Skip to content

Latest commit

 

History

History
33 lines (22 loc) · 2.1 KB

File metadata and controls

33 lines (22 loc) · 2.1 KB
title Configure vender-specific attributes for P2S User Groups - RADIUS
titleSuffix Azure Virtual WAN
description Learn how to configure RADIUS/NPS for user groups to assign IP addresses from specific address pools based on identity or authentication credentials.
author cherylmc
ms.service azure-virtual-wan
ms.topic how-to
ms.date 04/23/2025
ms.author cherylmc

RADIUS - Configure NPS for vendor-specific attributes - P2S user groups

This article helps you configure Windows Server Network Policy Server (NPS) to authenticate users to respond to Access-Request messages with the Vendor Specific Attribute (VSA) that is used for user group support in Virtual WAN point-to-site-VPN. For more information RADIUS and user groups for point-to-site, see About user groups and IP address pools for P2S User VPNs.

The steps in the following sections help you set up a network policy on the NPS server. The NPS server replies with the specified VSA for all users who match this policy, and the value of this VSA can be used on your Virtual WAN point-to-site VPN gateway.

You can create multiple network policies on your NPS server to send different Access-Accept messages to the Virtual WAN point-to-site VPN gateway based on Active Directory group membership, or any other mechanism you'd like to support.

Prerequisites

Verify that you have a working RADIUS server (NPS) already registered to Active Directory.

Configure the NPS server

Use the following steps to help you configure a network policy on your NPS server. Steps might vary, depending on vendor and version. For more information about how to configure network policies, see Network Policy Server.

[!INCLUDE NPS steps]

Next steps