Skip to content

Pulse Connect Secure VPN MFA Setup with Mideye

This guide explains how to configure Mideye two-factor authentication (MFA) for Pulse Connect Secure (now Ivanti Connect Secure) using RADIUS. After completing the steps below, VPN users will be prompted for a second authentication factor through the Mideye Server.

For general product information, refer to the official Pulse Secure documentation.

ComponentSupported versions
Pulse Connect Secure / Ivanti Connect Secure8.x / 9.x / 22.x
Mideye Server5.x / 6.x
  • A running Mideye Server with RADIUS enabled (default UDP port 1812)
  • The Pulse Secure appliance must be added as a RADIUS client in Mideye Server
  • Administrator access to the Pulse Secure admin console
  • Network connectivity between the Pulse Secure appliance and Mideye Server on UDP port 1812

Log in to the Pulse Secure admin console at https://FQDN/admin.

1. Create a new RADIUS authentication server

Section titled “1. Create a new RADIUS authentication server”

Navigate to AuthenticationAuth. Servers. Select RADIUS Server from the dropdown and click New Server…

Configure the following settings:

SettingValue
NameGive the authentication server a friendly name
NAS-IdentifierLeave blank
RADIUS ServerEnter the IP or hostname of the Mideye RADIUS Server
Authentication port1812 (UDP, default)
Shared SecretEnter a shared secret — must be identical on both the Pulse Secure appliance and the Mideye Server RADIUS client
Accounting1813 (UDP, default). This port must also be defined as a RADIUS Server in the Mideye Server
Timeout35 seconds. Required — gives fallback methods enough time to complete before the connection times out
Retries0

Pulse Connect Secure RADIUS authentication server configuration showing server address, shared secret, timeout, and retry settings for Mideye MFA

Under Custom Radius Rules, click New RADIUS Rule to create two rules that handle Access-Reject and Access-Challenge responses from the Mideye Server.

Configure the Access Reject rule with the following settings:

SettingValue
NameAccess Reject
Response Packet TypeAccess Reject
Attribute criteriaRadius Attribute: Reply-Message (18), Operand: matches the expression, Value: (.*)

Then select Show user login page with error messageShow Reply-Messages attribute from the RADIUS server to the user.

Click Save Changes.

Custom Access Reject RADIUS rule configuration in Pulse Connect Secure for displaying Mideye Server error messages to the user

Click New RADIUS Rule again and configure the Access Challenge rule:

SettingValue
NameAccess Challenge
Response Packet TypeAccess Challenge
Attribute criteriaRadius Attribute: Reply-Message (18), Operand: matches the expression, Value: (.*)

Then select Show Generic Login page.

Click Save Changes.

Access Challenge RADIUS rule configuration in Pulse Connect Secure for Mideye two-factor authentication prompt

After creating both rules, the Custom Radius Rules list should show both the Access Reject and Access Challenge entries:

Overview of completed custom RADIUS rules for Mideye MFA in Pulse Connect Secure showing Access Reject and Access Challenge rules

Click Save Changes to save the authentication server.

3. Apply the authentication server to a user realm

Section titled “3. Apply the authentication server to a user realm”

Navigate to UsersUser Realms and select the realm that should be protected with Mideye authentication. Add the RADIUS server created above and click Save Changes.

For further details on configuring user realms, refer to the Pulse Secure User Realm Configuration guide.

SymptomCheck
Authentication fails / times outVerify that the RADIUS timeout is set to 35 seconds and retries is 0
No RADIUS logs in Mideye ServerVerify UDP port 1812 is open between the Pulse Secure appliance and Mideye Server
Shared secret mismatchEnsure the secret configured in Pulse Secure matches the RADIUS client in Mideye Server exactly
OTP prompt does not appearVerify the Access Challenge custom RADIUS rule is configured and saved
Generic error instead of Mideye messageVerify the Access Reject custom RADIUS rule is configured to show Reply-Messages

Verify that authentication requests are reaching the Mideye Server by checking the RADIUS log file:

Mideye Server\log\radius-messages.log

If the log file shows no entries, check firewall rules and network routing between the appliance and Mideye Server.

Official Pulse Secure / Ivanti documentation

Section titled “Official Pulse Secure / Ivanti documentation”