githubEdit

README

Welcome to the TOUGHRADIUS project!

 _____ _____ _ _ _____ _ _ _____ ___ _____ _ _ _ _____ |_ _| / _ \ | | | | / ___| | | | | | _ \ / | | _ \ | | | | | | / ___/  | | | | | | | | | | | | | |_| | | |_| | / /| | | | | | | | | | | | | |___  | | | | | | | | | | | | _ | _ | | _ / / / | | | | | | | | | | | | \___ \  | | | |_| | | |_| | | |_| | | | | | | | \ \ / / | | | |_| | | | | |_| | ___| |  |_| \_____/ \_____/ \_____/ |_| |_| |_| \_\ /_/ |_| |_____/ |_| \_____/ /_____/

TOUGHRADIUS

Licensearrow-up-right Go Versionarrow-up-right Releasearrow-up-right Build Statusarrow-up-right codecovarrow-up-right Docker Pullsarrow-up-right

A powerful, open-source RADIUS server designed for ISPs, enterprise networks, and carriers. Supports standard RADIUS protocols, RadSec (RADIUS over TLS), and a modern Web management interface.

✨ Core Features

RADIUS Protocol Support

  • 🔐 Standard RADIUS - Full support for RFC 2865/2866 authentication and accounting protocols

  • 🔒 RadSec - TLS encrypted RADIUS over TCP (RFC 6614)

  • 🌐 Multi-Vendor Support - Compatible with major network devices like Cisco, Mikrotik, Huawei, etc.

  • High Performance - Built with Go, supporting high concurrency processing

Management Features

  • 📊 React Admin Interface - Modern Web management dashboard

  • 👥 User Management - Complete user account and profile management

  • 📈 Real-time Monitoring - Online session monitoring and accounting record queries

  • 🔍 Log Auditing - Detailed authentication and accounting logs

Integration Capabilities

  • Multi-Database Support - PostgreSQL, SQLite

  • 🔌 Flexible Extension - Supports custom authentication and accounting logic

  • 📡 Multi-Vendor VSA - Huawei, Mikrotik, Cisco, H3C, etc.

🚀 Quick Start

Prerequisites

  • Go 1.24+ (for building from source)

  • PostgreSQL or SQLite

  • Node.js 18+ (for frontend development)

Installation

1. Build from Source

2. Use Pre-compiled Version

Download the latest version from the Releasesarrow-up-right page.

Configuration

  1. Copy the configuration template:

  1. Edit toughradius.prod.yml configuration file:

EAP Configuration

You can fine-tune authentication behavior via system configuration (sys_config):

  • radius.EapMethod: Preferred EAP method (default eap-md5).

  • radius.EapEnabledHandlers: List of allowed EAP handlers, separated by commas, e.g., eap-md5,eap-mschapv2. Use * to enable all registered handlers.

This allows you to quickly disable unauthorized EAP methods without interrupting the service.

Running

Access Web Management Interface: http://localhost:1816arrow-up-right

Default Admin Account:

  • Username: admin

  • Password: Please check the initialization log output

📖 Documentation

🏗️ Project Structure

🔧 Development

Backend Development

Frontend Development

🤝 Contribution

We welcome contributions in various forms, including but not limited to:

  • 🐛 Submitting Bug reports and feature requests

  • 📝 Improving documentation

  • 💻 Submitting code patches and new features

  • 🌍 Helping with translation

📜 License

This project is licensed under the MIT Licensearrow-up-right.

Third-Party Resources

The RADIUS dictionary files in the share/ directory are derived from the FreeRADIUSarrow-up-right project and are licensed under the Creative Commons Attribution 4.0 International License (CC BY 4.0)arrow-up-right.

💎 Sponsors

Thanks to JetBrainsarrow-up-right for supporting this project!

JetBrains Logo

Last updated