More actions
No edit summary |
No edit summary |
||
Line 11: | Line 11: | ||
# | # Click the Start button and open Server Manager | ||
# On the top right, click Manage, then click "Add Roles and Features" | |||
# The Microsoft "Add Roles And Features Wizard" will open. Click Next to continue. | |||
# On the installation type screen, proceed with a Role-based or feature-based installation. | |||
# Click Next to proceed with the installation on the local server on the "Server Selection" screen. If you are using RSAT, you may need to select a different server, or add the server to the pool to proceed with management. | |||
# |
Revision as of 00:21, 18 May 2024
History
Authentication: Microsoft NPS, or Network Policy Server, allows you to create and enforce organization-wide network access policies for connection requests, authentication and authorization, including RADIUS authentication. Official Microsoft documentation can be found here.
This service was setup to authenticate Network: Road Warrior VPN on Hardware:SAD-HME-FW01 via RADIUS. In addition to RADIUS authentication, Authentication: Cisco DUO Application Proxy handles multi-factor authentication. These services run from Servers:SAD-AUTH01 and provide secure access to sysadminafterdark internal operations.
Deployment
The steps below were followed to atain a working Microsoft NPS server with RADIUS Authentication:
- Click the Start button and open Server Manager
- On the top right, click Manage, then click "Add Roles and Features"
- The Microsoft "Add Roles And Features Wizard" will open. Click Next to continue.
- On the installation type screen, proceed with a Role-based or feature-based installation.
- Click Next to proceed with the installation on the local server on the "Server Selection" screen. If you are using RSAT, you may need to select a different server, or add the server to the pool to proceed with management.