Create and Configure the RADIUS Security Provider
Go to /login > Users & Security > Security Providers.
From the dropdown, select the type of server you want to configure. Then click the Create Provider button.
Alternatively, you can copy an existing provider configuration by clicking Create Copy.
If you want to copy one node in a cluster, click Duplicate Node.
Enter the settings for this security provider configuration as detailed below.
Create a unique name to help identify this provider.
Enabled: This provider is enabled
If checked, your Secure Remote Access Appliance can search this security provider when a user attempts to log in. If unchecked, this provider will not be searched.
Display Names: Keep display name synchronized with remote system
These values determine which fields should be used as the user's private and public display names.
Only allow the following users
You can choose to allow access only to specified users on your RADIUS server. Enter each username separated by a line break. Once entered, these users will be available from the Add Policy Member dialog when editing group policies on the /login > Users & Security > Group Policies page.
If you leave this field blank, all users who authenticate against your RADIUS server will be allowed; if you allow all, you must also specify a default group policy.
LDAP Group Lookup
If you want users on this security provider to be associated with their groups on a separate LDAP server, choose one or more LDAP group servers to use for group lookup.
Default Group Policy
Each user who authenticates against an external server must be a member of at least one group policy in order to authenticate to your Secure Remote Access Appliance, logging into either the /login interface or the representative console. You can select a default group policy to apply to all users allowed to authenticate against the configured server.
Note that if a default policy is defined, then any allowed user who authenticates against this server will potentially have access at the level of this default policy. Therefore, it is recommended that you set the default to a policy with minimum privileges to prevent users from gaining permissions that you do not wish them to have.
If a user is in a default group policy and is then specifically added to another group policy, the settings for the specific policy will always take precedence over the settings for the default, even if the specific policy is a lower priority than the default, and even if the default policy's settings are set to disallow override.
Enter the hostname of the server that houses your external directory store.
Specify the authentication port for your RADIUS server. This is typically port 1812.
If you are using an external directory store in the same LAN as your Secure Remote Access Appliance, the two systems may be able to communicate directly, in which case you can leave the option Proxy from appliance through the Connection Agent unchecked and move on.
BeyondTrust Cloud customers must run the connection agent in order to use an external directory store.
Provide a new shared secret so that your Secure Remote Access Appliance and your RADIUS server can communicate.
Set the length of time to wait for a response from the server. Note that if the response is Response-Accept or Response-Challenge, then RADIUS will wait the entire time specified here before authenticating the account. Therefore, it is encouraged to keep this value as low as reasonably possible given your network settings. An ideal value is 3-5 seconds, with the maximum value at three minutes.
Click Save Changes to save this security provider configuration.