JumpCloud’s RADIUS-as-a-service lets your users authenticate to WiFi or VPN networks within your IT environment. The following list of questions are commonly asked of the JumpCloud product and the RADIUS protocol.<\/p>\n\n\n\n
This may work for some, but not all use cases. JumpCloud uses the public IP address where RADIUS authentication attempts originate to identify them. If WiFi and VPN authentication attempts originate from the same public IP, JumpCloud can\u2019t differentiate between the services.<\/p>\n\n\n\n
If you want different users to be able to access each service independently or enable MFA for one and not the other, your network would need an additional public IP address from your ISP. This requires some firewall configuration to send authentication requests for each service from a different public IP.\u00a0\u00a0<\/p>\n<\/div><\/div><\/div>\n\n\n\n
EAP-PEAP\/MSCHAPv2<\/strong> is the most common way users connect to JumpCloud-RADIUS-backed networks. When connecting, users will be prompted for their credentials and then asked to manually trust the RADIUS server certificate. They will only be asked to trust the certificate upon the initial connection and not again until the RADIUS server certificate is updated.<\/p>\n\n\n\n
EAP-TTLS\/PAP<\/strong> requires additional client configuration, which is outlined for both Windows<\/a> and Apple<\/a> devices. These profiles are pre-configured with the certificate installed and trusted on the device and also includes the ability to send an Anonymous Outer Identity. Some Linux distributions also only support one or the other.<\/p>\n\n\n\n