Are you ready for Big Sur? Join Apple experts Bradley Chambers and Tom Bridge on Oct. 7th to learn how to prepare for Big Sur and the future of Mac management. Register today

Outsourced RADIUS




RADIUS is a core protocol for managing network infrastructure. Over time, it has also become a useful part of managing users on WiFi networks. The challenge with RADIUS has been that it is difficult to implement, manage, and maintain. RADIUS is notoriously complex due to the variety of different authentication methods that need to be configured on devices. Recently, a new category of solutions, deemed RADIUS-as-a-Service, is outsourcing RADIUS.

First Use Case: RADIUS for WiFi Authentication

For many years, RADIUS has been leveraged within the network infrastructure portion of networks. Specifically, IT organizations leverage RADIUS to provide authentication services to switches, routers, storage equipment, VPNs, and sometimes even servers. More recently, RADIUS has become the protocol of choice for managing users on their WiFi networks. As organizations move to WiFi from wired networks, they must mitigate the greater security risk. Most WiFi networks are secured with an SSID and passphrase, and IT admins realize that those protocols offer relatively weak security. As a result, IT admins look to the RADIUS protocol as a way to connect the WiFi authentication process to the user’s credentials.

Setup Issues: RADIUS with Core Directory Services

The process of connecting RADIUS to the core directory services can be painful. In addition to configuring the WiFi access point to talk to the RADIUS server, an IT admin must connect the RADIUS infrastructure to the core identity provider. The last major step is to connect users to the WiFi network leveraging a supplicant. This process can be executed through policies, depending upon the operating systems in play within the network. The challenge is being able to set up all of these different steps, ensure high availability, and then, afterwards, maintain the entire infrastructure.

More Security & Control: Benefits of Outsourcing RADIUS

Another option is to outsource the RADIUS infrastructure. In combination with outsourcing directory services, IT admins find that there is very little work for them or the organization to do. WiFi access points are pointed to the cloud-based RADIUS server for authentication. User credentials are passed securely through to the cloud provider’s RADIUS infrastructure. If the RADIUS service is integrated with a Directory-as-a-Service platform, then those credentials are verified with the on-board user database. That process eliminates two core components of infrastructure that an IT organization needs to manage.

The benefits of outsourcing RADIUS are evident. Beyond implementation, maintenance, and management, the organization significantly steps up its security posture. No longer are users leveraging a shared set of WiFi credentials; rather, each user has unique access to the network that can be provisioned and deprovisioned at will and without impacting other users.

To learn more about how you can outsource your RADIUS infrastructure, drop us a note. We’d be happy to chat with you about how our next generation Identity-as-a-Service platform can do the heavy lifting for you with respect to RADIUS and your directory services. To try out our RADIUS-as-a-Service functionality, just set up a free account. The first 10 users are free.


Recent Posts
RADIUS has long served the IT industry, securing networks and end user access to them. Now, cloud RADIUS provides the same benefits without the setup.

Blog

Cloud RADIUS 101

RADIUS has long served the IT industry, securing networks and end user access to them. Now, cloud RADIUS provides the same benefits without the setup.

There are four core ways to try to head off phishing attacks before they happen. Only one avoids phishing vectors altogether. Find it free here.

Blog

Anti-Phishing Approaches

There are four core ways to try to head off phishing attacks before they happen. Only one avoids phishing vectors altogether. Find it free here.

Understand the risk in updating passwords on Microsoft 365, and learn a new approach to securing a user’s core identity. Try JumpCloud Free.

Blog

The Risks to Updating Passwords on Microsoft 365

Understand the risk in updating passwords on Microsoft 365, and learn a new approach to securing a user’s core identity. Try JumpCloud Free.