Mirket Help Center
  • Mirket Help Center
    • End User License Agreement
    • Privacy Policy
    • Mirket On Premise
      • Mirket Installation
        • Mirket MFA Installation Requirements
        • Mirket Installation Steps
      • Mirket Admin Panel
        • Dashboard
        • Admin Accounts Configuration
        • User Management
          • Local Users Configuration
          • Local Group Configuration
          • Ldap Users
          • LDAP Group Configuration
        • Rules
          • Radius Rules
            • Radius Clients
            • Radius Rules
            • Authorization Profiles
          • RDP Rules
          • OWA Rules
          • API Rules
            • API Docs
        • Providers
          • Approve / Deny
          • Mirket OTP
          • TOTP
          • SMS Providers
          • Pauth
          • Pauth or Approve/Deny
          • Bypass
        • Logging
          • Radius Logging
          • RDP Logging
          • OWA Logging
          • API Logging
        • Reports
        • Settings
          • General Settings
          • Syslog Settings
          • Notification Settings
          • License
        • Mirket Upgrade Process
      • Mirket Agents
        • Mirket RDP Agent
        • Mirket OWA Agent
      • Mirket MFA App
      • Integrations
        • Array Networks SSL VPN Integration
        • Barracuda CloudGen Firewall Integration
        • Citrix Integration
        • Cisco ASA Integration
        • Cisco ISE RADIUS Integration
        • Checkpoint SSL VPN Integration
        • CyberArk Integration
        • Dell SonicWall Network Security Appliance Integration
        • Fortigate MFA for admin accounts
        • Fortigate SSL VPN Integration
        • F5 integration
        • Ivanti Pulse Secure Connect Integration
        • Palo Alto MFA for admin accounts
        • Palo Alto SSL VPN Integration
        • Sophos SSL VPN Integration
        • Watchguard SSL VPN Integration
        • Ubuntu Server 22.0.4 SSH connections
        • XLOG Integration
        • VMware Horizon 8 RADIUS Integration
      • Knowledge Base
        • User not found on logs even user exist
        • Global Protect authentication happened two time while using RADIUS
        • User is not withdrawn from LDAP.
        • Fortigate SSL VPN timeout
        • Provider not found error
        • How to install SSL certificate to Mirket
        • Can a Palo Alto be set up to forward client IP addresses to Mirket?
        • SMS not sent to the phone number
      • Release Notes
        • Mirket Version 4.1.2
        • Mirket Version 4.0.6
        • Mirket Version 4.0.0
        • Mirket Version 3.9.2
    • Mirket SAAS Platform
      • Mirket Gateways Installation Requirements
      • Mirket Portal
        • Dashboard
        • Administration
        • Users
          • LDAP Users
          • Local Users
        • Groups
        • External Sources
        • Authentication
          • Radius Rules
          • Proxy Rules
          • OWA Rules
          • ADFS
            • ADFS Management
            • ADFS Agent
          • Custom API
          • OS Logon
            • OS Logon Management
            • OS Logon Agent
        • User Portal
          • User Portal Management
          • User Portal Login Page
          • User Portal Dashboard
        • Connector
          • Radius Gateways
          • LDAP Gateways
          • Proxy Gateways
        • SMS Providers
        • Settings
          • General Settings
          • Syslog
          • Attribute Profiles
      • Monitor
        • Audit Logs
        • Radius Logs
        • Proxy Logs
        • OWA Logs
        • User Portal
        • ADFS Logs
        • OS Logon Logs
      • Mirket Mobile App
      • Integrations
        • Array Networks SSL VPN Integration
        • Barracuda CloudGen Firewall Integration
        • Citrix Integration
        • Cisco ASA Integration
        • Cisco ISE RADIUS Integration
        • Checkpoint SSL VPN Integration
        • CyberArk Integration
        • Dell SonicWall Network Security Appliance Integration
        • Fortigate MFA for admin accounts
        • Fortigate SSL VPN Integration
        • F5 integration
        • Ivanti Pulse Secure Connect Integration
        • Palo Alto MFA for admin accounts
        • Palo Alto SSL VPN Integration
        • Sophos SSL VPN Integration
        • Watchguard SSL VPN Integration
        • Ubuntu Server 22.0.4 SSH connections
        • XLOG Integration
        • VMware Horizon 8 RADIUS Integration
      • Knowledge Base
      • Release Notes
Powered by GitBook
On this page
  1. Mirket Help Center
  2. Mirket SAAS Platform
  3. Mirket Portal
  4. Authentication

