Windows Routing and Remote Access Service - RADIUS Configuration with Authentication Manager - RSA Ready Implementation Guide
This article describes how to integrate Windows RRAS with RSA Authentication Manager (AM) using RADIUS.
Configure AM
Perform these steps to configure AM using RADIUS.
Procedure
- Sign in to Security Console.
- Go to RADIUS > RADIUS Servers and make a note of the IP address of the selected RADIUS server.
- Navigate to RADIUS > RADIUS Clients and click Add New.
- On the Add RADIUS Client page, enter the following:
- Client Name: Enter a descriptive name for the RADIUS client.
- IPv4 Address: Enter the IP address of the RADIUS client (Windows RRAS server).
- Make/Model: Standard Radius.
- Shared Secret: Create and enter a secure shared secret. This secret will be used for secure communication between the RADIUS client and the RADIUS server.
- Click Save & Create Associated RSA Agent.
- On the Add New Authentication Agent page, click Save, then confirm by clicking Yes, Save Agent.
Notes
- AM RADIUS server listens on ports UDP 1645 and UDP 1812.
- The relationship of the agent host record to the RADIUS client in AM can be 1 to 1, 1 to many, or 1 to all (global).
- Shared Secret must be an alphanumeric string between 1 and 31 characters in length and is case-sensitive.
Configure Windows RRAS
Perform these steps to configure Windows RRAS.
Procedure
- Log on to the RRAS Windows server.
- Open the Routing and Remote Access configuration on the server.
- In the left pane, right-click the server name and click Properties.
- On the Server Properties page, navigate to the Security tab.
- Under Authentication provider, choose RADIUS Authentication.
- On the same window, click Configure next to RADIUS Authentication.
- On the Configure window, click Add to add the RSA RADIUS server details.
- On the Add RADIUS Server window, enter the details of the RADIUS server and click OK.
- Server name: Name for the RSA RADIUS server.
- Shared secret: RADIUS secret between the RADIUS client and server. This should match the secret configured in RSA.
- Time-out: Increase the timeout to 15 seconds.
- Port: Leave port 1812 as the default port used for RADIUS.
- In the Security tab, click Authentication Methods.
- Select the Unencrypted password (PAP) checkbox and click OK.
Note: The VPN client used should also be configured to use PAP to match what is configured in RRAS.
In the preceding screenshot, a pre-shared key (PSK) was used for L2TP/IPsec for simplicity. This should match the PSK configured in the VPN client.
The configuration is complete.
Related Articles
Windows Routing and Remote Access Service - RADIUS Configuration with Cloud Access Service - RSA Ready Implementation Guide 2Number of Views Add a Persistent IPv6 Static Route 9Number of Views Windows Routing and Remote Access Service - RSA Ready Implementation Guide 2Number of Views Add a Persistent IPv4 Static Route 31Number of Views Error: Principal does not possess one or more authenticators when using RSA SecurID Access Authenticate app tokencode with… 561Number of Views
Trending Articles
Quick Setup Guide - Passwordless Authentication in Windows MFA Agent for Active Directory RSA Authentication Manager 8.9 Release Notes (January 2026) Artifacts to gather in RSA Identity Governance & Lifecycle RSA Governance & Lifecycle 8.0.0 Administrators Guide RSA Governance & Lifecycle 8.0.0 Installation Guide
Don't see what you're looking for?