View Categories

Setting Up RADIUS Authentication

8 min read

Overview

CertMS supports RADIUS (Remote Authentication Dial-In User Service) authentication, allowing you to integrate with existing RADIUS servers for centralized user authentication. This enables you to leverage your organization’s existing authentication infrastructure, maintain consistent password policies, and streamline user access management.

What is RADIUS Authentication?

RADIUS authentication allows CertMS to delegate user authentication to an external RADIUS server instead of managing passwords locally. Benefits include:

  • Centralized authentication: Use existing RADIUS infrastructure
  • Consistent password policies: Enforce organization-wide password requirements
  • Simplified user management: No need to manage passwords in multiple systems
  • Enhanced security: Leverage existing security controls and monitoring
  • Integration with existing systems: Works with Active Directory, FreeRADIUS, and other RADIUS-compatible systems

Prerequisites

Before configuring RADIUS authentication, ensure you have:

  • Administrative access to CertMS
  • Access to your RADIUS server configuration
  • RADIUS server hostname or IP address
  • RADIUS shared secret (pre-shared key)
  • Network connectivity between CertMS and the RADIUS server
  • Firewall rules allowing UDP traffic on the RADIUS port (typically 1812)

Step-by-Step Configuration

Step 1: Access Authentication Provider Settings

  1. In the left-hand navigation menu, click on Settings dropdown
  2. Select Auth Providers
  3. This page displays all currently configured authentication providers
  4. Review existing providers (Local authentication is always available)

Step 2: Create RADIUS Provider

  1. Click the Create Provider button
  2. Begin configuring your RADIUS authentication provider

Step 3: Configure Basic Provider Settings

Complete the basic authentication provider information:

Required Fields

FieldDescriptionExample
Provider NameDescriptive name for this auth provider (required)“Corporate RADIUS Server”
Provider TypeAuthentication method (required)Select Radius from dropdown
DescriptionOptional notes about this provider“Main corporate RADIUS for domain authentication”
PriorityOrder in which providers are tried1, 2, 3, etc. (lower = higher priority)
ActiveEnable/disable this provider✅ Checkbox (checked to activate)

Provider Type Options

  • Radius: RADIUS server authentication
  • SAML: SAML-based Single Sign-On (covered in separate documentation)

Note: Select Radius for this configuration.

Step 4: Configure RADIUS Settings

After selecting Radius as the Provider Type, the Radius Configuration section appears with additional required fields.

RADIUS Configuration Fields

FieldDescriptionDefaultExample
Server HostRADIUS server hostname or IP address (required)Noneradius.example.com or 10.0.1.50
Server PortUDP port for RADIUS authentication18121812 (standard authentication port)
Shared SecretPre-shared key for RADIUS communication (required)Noneyour-secure-shared-secret
Timeout (seconds)Time to wait for RADIUS response55 (recommended)
RetriesNumber of retry attempts on failure33 (recommended)
NAS IdentifierNetwork Access Server identifier (optional)Nonecertms-prod or certms.example.com

Field Details

Server Host
  • Enter the fully qualified domain name (FQDN) or IP address of your RADIUS server
  • Ensure DNS resolution works if using hostname
  • Verify network connectivity from CertMS to this address
Server Port
  • 1812: Standard RADIUS authentication port (recommended)
  • 1645: Legacy RADIUS authentication port (older systems)
  • Use custom port if your RADIUS server is configured differently
Shared Secret
  • Must match the shared secret configured on the RADIUS server
  • Treat this as a password – keep it secure and complex
  • Coordinate with your RADIUS administrator to obtain or set this value
Timeout
  • How long CertMS waits for a response from the RADIUS server
  • 5 seconds is typically sufficient for local network RADIUS servers
  • Increase for RADIUS servers across WAN or with higher latency
Retries
  • Number of times CertMS will retry authentication if no response received
  • 3 retries provides good balance between reliability and user experience
  • Adjust based on network reliability
NAS Identifier
  • Optional identifier sent to RADIUS server to identify the requesting system
  • Useful for RADIUS server logging and policy decisions
  • Can be hostname, application name, or custom identifier

Step 5: Save RADIUS Provider

  1. Review all configuration settings for accuracy
  2. Ensure Active checkbox is checked to enable the provider
  3. Click Create or Save to save the RADIUS provider
  4. The provider will appear in your Auth Providers list

Step 6: Test RADIUS Configuration

Before assigning users, verify RADIUS connectivity:

  1. Check network connectivity to RADIUS server
  2. Verify shared secret matches on both sides
  3. Review RADIUS server logs for connection attempts
  4. Test with a known-good RADIUS account

Assigning Users to RADIUS Authentication

Once the RADIUS provider is configured, assign users to authenticate via RADIUS.

Step 1: Access User Management

  1. In the left-hand navigation menu, click on Settings dropdown
  2. Select Users
  3. This page displays all configured users

Step 2: Create or Edit User

You can assign RADIUS authentication to new or existing users.

