Skip to main content

What is RADIUS-as-a-Service?

RADIUS-as-a-Service (sometimes written RADIUSaaS or cloud RADIUS) is a fully managed RADIUS authentication service delivered as a SaaS. You point your access points at a hostname; Purple validates every join request against your identity provider and tells the access point which VLAN to drop the device onto.

The service handles EAP over RADIUS exactly the same way a FreeRADIUS cluster, Microsoft NPS farm, or Cisco ISE appliance does — so your clients (laptops, phones, IoT, BYOD) do not need reconfiguration. What you stop doing is running the servers: no OS patching, no certificate chain maintenance on the auth plane, no designing for high availability, no capacity planning for office reopening days.

Why move to cloud RADIUS in 2026?

Three forces have converged to make cloud the default RADIUS posture for new deployments.

Identity has moved to the cloud

Your primary identity is now Entra ID, Okta, or Google Workspace — not on-prem Active Directory. On-prem RADIUS forces an AD-sync or hybrid bridge that cloud RADIUS removes entirely. SCIM provisioning means an offboarded employee loses WiFi access at the same second they lose email.

Certificates, not passwords

WPA3-Enterprise and modern IT hygiene both push toward EAP-TLS with machine-issued certificates. Running your own CA on top of on-prem RADIUS is an operational burden most teams no longer want. Purple pairs RADIUS-as-a-Service with managed certificate issuance where needed.

High availability is the default, not a project

On-prem RADIUS HA means two boxes, a replication topology, and a quarterly failover test. Cloud RADIUS gives you active-active multi-region from day one. Access points are configured with two or three endpoints; failover happens in seconds with no operator involvement.

Authentication flow

Every join request follows the same path. The client (laptop, phone, IoT) attempts to associate to an SSID configured for 802.1X. The access point, acting as the authenticator, wraps the client's EAP traffic inside a RADIUS packet and forwards it to Purple. Purple, acting as the authentication server, validates the credential against your IdP and returns Access-Accept along with the VLAN and policy to apply. The access point enforces the decision. Total latency: tens of milliseconds.

  1. Client initiates 802.1X association to the SSID.
  2. Access point (authenticator) relays EAP inside RADIUS to Purple.
  3. Purple validates the certificate, password, or iPSK against the IdP.
  4. Purple returns Access-Accept with VLAN, ACL, and policy attributes.
  5. The access point admits the device to the correct segment.

Supported EAP methods

MethodCredentialBest for
EAP-TLSX.509 client certificateManaged fleets. Gold standard — no password, no phishing surface.
PEAP-MSCHAPv2Username + passwordLegacy devices and transitional deployments.
EAP-TTLSUsername + password inside a TLS tunnelNon-AD directories and mixed-client venues.
EAP-FASTProtected Access CredentialCisco-heavy networks with existing EAP-FAST policy.
iPSKUnique per-device pre-shared keyBYOD, IoT, and multi-tenant WiFi where certificates are impractical.

Identity provider integrations

Purple RADIUS-as-a-Service authenticates against whatever identity provider already holds the truth about your users. SCIM provisioning keeps membership in sync without a nightly batch job.

  • Microsoft Entra ID (formerly Azure AD) — direct integration with group-based policy and Conditional Access signal hand-off.
  • Okta — SAML + SCIM, with per-group VLAN policy.
  • Google Workspace — domain-wide authentication for Google-first organisations.
  • OneLogin, JumpCloud — standard SAML / SCIM.
  • Active Directory — via secure LDAP bind for hybrid environments still running on-prem AD as the source of truth.
  • Any SAML 2.0 IdP — generic SAML federation for IdPs we do not name explicitly.

Hardware compatibility

RADIUS-as-a-Service runs on any enterprise-grade access point that speaks standard RADIUS. No hardware swap, no controller upgrade.

Verified with: Cisco Meraki, Cisco Catalyst, Aruba (HPE), Ruckus (CommScope), Juniper Mist, Ubiquiti UniFi, Cambium Networks, Extreme Networks, Fortinet FortiAP, and more. If your access point can be configured with a RADIUS server IP or hostname, Purple is compatible.

