Enable RADIUS on Identity Routers in a Cluster
Enable RADIUS on Identity Routers in a Cluster
As part of the RADIUS setup process, you must enable RADIUS on the identity routers in each cluster that communicates with RADIUS client devices.
Note: Enabling RADIUS on a cluster does not affect identity routers that are embedded in Authentication Manager.
Before you begin
- You must be a Super Admin for the Cloud Administration Console.
- At least one identity router must be deployed.
Note: Enabling RADIUS for a cluster automatically opens RADIUS port UDP 1812 in the firewall settings for all identity routers in the cluster.
Procedure
- In the Cloud Administration Console, click Platform > Clusters.
- Select Edit from the drop-down menu next to the cluster.
- Select the Enable the RADIUS service on all identity routers in the cluster checkbox.
- Click Save and Finish.
- Click Publish Changes to apply the configured settings.
Related Articles
RSA Announces the April 2020 Release of RSA SecurID Access 8Number of Views Cloud Access Service - Installing and Configuring Identity Routers 13Number of Views Cloud Access Service - Managing Identity Routers 7Number of Views Test the RSA Authentication Manager Connection 61Number of Views Quick Setup Guide - Cloud Access Service RADIUS Clients - Step 8: Test 26Number of Views
Trending Articles
RSA Authentication Manager 8.9 Release Notes (January 2026) RSA MFA Agent 2.5 for Microsoft Windows Installation and Administration Guide Quick Setup Guide - Passwordless Authentication in Windows MFA Agent for Active Directory Troubleshooting AFX Server issues in RSA Identity Governance & Lifecycle Downloading RSA Authentication Manager license files or RSA Software token seed records
Don't see what you're looking for?