You configure the User Auth service in the Workspace ONE Access connector to use the connector-based RADIUS (cloud deployment) authentication method when users log into Workspace ONE. You enable the RADIUS authentication method and configure the RADIUS settings in the Workspace ONE Access console.
Prerequisites
- Install and configure the RADIUS software on an authentication manager server. Because RADIUS two-factor authentication solutions work with authentication managers installed on separate servers, the RADIUS server must be configured and accessible to the Workspace ONE Access service. For RADIUS authentication, follow the vendor's configuration documentation.
The following RADIUS server information is required to configure RADIUS on the Workspace ONE Access service.
- IP address or DNS name of the RADIUS server.
- Authentication port numbers. Authentication port is usually 1812.
- Authentication type. The authentication types include PAP (Password Authentication Protocol), CHAP (Challenge Handshake Authentication Protocol), MSCHAP1, MSCHAP2 (Microsoft Challenge Handshake Authentication Protocol, versions 1 and 2).
- RADIUS shared secret that is used for encryption and decryption in RADIUS protocol messages.
- Specific timeout and retry values needed for RADIUS authentication.
- The User Auth service installed as a component of the Workspace ONE Access connector.
Procedure
What to do next
Add RADIUS as an authentication method to the built-in identity provider configuration page.
Add the RADIUS authentication method to the default access policy. In the console, go to the page and edit the default policy rules to add the RADIUS authentication method to the rule. See Managing Access Policies in the Workspace ONE Access Service.
For high availability, associate this RADIUS authentication method to other registered Workspace ONE Access connectors where the enterprise service User Auth component is installed.