RADIUS is a networking protocol used for remote user authentication and accounting.
Description
RADIUS, which stands for Remote Authentication Dial-In User Service, is a client-server protocol that provides centralized Authentication, Authorization, and Accounting (AAA) management for users who connect and use a network service. In the context of Non-Human Identities (NHIs), RADIUS can also be utilized to manage and authenticate devices, sensors, and other non-human entities that require network access. The RADIUS server manages the authentication requests from clients, which can be network access servers, routers, or switches, ensuring that only authorized devices can access the network. It supports various methods of authentication, including passwords and digital certificates, and provides accounting features to track the usage and performance of these devices. This is particularly important in environments where non-human entities operate autonomously, such as Internet of Things (IoT) networks, where ensuring security and tracking usage is crucial.
Examples
- An IoT device connecting to a corporate network using RADIUS for secure authentication.
- A wireless access point using RADIUS to authenticate devices trying to access the Wi-Fi network.
Additional Information
- RADIUS is commonly used in ISP and enterprise networks for managing user access.
- It can integrate with other authentication systems like LDAP or Active Directory.
References
- Non-Human Identity Management - Veza
- The Complete Guide to the Growing Impact of Non-Human Identities ...
- Why Non-Human Identities Should Be A Top Cybersecurity Priority
- The State of Non-Human Identity Security | CSA
- The Crucial Role Of Non-Human Identity And Secrets Management
- Entro Extends Non-Human Identity Security Platform - Dark Reading
- Risk related to non-human identities: Believe the hype, reject the FUD
- Three ways to thwart non-human identity attacks | SC Media
- As Non-Human Identity Attacks Soar, Cloud Security Alliance and
- Non-Human Identities Security: Breaking down the problem - SlashID