Migrating from On-Premises RADIUS (NPS) to RADIUS as a Service
This authoritative guide details the technical architecture, implementation methodology, and business impact of migrating from on-premises Microsoft Network Policy Server (NPS) to a cloud-native RADIUS as a Service model. It provides IT leaders and network architects with practical frameworks to reduce operational overhead, eliminate single points of failure, and secure enterprise authentication across distributed venues.
Listen to this guide
View podcast transcript
- Executive Summary
- Technical Deep-Dive: Architecture and Standards
- The Limitations of On-Premises NPS
- The Cloud RADIUS Architecture
- Implementation Guide: A 5-Phase Methodology
- Phase 1: Audit and Inventory
- Phase 2: Pilot Deployment
- Phase 3: Parallel Running (Risk Mitigation)
- Phase 4: Cutover
- Phase 5: Decommission
- Best Practices & Compliance
- Troubleshooting & Risk Mitigation
- ROI & Business Impact

Executive Summary
For nearly two decades, Microsoft’s Network Policy Server (NPS) has been the default RADIUS implementation for enterprise networks. However, as venue operators scale across distributed locations—from retail chains to global hospitality groups—the operational burden of managing on-premises authentication infrastructure has become a significant liability.
Migrating to RADIUS as a Service shifts authentication from a managed hardware component to a consumed cloud service. This architectural transition eliminates the single point of failure inherent in standalone NPS deployments, removes hardware refresh cycles, and provides the elastic scalability required for high-density environments like stadiums and conference centres. For IT managers and network architects, this guide provides a vendor-neutral, structured methodology for migrating 802.1X authentication to the cloud without impacting production traffic, ensuring compliance with PCI DSS and GDPR, and reducing authentication infrastructure OpEx by up to 80%.
Technical Deep-Dive: Architecture and Standards
To understand the migration, we must first examine the architectural shift in how IEEE 802.1X port-based access control is delivered.
The Limitations of On-Premises NPS
In a traditional deployment, access points act as the Network Access Server (NAS), forwarding authentication requests to an on-premises NPS server. The NPS server evaluates connection request policies, validates credentials against an identity store (typically Active Directory via LDAP), and returns an Access-Accept or Access-Reject message.
This model presents three critical constraints for modern networks:
- Hardware Dependency & Maintenance: NPS requires dedicated physical or virtual machines, demanding continuous patching, capacity planning, and lifecycle management.
- High Availability Complexity: Achieving redundancy requires deploying NPS in a failover pair, doubling licensing costs without providing true geographic redundancy.
- Throughput Bottlenecks: During peak concurrency—such as a stadium ingress or retail peak trading hours—a single NPS instance can become a bottleneck, leading to authentication timeouts and degraded user experience.
The Cloud RADIUS Architecture
RADIUS as a Service abstracts the authentication layer. Cloud providers operate distributed, geo-redundant clusters of RADIUS servers. The NAS points to these cloud endpoints, and requests are load-balanced automatically.

Transport Security: The Role of RadSec When moving RADIUS to the cloud, authentication traffic traverses the public internet. While traditional RADIUS uses a shared secret and MD5 hashing, modern deployments must implement RadSec (RADIUS over TLS, RFC 6614). RadSec wraps the entire RADIUS conversation in a TLS tunnel (typically TCP port 2083), providing transport-layer encryption equivalent to HTTPS and mutual authentication between the NAS and the cloud RADIUS endpoint.
Identity Integration Cloud RADIUS does not require migrating your user directory. Services typically support LDAPS connections back to on-premises Active Directory or native API integrations with Azure Active Directory (Entra ID) via SAML or SCIM. This ensures your existing user lifecycle management processes remain intact.
For venues leveraging Guest WiFi platforms, cloud RADIUS integrates directly, providing a unified control plane for both corporate 802.1X authentication and guest network access, complete with advanced WiFi Analytics .
Implementation Guide: A 5-Phase Methodology
Executing a migration without downtime requires a structured, phased approach.

Phase 1: Audit and Inventory
Before making any changes, document the current state:
- RADIUS Clients: Identify every NAS (access points, switches, VPN concentrators).
