This page is still being written. Check back soon...
FreeRADIUS fully supports the MSCHAPv2 protocol used for Active Directory authentication and deployments of FreeRADIUS with Active Directory are extremely popular.
Active Directory support using SAMBA
To fully support Active Directory authentication, FreeRADIUS requires the use of Samba in general, and
The definitive guide for FreeRADIUS deployments with Active Directory is maintained at http://deployingradius.com/documents/configuration/active_directory.html.
Active Directory support using LDAP bind-as-user
If you do not wish to use Samba or your organisation forbids the use of it, you can use the LDAP bind-as-user method.
For more information on this method, see using LDAP to connect to a directory, but you will be need a low-privileged user with read/browse access to Active Directory instead.
Using the FreeRADIUS users flat file together with Active Directory
After connecting your FreeRADIUS server to Active Directory, you may wish to use a test user that is defined in the FreeRADIUS users flat file.
To use this functionality you must: