Hosted RADIUS Server
Your Dedicated Authentication Hub Hosted in the Cloud
IronWifi Cloud-based RADIUS Solution provides:
- Reliable WPA2-Enterprise / 802.1x Authentication
- Authentication using Password, PIN, Certificate or MAC address
- Customizable Captive Portal pages
- Support for cloud controllers Cisco Meraki Cloud and Aruba Central
- Synchronization with Google Apps, Active Directory, SQL DB
- 20 comprehensive AAA reports and API interface
- Up and Running in 60 seconds
IronWifi is a cloud-based RADIUS authentication and accounting service that provides resizable capacity in the cloud. Gain visibility into the strongest authentication available, at the driver’s seat of access control and client management for your network resources.
Obtain and configure access control with minimal friction through a powerful and user-friendly web interface. Keep a birds-eye view of your users and networking devices while running on a proven cloud-based computing environment.
IronWifi RADIUS is a managed service, which means its components are redundant and highly available. If a load balancing component fails, it is restarted or replaced automatically and immediately.
Revolutionizes the economics of AAA service. Pay only for the capacity that you actually need. IronWifi provides system administrators with a failure resilient tool to isolate themselves from common failure scenarios. Deploy with confidence to authenticate the clients accessing your infrastructure in as little as 60 seconds.
When you need a RADIUS server
RADIUS is an authentication service, telling your network access controller (NAS, router or wireless access point) whether a connecting client should be allowed to have access to your network and under what conditions, such as data download or bandwidth limits and time of day constraints.
Implement 802.1x security in your wireless network, or use a captive portal solution to authenticate users via credentials provided in a web form. In an 802.1x security deployment scenario, before any client is allowed to connect, verify identity using some of the following parameters:
- Username and Password – Authentication using credentials selected by client
- MAC address – Authentication based on hardware address of the client’s device
- Client certificate – Authentication based on rock-solid, asymmetric encryption algorithm
- PIN Code - Create singular or multiple PIN codes from within the IronWifi Console to distribute to users as needed
Manage your clients manually from within our console, or from your external database. Our solution currently supports integration with Active Directory, LDAP, SQL, and Google Apps. Synchronization with your database will automatically update the list of users, groups and their access permissions. Clients seeking a reliable and secure method of authenticating users, visitors or mobile devices will find IronWifi a solution that is easy to deploy and maintain. WPA2-Enterprise (802.1x) is de-facto standard for networks that require manageability and the highest level of protection. It is widely used by Universities, Corporations and required by the PCI and HIPAA.
Principles of 802.1x network authentication standard do not allow processing or recording any sensitive network communication, except data received from a NAS device for accounting purposes.
If you have any questions regarding security please contact us at [email protected].
All communication with our systems or systems of third parties goes through encrypted protocols.
Our public web sites and API are only available on port 443 via HTTPS enforced with HSTS. You can verify security of our connections on the Qualys web site:
Communication with our Radius servers is encrypted using standard mechanisms and authentication details of users connecting to your Wireless network are transferred inside an encrypted EAP tunnel.
To protect our service from outages caused by failures and attacks, we are running our infrastructure in Amazon’s AWS cloud and Google Cloud platform. Cloud based infrastructure allows us to deliver very low latency, high availability and great flexibility to support even the largest implementations.