Radius Rules

PreviousAuthenticationNextProxy Rules

Last updated 3 months ago

You can access this page from the Configuration > Radius Rules tab. On this page, you can view or manage the list of RADIUS rules for users and groups. In this list, you can view the Rule Name, Source, Auth Method, and Action values of each RADIUS rule.

You can review, edit, clone, or delete the RADIUS rule from the menu on the right side of the RADIUS rule. Also, you can search and filter RADIUS rules. When you review the rule details from the menu, you will see the following information:

Action: Shows the condition under which the rule grants access to the user or group. Name: Displays the name of the rule. Description: Contains the description of the rule. Radius Clients: Indicates the RADIUS Client that communicates with the rule. Source Address: Displays the Source IP addresses where the rule operates. Source Country: Displays the source countries where the rule operates. Schedule Type: Specifies the time period during which the rule will be active. Is Active: Displays whether the rule is active or not. Auth Method: Indicates the authentication method used by the rule. Attribute Type: Shows the attribute type used by the rule. Value: Displays the value of the attribute type used in the rule. Users/Groups: Displays the users/groups impacted by the rule.

To edit a RADIUS rule, click the Edit option from the menu on the right side of the rule. This will redirect you to the Edit page. The Edit page has the following five main sections:

Overview: Displays detailed information about the RADIUS rule, but does not allow editing in this field.

Source: You can edit the RADIUS rule's Name, Description, Radius Client, Source Address, and Source Country values.

Groups/Users: You can add or remove users or groups to which the rule will apply.

Schedule: You can edit the time period when the rule will be applied.

Action: You can edit the Auth Method, Attribute Type, Value, and Action values of the rule. On the Edit page, you can enable/disable, or delete the rule by clicking the “...” button on the top-right corner.

To create a new RADIUS rule, click the Add Radius Rule button on the top right corner. The rule creation process consists of five steps. In the first step, fill in the fields according to the following instructions:

Name: Enter a name for the rule. Description: Enter a description for the rule. Radius Client: Select the RADIUS Client that will communicate with the RADIUS Gateway. Source Address: Enter the source IP addresses to which the rule will be applied. Source Country: Enter the source countries where the rule will be applied.

After filling in the required fields, click the Next button to proceed to the next step. In the second step, specify whether the rule will be applied to a user or a group.

After specifying, click the Next button to proceed to the next step. In the third step, select the users or groups to which the rule will apply. Transfer your selections to the Selected Users/Groups table by clicking the arrow icon next to the Available Users/Groups table.

Once the addition process is completed, click the Next button to proceed to the next step. In the fourth step, there is only one field. Complete this field according to the description below:

Schedule Type: Select the time period when the rule will run. There are three options:

  • All: The rule will run every day.

  • Recurring: The rule will run on the specified days and times.

  • One Time: The rule will run within the date range you specify.

After selecting, click the Next button to proceed to the final step. In the fifth step, fill in the fields according to the following instructions:

Action: Specify whether the user or group will be granted access based on the rule. Auth Method: Select the authentication method that the rule will use. OTP Timeout: It is only supported by SMS providers. It determines how many hours a code will remain valid. Note: This field only appears when SMS Provider is selected as the authentication method. Attribute Type: Mirket supports both standard Radius attributes and vendor-specific attributes as a Radius. Choose the Attribute Type, which represents the authorization profile the rule will apply for the user or group. Value: Enter the value corresponding to the Attribute Type you selected. Note: Ensure that the value you enter corresponds to the group name in the firewall.

After filling in the required fields, click the Save button. Then, the RADIUS rule will be successfully created.

Created Radius rules are listed in the Configuration > Radius Rules tab.

Priorities of the rules progress from top to bottom. To move a rule upwards, hover over it, hold it, and drag it upwards. The same process is applied to move the rule downwards.