Skip to content

RADIUS Clients – Configure Client Authentication Settings

The RADIUS Clients page manages the client devices and applications that send authentication requests to MideyeServer. Each RADIUS client defines how incoming authentication requests are processed, including which user repositories are queried, what OTP format is used, how usernames are filtered, and which Assisted Login profiles are available.

MideyeServer includes two built-in clients — webUiClient (for the admin web interface) and selfServicePortal — which cannot be deleted or renamed. All other clients can be fully configured, cloned, tested, and removed.

Required Role: ROOT, SUPER_ADMIN, or ADMIN (to create, edit, delete, clone, or test clients)

Navigation: Home → RADIUS Settings → RADIUS Clients

RoleViewCreate / Edit / DeleteCloneTest Auth
ROOT
SUPER_ADMIN
ADMIN
OPERATOR
ColumnDescriptionVisibility
Client NameUnique name identifying the RADIUS clientAlways
IPIP address or CIDR range of the clientAlways
NAS IDNetwork Access Server identifierAlways
RADIUS ServerLinked authentication RADIUS server (clickable link)Always
Accounting RADIUS ServerLinked accounting server (clickable link), if configuredAlways
LDAP ProfilesLinked LDAP directory profiles (clickable links)Hidden below XL breakpoint
Assisted Login ProfilesLinked assisted login profiles (clickable links)Hidden below XL breakpoint
ActionEdit, Delete, Clone, Test buttons (admin only)Always
ActionIconDescriptionRestrictions
EditPencilOpen the multi-tab edit formAdmin only
DeleteTrashDelete the client after confirmationAdmin only; hidden for webUiClient and selfServicePortal
CloneCopyCreate a duplicate client with a new nameAdmin only; hidden for webUiClient and selfServicePortal
TestPlayOpen the test authentication dialogAdmin only

The configuration form has five tabs covering all aspects of client behavior.

Core identification fields for the RADIUS client.

FieldTypeRequiredValidationDescription
Client NameTextYesUnique (async check)Unique name for this client. Disabled for built-in clients
IPTextConditionalEither IP or NAS ID must be providedIPv4 address or CIDR notation of the client device
NAS IDTextConditionalEither IP or NAS ID must be providedNetwork Access Server identifier
RADIUS ServerSelectYesAuthentication server that processes requests from this client
Accounting RADIUS ServerSelectNoServer for accounting records. Select “No Accounting” to disable

Defines where MideyeServer looks up users for authentication requests from this client.

FieldTypeDefaultDescription
Use Mideye DatabaseCheckboxEnabledQuery the local Mideye user database
LDAP ProfilesMulti-selectLDAP directory profiles to search for user accounts
Entra ID ProfilesMulti-selectMicrosoft Entra ID (Azure AD) profiles to search

Controls how authentication requests are processed.

FieldTypeDefaultValidationDescription
Max OTP LengthNumber6Min: 4, Max: 12Maximum length of one-time passwords
OTP TypeSelectNUMERIC_OTPCharacter set for OTP generation

OTP Type Values:

ValueDescription
NUMERIC_OTPDigits only (0–9)
ALPHABETIC_OTPLetters only (a–z, A–Z)
ALPHANUMERIC_OTPDigits and letters
FieldTypeDefaultDescription
EncodingSelectUTF_8Character encoding for RADIUS attribute values

Encoding Values: UTF_8, ISO_8859_1, US_ASCII, UTF_16

FieldTypeDefaultDescription
Auth Type 1 EnabledCheckboxOffEnable single-factor (password-only) authentication
Allow Personalized TokenCheckboxOffAllow users to use personalized software tokens
Require Mideye PlusCheckboxOffRequire Mideye Plus app for authentication
Ignore PasswordCheckboxOffSkip password verification (OTP/token only)
Enable Local AuthCheckboxOffEnable local authentication fallback
Require Token Coupled PlusCheckboxOffRequire token-coupled Mideye Plus authentication
Support DMCheckboxOffEnable Disconnect Messages (CoA) for active sessions
Use SuffixCheckboxOffEnable domain suffix processing for usernames
Require Message AuthenticatorCheckboxOffRequire Message-Authenticator attribute in requests
Respond With Message AuthenticatorCheckboxOnInclude Message-Authenticator in responses

Controls how usernames are processed before authentication.

FieldTypeDefaultDescription
Filter MethodSelectNONEHow to extract the username from a domain-qualified identity
Filter SeparatorText\The character that separates domain from username

Filter Method Values:

ValueExample InputResult
NONEDOMAIN\userDOMAIN\user (unchanged)
PREFIXDOMAIN\useruser (domain prefix removed)
SUFFIXuser@domain.comuser (domain suffix removed)
FieldTypeDefaultValidationDescription
Filter SpacesCheckboxOffRemove space characters from usernames
Additional CharactersText(empty)Max 30 characters, no spacesAdditional characters to remove from usernames

Configuration for assisted (approver-based) authentication.

FieldTypeDescription
Display NameTextName displayed to approvers when this client requests Assisted Login
Assisted Login ProfilesMulti-selectProfiles defining the Assisted Login workflow for this client

The Test Authentication dialog provides a multi-step interface to simulate RADIUS authentication against a client configuration.

FieldTypeRequiredDescription
User NameTextYesUsername to authenticate
PasswordPasswordYesUser’s password
Use MS-CHAPv2CheckboxNoUse MS-CHAPv2 protocol for password verification

Click Login to submit the authentication request.

If MFA is required, the server returns a challenge message (e.g., “Enter OTP:”). Enter the OTP or approve via Mideye Plus.

FieldTypeRequiredDescription
Challenge ResponsePasswordYesThe OTP, token code, or challenge response

Success: Displays the authenticated username, assigned role, and a table of all RADIUS response attributes (name and value).

Failure: Displays the error message from the authentication server.

  1. Click Add New.
  2. On the General tab, enter the VPN concentrator’s name, IP address, and select the RADIUS server.
  3. On the User Repositories tab, enable the Mideye database and/or select LDAP profiles.
  4. On the Client Configuration tab, set OTP length and type as required by the VPN.
  5. Click Save.
  6. Configure a matching RADIUS Shared Secret for the VPN’s source IP.
  1. Find the source client in the data grid.
  2. Click the Clone icon.
  3. A duplicate is created with a modified name.
  4. Edit the clone to update the name, IP, and any settings that differ.
  1. Click the Test icon for the target client.
  2. Enter a valid username and password.
  3. Complete the MFA challenge if prompted.
  4. Verify the response attributes match expectations.

For environments where users authenticate as DOMAIN\username:

  1. Edit the client.
  2. Go to the User Name Filtering tab.
  3. Set Filter Method to PREFIX and Filter Separator to \.
  4. Save.
IssuePossible CauseResolution
Cannot delete clientIt is a built-in client (webUiClient or selfServicePortal)Built-in clients cannot be deleted
Save fails with “IP or NAS ID required”Both IP and NAS ID are emptyProvide at least one identifier
Client name validation errorName already in useChoose a unique client name
Test authentication failsIncorrect password, user not in configured repositories, or shared secret mismatchVerify password, check User Repositories tab, verify shared secret
LDAP users not foundLDAP profile not assigned to clientAdd the LDAP profile on the User Repositories tab