You enable the RADIUS authentication method and configure the RADIUS settings in the Workspace ONE Access console.

Prerequisites

Install and configure the RADIUS software on an authentication manager server. For RADIUS authentication, follow the vendor's configuration documentation.

The following RADIUS server information is required to configure RADIUS on the Workspace ONE Access service.

  • IP address or DNS name of the RADIUS server.
  • Authentication port numbers. Authentication port is usually 1812.
  • Authentication type. The authentication types include PAP (Password Authentication Protocol), CHAP (Challenge Handshake Authentication Protocol), MSCHAP1, MSCHAP2 (Microsoft Challenge Handshake Authentication Protocol, versions 1 and 2).
  • RADIUS shared secret that is used for encryption and decryption in RADIUS protocol messages.
  • Specific timeout and retry values needed for RADIUS authentication

The User Auth service installed as a component of the Workspace ONE Access connector version 20.01. See Installing VMware Workspace ONE Access Connector 20.01.

Procedure

  1. In the Workspace ONE Access console Identity & Access Management tab, select Manage > Enterprise Authentication Methods.
  2. Click NEW and select RADUS (cloud deployment).
  3. Select the directory and the service host to configure with this authentication method.
  4. Configure the RADIUS authentication method.
    Option Action
    Number of authentication attempts allowed Enter the maximum number of failed login attempts when using RADIUS to log in. The default is five attempts.
    Login page passphrase hint Enter the text string to display as the message on the user login page to direct users to enter the correct RADIUS passcode. For example, if this text box is configured with AD password first and then SMS passcode, the login page message reads Enter your AD password first and then SMS passcode.. The default text string is RADIUS Passcode.
    Enable direct authentication to Radius server Select this box to enable direct user authentication. When this is enabled, users are not required to reenter their credentials.

    To use direct authentication to the RADIUS server, the user name must be configured the same way on both the RADIUS server and in Active Directory. Note that a user name JSmith in Active Directory does not match jsmith in the RADIUS server.

    Number of attempts to RADIUS server Enter the total number of retry attempts. If the primary server does not respond, the service waits for the configured time before retrying again.
    Server timeout in seconds

    Enter the RADIUS server timeout in seconds, after which a retry is sent if the RADIUS server does not respond.

    RADIUS Server Hostname/Address (Optional) Enter the host name or the IP address of the RADIUS server.
    Authentication port Enter the RADIUS authentication port number. The port is usually 1812.
    Accounting port Enter 0 for the port number. The accounting port is not used currently.
    Authentication type Enter the authentication protocol that is supported by the RADIUS server. Either PAP, CHAP, MSCHAP1, OR MSCHAP2.
    Shared secret Enter the shared secret that is used between the RADIUS server and the Workspace ONE Access service.
    Realm prefix (Optional) The user account location is called the realm. Enter the realm prefix to use.

    If you enter a realm prefix string, the string is placed at the beginning of the user name when the name is sent to the RADIUS server. For example, if the user name is entered as jdoe and the realm prefix DOMAIN-A\ is specified, the user name DOMAIN-A\jdoe is sent to the RADIUS server. If you do not configure the Realm text boxes, only the user name that is entered is sent.

    Realm suffix (Optional) If you specify a realm suffix, the string is placed at the end of the user name. For example, if the suffix is @myco.com, the user name [email protected] is sent to the RADIUS server.
  5. You can enable a secondary RADIUS server for high availability.
    Configure the secondary server as described in step 4.
  6. Click NEXT to review the configuration and then click SAVE.

What to do next

Add RADIUS as an authentication method to the built-in identity provider configuration page.

Add the RADIUS authentication method to the default access policy. Go to the Identity & Access Management > Manage > Policies page and edit the default policy rules to add the RADIUS authentication method to the rule. See Managing Access Policies in Workspace ONE Access That Apply to Users.

For high availability, associate this RADIUS authentication method to other registered Workspace ONE Access connectors where the enterprise service User Auth is installed.