PAM360 supports integration with RADIUS servers and any RADIUS-compliant Two-Factor Authentication (TFA) systems, such as Vasco Digipass, to provide an additional layer of security for user authentication. By leveraging RADIUS-based authentication, users are required to validate their identity through a second factor, unlike single authentication. The setup process involves configuring the essential details of your RADIUS server and enabling it as the second factor of authentication in PAM360. Once configured, users will need to authenticate through the RADIUS system after successfully entering their primary credentials.
To integrate a RADIUS server with PAM360, install and configure the RADIUS server on your resource by creating authentication details such as the username and passcode in a .conf file. Once the RADIUS server is set up, navigate to PAM360's web interface, enable the RADIUS Authenticator under Two-Factor Authentication Settings, and provide the required configuration details as follows:

Finally, enforce the RADIUS TFA for users to complete the integration. Refer here for detailed instructions.
The users for whom TFA is enabled, will have to authenticate twice successively. As explained above, the first level of authentication will be through the usual authentication i.e. the users have to authenticate through PAM360's local authentication or AD/Entra ID/LDAP authentication.
Perform the following steps to connect to the PAM360 web interface after enabling RADIUS Authenticator:
Caution
If you have configured High Availability, whenever you enable TFA or when you change the TFA service type, you need to restart the PAM360 secondary server once for it to take effect.