{"id":33880,"date":"2021-06-16T11:00:00","date_gmt":"2021-06-16T15:00:00","guid":{"rendered":"https:\/\/jumpcloud.com\/?p=33880"},"modified":"2024-08-15T12:20:39","modified_gmt":"2024-08-15T16:20:39","slug":"ldap-vs-radius","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/ldap-vs-radius","title":{"rendered":"LDAP vs RADIUS"},"content":{"rendered":"\n
For some, the comparison of LDAP versus RADIUS may not make much sense. But, for others, there are instances where the abilities of each protocol overlap \u2014 especially when it comes to authenticating various networking devices. <\/p>\n\n\n\n
As the pandemic nears its end, organizations are opening their doors to welcome employees back into the office and creating hybrid work environments<\/a>; with that and the emerging question of how end users will access their IT resources in mind, let\u2019s take a look at LDAP versus RADIUS.<\/p>\n\n\n\n Both LDAP and RADIUS are authentication protocols that enable users to access IT resources. Each protocol is available as an open source implementation, and each is standardized with an Internet Engineering Task Force Request for Comments or IETF RFC. Here is a link to each: LDAP<\/a> and RADIUS<\/a>. <\/p>\n\n\n\n Further, each solution has a community surrounding it that provides further development, discussion, and best practices for implementation. <\/p>\n\n\n\n In short, these two protocols were created for different use cases. LDAP was created mainly for authentication to systems and applications. <\/p>\n\n\n\n RADIUS, on the other hand, was initially created for low-bandwidth conditions across networks to authenticate dial-up users via modems to remote servers over telephone lines. Now, it is mainly used for authentication to networks and network resources. <\/p>\n\n\n\n LDAP and RADIUS can overlap: LDAP can be leveraged to authenticate users to OpenVPN networks in the same way that RADIUS can, for example. <\/p>\n\n\n\n Also, some WiFi networking gear allows LDAP authentication<\/a> in place of RADIUS. For these purposes, IT admins and DevOps engineers may have a preference based on their environment setup, company processes, or personal experience. . <\/p>\n\n\n\n Despite these overlaps, however, one generally cannot replace the other. For example, you may need RADIUS reply attributes to place a given user, or group of users, in the correct VLAN<\/a>. You cannot do this with LDAP. Similarly, you wouldn\u2019t use RADIUS to authenticate users to Linux servers or share user attributes with an application.<\/p>\n\n\n\n Fortunately, LDAP and RADIUS work well in tandem. That\u2019s why the JumpCloud Directory Platform<\/a> leverages both protocols so you get the ability to use LDAP and<\/em> RADIUS\u2014all with no on-prem infrastructure to tend to. <\/p>\n\n\n\n LDAP (Lightweight Directory Access Protocol)<\/a> is an authentication protocol that facilitates user access to various IT resources (applications, servers, networking equipment, file servers, and more). <\/p>\n\n\n\n LDAP is also leveraged as a directory store of information about users, their attributes, and group memberships, among other details. LDAP enables IT administrators to store, access, authenticate, and modify those attributes along with utilizing those attributes during the authentication process. <\/p>\n\n\n\n One of the most common LDAP actions is the bind request. Essentially, a bind request is a request from a client (sent on behalf of a user) to authenticate against an LDAP server<\/a>, which hosts the directory itself \u2014 the database of users along with their passwords, attributes, and more. <\/p>\n\n\n\n Ultimately the bind process is to gain access to a particular resource \u2014 which could be a Linux server, application (such as Atlassian Jira), an on-prem storage system like a network attached storage (NAS)<\/a> device, an OpenVPN-based network, or wireless networking gear, among many others. <\/p>\n\n\n\n Common LDAP implementation choices include: <\/p>\n\n\n\n RADIUS, or Remote Access Dial-In User Service<\/a>, is a protocol created to authenticate user identities to networks and networking infrastructure. Like LDAP, RADIUS has an integrated database to store users and attributes, but unlike LDAP, most RADIUS implementations delegate identity verification to a separate directory server.<\/p>\n\n\n\n The primary use case for RADIUS is to centralize authentications to access networks via WiFi or VPNs as well as to many different types of networking gear. Those devices could include wireless access points, switches, VPNs<\/a>, routers, and many more. <\/p>\n\n\n\n RADIUS serves as both a piece of software and a protocol; RADIUS can<\/em> store user identities for authentication purposes, but the work of actually performing those authentications is generally delegated to a directory service (primarily because RADIUS isn\u2019t a popular authentication protocol with applications and systems and would thus require another user store). <\/p>\n\n\n\n While RADIUS has the ability to store basic user attributes, like usernames and passwords, many organizations also need other attributes in their network authentication environments that are generally focused on the networking side, such as VLAN placement and \u201caccounting\u201d data, which includes reporting on network activity \u2014 all of which RADIUS supports.<\/p>\n\n\n\n By centralizing authentications, RADIUS eliminates the need for users to remember different credentials for each network resource. T<\/p>\n\n\n\n his improves the user experience, eases the user provisioning and deprovisioning process, and removes the risk of leaked credentials to central network resources by replacing a shared master login with individual user-based logins (no more shared WiFi or VPN network credentials passed around the user population). <\/p>\n\n\n\n Because RADIUS has been around for over three decades and works with so many different types of equipment, it has cemented its place in IT for another generation. <\/p>\n\n\n\n RADIUS is common in environments with many different users and a significant amount of networking gear, like ISPs, college campuses, and enterprise infrastructures. Common implementations of RADIUS \u2014 both software and protocol \u2014 include:<\/p>\n\n\n\n JumpCloud integrates both the LDAP and RADIUS protocols into an integrated cloud-based directory that securely manages devices, users, and IT resources. Get started<\/a> with JumpCloud. Or, to see it in action, schedule a demo<\/a> today.<\/p>\n","protected":false},"excerpt":{"rendered":" For a detailed overview of what each protocol brings to your identity management strategy, take a look at our RADIUS vs LDAP comparison.<\/p>\n","protected":false},"author":144,"featured_media":33830,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_oasis_is_in_workflow":0,"_oasis_original":0,"_oasis_task_priority":"","inline_featured_image":false,"footnotes":""},"categories":[23,2337],"tags":[],"collection":[2779,2780],"platform":[],"funnel_stage":[3016],"coauthors":[2532],"acf":[],"yoast_head":"\nLDAP versus RADIUS: Similarities and Differences<\/h2>\n\n\n\n
What LDAP Does<\/h2>\n\n\n\n
\n
<\/li>\n\n\n\n
<\/li>\n\n\n\n
<\/li>\n\n\n\nWhat RADIUS Does<\/h2>\n\n\n\n
\n
<\/li>\n\n\n\n
<\/li>\n\n\n\n
<\/li>\n\n\n\nTry JumpCloud Today<\/h2>\n\n\n\n