- Policies: Document existing NPS connection request and network policies, including Vendor-Specific Attributes (VSAs) used for VLAN assignment.
- EAP Methods: Identify which Extensible Authentication Protocol methods are in use (e.g., EAP-TLS, PEAP-MSCHAPv2).
Phase 2: Pilot Deployment
Provision the cloud RADIUS instance and configure a non-production SSID or a single test site. Validate the identity directory integration (e.g., Entra ID sync) and ensure the EAP method functions end-to-end.
Phase 3: Parallel Running (Risk Mitigation)
Configure the production NAS devices to use both the cloud RADIUS server (Primary) and the legacy NPS server (Fallback). Run this configuration for a minimum of two weeks. Monitor authentication success rates, latency metrics, and accounting data flows to identify any policy discrepancies before cutover.
Phase 4: Cutover
During a scheduled maintenance window, remove the legacy NPS fallback configuration from the NAS devices. Commit entirely to the cloud infrastructure. Ensure your rollback procedure is documented and tested.
Phase 5: Decommission
After 30 days of stable operation, securely decommission the legacy NPS servers and reclaim the compute resources.
Best Practices & Compliance
When designing your cloud RADIUS architecture, adhere to the following standards:
- Mandate RadSec: Never send RADIUS traffic over the public internet using standard UDP 1812/1813 if RadSec (TCP 2083) is supported by your NAS hardware.
- Certificate Trust Chains: Ensure client devices trust the Certificate Authority (CA) that issued the cloud RADIUS server's certificate. Push the root CA to managed devices via MDM or Group Policy prior to migration.
- Compliance Posture: Select a cloud RADIUS provider that maintains SOC 2 Type II certification and ISO 27001 accreditation. This significantly simplifies your annual PCI DSS assessments, particularly for Retail and Hospitality environments.
For broader network design principles, consult our guides on Setting Up WiFi for Business: A 2026 Playbook and Understanding RSSI and Signal Strength for Optimal Channel Planning .
Troubleshooting & Risk Mitigation
| Failure Mode | Root Cause | Mitigation Strategy |
|---|---|---|
| Authentication Timeouts | Firewall blocking outbound UDP 1812/1813 or TCP 2083. | Verify perimeter firewall rules permit outbound traffic to the specific IP ranges of the cloud RADIUS provider. |
| Certificate Trust Errors | Client devices lack the Root CA in their trusted store. | Deploy the Root CA via MDM/GPO before Phase 3 (Parallel Running). |
| VLAN Assignment Fails | Vendor-Specific Attributes (VSAs) not mapped correctly in cloud policies. | Replicate exact VSA string formats from NPS to the cloud RADIUS policy engine during Phase 1. |
| WAN Outage Impact | Loss of internet drops access to cloud RADIUS. | Deploy redundant WAN links or implement a local RADIUS proxy that caches credentials for known devices. |
ROI & Business Impact
Migrating to RADIUS as a Service delivers measurable business outcomes:
- Cost Reduction: Eliminates hardware procurement, Windows Server licensing, and the engineering hours spent on patching and maintenance. Typical OpEx reduction is 60-80%.
- Reliability SLA: Cloud providers offer financially backed 99.99% uptime SLAs, compared to the typical 97-98% achieved by single-site NPS deployments.
- Agility: New sites can be brought online instantly without provisioning local authentication hardware, accelerating deployment timelines for Transport hubs and Healthcare facilities.
Listen to our senior consulting team discuss the strategic implications in this 10-minute briefing:
Key Definitions
RADIUS (Remote Authentication Dial-In User Service)
A networking protocol that provides centralized Authentication, Authorization, and Accounting (AAA) management for users who connect and use a network service.
The core protocol used by enterprise WiFi networks to validate user credentials before granting network access.
NPS (Network Policy Server)
Microsoft's implementation of a RADIUS server and proxy, bundled as a role in Windows Server.
The legacy on-premises infrastructure that organizations are actively migrating away from to reduce maintenance overhead.
