{"id":26549,"date":"2019-01-07T15:00:36","date_gmt":"2019-01-07T22:00:36","guid":{"rendered":"https:\/\/jumpcloud.com\/?p=26549"},"modified":"2023-01-10T15:46:47","modified_gmt":"2023-01-10T20:46:47","slug":"iam-radius-authentication","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/iam-radius-authentication","title":{"rendered":"IAM Capability RADIUS Authentication"},"content":{"rendered":"\n
With the IT network shifting further away from wired connections and over to WiFi, there is a renewed focus on security and authentication services. Gone are the days of security by proxy\u2014that is, security via a physical connection to the network. With WiFi, additional measures need to be exercised. As a result, the identity and access management<\/a> capability for RADIUS authentication<\/a> is being evaluated by IT admins around the world. We will explore that evaluation in the following blog. <\/span><\/p>\n\n\n\nRADIUS Past and Present Use Cases<\/span><\/h2>\n\n\n