Internal RADIUS Authentication (via nginx)

To configure Internal RADIUS Authentication (via nginx):

  1. On your Operations Monitor, Navigate to Radius Authentication under adminSettingsExternal Devices.
  2. Click the RADIUS authentication enabled checkbox to enable RADIUS authentication.
  3. Configure details as given here:

    Table 6-3 Radius Authentication

    Field Value Remarks
    RADIUS server hostname 127.0.0.1 Hostname should be localhost for internal communication with radsecproxy
    RADIUS server port number: 1812 The UDP port on which the radsecproxy server is listening
    RADIUS shared secret radsec This field must contain the secret that is shared by Operations Monitor and the RADIUS server used for authentication. The recommended and default will be radsec
    RADIUS NAS identifier OCOM a string identifier and is used by the RADIUS server to determine whether or not the request is coming from Operations Monitor.
    RADIUS timeout 5 Number of seconds to wait response from RADIUS server.
    Number of retries issued by RADIUS client 3 Number of retry attempts if a request to the RADIUS server fails
For more information on configuring internal RADIUS authentication, see the section RADIUS Authentication in the Oracle Communications Operations Monitor User Guide.