RADIUS for Universities University environments present challenges for RADIUS system design. Every hour, on the hour, thousands of students close their laptops, move to a different location, and open them again. This unique ... Network Security Best Practices
Enterprise ransomware prevention starts with network authentication When properly implemented, network authentication can serve as a powerful barrier against ransomware attacks, stopping bad actors before they gain the initial foothold they need. In 2024, the number o... Network Security Best Practices Security Threats and Vulnerabilities
How to connect FreeRADIUS to Active Directory for authentication Active Directory is widely used in the enterprise and university systems. This article describes how to connect FreeRADIUS with Active Directory, allowing you toauthenticate users against your existin... Network Security Best Practices Network Security Protocols
Database design principles for RADIUS systems Database design is often overlooked as a critical element of a RADIUS ecosystem. In practice, when we work with our clients, we usually spend the bulk of our time optimizing the database architecture.... Network Security Best Practices
Using FreeRADIUS with FIPS mode on compliant systems In order to create more secure systems, standards such as Federal Information Processing Standard 140-2 ( FIPS-140) are being more widely used. The FIPS standard provides for limits on which cryptogra... Network Security Protocols
Preventing fraudulent logins with a session database In today's enterprise computer networks, credential sharing is a big problem for ISPs and companies with multiple locations. When an ISP runs RADIUS servers across different sites , new attack vectors... Network Security Best Practices
How to set up a wireless RADIUS server for secure Wi-Fi authentication When setting up a Wi-Fi network at home, you typically set up an SSID and password, accept the defaults for any other options, and be done with it. (In some cases, these are done for you by your servi... Network Security Protocols
Network design for multi-site RADIUS systems Some organizations and network operators such as ISPs can use a central RADIUS service for all of their RADIUS needs. This configuration is possible when there are a small number of users, or system l... Network Security Best Practices
RADIUS Insecurity RADIUS is almost thirty years old, and uses cryptography based on MD5. Given that MD5 has been broken for over a decade, what are the implications for RADIUS? Why is RADIUS still using MD5? RADIUS sti... Network Security Protocols
Announcing SRADIUS RADIUS has used MD5 for security for almost thirty years. It is time to use a modern alternative: SRADIUS! We just released an Internet-Draft which defines “Secure RADIUS”, or “SRADIUS”. We also have ... Network Security Protocols
Inaugural RADIUS Conference Set for March 12–13, 2025 FOR IMMEDIATE RELEASE Jana Sedivy InkBridge Networks jana.sedivy@inkbridgenetworks.com InkBridgeNetworks.com Inaugural RADIUS Conference Set for March 12–13, 2025 The first-ever global RADIUS conferen... Network Security Protocols
Authorized users only: Why use RADIUS and 802.1x to control network access? RADIUS can be an alternative to implementing 802.1x for network access control in complex enterprise environments. Controlling which users and what devices are on your network has become significantly... Network Security Best Practices