Use Multi-Factor Authentication (MFA) with JumpCloud to secure user access to your organization’s resources. You can enable MFA for your RADIUS VPN servers. When MFA is enabled on a RADIUS VPN server, users are challenged for a Time-based One-time Password (TOTP) or to use Push when connecting to that VPN server.
Considerations:
- Set up your Push or TOTP MFA for user accounts first:
JumpCloud supports the following MFA solutions:
- TOTP
- PAP only
- PUSH
- PAP
- EAP-TTLS/PAP
- EAP-MSCHAPv2
- EAP-PEAP/MSCHAP2
- MSCHAP
- MSCHAPv2
- We recommend using EAP-TTLS/PAP for RADIUS authentication.
- We do not recommend you use TOTP, because it can only be used with PAP which is an insecure authentication method.
- JumpCloud MFA is intended to be used on RADIUS VPN servers. We do not recommend enabling MFA for wireless network RADIUS servers. Depending on your network configuration, users might be prompted to approve multiple MFA requests throughout the day as their devices reconnect to WiFi.
- Mac and iOS devices require additional software to use EAP-TTLS/PAP authentication for wireless clients. See Configure EAP-TTLS/PAP on Mac and iOS for RADIUS for more information.
- JumpCloud Protect Mobile Push can be used on RADIUS VPN servers and wireless network RADIUS servers.
- JumpCloud Protect Mobile Push can be used as an authentication method for the following RADIUS protocols: EAP-TTLS/PAP, EAP-MSCHAPv2, EAP-PEAP/MSCHAP2, and MSCHAPv2.
- To learn more about the RADIUS authentication protocols supported by JumpCloud, see RADIUS Protocol Support.
Configuring TOTP MFA on RADIUS Servers
Learn how to add a RADIUS server to your JumpCloud account: RADIUS Configuration and Authentication.
To configure RADIUS MFA for an existing server:
- Log in to the JumpCloud Admin Portal.
If your data is stored outside of the US, check which login URL you should be using depending on your region, see JumpCloud Data Centers to learn more.
- Go to Access > RADIUS.
- Select an existing RADIUS server, then click the Authentication tab.
- Configure TOTP Multi-factor Authentication for the RADIUS server:
- Under Multi-Factor Authentication (MFA) Configuration, toggle the MFA Requirement for this RADIUS Server option to Enabled. This option is disabled by default.
- Select Require MFA on all users or Only require MFA on users enrolled in MFA.
- Click Save.
The RADIUS MFA settings have been updated from a previous version:
- Require MFA on all users (previously was Challenge all users, including during an enrollment period)
- Require MFA on all users, but Exclude users in TOTP Enrollment period (previously was Challenge all users, unless they are in an enrollment period)
- Only require MFA on users enrolled in MFA (previously was Challenge active TOTP MFA users)
Connecting to TOTP MFA-enabled RADIUS Servers
Users connect to TOTP MFA-enabled servers by adding a comma (,) and 6-digit TOTP to their JumpCloud password. For example, a user with a password of MyB@dPa33word would enter MyB@dPa33word,123456 for their password, where 123456 represents the 6-digit OTP that is generated by a TOTP app like JumpCloud Protect. Educate your users: Set Up an Authenticator App for Your User Account.
Configuring Push MFA on RADIUS Servers
Learn how to add a RADIUS server to your JumpCloud account: RADIUS Configuration and Authentication.
When Push is required on MFA, both TOTP and Push become available; however, only one method of authentication is required.
To configure RADIUS MFA for an existing server:
- From the JumpCloud Admin Portal, go to Access > RADIUS.
- Select an existing RADIUS server, then click the Authentication tab.
- Configure Multi-factor Authentication for the RADIUS server:
- Under Multi-Factor Authentication (MFA) Configuration, toggle the MFA Requirement for this RADIUS Server option to Enabled for this server. This option is Disabled by default.
- Select Require MFA on all users or Only require MFA on users enrolled in MFA.
- If selecting Require MFA on all users, a sub-bullet allows for excluding users in a TOTP enrollment period, but this does not apply to JumpCloud Protect (users in a TOTP enrollment period who are successfully enrolled in Protect will still be required to complete MFA).
- If JumpCloud Protect is not yet enabled, follow the Enable Now link.
- Click Enable, which will return you to the RADIUS Server Configuration window.
- Click Save.
Connecting to Push MFA-Enabled RADIUS Servers
Users connect to Push MFA-enabled servers by entering their JumpCloud password. The system will send a push notification to their Protect device and users simply open the notification and tap Yes, Approve to complete the login.
Viewing RADIUS MFA Status
You can see if TOTP MFA is enabled for a RADIUS server in the RADIUS list's MFA Status column.
