New features in v 0.2.1
- LDAP Proxy
- LDAP Self-enrollment web page
- Web certificate upgrade tool
- Configuration export tool (to backup appliance configurable parameters)
- Global or per user single factor login setting
- A number of GUI improvements
Information about previous versions is available here: v0.1, v0.2
Token2 TOTPRadius provides the RADIUS RFC-2865 for TOTP RFC-6238 based authentication. With TOTPRadius you can integrate a large variety of third-party products and systems with multi-factor authentication. A number of enterprise products and services like VPNs, Citrix XenApp/XenDesktop, VMWare View and many others provide support for RADIUS servers to validate second factor of user authentications.
TOTPRadius supports OTP-only authentication based on RFC-2865 algorithm (TOTP: Time-Based One-Time Password Algorithm), LDAP authentication as well as LDAP+TOTP combined authentication. It provides a web based administration panel and an HTTPS REST based API service designed to enable users' self-enrollment.
TOTPRadius also allows enabling two-factor authenticaton with systems supporting single authentication source only. This is done by enabling LDAP component of the appliance - users will supply their regular passwords together with one-time passwords, TOTPRadius will split the password into two parts and validate OTP part locally and send the regular password to a LDAP server (e.g. an Active Directory controller); so, basically, acting as an LDAP proxy.
You can view TOTPRadius web based administration panel screenshots here.
Self-enrollment using RESTFul API
The main advantage of TOTPRadius is the RESTFul API that allows users to self-enroll with their software tokens such as Google Authenticator and Token2 Mobile OTP.
An example of such an integration with Citrix Netscaler/StoreFront is shown on the video. The integration can be done by installing our Storefront integration package and adding a new RADIUS authentication server on the Netscaler. It usually takes not more than five minutes to implement. Refer to Citrix integration manual for more details.
Self-enrollment using LDAP Enroll web interface
You can configure TOTPRadius to allow users to log in without second factor (e.g. using AD password only) for the first1 time and then navigate2 to TOTPRadius LDAP Enroll web interface (accessible only within your local network or VPN), where they can enroll the second factor independently. Administrators can also allow modifying (reenrolling) via LDAP Enroll web interface.  - also configurable, i.e. administrators can allow first several logins without second factor provided.
 - manually or automatically, e.g. upon VPN connection is established.
TOTPRadius operates as a standards based RADIUS server (RFC-2865) and supports the following credentials and combinations over RADIUS:
Username+LDAP/AD password 1
Username only 2
Additionally, TOTPRadius provides authentication and user enrollment over HTTP and HTTPS protocols using RESTFul API. You can use this API to integrate TOTPRadius with any application, or use one of our existing integration packages:
Citrix Netscaler/Store front integration package
 - single factor authentication, or initial login in order to allow self-service enrollment of the second factor.  - initial login in order to allow self-service enrollment of the second factor.
Citrix Netscaler & StoreFront
Full integration including built-in self-service user enrollment integration package for StoreFront based on RESTFul API. Read more ...
Cisco Meraki MX
Enabling two-factor authentication for Meraki Client VPN. Self-enrollment is possible via LDAP Enroll web interface. Read more ...
RADIUS authentication source without built-in self-enrollment feature. Self-enrollment is possible via LDAP Enroll web interface. Integration manual
TOTPRadius is deployed as a software-based virtual appliance that run on two hypervisors: VMWare ESXi and Microsoft Hyper-V. Upon request, virtual appliances for other hypervisors can be provided. It is free to use with up to 5 users. You need to obtain a license to increase the number of allowed users.
*- Requires Hyper-V v.10 or higher (Win10 or Win2016). For lower version, create the VM manually with default settings and connect the IDE0 to the VHDX file in the archive. No further configuration changes are required.