Microsoft NPS - RADIUS Configuration with Cloud Authentication Service - RSA Ready Implementation Guide
This article describes how to integrate RSA Cloud Authentication Service with Microsoft NPS using RADIUS.
Configure RSA Cloud Authentication Service
Perform these steps to configure RSA Cloud Authentication Service using RADIUS.
Procedure
- Sign in to RSA Cloud Authentication Service.
- Navigate to Authentication Clients > RADIUS.
- Click Add RADIUS Client and Profiles.
- On the RADIUS Client page, enter the following details:
- Name: Enter a descriptive name for the RADIUS client.
- IP Address: Enter the IP address of the RADIUS client (NPS server IP address).
- Shared Secret: Create and enter a secure shared secret. This secret will be used for secure communication between the RADIUS client and the RADIUS server.
- Click Save and Next Step and click Finish to complete the configuration.
- Click Publish Changes to apply your changes to the RADIUS server and wait for the process to be completed.
Notes
- The RSA Cloud Authentication RADIUS server is configured to listen on UDP port 1812.
- Shared Secret must be an alphanumeric string between 1 and 31 characters in length and is case-sensitive.
Configure Microsoft NPS
Perform these steps to configure Microsoft NPS as a RADIUS client to RSA Cloud Authentication Service and to configure the Connection Request Policy in NPS.
Procedure
- In Server Manager, click Tools, and then click Network Policy Server to open the NPS console.
- In the left pane, expand the RADIUS Clients and Servers folder, right-click Remote RADIUS Server Groups, and click New.
- On the New Remote RADIUS Server Group dialog box:
- In the Group name field, enter a name for the remote RADIUS server group.
- Under RADIUS Servers, click Add.
- On the Add RADIUS Server dialog box, enter management IP address or FQDN of the Identity router deployed in RSA and click Verify if FQDN is used.
- Click the Authentication/Accounting tab.
- For Shared secret and Confirm shared secret, enter the same shared secret used for adding RADIUS client in RSA Cloud Authentication Service.
- Select the Request must contain the message authenticator attribute checkbox.
- Click the Load Balancing tab.
- Increase the timeout value for Number of seconds without response before request is considered dropped to 10 seconds and click OK.
Note: The default value of 3 seconds for Number of seconds without response before request is considered dropped might be insufficient and users might experience authentication issues. The Windows Security Event log records the authentication failure with Reason: The remote RADIUS (Remote Authentication Dial-In User Service) server did not respond and Reason Code: 117. Increase the timeout value appropriately to resolve this issue. - In the left pane, expand Policies, right-click Connection Request Policy, and click New.
- Enter a name for Policy name and select the access server type of your deployment from in the Type of network access server drop-down list.
- Click Next.
- Click Add to specify a new condition to the policy.
- Select User Name for the condition and click Add.
- Depending on the format of your user login names, enter the common element of the Username (For example, a pattern that matches the e-mail domain). This will signal to Microsoft NPS that usernames in this pattern will match that policy and hence these requests will be sent to RSA RADIUS Server for authentication.
- Click OK.
- Click Next.
- In Settings, under Authentication:
- Choose the Forward requests to the following remote RADIUS server group for authentication option.
- Select the RADIUS server group configured earlier in the drop-down list.
- Click Next. For any request that triggers the policy, the RADIUS request will be forwarded to the RSA RADIUS Server.
- Select Username in the Attribute drop-down list and click Add.
- For the Attribute Manipulation Rule, enter the common element of the Username in the Find field and leave the Replace with field blank.
- Click OK and then click Next.
Note: This step is necessary as the username will be edited by NPS and sent to RSA in the accepted format. For example, during authentication, the end user enters "username@example.com", but only “username" will be passed to the RSA RADIUS Server. - Click Finish.
- In the main pane of Microsoft NPS, expand RADIUS Client and Servers, right-click RADIUS Clients, and click New.
- On the New RADIUS Client screen:
- In the Friendly name field, enter a display name for the RADIUS client.
- For Address (IP or DNS), enter the IP address of the client (Network Access Server).
- For Shared secret and Confirm shared secret, enter the same shared secret used for adding RADIUS client in the RSA Authentication Manager or RSA Cloud Administration Console.
- Click OK.
This RADIUS Client will send the request to NPS that will be later proxied by NPS to RSA RADIUS server for authentication.
The configuration is complete.
Related Articles
Self-Service Console User Enrollment 50Number of Views Troubleshooting SWIFT Alliance Access with RSA Authentication Manager using RADIUS protocol 48Number of Views RSA Authenticator 4.6 for iOS and Android Quick Start Guide (Chinese) 9Number of Views Deploying RADIUS for Cloud Access Service 113Number of Views Edit a RADIUS Profile 11Number of Views
Trending Articles
How to recover the Application and AFX after an unexpected database failure in RSA Identity Governance & Lifecycle RSA SecurID Software Token 5.0.2 for Windows Desktop displays message after reboot due to roaming profile: No token stor… RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide Downloading RSA Authentication Manager license files or RSA Software token seed records RSA Release Notes for RSA Authentication Manager 8.8
Don't see what you're looking for?