EAP-TTLS Configuration
You can configure the RSA RADIUS server to handle Extensible Authentication Protocol-Tunneled Transport Layer Security (EAP-TTLS) authentications. RSA RADIUS requires the following certificates to handle authentication requests made using the EAP-TTLS protocol:
A server certificate for each RADIUS server, which is used by a RADIUS client to verify the identity of the RADIUS server. A server certificate is installed on each RADIUS server by default.
A trusted root certificate, which is used by a RADIUS server to verify the identity of a RADIUS client. Root certificates are not installed on the RADIUS server by default.
For more information about server and trusted root certificates, see Replace a RADIUS Server Certificate and Add a Trusted Root Certificate.
Related Articles
Manage Networks 99Number of Views Manage Clusters 19Number of Views Add an Identity Source 290Number of Views Attribute Change Rule reverts to a previous version after making changes in RSA Identity Governance & Lifecycle 23Number of Views RSA Identity Governance and Lifecycle 7.0.1 P01 installation gets stuck at message of undeploying current ear and deployin… 163Number of Views
Trending Articles
RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide RSA Authentication Manager 8.9 Release Notes (January 2026) How to install the jTDS JDBC driver on WildFly for use with Data Collections in RSA Identity Governance & Lifecycle RSA Authentication Manager 8.8 Setup and Configuration Guide Artifacts to gather in RSA Identity Governance & Lifecycle