You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/virtual-wan/user-groups-radius.md
+9-48Lines changed: 9 additions & 48 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,68 +5,29 @@ description: Learn how to configure RADIUS/NPS for user groups to assign IP addr
5
5
author: cherylmc
6
6
ms.service: azure-virtual-wan
7
7
ms.topic: how-to
8
-
ms.date: 07/16/2024
8
+
ms.date: 04/23/2025
9
9
ms.author: cherylmc
10
10
11
11
---
12
12
# RADIUS - Configure NPS for vendor-specific attributes - P2S user groups
13
13
14
-
The following section describes how to configure Windows Server Network Policy Server (NPS) to authenticate users to respond to Access-Request messages with the Vendor Specific Attribute (VSA) used for user group support in Virtual WAN point-to-site-VPN. The following steps assume that your Network Policy Server is already registered to Active Directory. The steps might vary depending on the vendor/version of your NPS server.
14
+
This article helps you configure Windows Server Network Policy Server (NPS) to authenticate users to respond to Access-Request messages with the Vendor Specific Attribute (VSA) that is used for user group support in Virtual WAN point-to-site-VPN. For more information RADIUS and user groups for point-to-site, see [About user groups and IP address pools for P2S User VPNs](user-groups-about.md#radius-server-openvpn-and-ikev2).
15
15
16
-
The following steps describe setting up single Network Policy on the NPS server. The NPS server replies with the specified VSA for all users who match this policy, and the value of this VSA can be used on your point-to-site VPN gateway in Virtual WAN.
16
+
The steps in the following sections help you set up a network policy on the NPS server. The NPS server replies with the specified VSA for all users who match this policy, and the value of this VSA can be used on your Virtual WAN point-to-site VPN gateway.
17
17
18
-
## Configure
18
+
You can create multiple network policies on your NPS server to send different Access-Accept messages to the Virtual WAN point-to-site VPN gateway based on Active Directory group membership, or any other mechanism you'd like to support.
19
19
20
-
1. Open the **Network Policy Server** management console, and right click **Network Policies -> New** to create a new Network Policy.
20
+
## Prerequisites
21
21
22
-
:::image type="content" source="./media/user-groups-radius/network-policy-server.png" alt-text="Screenshot of new network policy." lightbox="./media/user-groups-radius/network-policy-server.png":::
22
+
Verify that you have a working RADIUS server (NPS) already registered to Active Directory.
23
23
24
-
1. In the wizard, select **Access granted** to ensure your RADIUS server can send Access-Accept messages after authenticating users. Then, click **Next**.
24
+
## Configure the NPS server
25
25
26
-
1. Name the policy and select **Remote Access Server (VPN-Dial up)** as the network access server type. Then, click **Next**.
26
+
Use the following steps to help you configure a network policy on your NPS server. Steps might vary, depending on vendor and version. For more information about how to configure network policies, see [Network Policy Server](https://learn.microsoft.com/windows-server/networking/technologies/nps/nps-np-configure).
27
27
28
-
:::image type="content" source="./media/user-groups-radius/policy-name.png" alt-text="Screenshot of policy name field." lightbox="./media/user-groups-radius/policy-name.png":::
29
-
30
-
1. On the **Specify Conditions** page, click **Add** to select a condition. Then, select **User Groups** as the condition and click **Add**. You can also use other Network Policy conditions that are supported by your RADIUS server vendor.
31
-
32
-
:::image type="content" source="./media/user-groups-radius/specify.png" alt-text="Screenshot of specifying conditions for User Groups." lightbox="./media/user-groups-radius/specify.png":::
33
-
34
-
1. On the **User Groups** page, click **Add Groups** and select the Active Directory groups that will use this policy. Then, click **OK** and **OK** again. You'll see the groups you've added in the **User Groups** window. Click **OK** to return to the **Specify Conditions** page and click **Next**.
35
-
36
-
1. On the **Specify Access Permission** page, select **Access granted** to ensure your RADIUS server can send Access-Accept messages after authenticating users. Then, click **Next**.
