Azure MFA Server (Radius) Configuration.

1 users found this article helpful

To configure Azure MFA server (RADIUS) properties:

  1. In the Parallels RAS Console, navigate to Connection / Second Level Authentication.

  1. In the Provider drop-down list, select Azure MFA server (RADIUS)
  2. Click the Settings button. In the dialog that opens, select the Connections tab page and specify the following options:

 

  1. Click the Check connection button to validate the connection. If the connection is configured correctly, you will see a confirmation message.
  2. Select the Forward username only to RADIUS server as required.
  3. Select the Forward the first password to Windows authentication provider option to avoid a prompt to enter the password twice (RADIUS and Windows AD). Note that for Azure MFA server, this option is always enabled and cannot be changed.
  4. Please also read a note at the bottom of the dialog (if available) suggesting specific settings for your RADIUS solution.
  5. If your RADIUS solution requires configuring attributes, click the Attribute tab and then click Add. In the dialog that opens, specify the following:
  1. Click OK and then click OK again to close all dialogs.

 


Configuring Azure MFA

User Location

MFA in the cloud

M FA Server

Azure Active Directory

Yes

 

Azure AD and on-premises AD using federation with AD FS (is required for SSO)

Yes

Yes

Azure AD and on-premises AD using DirSync, Azure AD Sync, Azure AD Connect - no password sync

Yes

Yes

Azure AD and on-premises AD using DirSync, Azure AD Sync, Azure AD Connect - with password sync

Yes

 

On-premises Active Directory

 

Yes

Depending on the user location there are four scenarios for the cloud MFA service:

Was this article helpful?

Tell us how we can improve it.