{"id":34807,"date":"2022-06-20T08:00:00","date_gmt":"2022-06-20T12:00:00","guid":{"rendered":"https:\/\/jumpcloud.com\/?p=34807"},"modified":"2023-06-16T16:03:49","modified_gmt":"2023-06-16T20:03:49","slug":"radius-pros-cons","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/radius-pros-cons","title":{"rendered":"RADIUS Authentication Pros & Cons"},"content":{"rendered":"\n
RADIUS authentication has been around for decades, but IT professionals still debate whether it should be the go-to service for managing and authenticating users. Although, over time, the technology landscape has developed to include a variety of authentication protocols, RADIUS authentication continues to offer significant value in modern IT environments. <\/p>\n\n\n\n
As such, we\u2019ve broken down exactly what RADIUS<\/a> authentication is, as well as the pros and cons of RADIUS<\/a> that IT admins should evaluate with respect to its implementation.<\/p>\n\n\n\n At its most basic, RADIUS authentication is an acronym that stands for Remote Authentication Dial in User Service. Livingston Enterprises, Inc.<\/a> developed it as an authentication and accounting protocol in response to Merit Network\u2019s<\/a> 1991 call for a creative way to manage dial-in access<\/a> to various Points-Of-Presence (POPs) across its network.<\/p>\n\n\n\nWhat is RADIUS Authentication?<\/h2>\n\n\n\n