当前位置:网站首页>How to implement two factor authentication MFA based on RADIUS protocol?
How to implement two factor authentication MFA based on RADIUS protocol?
2022-06-28 08:52:00 【nington01】
RADIUS The protocol is often used for authentication in network access scenarios . And will be RADIUS And two factor authentication (MFA) The combination can further improve network security . The question is whether there are available on the market based on RADIUS Two factor authentication scheme of authentication protocol ? Before exploring this issue , Let's get to know RADIUS Protocol and two factor authentication .
1. RADIUS Authentication protocol
Remote Access dial in user service (RADIUS) Protocols have been in use since the early Internet era .RADIUS Originally used for dial-up networking , It works with enterprise identity providers (IdP) Working together , Jointly support access to network resources . Early adoption RADIUS In many enterprises with authentication protocols ,IdP Usually Microsoft Active Directory And other directory services .
With the gradual development of network into wireless access ,RADIUS The agreement has stood the test , And suitable for protection WiFi Network security . Generally, when accessing the wireless network , Can use sharing WPA voucher , but RADIUS The protocol uses the unique user name and password of each user to authenticate , If RADIUS Integration with directory services , Is stored in IdP Personal credentials in . This method can effectively improve network security .
2. Two factor authentication (MFA)
As phishing and other identity based cyber attacks become more frequent , image RADIUS Authentication, an authentication process that relies only on user names and passwords, is potentially risky . Hackers can deceive the world with a little trickery . Regarding this , Many enterprises have begun to add additional authentication steps to the user login process , This process is called two factor or multi factor authentication (MFA).
Two factor authentication usually requires the user to input the user name and password before entering the mobile phone APP Generated dynamic token , Make sure your identity is authentic . therefore , The concept of two factor authentication is similar to zero trust security , namely Users are not trusted when they only show their user name and password , By adding additional verification factors, it provides users with a way to prove their credibility , Effectively ensure login security . A recent survey released by Symantec found that , Using two factor authentication can prevent 80% The identity of .
3. Synergy
because RADIUS Authentication is based on user name and password , Therefore RADIUS Adding two factor authentication to authentication can further control network access . Now back to the question at the beginning of this article , What is on the market based on RADIUS The two factor authentication scheme of authentication protocol can be selected by enterprises ?
4. MFA、RADIUS And cloud directory services
in fact , At present, there are few RADIUS The certification service provider can provide two factor certification . however , Identity directory as a service (DaaS) You can integrate the two .
DaaS Supporting enterprises of different sizes will RADIUS The authentication server is connected to IdP, The user identity can be automatically synchronized to RADIUS The server . Administrators can also use DaaS The built-in two factor authentication module in the cloud directory enhances RADIUS and VPN And so on .
Of course , be based on RADIUS The two factor authentication of the protocol is only Ning Dun DaaS A small part of the function of , Other functions include unified user management , And the user's understanding of the business system 、 The Internet 、 mail 、 Applications 、 Management of access to infrastructure, etc . It makes the The user only needs a set of credentials protected by two factor authentication to authenticate all the credentials within the access authority IT resources , Platform independent 、 agreement 、 Manufacturer or location restrictions .
边栏推荐
- Applet: traverse the value of an array in the list, which is equivalent to for= "list" list An item in comment
- 小程序 :遍历list里面的某个数组的值,等同于 for=“list” list.comment里面的某一项
- 如何抑制SiC MOSFET Crosstalk(串擾)?
- "Jianzhi offer" -- Interview Question 4: finding two-dimensional arrays
- Superimposed ladder diagram and line diagram and merged line diagram and needle diagram
- Implementation of code scanning login
- It only takes two steps to find the right PMP organization, one check and two questions
- 个人究竟如何开户炒股?在线开户安全么?
- 如何实现基于 RADIUS 协议的双因子认证 MFA?
- ffmpeg推流报错Failed to update header with correct duration.
猜你喜欢

How to solve the problem of high concurrency and seckill

JMeter -- interface test 1

Discussion on the improvement and application of the prepayment system in the management of electricity charge and price

Installation of containerd1.5.5

VMware Workstation related issues

利尔达低代码数据大屏,铲平数据应用开发门槛

Kali Notes(1)

爱分析发布《2022爱分析 · IT运维厂商全景报告》 安超云强势入选!

Protection range and optimization of motor protector for hoist equipment

Idea related issues
随机推荐
It only takes two steps to find the right PMP organization, one check and two questions
Integer partition
Kali Notes(1)
Is it safe to open an account for online stock speculation?
Lilda low code data large screen, leveling the threshold of data application development
Fire fighting work and measures in Higher Vocational Colleges
Avframe Memory Management API
中金财富开户安全吗?怎么收费?
How to solve the problem of high concurrency and seckill
Love analysis released the 2022 love analysis · it operation and maintenance manufacturer panorama report, and an Chao cloud was strongly selected!
TCP
Not so Mobile
Power data
【无标题】
电子元器件销售ERP管理系统哪个比较好?
Guangzhou: new financial activities and new opportunities for enterprises
[cloud native | kubernetes] in depth understanding of pod (VI)
Basic operation of PMP from applying for the exam to obtaining the certificate, a must see for understanding PMP
【力扣10天SQL入门】Day5+6 合并表
Error: `brew cask` is no longer a `brew` command. Use `brew <command> --cask` instead.