Prerequisites
Before you begin, confirm that:- You can sign in to the Altostrat Radius UI at radius.altostrat.app.
- You have permission to create NAS devices, groups, users, and realms in the workspace.
- Your network device supports RADIUS or RadSec and can be configured with the values shown in the device detail page.
- You know the first policy attributes you need to return or check, or you have an existing RADIUS configuration to translate into groups.
- If you plan to use CoA or PoD, the NAS can accept control messages from the source address shown in the UI.
First Setup
Open RADIUS
Go to radius.altostrat.app and select the workspace you want to configure.
Add a device
Open Settings and select Devices. Create a NAS device with a device name, type, and optional description.
Save device configuration
After the device is created, open its detail page. Use the RadSec configuration values and certificate downloads shown there when configuring the network device.
Create a group
Open Settings and select Groups. Create a group for the first reusable access policy, then add check or reply attributes as needed.
Add a user
Return to the main RADIUS workspace and add a user. Enter the username, generate or set a password, add an optional display name, choose a folder, and assign groups.
Device Setup Notes
When you add a NAS device, the form supports:- Device name or NAS identifier.
- Device description.
- Device type: router, switch, access point, VPN gateway, firewall, wireless controller, or other.
- Auto user registration, optionally tied to a default group.
- CoA and PoD replies, including NAS IP address, inbound port, and shared secret.
- Metadata fields for local context.
Group Setup Notes
Groups are where you define reusable RADIUS policy. Add:- Check attributes for values evaluated during authentication.
- Reply attributes for values returned after successful authentication.
- Metadata when your team needs operational context.
User Setup Notes
When you create a user, the form supports:- Username.
- Optional realm suffix selected through the
@realm picker. - Password entry or generated password.
- Optional display name.
- Folder selection.
- Group membership.
- Custom check and reply attributes.
- Metadata fields.
Confirm The First Authentication
Open Live View after the NAS sends a request. Use the filters to narrow the view by status type, user, device, folder, timeframe, or failures only. Healthy first-run signs:- The NAS device appears in logs.
- The username matches the expected user.
- The status is success or an intentional policy rejection.
- The user detail page shows the latest session and recent logs.
- The device dashboard shows requests, success rate, active sessions, and rejects.
What To Read Next
Architecture and Scale
Learn how RadSec, policy lookup, metrics, quotas, logs, and imports are designed to scale.
Supported Dictionaries
Review the supported attributes, operators, input types, and validation limits before building broad policy.
CoA and PoD
Configure dynamic authorization when active sessions need manual or quota-triggered disconnects.