HashiCorp Vault - RADIUS Configuration RSA Ready Implementation Guide
Originally Published: 2023-10-13
This section describes how to integrate HashiCorp Vault with RSA Cloud Authentication Service using RADIUS.
Configure RSA Cloud Authentication Service
Perform these steps to configure RSA Cloud Authentication Service using RADIUS.
Procedure
- Sign in to RSA Cloud Administration Console and browse to Authentication Clients > RADIUS.
- Click Add RADIUS Client and Profiles.
- In the RADIUS Client section, provide the following details.
- Name: Name for your RADIUS client.
- Description (optional): A description for your RADIUS client.
- IP Address: The IP address of the machine on which HashiCorp Vault is installed.
- Shared Secret: The secret that you will configure in the HashiCorp Vault.
- Click the Cloud Authentication Service only applies access policy for additional authentication option.
- Select an Access Policy as applicable.
- Click Save and Next Step.
- Click Finish.
Notes:
- Users must have a valid authentication method registered. To register an authentication method, access My Page and add the authentication method.
- When signing in to Vault with RADIUS, provide the tokencode as the password for the username.
Configure HashiCorp Vault
Perform these steps to configure HashiCorp Vault.
Procedure
- Sign in to Vault with the root token that is set while starting the HashiCorp Vault server.
- In the left pane, click Access.
- Under Authentication Methods, click Enable new method.
- Select RADIUS under Infra, and click Next.
- Under Enable an Authentication Method, click Enable Method.
- Configure the RADIUS server by providing the following details.
- Host: Server name or IP address of your RSA Identity Router.
- Secret: Enter the RADIUS shared secret. It must match with the secret as entered in the RSA Cloud Administration Console.
- Timeout: 60 seconds.
- Server Authentication Port: 1812.
- NAS Port:10
Note:
To get the IP address of the Identity Router:
- Sign in to Cloud Administration Console, and go to Platform > Identity Routers.
- Expand the identity router configured and copy the value of
Eth0 IP Address (Management).
In addition to the configuration made in the user interface, you can use the following endpoint to configure RADIUS.
| Type | Endpoint | Header | Body |
| POST | http://127.0.0.1:8200/v1/auth/radius/config | X-Vault-Token : <root token id> | { “host” : “ipaddress” , "port" : "1812" , "secret" : "secret" } |
Configuration is complete.
Return to the main page .
Related Articles
CyberArk Password Vault Web Access - RADIUS Configuration with Authentication Manager - RSA Ready Implementation Guide 124Number of Views CyberArk Password Vault Web Access - RADIUS Configuration with Cloud Access Service - RSA Ready Implementation Guide 71Number of Views CyberArk Vault - RADIUS Configuration with Authentication Manager - RSA Ready Implementation Guide 3Number of Views Palo Alto NGFW Global Protect - RADIUS Configuration in Cloud Access Service- RSA Ready Implementation Guide 56Number of Views CyberArk Vault - RADIUS Configuration with Cloud Access Service - RSA Ready Implementation Guide 2Number of Views
Trending Articles
RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide RSA Authentication Manager 8.9 Release Notes (January 2026) How to install the jTDS JDBC driver on WildFly for use with Data Collections in RSA Identity Governance & Lifecycle RSA Authentication Manager 8.8 Setup and Configuration Guide Artifacts to gather in RSA Identity Governance & Lifecycle
Don't see what you're looking for?