HashiCorp Vault - RADIUS Configuration RSA Ready Implementation Guide
Originally Published: 2023-10-13
This section describes how to integrate HashiCorp Vault with RSA Cloud Authentication Service using RADIUS.
Configure RSA Cloud Authentication Service
Perform these steps to configure RSA Cloud Authentication Service using RADIUS.
Procedure
- Sign in to RSA Cloud Administration Console and browse to Authentication Clients > RADIUS.
- Click Add RADIUS Client and Profiles.
- In the RADIUS Client section, provide the following details.
- Name: Name for your RADIUS client.
- Description (optional): A description for your RADIUS client.
- IP Address: The IP address of the machine on which HashiCorp Vault is installed.
- Shared Secret: The secret that you will configure in the HashiCorp Vault.
- Click the Cloud Authentication Service only applies access policy for additional authentication option.
- Select an Access Policy as applicable.
- Click Save and Next Step.
- Click Finish.
Notes:
- Users must have a valid authentication method registered. To register an authentication method, access My Page and add the authentication method.
- When signing in to Vault with RADIUS, provide the tokencode as the password for the username.
Configure HashiCorp Vault
Perform these steps to configure HashiCorp Vault.
Procedure
- Sign in to Vault with the root token that is set while starting the HashiCorp Vault server.
- In the left pane, click Access.
- Under Authentication Methods, click Enable new method.
- Select RADIUS under Infra, and click Next.
- Under Enable an Authentication Method, click Enable Method.
- Configure the RADIUS server by providing the following details.
- Host: Server name or IP address of your RSA Identity Router.
- Secret: Enter the RADIUS shared secret. It must match with the secret as entered in the RSA Cloud Administration Console.
- Timeout: 60 seconds.
- Server Authentication Port: 1812.
- NAS Port:10
Note:
To get the IP address of the Identity Router:
- Sign in to Cloud Administration Console, and go to Platform > Identity Routers.
- Expand the identity router configured and copy the value of
Eth0 IP Address (Management).
In addition to the configuration made in the user interface, you can use the following endpoint to configure RADIUS.
| Type | Endpoint | Header | Body |
| POST | http://127.0.0.1:8200/v1/auth/radius/config | X-Vault-Token : <root token id> | { “host” : “ipaddress” , "port" : "1812" , "secret" : "secret" } |
Configuration is complete.
Return to the main page .
Related Articles
CyberArk Password Vault Web Access - RADIUS Configuration with Authentication Manager - RSA Ready Implementation Guide 130Number of Views CyberArk Vault - RADIUS Configuration with Authentication Manager - RSA Ready Implementation Guide 3Number of Views CyberArk Password Vault Web Access - RADIUS Configuration with Cloud Access Service - RSA Ready Implementation Guide 71Number of Views Microsoft Entra ID External Authentication Methods (EAM) - Relying Party Configuration Using OIDC - RSA Ready Implementati… 547Number of Views Okta Agent - RADIUS Configuration - Cloud Authentication Service - RSA Ready Implementation Guide 182Number of Views
Trending Articles
RSA MFA Agent 2.5 for Microsoft Windows Installation and Administration Guide RSA Authentication Manager 8.9 Release Notes (January 2026) RSA Authentication Manager Upgrade Process Downloading RSA Authentication Manager license files or RSA Software token seed records When configuring LDAP or LDAPS in RSA Authentication Manager with a global catalog the connection fails
Don't see what you're looking for?