LogoLogo
HomeIntegrityControlSolutionsManagement Center
3.1.0 Radius
3.1.0 Radius
  • THE SERVICE
    • Overview
    • About this release
      • Release notes
      • Breaking changes
    • Get started
    • Installation
      • Container
      • Linux
      • Windows
  • Modules
    • Radius
    • OathValidation
      • Token enrollment
    • Other modules
  • Authenticators
    • Overview
    • Common configuration
      • Selector
      • Response attributes
    • Accept Authenticator
    • Reject Authenticator
    • Username & Password
    • Username, Password & OTP
  • Operations
    • CEF logging
Powered by GitBook
On this page
  • Authentication scenarios
  • User store
  1. Authenticators

Overview

Common scenario is to configured RADIUS using multi-factor authentication (MFA)/one-time password (OTP) to a virtual private network (VPN).

Authentication scenarios

Integrity RADIUS can be configured for the following authentication scenarios:

  • Username & Password

  • Username, Password & Sent one-time password (OTP)

    • OTP can be sent using SMS, Voice or SMTP

  • Username, Password & Generated (offline) one-time password (OTP)

    • Supported token are any OATH compliant software/hardware token.

  • Username & Token

    • This is called passwordless authentication.

    • Supported token are any OATH compliant software/hardware token.

User store

Common user stores used are Active Directory, LDAP or SQL database.

PreviousOther modulesNextCommon configuration