Skip to main content
Skip table of contents

How to configure/test freeradius with TCP

Freeradius is running by default on port 2083. It is configured to use the same certificate as haproxy. There are no additional steps necessary for TCP to run with freeradius..

In order to integrated an external service, the following needs to be done:

  1. take the password for the integration

CODE
grep secret /opt/veridiumid/freeradius/etc/raddb/sites-available/tls
  1. if necessary, disable require_client_cert = no in /opt/veridiumid/freeradius/etc/raddb/sites-enabled/tls.

  2. configure in /opt/veridiumid/freeradius/etc/raddb/sites-enabled/tls specific client in clients radsec (map the source IP to the client)

  3. define in websecadmin in freeradiusconfig.json, allowed methods

CODE
"radseclocalhost": {
                "authentication_methods_allowed": [
                    "OTP",
                    "PUSH"
                ]
            }

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.