当前位置:网站首页>How to implement two factor authentication MFA based on RADIUS protocol?
How to implement two factor authentication MFA based on RADIUS protocol?
2022-06-28 08:52:00 【nington01】
RADIUS The protocol is often used for authentication in network access scenarios . And will be RADIUS And two factor authentication (MFA) The combination can further improve network security . The question is whether there are available on the market based on RADIUS Two factor authentication scheme of authentication protocol ? Before exploring this issue , Let's get to know RADIUS Protocol and two factor authentication .
1. RADIUS Authentication protocol
Remote Access dial in user service (RADIUS) Protocols have been in use since the early Internet era .RADIUS Originally used for dial-up networking , It works with enterprise identity providers (IdP) Working together , Jointly support access to network resources . Early adoption RADIUS In many enterprises with authentication protocols ,IdP Usually Microsoft Active Directory And other directory services .
With the gradual development of network into wireless access ,RADIUS The agreement has stood the test , And suitable for protection WiFi Network security . Generally, when accessing the wireless network , Can use sharing WPA voucher , but RADIUS The protocol uses the unique user name and password of each user to authenticate , If RADIUS Integration with directory services , Is stored in IdP Personal credentials in . This method can effectively improve network security .
2. Two factor authentication (MFA)
As phishing and other identity based cyber attacks become more frequent , image RADIUS Authentication, an authentication process that relies only on user names and passwords, is potentially risky . Hackers can deceive the world with a little trickery . Regarding this , Many enterprises have begun to add additional authentication steps to the user login process , This process is called two factor or multi factor authentication (MFA).
Two factor authentication usually requires the user to input the user name and password before entering the mobile phone APP Generated dynamic token , Make sure your identity is authentic . therefore , The concept of two factor authentication is similar to zero trust security , namely Users are not trusted when they only show their user name and password , By adding additional verification factors, it provides users with a way to prove their credibility , Effectively ensure login security . A recent survey released by Symantec found that , Using two factor authentication can prevent 80% The identity of .
3. Synergy
because RADIUS Authentication is based on user name and password , Therefore RADIUS Adding two factor authentication to authentication can further control network access . Now back to the question at the beginning of this article , What is on the market based on RADIUS The two factor authentication scheme of authentication protocol can be selected by enterprises ?
4. MFA、RADIUS And cloud directory services
in fact , At present, there are few RADIUS The certification service provider can provide two factor certification . however , Identity directory as a service (DaaS) You can integrate the two .
DaaS Supporting enterprises of different sizes will RADIUS The authentication server is connected to IdP, The user identity can be automatically synchronized to RADIUS The server . Administrators can also use DaaS The built-in two factor authentication module in the cloud directory enhances RADIUS and VPN And so on .
Of course , be based on RADIUS The two factor authentication of the protocol is only Ning Dun DaaS A small part of the function of , Other functions include unified user management , And the user's understanding of the business system 、 The Internet 、 mail 、 Applications 、 Management of access to infrastructure, etc . It makes the The user only needs a set of credentials protected by two factor authentication to authenticate all the credentials within the access authority IT resources , Platform independent 、 agreement 、 Manufacturer or location restrictions .
边栏推荐
- Postman interface test
- nuxt3入门
- Cloudcompare & PCL point cloud SVD decomposition
- Large current and frequency range that can be measured by Rogowski coil
- High rise building fire prevention
- Using transform:scale causes the page mouse hover event to disappear
- Idea related issues
- Quickly understand JVM structure and working principle
- Build the first neural network with pytoch and optimize it
- STL - inverter
猜你喜欢
![[untitled]](/img/bb/213f213c695795daecb81a4cf2adcd.jpg)
[untitled]

用Pytorch搭建第一個神經網絡且進行優化

Lilda low code data large screen, leveling the threshold of data application development

Application of energy management system in iron and steel enterprises

爱分析发布《2022爱分析 · IT运维厂商全景报告》 安超云强势入选!

Kali Notes(1)

罗氏线圈工作原理

DB

Matlab tips (20) matrix analysis -- principal component regression

【大案例】学成在线网站
随机推荐
What are the advantages of a differential probe over a conventional probe
Comment supprimer le crosstalk SiC MOSFET?
MATLAB小技巧(20)矩阵分析--主成分回归
yaml json
Why are function templates not partial specialization?
DELL R730服务器开机报错:[XXX] usb 1-1-port4: disabled by hub (EMI?), re-enabling...
Wasmedge 0.10.0 release! New plug-in extension mechanism, socket API enhancement, llvm 14 support
Tree
Kali installation configuration
Assertions used in the interface automation platform
How to solve the problem of high concurrency and seckill
【Go ~ 0到1 】 第三天 6月27 slice,map 与 函数
用Pytorch搭建第一個神經網絡且進行優化
centos mysql5.5配置文件在哪
Robot Rapping Results Report
How do people over 40 allocate annuity insurance? Which product is more suitable?
Cloudcompare & PCL point cloud SVD decomposition
Cloudcompare & PCL point cloud clipping (based on closed surfaces or polygons)
DEJA_VU3D - Cesium功能集 之 052-模拟卫星轨道(高空)效果
[big case] Xuecheng online website