RADIUS authentication has been around for decades, but IT professionals still debate whether it should be the go-to service for managing and authenticating users. Although, over time, the technology landscape has developed to include a variety of authentication protocols, RADIUS authentication continues to offer significant value in modern IT environments. <\/p>\n\n\n\n
As such, we\u2019ve broken down exactly what RADIUS<\/a> authentication is, as well as the pros and cons of RADIUS<\/a> that IT admins should evaluate with respect to its implementation.<\/p>\n\n\n\n
At its most basic, RADIUS authentication is an acronym that stands for Remote Authentication Dial in User Service. Livingston Enterprises, Inc.<\/a> developed it as an authentication and accounting protocol in response to Merit Network\u2019s<\/a> 1991 call for a creative way to manage dial-in access<\/a> to various Points-Of-Presence (POPs) across its network.<\/p>\n\n\n\n
RADIUS utilizes the client\/server model<\/a> to authenticate and authorize users to login to a network or network infrastructure gear. It works by sending client requests for access to the RADIUS server for verification. These requests are formatted like a package, including the client\u2019s username, password, IP address, and port, which are then queried in the database for potential matches. Depending on the information received, and whether it is correct, the server will return with an action to either accept, reject, or challenge access to the requested service.<\/p>\n\n\n\n