Prerequisites
Before you build groups, confirm that:- You know the RADIUS attributes your NAS devices expect.
- The required attributes are available in the attribute picker.
- You understand whether an attribute belongs in the authentication check or the successful authentication reply.
- You have at least one user or realm ready for testing.
What A Group Contains
A group includes:- Group name.
- Check attributes.
- Reply attributes.
- Member users.
- Metadata.
Check Attributes
Check attributes are used during authentication. Use them for conditions or values that must be evaluated before the RADIUS server accepts the request. The group dashboard describes check attributes as attributes sent to the RADIUS server during authentication.Reply Attributes
Reply attributes are returned after successful authentication. Use them for values the NAS needs after access is granted, such as session behavior, authorization hints, network policy, or vendor-specific values. The group dashboard describes reply attributes as attributes sent back from the RADIUS server upon successful authentication.Attribute Rows
Each attribute row has:- Attribute: selected from the RADIUS attribute dictionary.
- Operator: limited to the operators allowed for that selected attribute.
- Value: rendered with the correct input style for the attribute, such as text, number, password, IP address, select option, duration, bandwidth, storage, or URL.
- Presence: shown when quota-aware behavior is available.
Presence Modes
Presence controls when an attribute is sent. The UI supports these modes:| Mode | When the attribute is sent |
|---|---|
| Always | Sent regardless of usage or status. |
| Normal (within quota) | Sent only if the user has not reached quota and is not suspended. |
| Quota exceeded | Sent only when quota has been reached or exceeded. |
| Suspended | Available for policy modeling in the UI. Suspended users are normally rejected before ordinary success reply attributes are returned. |
Quota Attributes
Quota behavior is configured with System attributes on groups:X-Octet-QuotaX-Quota-TTLX-Quota-Reset-AfterX-Quota-Carry-Over-CyclesX-Quota-Expire-TTL
Create A Group
Inheritance
Users inherit attributes from their groups. When you open a user, inherited attributes are displayed with their source group so you can trace policy back to the object that defined it. Realms can also apply groups automatically. If a user authenticates with a username that matches a realm, the selected realm groups are applied in addition to directly assigned user groups. Group reply attributes are merged first, then user-specific reply attributes are applied. User-specific attributes are best for exceptions because they override group values unless the operator is+=, which appends another value for multi-value attributes such as routes.
When a user has multiple groups, review the effective attribute display on the user detail page before assuming the final policy. The UI is the best place to confirm what will be applied for that user.
Recommended Practices
- Keep common policy on groups instead of repeating user-specific attributes.
- Give groups operational names that describe intent, not only implementation details.
- Use user-specific attributes for exceptions and short-lived overrides.
- Review inherited attributes on a test user before assigning a group broadly.
- Use metadata to connect groups to billing, CRM, support, or customer records.
- Keep quota-exceeded behavior explicit when those users should receive different reply attributes, and document suspension behavior as an access block.
- Use CoA and PoD when quota exhaustion should disconnect active sessions instead of only changing future reply attributes.