Skip to content

RADIUS Integration Guide for VPN & Firewall Access

Mideye Server acts as a RADIUS server. Your VPN, firewall, or network device acts as a RADIUS client. When a user authenticates, Mideye validates the password against the configured user repository and adds a second factor.

Mideye supports two RADIUS authentication flows depending on the authentication type and the capabilities of the RADIUS client.

Every RADIUS integration requires three settings on the RADIUS client (your VPN or firewall). Getting these right is essential — incorrect values are the most common cause of authentication failures.

The RADIUS timeout controls how long the RADIUS client waits for Mideye Server to respond before giving up. Mideye needs time to deliver the OTP or push notification and wait for the user to respond.

Recommended: 35 seconds

SettingRecommended value
Timeout35 seconds
Retries1

A timeout below 30 seconds risks the session expiring before the user has time to read and enter an OTP — especially if SMS delivery is delayed or push falls back to an alternative method.

For a deeper explanation of how timeouts interact, see RADIUS Timeout.

Authentication protocol (PAP vs MS-CHAPv2)

Section titled “Authentication protocol (PAP vs MS-CHAPv2)”

The RADIUS authentication protocol determines how the user’s password is transmitted between the RADIUS client and Mideye Server.

ProtocolWhen to useNotes
PAPMost integrationsPassword is encrypted using the RADIUS shared secret. Simple, widely supported, and works with all Mideye authentication types. Use this unless you have a specific reason not to.
MS-CHAPv2Active Directory password changesRequired when users need to change expired AD passwords during VPN login. Requires a Network Policy Server (NPS) integrated with Mideye.

The RADIUS shared secret is a password shared between the RADIUS client and Mideye Server. It is used to encrypt passwords in RADIUS packets and to authenticate that requests come from a trusted source.

  • Must be identical on both the RADIUS client and in Mideye Server
  • Use a strong, randomly generated secret (minimum 16 characters)
  • Configure in Mideye under RADIUS Clients

Challenge-Response is a RADIUS capability where the server sends an intermediate Access-Challenge message to prompt the user for additional input (such as an OTP). Not all RADIUS clients support this.

If your RADIUS client supports Challenge-Response, you can use authentication types that prompt for an OTP (Mobile, Token, Plus, On-Prem). If it does not, use authentication types that complete without a challenge (Touch, Concatenated).

See Choosing the right flow below for details.

Mideye can include custom attributes in RADIUS responses using Vendor-Specific Attributes. These can pass user information (such as group membership or email) to the RADIUS client for use in access policies, logging, or session metadata.

VSAs are optional and only needed when your RADIUS client requires additional user attributes beyond Accept/Reject.


These are the recommended RADIUS settings for most integrations:

SettingValue
Authentication protocolPAP
Timeout35 seconds
Retries1
PortUDP 1812
Shared secretStrong, minimum 16 characters

The RADIUS client sends an Access-Request. Mideye validates the password, then returns an Access-Challenge prompting the user to enter a one-time password (OTP) or wait for approver confirmation. The user responds, and Mideye sends the final Access-Accept or Access-Reject.

UserRADIUS Client(VPN / Firewall)Mideye ServerUser Repository 1. Username + password2. Access-Request 3. Validate password4. Access-Challenge"Enter OTP"5. OTP prompt6. One-time password7. Access-Request (OTP)8. Access-Accept ✓

Authentication types using Challenge-Response

Section titled “Authentication types using Challenge-Response”
TypeNameHow it works
2MobileOTP sent via SMS or Mideye+ push. User enters the OTP.
3TokenUser enters OTP from a hardware token (YubiKey, HID).
5PlusUser manually signs an access challenge in the Mideye+ app.
9Assisted LoginUser waits while an authorized approver accepts the login via Mideye+.
10Shared AccountUser is prompted to enter a phone number or token serial, then completes a second factor.
11On-PremUser enters a TOTP code from an authenticator app or TOTP/HOTP hardware token.

The RADIUS client sends an Access-Request. Mideye validates the password, performs the second factor synchronously (e.g., sends a push notification and waits for the user to accept), then returns Access-Accept or Access-Reject directly — without an intermediate Access-Challenge.

UserRADIUS Client(VPN / Firewall)Mideye ServerUser's Phone(Mideye+ App) 1. Username + password2. Access-Request 3. Push notification"Accept login?"4. User taps Accept ✓5. Access-Accept ✓
TypeNameHow it worksFallback
1PasswordPassword only (no second factor).
4ConcatenatedPassword + OTP entered in one field (e.g. MyPass123456). No challenge needed.
6TouchPush notification to Mideye+ app. User taps Accept. If Mideye+ is not activated, a magic link is sent via SMS.
7Touch-PlusTries Touch first. If phone is not reachable, falls back to Plus (Challenge-Response).Plus (5)
8Touch-MobileTries Touch first. If unreachable, falls back to Mobile OTP (Challenge-Response).Mobile (2)

Your system supports…Recommended authentication type
Challenge-Response ✓Mobile (2), Token (3), Plus (5), Touch-Plus (7), Touch-Mobile (8), On-Prem (11)
Direct Accept onlyTouch (6), Concatenated (4)
No MFA neededPassword (1)

Most VPNs and firewalls support Challenge-Response. Key exceptions:

  • Microsoft RRAS VPN — does not support Access-Challenge → use Touch (6)
  • Remote Desktop Services (RDS) — depends on NPS configuration → use Touch (6) for simplest setup
  • Windows Hello with Mideye — uses Touch (6)
PlatformGuide
FortiGate (Fortinet SSL/IPsec VPN)FortiGate
Palo Alto GlobalProtectGlobalProtect
Cisco AnyConnectAnyConnect
Cisco AnyConnect (via FMC)AnyConnect FMC
Check Point VPNCheck Point
Pulse Connect SecurePulse Secure
Citrix ADC (NetScaler)Citrix ADC
Linux PAM / SSHPAM

Mideye follows the RADIUS standard (RFC 2865) and works with any system that supports RADIUS authentication. The guides above cover the most common platforms — if your system supports RADIUS, it can integrate with Mideye.

Windows infrastructure components that use RADIUS under the hood have their own section:

  • ADFS — custom Mideye module for AD FS
  • NPS — Network Policy Server as RADIUS proxy
  • RDS — Remote Desktop Services
  • Windows VPN (RRAS) — built-in Windows VPN

See Windows Integrations for the full list.

  • Network access from the RADIUS client to Mideye Server on UDP 1812
  • A RADIUS client configured in Mideye Server
  • A user repository configured (AD, LDAP, Entra ID, or local database)
  • Review the port requirements for full details