Data Bites

RADIUS security news and updates from the Cloud RADIUS team.

LDAP Vs. RADIUS

Two widely used protocols, LDAP (Lightweight Directory Access Protocol) and RADIUS (Remote Authentication Dial-In User Service) are essential to network authentication and access management. These protocols are the crucial building pieces that allow for effective and safe user management in a networked setting. LDAP is especially good at handling user IDs and associated attributes since […]

Read Story

The Stages of 802.1X Authentication

The 802.1X authentication protocol is a state-of-the-art cryptographic network technology that provides protection for both wired and wireless networks. The fundamental concept behind the implementation of security protocols is rooted in the necessity to safeguard confidential data and authenticate individuals endeavoring to illicitly infiltrate the system. Upon network enrollment, devices must undergo authentication, which is […]

Read Story

What Is a Linux RADIUS Server?

It's important to understand that not all RADIUS solutions are the same, let's compare and contrast Linux RADIUS vs. other solutions.

Read Story

RadSec vs RADIUS: What’s the difference?

When it comes to network infrastructure, there can be a lot of confusion over all the different terminology and protocols. It’s common for people to get bogged down by jargon, making it difficult to understand exactly what things actually mean in a practical sense.

Read Story

How to Configure RADIUS over TLS (RadSec)

RADIUS isn't viable when sending information over the internet. RadSec securely transfers data with TLS encryption.

Read Story