{"id":43083,"date":"2019-11-24T09:00:00","date_gmt":"2019-11-24T09:00:00","guid":{"rendered":"https:\/\/jumpcloud.com\/?p=43083"},"modified":"2023-05-11T16:03:46","modified_gmt":"2023-05-11T20:03:46","slug":"radius-without-ad","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/radius-without-ad","title":{"rendered":"RADIUS Server Without Active Directory"},"content":{"rendered":"\n
Can you implement a RADIUS server without Active Directory (AD) back-ending it? For a long time in IT, admins used the on-prem directory service as the source of user data for their RADIUS servers, ensuring their networks were as secure as possible. With the prevalence of the cloud in the IT landscape, however, on-prem server functions seem to be going out of style. So, the question becomes: how do you shift RADIUS to the cloud without AD back-ending it?<\/p>\n\n\n\n
When compared to traditional methods, using RADIUS \u2014 or the Remote Access Dial-In User Service<\/a> \u2014 allows organizations to tighten up their network security more thoroughly. Many organizations implement RADIUS to require a unique set of credentials to authenticate users to WiFi networks, which, when used in addition to just a shared WPA key, reduces the likelihood of a network breach. RADIUS also enables the use of multi-factor authentication (MFA) on VPN connections<\/a>. Although MFA is a more recent trend, securing VPNs was one of RADIUS\u2019s core use cases.<\/p>\n\n\n\n In order to properly authenticate access, RADIUS requires a directory to compare relayed credentials against. Most RADIUS servers can authenticate against user credentials stored within it, but the process is made more secure by leveraging the core identity from a directory service. Given that AD has dominated the directory services scene<\/a> since its inception, it made sense to pair it with RADIUS. Plus, historically, RADIUS servers are generally housed on-prem, which puts it directly in the range of the AD domain controller\u2019s reach. In fact, Microsoft created its own RADIUS-like solution called Windows NPS<\/a> to provide RADIUS-like capabilities to the AD domain. For much of the early 21st century, IT admins equipped with Active Directory and NPS or a standalone RADIUS server, such as FreeRADIUS<\/a>, could rest assured that they had tightly controlled network access.<\/p>\n\n\n\n Although they don\u2019t have direct interactions with RADIUS, the host of cloud applications and infrastructure that has risen in prevalence in the modern IT landscape has changed the way RADIUS is viewed. In spite of their advancements in productivity and collaboration, these cloud-based resources have put a strain on AD-centric IT organizations. Due to this, some organizations have started to rethink their directory service options. This decision ultimately trickles down to on-prem RADIUS servers as well. After all, many server functions have been offloaded to the cloud (i.e. infrastructure\/data centers in AWS, Azure, GCP, etc.), so it’s natural to consider shifting RADIUS as well. Of course, simply hosting FreeRADIUS on a cloud server in AWS doesn\u2019t preclude IT organizations from the work of managing, configuring, and updating their RADIUS implementations.<\/p>\n\n\n\n Organizations looking to move their infrastructure to the cloud need a way to use RADIUS without Active Directory \u2014 or servers altogether. By implementing RADIUS integrated with a cloud directory service, IT organizations can reap much of the benefits of RADIUS authentication with barely any of the heavy lifting and legwork. All of this and more are possible with JumpCloud’s open directory platform. <\/a>The first cloud directory service of its class, JumpCloud features baked-in Cloud RADIUS<\/a>, which leverages a global network of cloud-hosted FreeRADIUS servers to alleviate the burden of implementation from the shoulders of IT admins and network engineers. This includes the addition of RADIUS MFA<\/a> for securing VPNs. Beyond online RADIUS servers<\/a>, JumpCloud is fully fledged with respect to user and device management, as well as authentication to applications and servers via SAML and LDAP<\/a>. With JumpCloud, IT organizations can essentially replace their on-prem AD instance with a modern directory completely hosted in the cloud.<\/p>\n\n\n\n If you\u2019re ready to secure your network with a cloud RADIUS server that provides interoperability and Zero Trust security, sign up today<\/a> for a JumpCloud account. It\u2019s free for up to 10 users or devices. If you\u2019d like additional information, feel free to consult JumpCloud\u2019s Knowledge Base<\/a>, or drop us a line<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":" Can you implement a RADIUS server without Active Directory? As more IT functions shift to the cloud, some wonder if RADIUS can as well.<\/p>\n","protected":false},"author":70,"featured_media":43085,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_oasis_is_in_workflow":0,"_oasis_original":0,"_oasis_task_priority":"","inline_featured_image":false,"footnotes":""},"categories":[2337],"tags":[],"collection":[2780],"platform":[],"funnel_stage":[3016],"coauthors":[2515],"acf":[],"yoast_head":"\n
<\/p>\n\n\n\nManaging RADIUS Access through AD<\/h3>\n\n\n\n
<\/p>\n\n\n\nThe Cloud Changed Everything<\/h2>\n\n\n\n
<\/p>\n\n\n\n
<\/p>\n\n\n\nRADIUS Without Servers<\/h2>\n\n\n\n
<\/p>\n\n\n\n
<\/p>\n\n\n\nTry JumpCloud Cloud RADIUS<\/h2>\n\n\n\n