How forwarding works
A visiting user's device associates to an eduroam SSID
The user is a student from another institution, visiting your
campus. Their device is already configured for eduroam.
The WLAN controller sends a RADIUS Access-Request
Username format
user@their-home-domain.edu. Destined for the
Radius Proxy Context on your EntryPoint deployment.EntryPoint forwards upstream
The Context’s Remote Radius Server configuration tells it where
to send the request — typically the national eduroam federation
server. Forwarding uses RADIUS over UDP or
RadSec, depending
on what the federation supports.
The federation routes onward
Through the eduroam hierarchy, the request reaches the user’s
home institution’s RADIUS server.
Single Default Device Group — no Self-Service, no variants
A Radius Proxy Context looks different from the other three variants on the Configuration page. It exists to forward traffic, not to host per-audience policy:- Exactly one Group. The Default Device Group is auto- created with the Context; the Add Group action is disabled. There’s no mental model of “one Group per audience” here — every forwarded authentication attaches to this single Group.
- No Self-Service portal. A proxy has no local identities, so there’s nothing for an end-user to see. Self-Service routes are hidden across the UI for Radius Proxy Contexts.
- No per-user or per-device admin. Membership is not a concept here. The federation decides who gets in.
Configuration surface
A Radius Proxy Context’s Configuration tabs are:| Tab | Purpose |
|---|---|
| Basic Configuration | Context name, description, a link to the Default Device Group. |
| Remote Radius Server | The upstream hostname, ports, shared secret, RadSec toggle + CA. See Remote Radius Server. |
| Attribute Profiles | Shared with other variants; attach to the Default Device Group to drive VLAN / SGT / tunnel on the client side. |
| Network Integration | Shared — hostname, ports, per-Context shared secret, IP allow-list, RadSec. See RADIUS clients. |
What Radius Proxy is NOT
- Not a local identity store. No PEAP accounts, no certificate lookups, no MAC lists. Every authentication is forwarded.
- Not a group-per-audience story. One Default Device Group exists. Per-audience segmentation happens in your WLAN / VLAN design, not in EntryPoint Groups.
- Not a Self-Service surface. No portal. Don’t try to invite users or manage fleets here — the other three variants are where those stories live.
- Not a captive portal or OTP service. For short-stay visitors without a roaming federation, look at Sign In instead.
Other use cases beyond eduroam
Most Radius Proxy deployments are eduroam, but the same mechanism works anywhere you want to forward authentication to a remote RADIUS endpoint:- Roaming partnerships between two Organizations. Two institutions or Organizations agree to mutually honour each other’s identities on a shared SSID. Each deploys a Radius Proxy Context pointed at the other’s RADIUS.
- Migration bridging. During a transition from an existing on-prem RADIUS to EntryPoint, a Radius Proxy can forward to the legacy server while identity-migration work proceeds elsewhere. Short-term rather than permanent.
- Outbound connectivity to a vendor-hosted RADIUS. Specific appliance vendors sometimes want EAP-based auth against their own RADIUS; a proxy Context gives you a single place to manage that forwarding from inside the Organization.
Who operates Radius Proxy
Organization administrators only. Lifecycle is thin:- Create the Context — Creating a Context.
- Configure the Remote Radius Server — Remote Radius Server.
- Enable RadSec if the upstream (eduroam, always) requires it.
- Attach an Attribute Profile to the Default Device Group for VLAN policy — Default Device Group.
- Attach your WLAN controllers / APs to the Context’s RADIUS endpoint — RADIUS clients.
Prerequisites
- An EntryPoint Context of type EntryPoint 2.0 (Radius Proxy / eduroam) — Creating a Context.
- The upstream RADIUS server’s hostname, ports, and shared secret. For eduroam, this comes from your national federation operator.
- For RadSec: the CA certificate the upstream uses for its RadSec session.
- Agreement from the upstream operator to allow connections from your EntryPoint deployment’s egress FQDN — the Remote Radius Server configuration displays the FQDN you need to share with them.
Where to go next
Remote Radius Server
Configure the upstream hostname, ports, and shared secret.
RadSec (RADIUS over TLS)
The standard for federated roaming today; required by eduroam.
Default Device Group
Where the single Group lives and how the Attribute Profile attaches.
RADIUS clients
Attach your WLAN controllers to the Context on the client side.

