How AuthAnvil RADIUS works
The AuthAnvil RADIUS Server provides RADIUS support via PAP and MSCHAP2 to offer strong authentication to firewalls, network devices and VPN servers within your network infrastructure. It provides mutual authentication via 128-bit RC4 encrypted session keys for MSCHAP2, giving strong authentication support to Microsoft’s Connection Manager and PPTP VPN.
The AuthAnvil RADIUS Server is a standalone windows service and is capable of running on any 32 bit or 64 bit platform that supports .NET 2.0. It does NOT require Microsoft’s Internet Authentication Service (IAS) or Network Policy Server (NPS) to function, but can coexist if you reconfigure it to use an alternate port.
Because AuthAnvil provides its own Windows service that can handle RADIUS, you therefore do not need to setup and configure a separate RADIUS server. All you will need to do is install our component on a Windows server that your RADIUS device/software can reach and point the RADIUS config to authenticate to your AA2FA server. You can even install it on the same server where you installed AA2FA if you like, assuming the firewall can reach it. More information on how to setup and configure RADIUS can be found in the documentation at https://helpdesk.kaseya.com/entries/26301063.
Process of RADIUS Authentication.
- User enters AuthAnvil passcode into vpn endpoint connection.
- VPN endpoint forwards request to AuthAnvil Radius server
- AuthAnvil passcode verified against AuthAnvil server.
- Radius server returns AuthAnvil server response to vpn endpoint.
- User is securely logged in
If you have any questions or need some help, we would be happy to assist. Open a case at help.scorpionsoft.com or send an email to firstname.lastname@example.org.