Hello, Currently we are using Cisco ACS for a central authentication & accounting. Is there any plan to add radius or tacacs+ on PRTG? Thanks.
Radius or Tacacs+ support?
Votes:
0
Best Answer
Votes:
0
Please place your vote in https://kb.paessler.com/en/topic/82629-open-improve-ad-integration-in-prtg-including-sso-with-ad-or-adfs-2fa by hitting the thumbs-up for the initial post.
Note that we're currently already investigating Azure Active Directory integration.
13 Replies
Votes:
0
Hello,
We do have RADIUS/tacacs+ authentication on our task list, but I would be very hard pressed to let you know when the same will be implemented. The demand for the same hasn't been very high, so the priority for this type of authentication is relatively low.
Votes:
0
Have you made any progress on authentication via TACACS. Honestly its much easier to integrate tacacs for authentication since most network administrators own tacacs versus AD integration. Besides using local login credentials are a thing of the past.
Votes:
0
Dear Mark,
thank you for the KB Post. We do appreciate user feedback very much. Implemented support for TACACS is still only on the wish list I'm afraid. The reason for this is that the necessary developer work would be rather high (including testing of course), in relation to the number of requests (also in comparison to the our installation base of 200,000).
So I'm afraid I can only say, that for the time being, it has to wait for more voices raised.
best regards.
Votes:
0
I am raising my voice! (again - I did so years ago already) Please add RADIUS authentication (we also use a Cisco ACS). I echo the points above: - network admins have easier access to RADIUS (or Cisco TACACS+) than Windows / LDAP authentication which is AD managed. - compliance is a headache when local USER accounts are used.
BTW thanks for this great product, and your super support service!
Votes:
0
Hi We miss exactly the same option for validating logons. It's difficult to understand that after so many years it still can not be given priority for development.
/Andreas
Votes:
0
Seems like a pretty basic request for any network service type system. Why has this not been addressed when a clear request was made more than 3 years ago?
Votes:
0
I'm with you regarding RADIUS authentication, but TACACS is clearly not getting implemented due to the lack of popular demand. We're currently more looking towards 2FA, so please leave your vote at https://kb.paessler.com/en/topic/81138-open-2fa-implementation :)
PRTG Scheduler |
PRTGapi |
Feature Requests |
WMI Issues |
SNMP Issues
Kind regards,
Stephan Linke, Tech Support Team
Votes:
0
Please add me to the list of users looking for TACACS, since having a central point of administration is critical and cumbersome to engineer the routing for, it would save Administrators a lot of work if you just included TACACS in PRTG.
Votes:
0
Please see my previous answer for that. Sorry, there's little to no chance this gets implemented.
PRTGapi |
Feature Requests |
WMI Issues |
SNMP Issues
Kind regards,
Stephan Linke, Tech Support Team
Votes:
0
So you're saying there's a chance?
Votes:
0
No, sorry. We're currently looking into 2Factor Authentication.
Created on Aug 26, 2019 5:55:05 AM by
Stephan Linke [Paessler Support]
Last change on Aug 26, 2019 5:55:35 AM by
Stephan Linke [Paessler Support]
Votes:
0
Another big upvote for RADIUS auth, or even improved AD integration! This is a pretty big disadvantage to using PRTG in a large commercial setting.
Votes:
0
Please place your vote in https://kb.paessler.com/en/topic/82629-open-improve-ad-integration-in-prtg-including-sso-with-ad-or-adfs-2fa by hitting the thumbs-up for the initial post.
Note that we're currently already investigating Azure Active Directory integration.
Add comment