37
-
38
-
:::image type="content" source="./media/user-groups-radius/specify-access.png" alt-text="Screenshot of the Specify Access Permission page." lightbox="./media/user-groups-radius/specify-access.png":::
39
-
40
-
1. For **Configuration Authentication Methods**, make any necessary changes, then click **Next**.
41
-
1. For **Configure Constraints** select any necessary settings. Then, click **Next**.
42
-
1. On the **Configure Settings** page, for **RADIUS Attributes**, highlight **Vendor Specific** and click **Add**.
43
-
44
-
:::image type="content" source="./media/user-groups-radius/configure-settings.png" alt-text="Screenshot of the Configure Settings page." lightbox="./media/user-groups-radius/configure-settings.png":::
45
-
46
-
1. On the **Add Vendor Specific Attribute** page, scroll to select **Vendor-Specific**.
47
-
48
-
:::image type="content" source="./media/user-groups-radius/vendor-specific.png" alt-text="Screenshot of the Add Vendor Specific Attribute page with Vendor-Specific selected." lightbox="./media/user-groups-radius/vendor-specific.png":::
49
-
50
-
1. Click **Add** to open the **Attribute Information** page. Then, click **Add** to open the **Vendor-Specific Attribute Information** page. Select **Select from list** and select **Microsoft**. Select **Yes. It conforms**. Then, click **Configure Attribute**.
51
-
52
-
:::image type="content" source="./media/user-groups-radius/attribute-information.png" alt-text="Screenshot of the Attribute Information page." lightbox="./media/user-groups-radius/attribute-information.png":::
53
-
54
-
1. On the **Configure VSA (RFC Compliant)** page, select the following values:
55
-
56
-
***Vendor-assigned attribute number**: 65
57
-
***Attribute format**: Hexadecimal
58
-
***Attribute value**: Set this to the VSA value you have configured on your VPN server configuration, such as 6a1bd08. The VSA value should begin with **6ad1bd**.
59
-
60
-
1. Click **OK** and **OK** again to close the windows. On the **Attribute Information** page, you'll see the Vendor and Value listed that you just input. Click **OK** to close the window. Then, click **Close** to return to the **Configure Settings** page.
61
-
62
-
1. The **Configure Settings** now looks similar to the following screenshot:
63
-
64
-
:::image type="content" source="./media/user-groups-radius/vendor-value.png" alt-text="Screenshot of the Configure Settings page with Vendor Specific attributes." lightbox="./media/user-groups-radius/vendor-value.png":::
65
-
66
-
1. Click **Next** and then **Finish**. You can create multiple network policies on your RADIUS server to send different Access-Accept messages to the Virtual WAN point-to-site VPN gateway based on Active Directory group membership or any other mechanism you would like to support.
1. Open the Network Policy Server console, and then double-click **Policies**.
9
+
1. In the console tree, right-click **Network Policies**, and click **New**. The New Network Policy wizard opens.
10
+
1. Use the New Network Policy wizard to create a policy. Advance through the policy pages, specifying the following settings:
11
+
12
+
|Page | Setting | Value |
13
+
|---|---|---|
14
+
| Specify Network Policy Name and Connection Type | Policy name | Enter a name for the policy. |
15
+
|| Type of network access server | From the dropdown, select **Remote Access Server (VPN-Dial up)**. |
16
+
|Specify Conditions | Conditions | Click **Add** and select **User Groups**. Then, click **Add**. You can also use other Network Policy conditions supported by your RADIUS server vendor.|
17
+
| User Groups | Add Groups | Click **Add Groups** and select the Active Directory groups that will use this policy. Click **OK** and **OK**, then click **Next**. |
| Vendor-Specific Attribute Information | Specify network access server vendor/Specify conforms| Choose **Select from list** and select **Microsoft**.<br>Select **Yes. It conforms**. Then, click **Configure Attribute**. |
25
+
| Configure VSA (RFC Compliant) | Vendor-assigned attribute number | 65 |
26
+
|| Attribute format | Hexadecimal |
27
+
||Attribute value | Set this value to the VSA value configured on your VPN server configuration, such as 6ad1bd08. The VSA value should begin with **6ad1bd**.|
28
+
29
+
1. Click **OK**, and **OK** again. Then, **Close** to return to the **Configure Settings** page.
30
+
1. Click **Next**, and then **Finish** to create your policy.
0 commit comments