{"id":30277,"date":"2019-03-15T09:00:30","date_gmt":"2019-03-15T15:00:30","guid":{"rendered":"https:\/\/jumpcloud.com\/?p=30277"},"modified":"2024-08-14T17:41:36","modified_gmt":"2024-08-14T21:41:36","slug":"high-availability-radius-server","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/high-availability-radius-server","title":{"rendered":"High Availability RADIUS Server"},"content":{"rendered":"\n
Is there a high availability (HA) RADIUS server that is easy to implement and cost-effective? As more IT organizations leverage RADIUS servers to help them control and manage their network infrastructure, the question around HA for RADIUS is critical. Thankfully, <\/span>an option exists on the market<\/span><\/a> today that is providing HA RADIUS on top of a cloud directory service. But, before diving into high availability RADIUS server options, we should step back and understand how and why RADIUS is used in modern IT environments.<\/span><\/p>\n\n\n\n As the IT landscape has shifted from on-prem, Windows \u00ae <\/sup>-based wired networks to mobile, heterogeneous WiFi environments, the way that IT organizations have to manage and control their networks has changed. Traditionally, IT admins would leverage tools such as Microsoft\u00ae<\/sup> Active Directory\u00ae<\/sup><\/a> and the <\/span>domain controller<\/span><\/a> to control access. End users would log in to their IT infrastructure through their Windows-based laptops and desktops, either on-prem or via a VPN. Active Directory then authenticated the user, and they would then have access to whatever Windows-based IT resources they needed\u2014i.e. within their domain.<\/span><\/p>\n\n\n\n As the wired network gave way to the convenience of WiFi, the process of authenticating and controlling users became more difficult. Most IT organizations simply gave users a shared SSID and passphrase to join the network. While a shared SSID\/passphrase was less secure, implementing and integrating unique WiFi authentication via RADIUS servers to the core identity provider was a hassle. Additionally, if any part of the RADIUS authentication chain broke, users would be completely without access to the network and the Internet.<\/span><\/p>\n\n\n\nA Changing Network<\/span><\/h2>\n\n\n\n