The RADIUS authentication setup is available via configuration files in the <pf_install>/pingfederate/bin directory. The RADIUS protocol provides a common approach for implementing strong authentication in a client-server configuration. The administrative API supports the protocol scenario for one-step authentication (for example, appending an OTP after the password).
When RADIUS authentication is configured, PingFederate does not lock out accounts based upon the number of failed logon attempts. Responsibility for preventing access is instead delegated to the RADIUS server and enforced according to its password lockout settings.
The NAS-IP-Address attribute is added to all Access-Request packets sent to the RADIUS server. The value is copied from the pf.engine.bind.address property in run.properties. Only IPv4 addresses are supported.
Verify the pf.admin.api.authentication value in
is set to
RADIUS.Update as needed.
file, change property values as needed for your network configuration.
See the comments in the file for instructions and additional information.Important:
Be sure to assign RADIUS users or designated RADIUS groups (or both) to at least one of the PingFederate administrative roles as indicated in the properties file. Alternatively, you can set the use.ldap.roles property to
trueand use the LDAP properties file (also in the bin directory) to map LDAP group-based permissions to PingFederate roles. (For information about permissions attached to the PingFederate roles, see the PingFederate User Access Control table in Configure access to the administrative API.)Note:
When assigning role(s), keep in mind that all accounts specified in radius.properties can be used to access the administrative API and the administrative console.
In a clustered PingFederate environment, you only need to modify run.properties and radius.properties on the console node.