
內容簡介
RADIUS(遠程身份驗證撥號用户服務)客戶端或 RADIUS 登錄外掛可讓用戶使用任何 RADIUS 服務器進行登錄。我們支持 PAP、CHAP(MD5)、MS CHAP V1、EAP-MSCHAPv2 等 RADIUS 身份驗證方案,也支持根據要求的其他方案。
RADIUS 客戶端外掛還允許您通過 RADIUS 服務器調用多因素身份驗證(mfa/2fa)。您還可以配置和使用 miniOrange 作為帶有 MFA 功能的 RADIUS 服務器。
RADIUS 客戶端外掛支持 ACCESS/REJECT 和 CHALLENGE RESPONSES 類型,因此您可以使用所有類型的第二因素方法。
RADIUS 客戶端外掛支持所有類型的屬性導入。
我們支持的 RADIUS 服務器
freeRadius
jumpCloud
routerOS
techRouter
tinyRadius
AuthenticateMyWiFi
ClearBox
FoxPass
Acess Points
免費版本功能
支持使用任何第三方 RADIUS 服務器或自定義 RADIUS 服務器進行登錄
選項允許/拒絕自動註冊用戶 - 如果該用戶尚未在您的網站上註冊,則登錄後自動註冊該用戶
允許現有用戶使用 WordPress 使用者名稱、電子郵件或兩者進行登錄
支持 PAP 身份驗證方案
高級版功能
所有免費版本功能
登錄小工具 - 使用小工具輕鬆集成登錄鏈接到您的 WordPress 網站中
支持身份驗證方案 - PAP 身份驗證、CHAP-MD5 身份驗證、MSCHAP v1 身份驗證、EAP-MSCHAP v2 身份驗證
RADIUS 服務器支持:
此外掛可與以下 RADIUS 服務器一起使用:
* Microsoft Windows 網絡策略服務器(NPS 服務器)
* Free RADIUS 2 及以上版本
* Tiny RADIUS
什麼是 RADIUS?
遠程身份驗證撥號用戶服務(RADIUS)是一種客戶端/服務器(網絡)協議,運行在 1812 端口上,可為連接和使用網絡服務的用戶提供集中的身份驗證、授權和計費(AAA 或三重 A)管理。它使遠程訪問服務器能夠與服務器進行通信,對用戶進行身份驗證並授權其訪問所需的系統或服務。
RADIUS 客戶端
RADIUS 客戶端通常是 NAS(網絡訪問服務器),負責將用戶信息傳遞到指定的 RADIUS 服務器,然後根據返回的響應進行用戶身份驗證或拒絕登錄。
RADIUS 服務器
RADIUS 服務器負責接收用戶連接請求,驗證用戶,然後返回客戶端身份驗證所需的所有配置信息。RADIUS 服務器可以充當代理客戶端到其他 RADIUS 服務器或其他類型的身份驗證服務。
身份驗證協議
RADIUS 服務器使用身份驗證方案(例如 PAP、CHAP、MS-CHAP、MS-CHAPv2、EAP、EAP-TLS、EAP-TTLS 和 EAP-PEAP)檢查信息是否正確。
安全
客戶端和 RADIUS 計費服務器之間的交易通過共享密鑰進行身份驗證,該密鑰永不在網絡上傳輸。
miniOrange 集成的熱門 RADIUS 客戶端:
*Palo Alto
用戶輸入其 AD 憑據以登錄 Palo Alto RADIUS 客戶端,通過驗證用戶名和密碼後,將一次性的驗證碼發送到用戶的手機號碼。用戶輸入接收到 One Time Passcode 後,miniOrange 將確認該驗證碼,以決定是否授予/拒絕用戶訪問權限。
*OpenVPN
用戶輸入其 AD 憑據和 2FA 碼(軟件 Token 或硬件 Token)以登錄 OpenVPN。
外掛標籤
開發者團隊
原文外掛簡介
RADIUS (Remote Authentication Dial-In User Service) Client or RADIUS Login plugin allows users to login with any RADIUS Server. We support radius authentication schemes like PAP, CHAP (MD5), MS CHAP V1, EAP-MSCHAP v2 and other schemes on request.
RADIUS Client plugin also allows you to invoke multi factor authentication (mfa/2fa) using RADIUS Server. You can also configure and use miniOrange as a RADIUS server with MFA.
RADIUS Client plugin supports both ACCESS/REJECT and CHALLENGE RESPONSES. In this way you can use all type of Second factor methods.
RADIUS Client supports all types of Attribute import.
Radius Servers we Support
freeRadius
jumpCloud
routerOS
techRouter
tinyRadius
AuthenticateMyWiFi
ClearBox
FoxPass
Acess Points
FREE VERSION FEATURES
Supports login with any 3rd party RADIUS server or custom RADIUS server
Option to allow/deny Auto Register Users- Automatic user registration after login if the user is not already registered with your site
Allow login with WordPress Username, Email or both for existing users.
Supports Authentication scheme – PAP Authentication
PREMIUM FEATURES
All the Free Version Features
Login Widget- Use Widgets to easily integrate the login link with your WordPress site
Support for Authentication Schemes – PAP Authentication, CHAP-MD5 Authentication, MSCHAP v1 Authentication, EAP-MSCHAP v2 Authentication
RADIUS Servers support :-
The plugin works with the following RADIUS Servers:
* Microsoft Windows Network Policy Server (NPS Server)
* Free RADIUS 2 and above
* Tiny RADIUS
What is RADIUS?
Remote Authentication Dial-In User Service (RADIUS) is a client/server(networking) protocol,operating on port 1812 that provides centralized Authentication, Authorization, and Accounting (AAA or Triple A) management for users who connect and use a network service. It enables remote access servers to communicate with a server to authenticate users and authorize their access to the requested system or service.
RADIUS Client
The RADIUS client is typically a NAS ( Network Access Server ) which is responsible for passing user information to designated RADIUS servers, and then based on the response which is returned, authenticates or rejects login to the user.
RADIUS Server
RADIUS servers are responsible for receiving user connection requests, authenticating the user, and then returning all configuration information necessary for the client to authenticate the user. A RADIUS server can act as a proxy client to other RADIUS servers or other kinds of authentication servers.
Authentication Protocols
The RADIUS server checks that the information is correct using authentication schemes such as PAP, CHAP, MS-CHAP, MS-CHAPv2, EAP, EAP-TLS, EAP-TTLS and EAP-PEAP.
Security
Transactions between the client and RADIUS accounting server are authenticated through the use of a shared secret, which is never sent over the network.
Popular RADIUS Clients miniOrange integrates with:
*Palo Alto
The users enter their AD credentials to log in to Palo Alto, the RADIUS Client, and after the username/password validation, an One Time Passcode is sent to the user’s mobile number. The user enters the One Time passcode received, which is validated by miniOrange to gain/deny access to the user.
*OpenVPN
The users enter their AD credentials and the 2FA code ( Software Token ) to log in to OpenVPN, the RADIUS Client, and after the username/password validation, are prompted for the 2-factor authentication. Post validation of 2nd factor, users are logged in to OpenVPN.
*FortiNet
The users enter their AD credentials to log in to FortiNet, and after the username/password validation, an push notification is sent to the user’s mobile, that he needs to accept to get logged in to AWS.
*AWS AD Connector
*Citrix
If you do not find your radius server listed here, please contact us on [email protected]
Secure your WordPress site with 2FA on top of single sign-on using miniOrange On-Premise IDP. You can also protect any VPN, Remote Desktop, Windows with 2FA using our Cloud Service/On-Premise Module.
