Support Center

Configuring a Wireless Access Point (WAP), VPN or Router for JumpCloud's RADIUS

This document is meant to be used in conjunction with Configuring RADIUS Servers in JumpCloud

  • Device or service endpoint that supports RADIUS and either EAP-TTLS/PAP or EAP-PEAP/MSCHAPv2 authentication methods.  Simple PAP may also be used, but we highly recommend you use a more secure authentication protocol such as EAP-TTLS/PAP or EAP-PEAP/MSCHAPv2
  • Port 1812/UDP to our RADIUS service endpoints (RADIUS Accounting on 1813 is not supported)
  • The JumpCloud RADIUS server certificate (For EAP-TTLS implementations)
  • The Shared Secret from the JumpCloud RADIUS Server configuration


The following is general information for setting up RADIUS on a device or service endpoint. Please refer to your vendor's documentation for specific configuration details, or for a specific example, see Configuring a Cisco Meraki WAP to JumpCloud's RADIUS-as-a-Service.

JumpCloud RADIUS server details:

When configuring your application or device, choose the IP(s) closest to your geographic location. US East US West EU APAC

Encryption/Authentication Mode:

  • WPA2 Enterprise
  • WPA2 with RADIUS
Note:  "WPA2 with RADIUS" is not available on all WAP and Router devices, and will vary by hardware vendor.  Please refer to your vendor documentation for further information.

Testing the connection:
  • Authenticate using the JumpCloud username and password, full email addresses for the username will fail
  • Test the authentication directly from the device (If supported)

Last Updated: Sep 20, 2018 09:31AM MDT

Related Articles
seconds ago
a minute ago
minutes ago
an hour ago
hours ago
a day ago
days ago
Invalid characters found