Configuring Local RADIUS Parameters
- 18 Mar 2024
-
DarkLight
-
PDF
Configuring Local RADIUS Parameters
- Updated on 18 Mar 2024
-
DarkLight
-
PDF
Article summary
Did you find this summary helpful?
Thank you for your feedback
Default parameters are shown in the sample below. It is important to include the correct groups that will be allowed to access IAP. At a minimum, the group that will have administrative rights should be included. If the login user and their associated group are not listed, they will not have access to any adapters or apps within IAP.
Note: If you choose to use a name different than
Local_Radius
, you will also need to update the"id"
property along with the"name": "admin"
and"group": "admin"
properties under"radius_groups"
.
Example: Default Parameters
{
"name": "Local_Radius",
"model": "@itential/adapter-radius",
"type": "Adapter",
"properties": {
"id": "Local_Radius",
"type": "RADIUS",
"properties": {
"host": "11.11.1.11",
"port": 1812,
"secret": "password",
"radius_groups": [
{
"name": "admin",
"group": "admin"
},
{
"name": "pronghorn_admin_radius",
"group": "pronghorn_admin_radius"
}
],
"healthcheck": {
"type": "startup",
"frequency": 6000
}
},
"brokers": [
"aaa"
],
"groups": []
},
"isEncrypted": true,
"redisProps": {
"host": "127.0.0.1",
"port": 6379
},
"loggerProps": {
"description": "Logging",
"log_max_files": 100,
"log_max_file_size": 1048576,
"log_level": "spam",
"log_directory": "/var/log/pronghorn",
"log_filename": "RADIUS.log",
"console_level": "warn"
}
}
Was this article helpful?