RADIUS Client or RADIUS Login plugin allows users to login with any RADIUS Server such as freeRadius, jumpCloud, tinyRadius, and etc.
RADIUS (Remote Authentication Dial-In User Service) Client or RADIUS Login plugin allows users to login with any RADIUS Server. We support radius authentication schemes like PAP, CHAP (MD5), MS CHAP V1, EAP-MSCHAP v2 and other schemes on request.
RADIUS Client plugin also allows you to invoke multi factor authentication (mfa/2fa) using RADIUS Server. You can also configure and use miniOrange as a RADIUS server with MFA.
RADIUS Client plugin supports both ACCESS/REJECT and CHALLENGE RESPONSES. In this way you can use all type of Second factor methods.
RADIUS Client supports all types of Attribute import.
The plugin works with the following RADIUS Servers:
* Microsoft Windows Network Policy Server (NPS Server)
* Free RADIUS 2 and above
* Tiny RADIUS
Remote Authentication Dial-In User Service (RADIUS) is a client/server(networking) protocol,operating on port 1812 that provides centralized Authentication, Authorization, and Accounting (AAA or Triple A) management for users who connect and use a network service. It enables remote access servers to communicate with a server to authenticate users and authorize their access to the requested system or service.
The RADIUS client is typically a NAS ( Network Access Server ) which is responsible for passing user information to designated RADIUS servers, and then based on the response which is returned, authenticates or rejects login to the user.
RADIUS servers are responsible for receiving user connection requests, authenticating the user, and then returning all configuration information necessary for the client to authenticate the user. A RADIUS server can act as a proxy client to other RADIUS servers or other kinds of authentication servers.
The RADIUS server checks that the information is correct using authentication schemes such as PAP, CHAP, MS-CHAP, MS-CHAPv2, EAP, EAP-TLS, EAP-TTLS and EAP-PEAP.
Transactions between the client and RADIUS accounting server are authenticated through the use of a shared secret, which is never sent over the network.
*Palo Alto
The users enter their AD credentials to log in to Palo Alto, the RADIUS Client, and after the username/password validation, an One Time Passcode is sent to the user’s mobile number. The user enters the One Time passcode received, which is validated by miniOrange to gain/deny access to the user.
*OpenVPN
The users enter their AD credentials and the 2FA code ( Software Token ) to log in to OpenVPN, the RADIUS Client, and after the username/password validation, are prompted for the 2-factor authentication. Post validation of 2nd factor, users are logged in to OpenVPN.
*FortiNet
The users enter their AD credentials to log in to FortiNet, and after the username/password validation, an push notification is sent to the user’s mobile, that he needs to accept to get logged in to AWS.
*AWS AD Connector
*Citrix
If you do not find your radius server listed here, please contact us on [email protected]
Secure your WordPress site with 2FA on top of single sign-on using miniOrange On-Premise IDP. You can also protect any VPN, Remote Desktop, Windows with 2FA using our Cloud Service/On-Premise Module.
Plugins > Add New
.RADIUS Client
. Find and Install RADIUS Client (RADIUS Login)
.miniorange-radius-client.zip
directory to your /wp-content/plugins/
directory.Please email us at [email protected] or Contact us
Please email us at [email protected] or Contact us.
You can use our another plugin for this use case. Click here to Checkout our plugin
You can use our another plugin for this use case. Click here to Checkout our plugin