NAS (Network Access Server)
The device that acts as the gateway to the network and passes authentication requests to the RADIUS server.
In a wireless context, the NAS is typically the WiFi Access Point or Wireless LAN Controller.
RadSec (RADIUS over TLS)
A protocol defined in RFC 6614 that transports RADIUS packets over a TCP connection encrypted with TLS.
Essential for cloud RADIUS deployments to ensure credential data is encrypted while traversing the public internet.
EAP (Extensible Authentication Protocol)
An authentication framework frequently used in wireless networks and point-to-point connections.
Determines how the client and server securely exchange credentials (e.g., certificates via EAP-TLS, or passwords via PEAP).
VSA (Vendor-Specific Attribute)
Custom attributes defined by hardware vendors within the RADIUS protocol to support proprietary features.
Crucial during migration; VSAs are often used to assign authenticated users to specific network VLANs dynamically.
LDAPS (Lightweight Directory Access Protocol over SSL)
A secure protocol for querying and modifying directory services like Active Directory.
Used by cloud RADIUS services to securely query on-premises identity stores without migrating the user directory to the cloud.
802.1X
An IEEE standard for port-based network access control (PNAC).
The underlying standard that uses RADIUS to ensure only authenticated devices can pass traffic onto the enterprise LAN or WLAN.
Worked Examples
A 200-property hotel group currently runs local NPS servers at each site for staff 802.1X authentication. They are migrating to Entra ID (Azure AD) and want to decommission the local servers. How should they approach the migration?
- Deploy a cloud RADIUS service that integrates natively with Entra ID via SAML/SCIM.
- Configure the cloud RADIUS policies to map Entra ID groups (e.g., 'Front Desk', 'Management') to specific VLAN VSAs.
- At a pilot property, configure the access points to use RadSec to connect to the cloud RADIUS endpoint.
- Push the cloud RADIUS server's Root CA to all staff devices via Microsoft Intune.
- Run parallel authentication at the pilot site, then execute a phased rollout across the remaining 199 properties.
A stadium with 50,000 capacity experiences authentication failures on their corporate SSID during major events because their on-premises NPS server cannot handle the throughput of thousands of devices roaming simultaneously.
- Audit the existing NPS policies and EAP methods.
- Provision a cloud RADIUS service capable of auto-scaling to handle high authentications per second (APS).
- Establish an LDAPS connection from the cloud RADIUS service to the stadium's on-premises Active Directory.
- Update the stadium's high-density wireless LAN controllers to point to the cloud RADIUS endpoints as the primary authentication servers.
Practice Questions
Q1. Your organization is migrating to Cloud RADIUS. The security team mandates that no authentication traffic can be sent over the internet in cleartext or using deprecated hashing algorithms like MD5. What protocol must you configure on your wireless LAN controllers?
Hint: Look for the protocol that wraps RADIUS in a TLS tunnel.
View model answer
You must configure RadSec (RADIUS over TLS). RadSec establishes a TLS tunnel over TCP port 2083 between the NAS and the cloud RADIUS server, providing transport-layer encryption and mutual authentication, satisfying the security team's requirements.
Q2. During Phase 3 (Parallel Running) of your migration, you notice that users are authenticating successfully against the cloud RADIUS server, but they are not being placed in the correct network segments. What is the most likely configuration gap?
Hint: How does a RADIUS server tell an access point which network segment to use?
View model answer
The Vendor-Specific Attributes (VSAs) for dynamic VLAN assignment have not been configured correctly in the cloud RADIUS policies. You must ensure the exact VSA strings used in the legacy NPS server are replicated in the cloud environment so the NAS knows which VLAN to assign to the user.
Q3. A client device is repeatedly failing EAP-TLS authentication against the new cloud RADIUS service, but it works fine against the legacy NPS server. The device logs show an 'untrusted server' error. How do you resolve this?
Hint: EAP-TLS requires the client to trust the server's identity.
View model answer
The client device does not have the Root Certificate Authority (CA) that issued the cloud RADIUS server's certificate in its trusted root store. You must deploy the Root CA to the client device using a Mobile Device Management (MDM) solution or Group Policy.