Configure RADIUS on Windows (NPS)



IAM • AAA • RADIUS • Windows NPS • Active Directory

Configure RADIUS on Windows (NPS)

Built an on-prem IAM decision engine for network access: I installed and configured Windows
Network Policy Server (NPS) to act as a RADIUS AAA authority. This centralizes
authentication and authorization so network devices (VPN / switch / Wi-Fi) can outsource the “who are you + are you allowed”
decision to one policy brain — with audit logging as the foundation for detection and compliance.

← Back to IAM Hub
Status: ✅ Completed
Stack: Windows Server, NPS (RADIUS), Active Directory

Overview (My POV)

This lab wasn’t “install a Windows role.” I set up the enterprise pattern behind centralized access control:
RADIUS. Instead of every network device managing its own local users, devices become
enforcers and NPS becomes the decider. NPS checks identities in Active Directory,
evaluates policy rules, returns Allow/Deny, and records the event for auditing.

Control
AAA (AuthN/AuthZ/Accounting)
Chokepoint
IAM for network access
Proof
Role installed + AD trust + policies visible

What I Did

  • Opened Server Manager to install a server role.
  • Installed Network Policy and Access Services (NPS/RADIUS).
  • Verified the role installed successfully.
  • Opened the NPS console (policy control plane).
  • Registered NPS in Active Directory so it can authenticate users and evaluate groups.
  • Viewed Network Policies (authorization rules).

What a RADIUS Server Actually Is

RADIUS = centralized authentication + authorization + accounting (AAA) for network access.

RADIUS is IAM delivered as a server. Network devices (VPN/switch/Wi-Fi) enforce access, but they outsource the
decision to NPS. NPS checks identities in Active Directory, applies policy rules, and returns Allow/Deny.

  • Authentication: verify identity
  • Authorization: apply policy (who can connect + conditions)
  • Accounting: record events for auditing and investigations

Architecture (who does what)

User
  |
  v
Network Device (VPN / Switch / Wi-Fi AP)
  |
  v   RADIUS request
NPS (Policy Decision Point)
  |
  v
Active Directory (Identity + Groups)
  |
  v
Allow / Deny (+ conditions + logs)

Device enforces. NPS decides. AD identifies.

Proof Gallery

Result

  • Built an NPS (RADIUS) AAA authority on Windows Server.
  • Linked the policy engine to Active Directory for identity + group evaluation.
  • Verified authorization logic exists (Network Policies).
  • Created the foundation for centralized network access control + auditing.

Why This Makes Me Valuable

Most people treat IAM as “console stuff.” I understand IAM as a control function that exists in every
environment: identity store → policy decision point → enforcement point → audit trail. That architecture thinking scales
from RADIUS on-prem to Entra/AWS Zero Trust.

#IAM
#RADIUS
#NPS
#ActiveDirectory
#AAA
#ZeroTrust