Let's show it in the example of Windows Server 2012.

Install and activate the RADIUS server

From the Server Manager right-click and choose "Add Role and Features". Choose "Role-based or feature-based installation". Select "Network Policy and Access Services" add features, and click next followed by "Install".

Once the installation is completed, open the Network Policy Server (NPS) console. First, you need to register the NPS with your domain. Right-click NPS and choose "Register server in Active Directory".

Add a new RADIUS client

The next step is to add your monitoring unit as a RADIUS client. Expand "Radius Clients and Servers" and right-click "RADIUS Clients" followed by "New". Set a friendly name for your monitoring unit, IP address, and shared secret key. This shared secret needs to be identical on your unit, see Access via a Radius server.

Creating Access Groups in a Domain

Open the "Active Directory Users and Computers". Select your domain, right-click followed by "New" and choose "Group". This group will be further used to allow users access to the monitoring unit.

Add a new user, "user_rad_100", in the same way, right-click followed by "New" and choose "User". In the "Dial-in" tab set "Network Access Permission" to "Control access through NPS Network Policy". Add this user to a previously created group.

Set the user password (or reset it by right clicking and selecting "Reset Password..."), which is the SHA-1 hash code entered by a user with a plain text password. For example, for the password "guest" it will be "35675e68f4b5af7b995d9205ad0fc43842f16450" (without quotes).

Create a new Network Policy

Using access policies, we will connect previously created RADIUS client records and domain security groups to access monitoring units. Open the Network Policy Server Console. Expand "Policies", right-click "Network Policies" and click "New". Set the policy name and select access permission as "Grant access".

In the next tab, "Conditions", we need to add the conditions under which this RADIUS policy will be applied. Add a group that contains all users that should be allowed to use the service.

In the next step, configure "Authentication Methods". Disable all authentication methods and enable the "Unencrypted authentication (PAP, SPAP)" method.

At the configuration settings step "Configure Settings", in the settings section of the standard RADIUS attributes, delete the attributes that are available by default. Select the "Vendor Specific" attributes section. Specify vendor as "Custom", select the "Vendor-Specific" attribute, and click "Add...".

In "Attribute Information" click "Add...". Enter the vendor code (for the Vutlan device is 39052) and configure the attributes by attribute number.

Each attribute has a name and an identifier number. Because the server does not have a dictionary for monitoring units, then attributes must be specified through a number as indicated in the table below.

Attributes
Name             Number        Format        Value
SRead            10            string        "all" or list of permission
SWrite           11            string        "all" or list of permission
CRead            12            string        "all"
CWrite           13            string        "all"
GRead            14            string        "all" or list of group ID
GWrite           15            string        "all" or list of group ID

Each user profile in the system can have access to system resources in a "read-only" or "read-write" mode.

Each resource in the system is compared with its corresponding access ID.

Access control is carried out by means of lists. The list is a text string, which consists of access IDs separated by commas.

Accordingly, in the user profile, there are two types of lists: lists for read access and for write access  (both recording and reading).
The system allows three types of permission lists :

1) Server permission lists:

The list of identifiers of server resources:

Do not specify identification users, otherwise, a user without administrative rights may see the records of other users. In addition, the user is logged in through the RADIUS server, and can not edit or delete user accounts stored in the internal memory of the monitoring device.

2) Client permission lists (web interface):

The list of resource identifiers of the client (Web Interface) is formed and is used solely by the client (by web interface) under its logical organization. Now it is not used and should be listed as "all,".

3) Lists of permits for groups of objects:

Lists of permissions for groups consist of group IDs (a positive integer) and are intended to limit the client (web interface) access to the group objects.

The format of these lists - identifiers separated by commas, in this case, there are special control words:

By default, there are no groups in the system, elements, and modules are not in groups, and access to them is possible only with the rights of "all".

After specifying all the attributes you will get this result. In this example, all users in the "RADIUS group" have full administrator rights on the monitoring unit.