Ivanti Pulse Connect 9.1 - RADIUS with CAS Configuration - SecurID Access Implementation Guide
This section describes how to integrate IvantiPulse Connect with SecurID Access Cloud Authentication Service using RADIUS.
Architecture Diagram
Configure SecurID Cloud Authentication Service
To configure RADIUS for Cloud Authentication Service for use with a RADIUS client, you must first configure a RADIUS client in the SecurID Access Console. Cloud Authentication RADIUS server listens on port UDP 1812.
-
Sign into the SecurID Access Cloud Administrative Console
-
Browse to Authentication Clients > RADIUS > Add RADIUS Client
-
Enter the Name for the Client.
-
Enter IP Address . This is the IP of the Pulse Connect Authentication server.
-
Enter Shared Secret. Create a Shared Secret. This secret will be used in the Pulse Connect configuration Authentication server.
-
-
Click on Platform > Identity Routers
-
Expand the information for the Identity Router for this configuration and note the Eth0 IP Address (Management). This is used in the Radius configuration below for the Radius server.
-
Click Publish Changes when all changes have been finalized.
Configure Ivanti Pulse Connect
Perform these steps to configure Ivanti Pulse Connect as a RADIUS client to SecurID Cloud Authentication Service.
Procedure
-
Sign into the Pulse Connect Administration Console.
-
Create a Pulse Connect Authentication Server for Radius. Browse to Authentication > Auth. Servers
Select RADIUS Server from server type and click on New Server.
-
Enter the Name for th is Authentication Server
-
Enter Radius Server . This is the IP of the SecurID Identity Provider found above.
-
Enter Shared Secret. This is the Shared Secret for the SecurID radius client created above.
-
Enter Timeout. The default value is 30 seconds, this may be insufficient for MFA. If necessary, this value may need to be increased.
-
Enter Backup Server information if you have more than one SecurID Authentication Manger RADIUS server.
-
Save Changes
-
-
Add Rule to Created Radius Server. Under Settings > Custom RADIUS rules click on New RADIUS rule
-
Enter Name
-
Response Packet Type >Choose Access Challenge
-
Then Take Action > Select show Generic Login Page
-
Save Changes
-
-
Create a User Realm
-
Browse to Users -> User Realms
-
Click on New
-
Enter a unique Name
-
Set Authentication. Choose the appropriate Authentication Server from the dropdown list.
-
Save Changes
-
Select Role Mapping Tab and Click on New Rule... to create your required Rule as needed to further restrict access based on your requirements. ie. user name is * to match all user ids. Make sure to Add a Role to the Rule . Users is the default system Role of all users . Click on Save Changes
-
-
Create a Sign-in Policy
-
Browse to Authentication -> Signing-In -> Sign-in Policies
-
Click on New URL...
-
Select User type This would be Users
-
Set Sign-in URL. This is the URL for the given Secure Access Service.
-
Select the associated Realm and click Add . Created in step 4.
-
Save Changes
-
Note: The connection timeout value configured in your RADIUS client software balances the amount of time users have to respond to push methods against failover performance. The recommended starting value is 45 seconds. Increase the value to give users more time to authenticate or decrease the value to improve failover. Failover occurs when the client determines the server is down and sends a request to another server. Also consider if retries are configured for the RADIUS clients. For example, if the client allows three retries, the effective timeout is really 2 minutes and 15 seconds.
In the RADIUS client settings configured in the Cloud Administration Console (Authentication Clients > RADIUS), if Automatically prompt for push notification methods is enabled, make sure the server timeout (Allow users to select authentication method after timeout) does not exceed the client’s connection timeout.
Next Step: Proceed to the Use Case Configuration Summary section for information on how to apply the RADIUS configuration to your use case.
Related Articles
Ivanti Pulse Connect 9.1 - SAML SSO Agent Configuration - SecurID Access Implementation Guide 12Number of Views Ivanti Pulse Connect 9.1 - Relying Party Configuration - SecurID Access Implementation Guide 14Number of Views RSA SecurID Authenticator 6.x for Windows Provisioning Guide 40Number of Views Array Networks SPX - RADIUS with CAS Configuration - RSA Ready SecurID Access Implementation Guide 8Number of Views RSA MFA Agent 3.0 for Microsoft AD FS Group Policy Object Template Guide (Korean) 16Number of Views
Trending Articles
RSA Release Notes for RSA Authentication Manager 8.8 RSA MFA Agent 2.4.3 for Microsoft Windows Group Policy Object Template Guide RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide RSA MFA Agent 2.4.3 for Microsoft Windows Installation and Administration Guide RSA Authentication Manager 8.9 Release Notes (January 2026)