Keywords:-
Article Content:-
Abstract
Radius centralizes logins and passwords. This is a server protocol. It should be noted that the server, Radius, manages authentication for clients, routers and switches. Radius is simply a remote authentication protocol used to centralize authentication data and manage user connections to remote services. This protocol relies primarily on a server (DARIUS server), linked to an identification base (database, LDAP directory, etc.). A Radius client, called NAS (Network Access Server), acting as intermediary between the end-user and the server. All transactions between the Radius client and the server are encrypted.
It works on the basis of a scenario similar to : a user sends a request to the NAS to authorize a remote connection. The NAS in turn forwards the request to the Radius server. The latter consults the requested identification database to find out the type of identification scenario requested for the user. Either the current scenario is suitable, or another identification method is requested from the user. This protocol thus returns one of the four responses we'll discuss in the rest of this article : ACCEPT : identification successful, REJECT : identification failed, CHALLENGE : the Radius server requests additional information from the user and proposes a challenge. Following the above authentication phase, an authentication phase begins, in which the server returns the user's authorizations.
In this article, as a network manager, we're concerned with setting up means of access control, and to do this, we have to square a kind of circle : simplicity for the user, reliability of the mechanisms, high level of security, all while using available standards as much as possible.
References:-
References
Ali MAHBOUB, Ali SENOUSSI, Gestion 13(02), 2019
A AMRI, FZ LAKEHAL, F SADOUKI, 2014
Amir Lamine, Editions Université Européennes, 2015
Ali Sadiqui ISTE GROUP, 2019
El Hadi Kenane, 2018
GUY Pojolle, Editions Eyrolles, 2014
http:/ /www.google.com/configuration of the Radius server under Windows server 2012, consulted on 02/05/2023;
http://www.certa.ssi.gouv.fr/site/CERTA-2008-ACT-047.pdf
http:/ /www.kismetwreless.net
Ilunga Mbuyamba Elisée, Kabuyaya Bahavira Patrick, International Journal of innovation and Applied studies 39(3), 2023
IT, AKademy, 2020
JUSTE Raimbault, University, Paris 7 Denis Diderot, 2018
Ken Chen ISTE GROUP, 2014
Maryline Laurent, Armen Khatchatourov, Signes de confiance, l'impact des labels sur la gestion des données personnelles, 2018
Olivier Fruchier, Philippe Egea, Faissal Bakati,
Ouelhadj Mohamed Amine, Université Mouloud Mammeri, 2015
Raphael Grevisse Yende, 2018
Rochdi Sarraj, Ecole Nationale Supérieure des Mines de Paris, 2013
Sylvain Métille, Jusletter, 2017, Huu Quynh Nguyen, Paris, ENST, 2008
Thierry Talbert, J3Ea21, 2008, 2022
PATRICE KADIONIK, ENSEIRB, 2002
Stefan Lueders, 2020
Jean Lucat, Global Security, 2016
Robin Heron, Stéphane Safin, Anne Bationo-Tillon EPIQUE, 2019
Wajih Abdallah, Sami Mnasri, Thierry Val Journées Nationales des communications Terrestres (JNCT 2019), 2019