TOTPRadius Virtual Appliance - Download
Download & install
TOTPRadius is deployed as a software-based virtual appliance that runs on two hypervisors: VMware ESXi and Microsoft Hyper-V. The version for VMware will run under XCP-NG without modifications as well. Upon request, virtual appliances for other hypervisors can be provided. It is free to use with up to 5 users. You need to obtain a license to increase the number of allowed users. You can download the appliance using one of the links below:
VMware or XCP-NG
version: 0.3format: OVA file (zip archive)
file size: 1.9 GB
md5sum:
5d06fe7ba76e06a6600fe91912d98726
download VMware image
Hyper-V
version: 0.3format: Exported VM (zip archive)
file size: 1.9 GB
md5sum:
1eab8225dab05cd44ad2f1febeed5a08
download HyperV image
Upgrade from previous versions
If you already have TOTPRadius 0.2.7, 0.2.8 or 0.2.9 deployed and configured, you can also upgrade using the upgrade package.
Upgrade
format: zip archivefile size: 2 mb
md5sum:
b4862903d4c17d2a179477cea67e8977
download upgrade package
About
Installation and configuration
- Installation and initial configuration
- Network configuration
- Migrating from older versions
- LDAP Configuration
- Azure AD Configuration
- Self-service enrollment portal
- Web and LDAPS Certificates
- Syslog configuration
- Single-factor authentication exceptions
- Slave appliance mode
- Dynamic RADIUS Attributes
Integration guides
Blog
21-11-2024
New iOS 18.1 Update Breaks Support for FIDO2.1 Final Keys
The latest iOS 18.1 release has introduced an unexpected issue affecting FIDO2.1 Final keys, rendering them incompatible with the new update. This issue is not limited to Token2's security keys but impacts devices from all manufacturers adhering to the FIDO2.1 final specification.
10-09-2024
Independent Public Security Review of Token2 PIN+ FIDO2 Security Keys
Compass Security Schweiz AG (Compass), a leading Swiss IT security firm, has conducted a comprehensive and independent public security review of the Token2 PIN+ FIDO2 Security Keys firmware.
04-09-2024
Update on EUCLEAK Vulnerability and Chip Security
We want to assure you that we do not use Infineon chips, which are affected by the EUCLEAK side-channel attack recently identified by NinjaLabs. This attack exploits a vulnerability related to the extended Euclidean algorithm (EEA) used in modular inversion.