resource.
  3. Add Users.
  4. Add Tokens or activate Users’ Self Service Portal.
  5. Assign Tokens to Users.
  6. Assign Tokens with Users to the Resource.

3. Configure Protectimus RADIUS Server

Protectimus RADIUS Server settings can be configured by specifying them in the rproxy.properties file, which must be located in the same directory as the executable.

Set the following values in the rpoxy.properties file:

3.1. RADIUS settings

radius.secret
The secret to be used by your authentication proxy server and your RADIUS server.
radius.port
The port where the RADIUS server will run.
radius.re-enter-otp
When this property is enabled (radius.re-enter-otp = true), password is not requested after an unsuccessful OTP check.

3.2. Configuring the First Authentication Factor Check (Static Password)

primary-authenticator
This property specifies where exactly the user’s static password will be checked. Possible options:
  1. PROTECTIMUS – the static password verification will be carried out by the PROTECTIMUS system.
primary-authenticator = PROTECTIMUS
  1. LDAP – the static password verification will be carried out on the LDAP (AD) side. To do this, you need to use the appropriate properties:
ldap.url
The hostname or IP address of your domain controller.
ldap.search-base
The LDAP DN of Group or organizational unit containing all of the users you wish to permit to log in.
ldap.account-name
The username of a domain account that has permission to bind to your directory and perform searches.
ldap.account-password
The password corresponding to domain account.
ldap.query-attribute
ldap.principal-attribute
If you want to authenticate user with “sAMAccountName” instead of “userPrincipalName”, specify the attributes “query-attribute” and “principal-attribute” accordingly
  1. If static password verification is not required (for example, the service supports the N factor), leave the property empty. In this case, only the OTP password will be checked.

3.3. Setting up connection to the PROTECTIMUS service

protectimus.login
Your login in PROTECTIMUS system.
protectimus.api-key
Your API key in PROTECTIMUS system.
protectimus.resource-id
ID of the resource that you created in the PROTECTIMUS system.
protectimus.api-url
If you are using the PROTECTIMUS cloud service for RADIUS 2FA, specify the following API URL: https://api.protectimus.com/

If you are using the Protectimus on-premise platform for RADIUS 2FA, the API URL will be something like: protectimus.api.url=http://127.0.0.1:8080/
protectimus.username.normalization
When normalization is enabled any domain information is stripped from the username, so “username”, “DOMAIN\username”, and “[email protected]” would all resolve to a single “username”.

3.4. An example of Protectimus RADIUS Server configuration file

#------RADIUS Server------
radius.port = 1812
radius.secret = secret
radius.re-enter-otp = true
primary-authenticator = LDAP

#------Protectimus API------
protectimus.login = [email protected]
protectimus.api-key = apikey
protectimus.resource-id = 1
protectimus.api-url = https://api.protectimus.com/
protectimus.username.normalization = true

#------LDAP-----------------
ldap.account-name = cn=user,dc=example,dc=com
ldap.account-password = password
ldap.url = ldap://localhost:389
ldap.search-base = dc=example,dc=com
ldap.query-attribute = sAMAccountName
ldap.principal-attribute = userPrincipalName

Now you need to configure your device or application to communicate with Protectimus RADIUS Server service over RADIUS protocol.

Use radius.port and radius.secret for configuration.
Last updated on 2022-09-15