Configuring EmpowerID RADIUS Server

EmpowerID provides RADIUS Server support for managing authentication of RADIUS devices. Doing so involves configuring the RADIUS device to remotely access EmpowerID, configuring EmpowerID for the remote RADIUS device, and configuring the EmpowerID Password Manager Policy for RADIUS.

This topic demonstrates configuring EmpowerID for RADIUS by configuring EmpowerID for the Cisco ASA 5505 RADIUS device and is divided into the following activities:

To configure the Cisco Server Settings

  1. On the Cisco server, open the Cisco ASDM."
  2. Click Configuration on the toolbar.
  3. Click the Device Management panel at the bottom of the screen.
  4. Expand Users/AAA and select AAA Server Groups.
  5. Add the following settings to set up the server group and then click OK when completed.
    1. Name
    2. Protocol - Select RADIUS from the drop-down.

  6. In the Servers in the Selected Group section, click Add to the right and then enter the following settings:
    1. Server Name or IP Address - This should be the IP address or server name of the EmpowerID server.
    2. Interface Name - This should be the same interface as the EmpowerID server.
    3. Server Authentication Port - Set this to 1812.
    4. Server Secret Key
    5. Common Password - This should be the same password as the Server Secret Key.
    6. Microsoft CHAPv2 Capable - Make sure this is selected.
  7. Click OK to save the RADIUS Server Group settings.
  8. Click Apply to apply the settings.
  9. Make sure the Server Group method on the connection profile is set to RADIUS.
  10. Apply and save the configuration.
  11. Once configured, your RADIUS Server Group settings should look similar to the following image.

To configure EmpowerID RADIUS Settings

  1. From the Navigation Sidebar, navigate to the RADIUS Connections page by by expanding Admins > SSO Connections and clicking RADIUS Connections.
  2. From the RADIUS Connections page, click the Add Connection page.
  3. From the RADIUS Connection page that appears, do the following:
    1. Type the name of the RADIUS connection in the Name field.
    2. Type the IP address for the CISCO device in the Start Allowed IP field.
    3. Type the IP address for the CISCO device in the End End Allowed IP field.
    4. Type the same Secret Key set previously for the RADIUS server group on the CISCO device in the Shared Secret field.
    5. Click Submit.

To configure the Password Manager Policy

  1. From the Navigation Sidebar, navigate to the Password Manager Policies page by by expanding Admin > Policies and clicking Password Manager Policies.
  2. From the Password Manager Policies page, search for the policy to which you want to enable RADIUS authentication and click the Display Name link for that policy.
  3. From the Policy Details page for the policy that appears, click the policy Edit link. Edit links have the Pencil icon.
  4. From the Edit page for the policy, click the Authentication Settings tab and in the RADIUS Policy section do the following:
    1. Select Enable Authentication to allow RADIUS authentication.
    2. Select Require Second Factor Authentication if two-factor auth for RADIUS is required in your environment.
    3. Select Enable RADIUS Login if No Token Assigned according to your requirements.
  5. Click Save to save your changes to the policy.