RADIUS Client (RADIUS Login)

RADIUS Client (RADIUS Login) Install Statistics

0
100%
Today: 0 Yesterday: 0 All-time: 2,409 downloads
RADIUS Client (RADIUS Login) Icon

Try plugin: RADIUS Client (RADIUS Login)

We'll create fresh WordPress site with RADIUS Client (RADIUS Login) installed. You have 20 minutes to test the plugin after that site we'll be deleted.

Takes ~10 seconds to install.

About RADIUS Client (RADIUS Login)

RADIUS Client or RADIUS Login plugin allows users to login with any RADIUS Server such as freeRadius, jumpCloud, tinyRadius, and etc.

1


0


0


0


0

updated: 1 year ago
since: 6 years ago
author: miniOrange

Description

RADIUS (Remote Authentication Dial-In User Service) Client or RADIUS Login plugin allows users to login with any RADIUS Server. We support radius authentication schemes like PAP, CHAP (MD5), MS CHAP V1, EAP-MSCHAP v2 and other schemes on request.
RADIUS Client plugin also allows you to invoke multi factor authentication (mfa/2fa) using RADIUS Server. You can also configure and use miniOrange as a RADIUS server with MFA.
RADIUS Client plugin supports both ACCESS/REJECT and CHALLENGE RESPONSES. In this way you can use all type of Second factor methods.
RADIUS Client supports all types of Attribute import.

Radius Servers we Support

  • freeRadius
  • jumpCloud
  • routerOS
  • techRouter
  • tinyRadius
  • AuthenticateMyWiFi
  • ClearBox
  • FoxPass
  • Acess Points

FREE VERSION FEATURES

  • Supports login with any 3rd party RADIUS server or custom RADIUS server
  • Option to allow/deny Auto Register Users- Automatic user registration after login if the user is not already registered with your site
  • Allow login with WordPress Username, Email or both for existing users.
  • Supports Authentication scheme – PAP Authentication

PREMIUM FEATURES

  • All the Free Version Features
  • Login Widget- Use Widgets to easily integrate the login link with your WordPress site
  • Support for Authentication Schemes – PAP Authentication, CHAP-MD5 Authentication, MSCHAP v1 Authentication, EAP-MSCHAP v2 Authentication

RADIUS Servers support :-

The plugin works with the following RADIUS Servers:
* Microsoft Windows Network Policy Server (NPS Server)
* Free RADIUS 2 and above
* Tiny RADIUS

What is RADIUS?

Remote Authentication Dial-In User Service (RADIUS) is a client/server(networking) protocol,operating on port 1812 that provides centralized Authentication, Authorization, and Accounting (AAA or Triple A) management for users who connect and use a network service. It enables remote access servers to communicate with a server to authenticate users and authorize their access to the requested system or service.

RADIUS Client

The RADIUS client is typically a NAS ( Network Access Server ) which is responsible for passing user information to designated RADIUS servers, and then based on the response which is returned, authenticates or rejects login to the user.

RADIUS Server

RADIUS servers are responsible for receiving user connection requests, authenticating the user, and then returning all configuration information necessary for the client to authenticate the user. A RADIUS server can act as a proxy client to other RADIUS servers or other kinds of authentication servers.

Authentication Protocols

The RADIUS server checks that the information is correct using authentication schemes such as PAP, CHAP, MS-CHAP, MS-CHAPv2, EAP, EAP-TLS, EAP-TTLS and EAP-PEAP.

Security

Transactions between the client and RADIUS accounting server are authenticated through the use of a shared secret, which is never sent over the network.

Popular RADIUS Clients miniOrange integrates with:

*Palo Alto
The users enter their AD credentials to log in to Palo Alto, the RADIUS Client, and after the username/password validation, an One Time Passcode is sent to the user’s mobile number. The user enters the One Time passcode received, which is validated by miniOrange to gain/deny access to the user.

*OpenVPN
The users enter their AD credentials and the 2FA code ( Software Token ) to log in to OpenVPN, the RADIUS Client, and after the username/password validation, are prompted for the 2-factor authentication. Post validation of 2nd factor, users are logged in to OpenVPN.

*FortiNet
The users enter their AD credentials to log in to FortiNet, and after the username/password validation, an push notification is sent to the user’s mobile, that he needs to accept to get logged in to AWS.

*AWS AD Connector

*Citrix

If you do not find your radius server listed here, please contact us on [email protected]

Secure your WordPress site with 2FA on top of single sign-on using miniOrange On-Premise IDP. You can also protect any VPN, Remote Desktop, Windows with 2FA using our Cloud Service/On-Premise Module.