Skip to main content
Skip table of contents

Pulse Secure VPN RADIUS Integration

This article assumes that MonoSign RADIUS Server is configured properly. If you have any issue with RADIUS server, you can check this article.

This document explains how to implement MonoSign RADIUS Server with Pulse Secure. Before you continue, it is better to start with Pulse Secure’s Single Sign-On implementation page.

Creating an Application and Access Key on MonoSign

Navigate to the application dedicated to RADIUS Server. Once you navigate, click Keys and Add New Key to create a RADIUS access key.

In the opened modal, choose RADIUS as Key Type and switch to RADIUS Settings. Fill in the necessary fields according to the information provided by Pulse Secure. Correspondings of the fields are as below.

Field

Value

NAS-Identifier

Name of the device dedicated to RADIUS

NAS-IP

Name or IP address of the RADIUS Server

Shared Secret

Shared Secret defined on the RADIUS Server

Click Save and you are gonna see your configuration for your access key as follows.

Configuration Single Sign-On for Pulse Secure

In order to configure the RADIUS Server on MonoSign for Pulse Secure SSO, create a RADIUS Server first. Navigate to Authentication > Auth. Servers. Choose Server Type as RADIUS Server and click New Server.

Fill in the necessary fields. Correspondings of the fields are as below.

Field

Value

Name

Label for referencing the server

NAS-Identifier

Name of the device dedicated to RADIUS

NAS IP

Empty if NAS IP is not configured on RADIUS Server

RADIUS Server

Name or IP address of the RADIUS Server

Shared Secret

Shared secret defined on the RADIUS Server

Accounting Port

Timeout

Recommended: 120 seconds

Scroll down to the Custom RADIUS Rules section and create recommended rules as follows.

Next, create a new User Realm or edit an existing one. Navigate to Users > User Realms and click New….

Fill in the necessary fields. Correspondings of the fields are as below.

Field

Value

Name

Label for referencing the realm

Authentication

Created RADIUS Authentication Server above

User Directory/Attribute

Same as above

Accounting

None

Device Attributes

None

Optionally, MonoSign Roles/Groups can be mapped to Pulse Secure Roles in the Role Mappings tab. Example group mapping is as follows.

Next, create a new dedicated Policy or edit the existing policy to add the created realm as the Authentication Realm. Navigate to Authentication > Signing In > Sign-in Policies and click New Rule….

Fill in the necessary fields and scroll down to the Authentication realm section. Add the realm as follows. You can add multiple realms to the policy and make users able to choose one. However, adding only one realm will automatically redirect users to it.

Creating Policies dedicated to desired Authentication Realms is recommended. This way the Authentication Realms will not be exposed to outside.

VPN Connection

In order to establish a VPN connection using RADIUS, connect to the Policy URL associated with RADIUS Authentication Realm. Create a new or edit the existing connection and fill the necessary fields according to configurations made in chapter two. Correspondings of the fields are as below.

Field

Value

Type

Policy Secure (UAC) or Connect Secure (VPN)

Name

Label for referencing the connection

Server URL

Url specified while creating policy

If multiple Authentication Realms exist assigned to the Policy, a Realm selection dialog will appear.

To connect, select RADIUS Authentication Realm and type your MonoSign credentials. the connection will start your MonoSign Authentication Flow.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.