--- title: RADIUS Provider --- import { HashSupport } from "./HashSupport"; You can configure a Radius provider for applications that don't support any other protocols or that require Radius. :::info This provider requires the deployment of the [RADIUS outpost](../../outposts/index.mdx) ::: Currently, only authentication requests are supported. ### Authentication flow Authentication requests against the Radius Server use a flow in the background. This allows you to use the same flows, stages, and policies as you do for web-based logins. The following stages are supported: - [Identification](../../flows-stages/stages/identification/index.mdx) - [Password](../../flows-stages/stages/password/index.md) - [Authenticator validation](../../flows-stages/stages/authenticator_validate/index.mdx) Note: Authenticator validation currently only supports DUO, TOTP, and static authenticators. For code-based authenticators, the code must be given as part of the bind password, separated by a semicolon. For example for the password `example-password` and the MFA token `123456`, the input must be `example-password;123456`. SMS-based authenticators are not supported because they require a code to be sent from authentik, which is not possible during the bind. - [User Logout](../../flows-stages/stages/user_logout.md) - [User Login](../../flows-stages/stages/user_login/index.md) - [Deny](../../flows-stages/stages/deny.md) - [Mutual TLS stage](../../flows-stages/stages/mtls/index.md) ### EAP