Previous Topic: Authenticate Users in Heterogeneous RADIUS Environments with One User DirectoryNext Topic: RADIUS Agents Group Overview


How to Authenticate Users in Heterogeneous RADIUS Environments with Two User Directories

The Policy Server can also be configured to authenticate users for multiple NAS devices when the user information for each device is located in separate user directories. The NAS devices can be of different vendor types.

There are several advantages to this configuration:

An example of a heterogeneous configuration that uses two user directories is illustrated in the following graphic:

Diagram showing a heterogeneous RADIUS environment using two user directories

Unlike the topology described in the previous section, this Policy Server uses two user directories to authenticate the users. User information for the Cisco RAS users is stored in User Directory A. User information for the Checkpoint firewall is stored in User Directory B. The Policy Server can authenticate users using both of these directories.

By dividing the configuration into two policy domains, the need for realm hints is eliminated. Each RADIUS Agent exists in a separate policy domain and is bound to only one realm.

The process of authentication when two user directories are used is as follows:

  1. The remote user dials in from a modem and the Cisco RAS determines that it must use a RADIUS user profile to authenticate the user.
  2. The RAS sends the user connection request to the Policy Server.
  3. The Policy Server enacts the policy defined for the RAS, and the RADIUS Agent obtains the user’s name and password using the authentication scheme configured for the Agent.
  4. The Policy Server evaluates the user information against the user directory and policy store associated with the policy’s domain.
  5. The Policy Server sends an authentication response to the Cisco RAS and one of the following takes place:

When the Internet user attempts to dial into the Internet Service Provider by using the Checkpoint Firewall, this same process of authentication occurs. However, the Policy Server evaluates the Internet user’s authentication information against a different user directory.

How to Configure the System and Policy Domain

To configure the heterogeneous environment described above, which includes two user directories, you must:

  1. Configure the system:
    1. Define two RADIUS Agents, as described in Define Agents for a Heterogeneous, Two Directory Environment.
    2. Set up the user directories, as described in Set Up User Directories.
    3. Create two policy domains, as described in Create Two Policy Domains.
  2. Configure the policy domain:
    1. Define one realm. The realm binds a RADIUS Agent with a RADIUS authentication scheme.
    2. Define a rule that enables authenticated users to access the realm. Each rule binds a realm with an allow or deny access event.
    3. Define a response that provides the user profile to the NAS device and optionally, configures the characteristics of the session using response attributes.
    4. Create a policy that binds the rule with the response. This policy also binds the rule and response with the RADIUS user directory.

A diagram of these two policy domains is shown in the following graphic:

Graphic showing how to configure the system and policy domain

Define Agents for a Heterogeneous Two Directory Environment

For this environment, you must configure two RADIUS Agents:

More information:

Define Agents for a Heterogeneous, Single Directory Environment

Set Up User Directories

Each of the user directories containing RADIUS user information must be configured in the Policy Server. Each directory will be associated with a separate policy domain so that separate administrators can be defined for each policy domain.

Create Two Policy Domains

One policy domain must be created for the Cisco RAS and one policy domain must be created for the Checkpoint firewall. When defining the policy domains, associate each domain with the appropriate user directory.