Security, compliance, and data residency

  • Encryption in transit: RadSec (RADIUS over TLS) supported, with IPsec fallback for access points that do not speak RadSec natively.
  • Audit trail: every authentication event logged with user, device, AP, SSID, and outcome. Exportable to SIEM via webhook or syslog.
  • Certifications: ISO 27001, SOC 2 alignment, GDPR, and B Corp.
  • Data residency: EU, UK, and US regions available; customers select the region at provision time.
  • Zero credentials at rest: Purple never stores user passwords. Authentication is proxied to your IdP in real time.

Cloud RADIUS vs on-premise RADIUS

Cloud RADIUS (Purple)On-premise (FreeRADIUS / NPS / ISE)
Time to liveUnder an hourDays to weeks
High availabilityMulti-region active-active, defaultDIY — two boxes plus replication
OS patchingVendor-managedYour ops team
Identity integrationNative Entra ID, Okta, Google WorkspaceAD-first, cloud IdP via bridges
Certificate managementManaged PKI optionSelf-hosted PKI required
ScalabilityElastic, per-AP billingCapacity planning exercise
Total cost of ownershipPredictable per-AP subscriptionLicense + hardware + ops + downtime

Where RADIUS-as-a-Service fits in the Purple platform

  • Staff WiFi: 802.1X with EAP-TLS or PEAP against your IdP; Conditional Access signals honoured.
  • Guest WiFi: captive portal onboarding plus OpenRoaming/Passpoint for auto-connect devices.
  • Multi-Tenant WiFi: iPSK per tenant with isolated Private Area Networks on a single SSID.
  • Passwordless WiFi: the broader hub covering EAP-TLS, iPSK, Passpoint, and SAML.

Frequently asked

What is RADIUS-as-a-Service?

RADIUS-as-a-Service is a cloud-hosted RADIUS authentication service that replaces on-premise FreeRADIUS, Microsoft NPS, or Cisco ISE servers. Your access points forward authentication requests to the cloud; credentials are validated against your identity provider (Entra ID, Okta, Google Workspace) and devices are admitted to the correct VLAN. You run no servers, patch no OS, and inherit multi-region high availability by default.

How is cloud RADIUS different from on-premise RADIUS?

On-premise RADIUS (FreeRADIUS, NPS, Cisco ISE) requires servers, patching, certificate management, and a high-availability design. Cloud RADIUS removes all of that — you point your access points at a hostname, and the provider handles uptime, scaling, and updates. The authentication flow is identical (EAP over RADIUS), so client devices do not know the difference.

Which EAP methods does Purple RADIUS-as-a-Service support?

EAP-TLS (certificate-based, the gold standard), PEAP-MSCHAPv2 (username/password for legacy devices), EAP-TTLS, and EAP-FAST. Most production deployments use EAP-TLS for managed devices and fall back to PEAP for a transition period. iPSK is offered alongside for BYOD and multi-tenant use cases where certificate provisioning is impractical.

Which identity providers can I integrate with?

Microsoft Entra ID (Azure AD), Okta, Google Workspace, OneLogin, JumpCloud, Active Directory (via LDAP bind or secure tunnel), and any SAML 2.0 or SCIM-compliant IdP. SCIM provisioning ensures an employee who leaves your company loses WiFi access at the same moment they lose email access — no orphaned credentials.

What does the uptime and redundancy model look like?

Purple operates RADIUS authentication endpoints in multiple regions with active-active failover. Access points are configured with two or three authentication targets; if the primary endpoint fails health checks, traffic moves to the next region within seconds. The service is backed by a 99.9% uptime SLA.

Do I need to replace my access points?

No. Any enterprise-grade access point that speaks RADIUS (Cisco, Aruba, Ruckus, Juniper Mist, Meraki, Ubiquiti UniFi, Cambium, Extreme) can forward authentication to Purple. You change the RADIUS server address on each SSID and the AP does the rest.

How does billing work?

Per access point per month, with volume discounts at scale. There is no per-authentication or per-user meter, so you can enable 802.1X across your full device fleet without a surprise invoice. Pricing is published on the Purple pricing calculator.

Can I migrate from FreeRADIUS, NPS, or Cisco ISE?

Yes. Typical migration is a weekend for a mid-sized deployment: stand up Purple alongside the existing RADIUS, add Purple as a secondary auth target on the access points, move SSIDs across one at a time, and decommission the legacy server once traffic is drained. Purple professional services run the cutover for enterprise customers.