Would you like to learn how to configure the Mikrotik Active directory authentication using Radius? In this tutorial, we are going to show you how to authenticate Mikrotik users on the Active Directory database using the Radius protocol.

MikroTik Tutorial:

On this page, we offer quick access to a list of tutorials related to MikroTik.

Tutorial – Radius Server Installation on Windows

• IP – 192.168.15.10.
• Operacional System – Windows 2012 R2
• Hostname – TECH-DC01
• Active Directory Domain: TECH.LOCAL

Open the Server Manager application.

Access the Manage menu and click on Add roles and features.

Windows 2012 add role

Access the Server roles screen, select the Network Policy and Access Service option.

Click on the Next button.

Network Policy and Access Service

On the following screen, click on the Add features button.

network policy features

On the Role service screen, click on the Next Button.

network policy server

On the next screen, click on the Install button.

radius server installation on windows

You have finished the Radius server installation on Windows 2012.

Tutorial Radius Server – Active Directory Integration

Next, we need to create at least 1 account on the Active directory database.

The MIKROTIK account will be used to login on the Mikrotik device.

On the domain controller, open the application named: Active Directory Users and Computers

Create a new account inside the Users container.

Zabbix active directory account

Create a new account named: mikrotik

Password configured to the MIKROTIK user: 123qwe..

This account will be used to authenticate as admin on the Mikrotik device.

mikrotik ldap active directory
zabbix active directory admin properties

Congratulations, you have created the required Active Directory accounts.

Next, we need to create at least 1 group on the Active directory database.

On the domain controller, open the application named: Active Directory Users and Computers

Create a new group inside the Users container.

Radius Active directory group

Create a new group named: Mikrotik-admin

Members of this group will have the Admin permission on the Mikrotik device.

mikrotik active directory authentication

Important! Add the mikrotik user as a member of the Mikrotik-admin group.

mikrotik active directory authentication using nps

Congratulations, you have created the required Active Directory group.

Tutorial Radius Server – Add Client Devices

On the Radius server, open the application named: Network Policy Server

You need to authorize the Radius server on the Active directory database.

Right-click on NPS(LOCAL) and select the Register server in Active Directory option.

authorize radius server on windows

On the confirmation screen, click on the OK button.

Next, you need to configure Radius clients.

Radius clients are devices that will be allowed to request authentication from the Radius server.

Important! Do not confuse Radius clients with Radius users.

Right click on Radius Clients folder and select the New option.

mikrotik radius client

Here is an example of a Client configured to allow a Mikrotik device to connect to the Radius server.

You need to set the following configuration:

• Friendly name to the device – Add a description to your Mikrotik
• Device IP Address – IP address of your Mikrotik
• Device Shared secret – kamisama123

The Shared secret will be used to authorize the device to use the Radius server.

You have finished the Radius client configuration.

Tutorial Radius Server – Configure a Network Policy

Now, you need to create a Network Polity to allow authentication.

Right click on the Network Policies folder and select the New option.

Enter a name to the network policy and click on the Next button.

nps - network policy name

Click on the Add condition button.

We are going to allow members of the MIKROTIK-ADMIN group to authenticate.

mikrotik radius user group

Select the User group option and click on the Add button.

nps - user group condition

Click on the Add Groups button and locate the MIKROTIK-ADMIN group.

mikrotik active directory admin

Select the Access granted option and click on the Next button.

This will allow members of the MIKROTIK-ADMIN group to authenticate on the Radius server.

NPS Access granted

On the Authentication Methods screen, select the Unencrypted authentication (PAP, SPAP) option.

Radius server authentication method

If the following warning is presented, click on the No button.

NPS Warning message

Select the Vendor Specific radius attribute option and click on the Add button

mikrotik vendor specific

Select the Custom vendor option.

Select the Vendor-Specific Attribute and click on the Add button.

mikrotic vendor specific attribute

Click on the Add button.

Mikrotic attribute information

Set the Vendor Code: 14988

Select: Yes, it conforms.

Click on the Configure Attribute button.

mikrotik radius vendor

Set the Vendor-assigned attribute number: 3

Select the Atribute format: String

Enter the Attribute Value: full

mikrotik radius attribute full

The NPS Radius server will pass the vendor specific information back to the Mikrotik device.

The Mikrotik will give the authenticated users read-write permission over the device.

mikrotic active directory vendor specific

Verify the Radius server configuration summary and click on the Finish button.

mikrotik active directory ldap

Congratulations! You have finished the Radius server configuration.

Tutorial – MikroTik Radius Authentication

• IP – 192.168.15.20.
• Operacional System – RouterOS 6.45.7
• Hostname – MikroTik

On the Mikrotik router console, use the following command to

Perform the following Radius configuration:

• Radius IP address – 192.168.15.10
• Radius Shared Secret – The Radius Client shared secret (kamisama123)

You need to change IP address of the Radius server to reflect your Radius server IP address.

You need to change the Shared secret to reflect your Radius client shared secret.

Copy to Clipboard

Here is the command output:

Copy to Clipboard

Enable the local user authorization to use Radius.

Copy to Clipboard

Here is the command output:

Copy to Clipboard

Congratulations! You have configured the Mikrotik active directory authentication using Radius.

Tutorial – MikroTik Active Directory Authentication Test

Now, you need to test the Mikrotik Radius authentication.

Download the PUTTY software and try to authentication on the Mikrotik using the SSH protocol.

mikrotik ssh radius

If you authenticate using the account named mikrotik you will have read-write permissions.

mikrotik active directory

Congratulations! You have tested the Mikrotik active directory authentication.