1 .TH rlm_mschap 5 "13 March 2004" "" "FreeRADIUS Module"
3 rlm_mschap \- FreeRADIUS Module
5 The \fIrlm_mschap\fP module provides MS-CHAP and MS-CHAPv2
6 authentication support.
8 This module validates a user with MS-CHAP or MS-CHAPv2
10 If called in Authorize, it will look for MS-CHAP Challenge/Response
11 attributes in the Acess-Request and adds an Auth-Type
12 attribute set to MS-CHAP in the Config-Items list unless
13 Auth-Type has already set.
15 The module can authenticate the MS-CHAP session via plain-text
16 passwords (User-Password attribute), or NT passwords (NT-Password
17 attribute). The module cannot perform authentication against an NT
20 The module also enforces the SMB-Account-Ctrl attribute. See the
21 Samba documentation for the meaning of SMB account control. The
22 module does not read Samba password files. Instead, the fIrlm_passwd\fP
23 module can be used to read a Samba password file, and supply an
24 NT-Password attribute which this module can use.
26 The main configuration items to be aware of are:
28 This is the string used to set the authtype. Normally it should be
29 left to the default value of MS-CHAP.
31 Unless this is set to 'no', FreeRADIUS will add MS-CHAP-MPPE-Keys for
32 MS-CHAPv1 and MS-MPPE-Recv-Key/MS-MPPE-Send-Key for MS-CHAPv2. The
34 .IP require_encryption
35 If MPPE is enabled, setting this attribute to 'yes' will cause the
36 MS-MPPE-Encryption-Policy attribute to be set to require encryption.
39 If MPPE is enabled, setting this attribute to 'yes' will cause the
40 MS-MPPE-Encryption-Types attribute to be set to require a 128 bit key.
42 .IP with_ntdomain_hack
43 Windows clients send User-Name in the form of "DOMAIN\\User", but send the
44 challenge/response based only on the User portion. Setting this value
45 to yes, enables a work-around for this error. The default is 'no'.
91 .I /etc/raddb/radiusd.conf
97 Chris Parker, cparker@segv.org