Summary
This concludes our journey into using RADIUS for authentication of various servers. As with many of the Linux services we've explored in this book, this chapter just scratches the surface of common configurations, use cases, and combinations that RADIUS can be used to address.
At this point, you should have the expertise to understand how RADIUS works and be able to configure secure RADIUS authentication for VPN services and administrative access, as well as wireless and wired network access. You should have the basics to understand the PAP, CHAP, LDAP, EAP-TLS, and 802.1x authentication protocols. The EAP-TLS use cases, in particular, should illustrate why having an internal CA can really help in securing your network infrastructure.
Finally, we touched on integrating Google Authenticator with RADIUS for MFA. We didn't cover the detailed configuration of the Google Authenticator service, though—this seems to be changing so frequently of late that the...