Solved

Can user access be granted to Windows Server logon via RADIUS Authentication (Non-Domain Server)

Posted on 2011-09-21
2
335 Views
Last Modified: 2013-11-05
Hello experts,

I was recently asked a question. We will be installing some windows servers in a DMZ, and non will be joined to a domain. Our question is, can we setup RADIUS authentication for accessing the server rather than creating admin accounts on all servers repeatedly. Our goal would be to create one admin account, and then use this to point the servers at a RADIUS server to authenticate users who are allowed to access.
0
Comment
Question by:ebiguy
2 Comments
 
LVL 42

Accepted Solution

by:
kevinhsieh earned 500 total points
ID: 36581877
That depends on how you are accessing the servers. It sounds like what you are asking for is what you get when you have a domain. In order to do that, you need to have a domain. ;-) You can have a separate forest/domain in the DMZ.
0
 

Author Comment

by:ebiguy
ID: 36590131
Yes, this is what I proposed when they asked me about this. However, these are network guys, and they are used to having RADIUS authenticate the logins for the network devices. I told them that in the Windows world, this is called a Domain with a domain controller. Go figure. So using RADIUS as the authentication server for a worksgroup server is out of the question. I will recommend a DMZ domain.
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The recent Microsoft changes on update philosophy for Windows pre-10 and their impact on existing WSUS implementations.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This tutorial will show how to push an installation of Backup Exec to an additional server in both 2012 and 2014 versions of the software. Click on the Backup Exec button in the upper left corner. From here, select Installation and Licensing, then I…
This tutorial will walk an individual through the steps necessary to enable the VMware\Hyper-V licensed feature of Backup Exec 2012. In addition, how to add a VMware server and configure a backup job. The first step is to acquire the necessary licen…

912 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now