For New Users:

  1. Click Create New User
  2. Fill in user information (username, first name, last name, email)
  3. Important: Username must match the RADIUS username
  4. Skip password field (RADIUS will handle authentication)

For Existing Users:

  1. Click on the user you want to modify
  2. User details will open for editing

Step 3: Change Authentication Provider

  1. Locate the Authentication Provider dropdown field
  2. Select your newly created RADIUS provider from the dropdown
  3. The user’s password field becomes optional (RADIUS handles authentication)

Step 4: Save User Configuration

  1. Review user settings
  2. Ensure Active Account is checked
  3. Verify appropriate roles are assigned
  4. Click Save or Update User

Step 5: Test User Login

  1. Log out of CertMS (or use incognito/private browsing)
  2. Navigate to your CertMS instance login page
  3. Enter the RADIUS-authenticated username and password
  4. Verify successful authentication

Managing Multiple Authentication Providers

Priority Order

If you have multiple authentication providers configured:

  • Priority field determines the order in which providers are tried
  • Lower numbers = higher priority (Priority 1 is tried before Priority 2)
  • If authentication fails with one provider, the next priority provider is attempted

Example Configuration:

ProviderTypePriorityUse Case
Corporate RADIUSRadius1Primary authentication for all domain users
Backup RADIUSRadius2Failover if primary RADIUS unavailable
Local AuthenticationLocal3Emergency access if RADIUS servers down

Best Practices:

  • Keep Local authentication available as a fallback
  • Set RADIUS as higher priority than Local for regular users
  • Maintain at least one Local admin account for emergency access

User Management Best Practices

Username Consistency

  • Match RADIUS usernames exactly: CertMS username must match RADIUS username
  • Use standard format: Typically username or domain\username depending on RADIUS configuration
  • Document format: Ensure users know the correct username format

Password Management

  • RADIUS users don’t need CertMS passwords: Authentication is handled by RADIUS
  • Password changes: Users change passwords on RADIUS server, not in CertMS
  • Password policies: Enforced by RADIUS server, not CertMS

Account Provisioning

  1. Create user in RADIUS first: Ensure account exists in RADIUS before creating in CertMS
  2. Create CertMS account: Add user to CertMS with matching username
  3. Assign RADIUS provider: Select appropriate RADIUS authentication provider
  4. Assign roles: Grant necessary CertMS permissions
  5. Test login: Verify user can authenticate successfully

Troubleshooting

Common Issues

IssuePossible CauseSolution
Authentication failsIncorrect shared secretVerify shared secret matches on both CertMS and RADIUS server
Connection timeoutNetwork connectivity or firewallVerify network connectivity and firewall rules allow UDP 1812
User not foundUsername mismatchEnsure CertMS username exactly matches RADIUS username
Slow authenticationTimeout too high or network latencyAdjust timeout value or investigate network performance
RADIUS server not respondingServer down or configuration errorCheck RADIUS server status and logs

Verification Steps

Test Network Connectivity

From the CertMS server, test connectivity to RADIUS server:

Linux/Mac: nc -u -v <radius-server> 1812

Windows: Test-NetConnection <radius-server> -Port 1812

Check RADIUS Server Logs

Review RADIUS server logs for:

  • Connection attempts from CertMS
  • Authentication requests
  • Shared secret mismatches
  • User authentication failures

Verify Firewall Rules

Ensure firewall allows:

  • Protocol: UDP
  • Source: CertMS server IP
  • Destination: RADIUS server IP
  • Port: 1812 (or configured port)

Test with Known Account

Use a RADIUS account that works with other systems to isolate CertMS-specific issues.

Debug Checklist

  •  RADIUS server is running and accessible
  •  Shared secret matches on both systems
  •  Network connectivity exists (ping, traceroute)
  •  Firewall allows UDP traffic on RADIUS port
  •  Username in CertMS matches RADIUS username exactly
  •  RADIUS provider is marked as Active
  •  User is assigned to correct authentication provider
  •  RADIUS server logs show authentication attempts

Security Considerations

Shared Secret Security

  • Use strong shared secrets: Long, random, complex strings
  • Rotate regularly: Change shared secrets according to security policy
  • Limit access: Only authorized personnel should know shared secret
  • Secure storage: Store shared secrets in password managers or secure vaults

Account Security

  • Maintain emergency access: Keep at least one Local admin account
  • Regular audits: Review RADIUS-authenticated user accounts
  • Disable unused accounts: Remove or deactivate accounts for departed users
  • Monitor failed attempts: Track and investigate authentication failures

Advanced Configuration

NAS Identifier Usage

Use NAS Identifier for:

  • RADIUS server logging: Identify authentication requests from CertMS
  • Policy decisions: RADIUS server can apply different policies based on NAS ID
  • Multi-tenant environments: Distinguish between different CertMS instances

Integration with Active Directory

When using RADIUS with Active Directory:

  • Username format: Use username or domain\username as configured
  • Group membership: RADIUS can validate AD group membership
  • Password policies: AD password policies are enforced automatically

Disabling or Removing RADIUS Authentication

Temporarily Disable

To temporarily disable RADIUS without deleting configuration:

  1. Open the RADIUS auth provider
  2. Uncheck the Active checkbox
  3. Save changes
  4. Users will fall back to next priority provider (typically Local)

Permanently Remove

To delete a RADIUS provider:

  1. First: Reassign all users to different authentication provider
  2. Navigate to Auth Providers
  3. Select the RADIUS provider
  4. Click Delete
  5. Confirm deletion

Warning: Do not delete a RADIUS provider while users are still assigned to it, or they will be unable to log in.


Need Help? Contact our support team at support@certms.com for assistance with RADIUS configuration, troubleshooting, or integration with your specific RADIUS infrastructure.

Powered by BetterDocs