Bridging the Gap between Cloud 2-Factor Authentication and On-Premise Resources using RADIUS

Webinar Registration

2-Factor Authentication is finally becoming common place thanks in large part to the explosion of online services and the cloud. But it's not an all-cloud world and before you get too far down the 2-Factor road make sure you understand the role RADIUS support plays in unifying strong authentication both in the cloud and with on-prem and with legacy resources.

RADIUS may have been designed back in the dial-up days but it has stood the test of time and remains a secure and robust protocol that enables you to easily configure thousands of different applications, systems and network devices to use pretty much whatever authentication provider you like.

RADIUS is really well designed and vendor agnostic, and that's why it's still such a vital technology. RADIUS abstracts authentication and authorization into a easy-to-configure service that only a requires a few parameters to setup between the resource being accessed and the identity and access provider. It's secure and fault-tolerant without being complex. And thanks its generic client/server design it has become a powerful way to bring 2-factor authentication to devices and applications that were never designed for it.

This is important because of the way that 2-factor authentication is being implemented these days. If we thought we needed strong authentication inside the network, we really need it on the Internet. We recognized this before the cloud because the primary driver for 2-factor back in the day was for securing VPN and other remote access applications like Outlook Web Access.

Now that much of what we are trying to protect is in the cloud and given how easy cloud services are to use it's no wonder that cloud-based 2-factor authentication services are becoming very popular.

But without proper planning you can easily end up with a fractured authentication framework where

  • your cloud-based 2-factor solution can't integrate with legacy and on-prem applications and devices
  • users are required to install multiple authentication apps on their mobile devices
  • wrestle with redundant but confusingly different enrollment methods
  • you lose a global, unified view of authentication activity
  • you lack centralized, policy based-control of authentication or the ability to apply risk-based metric

In this webinar I'll show you how RADIUS works and explain the basic setup of any RADIUS implementation including how

  • the shared secret works and how to ensure that is implemented securely
  • to ensure fault-tolerance with RADIUS
  • it can be used to support 2-factor authentication

Then Joe Campbell will talk about how One Identity authentication solutions make it easy to roll out a variety of 2FA methods that support the widest range of on-prem, cloud and legacy applications.

Please join us for this real training for free ™ event.

First Name:   
Last Name:   
Work Email:  
Phone:  
Job Title:  
Organization:  
Country:    
Address:  
City:  
State:  
Zip/Postal Code:  
Organization Type :
 

Your information will be shared with the sponsor.