Search…
RadSec

Configuration Steps

Step 1: RadSec Connection Certificate

This is a mandatory step.
To establish trust between your RadSec-capable network gear and RADIUSaaS, upload the RadSec server certificate as described here.
Your network gear vendor should either provide this certificate or provide guidance on how to create one (CSR or via FQDN).

Step 2: Server Certificate

This is a mandatory step.
Since the client will establish a TLS tunnel directly to RADIUSaaS during network authentication, a trusted TLS certificate is required. This can be generated directly from the RADIUSaaS Admin Portal or imported if you already own a suitable certificate.
If you are planning to use RADIUSaaS along with Android devices, you must create a custom CA or upload your own certificate that was signed by a CA. The default self-signed server certificate will not allow Android devices to connect to RADIUSaaS.
  1. 1.
    Create a custom CA, upload your own certificate or use the default self-signed server certificate as described here.
  2. 2.
    Download the active server certificate as described here. You will need it later on for the Intune device profile.

Step 3: Trusted Root CA

This is a mandatory step.
  1. 1.
    Tell your RADIUSaaS instance which certificates will be allowed to connect as described here .

Step 4: Network Gear Configuration

This is a mandatory step.

WiFi Access Points

For some popular vendors, we have prepared representative step-by-step guides here. While we are not able to provide documentation for every vendor, in general, the following steps apply:
  1. 1.
    Import your active RADIUS Server Certificate to your WiFi infrastructure.
  2. 2.
    Add the CA certificate from which your APs obtain their RadSec connection certificate to your RadSec allowed Connection list as described here.
  3. 3.
    Create a new RADIUS profile.
  4. 4.
    Set the IP address and the port of your server in your RADIUS profile. Therefore, use the public RadSec IP address and the standard RadSec port (2083).
    1. 1.
      If you get asked to enter a shared secret, set it to "radsec".
  5. 5.
    Assign the created profile to your SSID(s).

Wired (LAN) Switches

Currently, we have not prepared sample guides for switch appliances yet. However, the configuration steps are similar to the ones for WiFi Access Points. In case you face difficulties, please reach out to us.

Step 5: Configure your MDM Deployment Profiles

This is a mandatory step.

Server Certificate

To enable trust between the client and RADIUSaaS, configure a trusted certificate profile in your preferred MDM solution:
Microsoft Intune

Jamf

WiFi Profile

To configure a WiFi profile in your preferred MDM solution, follow one of these guides:
Microsoft Intune
Jamf

Wired (LAN) Profile

To configure a wired (LAN) profile for your stationary devices in your preferred MDM solution, follow one of these guides:
Microsoft Intune
Jamf

Step 6: Rules

This is an optional step.
If you would like to configure additional rules, for example to assign VLAN IDs or limit authentication requests to certain trusted CA or WiFi access points, please check out the RADIUSaaS Rule Engine.