Internal RADIUS Authentication (via nginx)
To configure Internal RADIUS Authentication (via nginx):
- On your Operations Monitor, Navigate to Radius Authentication under admin → Settings → External Devices.
- Click the RADIUS authentication enabled checkbox to enable RADIUS authentication.
- Configure details as given here:
Table 6-3 Radius Authentication
Field Value Remarks RADIUS server hostname 127.0.0.1 Hostname should be localhost for internal communication with radsecproxy RADIUS server port number: 1812 The UDP port on which the radsecproxy server is listening RADIUS shared secret radsec This field must contain the secret that is shared by Operations Monitor and the RADIUS server used for authentication. The recommended and default will be radsec RADIUS NAS identifier OCOM a string identifier and is used by the RADIUS server to determine whether or not the request is coming from Operations Monitor. RADIUS timeout 5 Number of seconds to wait response from RADIUS server. Number of retries issued by RADIUS client 3 Number of retry attempts if a request to the RADIUS server fails