Mideye Reference Guide
The Mideye Server Reference Guide provides detailed documentation for every page in the web administration interface. Use this guide to understand configuration options, field definitions, permissions, and API endpoints across all functional areas.
Sections
Section titled “Sections”Monitor authentication activity, blocked attempts, RADIUS accounting, audit trails, server log files, and active RADIUS sessions.
- Authentication Logs — real-time authentication event monitoring with filtering and blocking
- Blocked Attempts — failed authentication attempts from blocked sources
- Accounting — RADIUS accounting records with session duration and data usage
- Audit Logs — administrative action audit trail with JSON detail inspection
- Log Files — server log file viewer with real-time streaming
- RADIUS Sessions — active RADIUS sessions with disconnect capability
Configure threat protection with automatic IP blocking, static filter rules, and webhook notifications.
- Configuration — master enable/disable, blocking thresholds, and webhook settings
- Auto-blocked IPs — dynamically blocked IP addresses with unblock actions
- Static Filter Rules — manually defined allow/block rules by IP, username, or calling station
Manage RADIUS clients, shared secrets, upstream servers, Network Policy Servers, and vendor-specific attributes.
- RADIUS Clients — NAS/VPN device configuration with authentication policies
- RADIUS Shared Secrets — shared secret lifecycle management
- RADIUS Servers — upstream RADIUS server configuration with custom user messages
- Network Policy Servers — NPS proxy target configuration
- Vendor-Specific Attributes — custom RADIUS vendor and attribute definitions
Configure directory integrations for user authentication and attribute resolution.
- LDAP Profiles — LDAP/Active Directory connection and attribute mapping
- Entra ID Profiles — Microsoft Entra ID (Azure AD) integration
- RADIUS Translation — map LDAP attributes to RADIUS response attributes
- Locked Users — view and unlock directory-locked user accounts
- LDAP Password Comparison — authenticate against hashed passwords in LDAP attributes
Manage local user accounts, password policies, and hardware token inventory.
- Mideye Users — local user account management with role assignment and token binding
- Mideye User Settings — password policy and user inactivity configuration
- Hardware Tokens — OATH TOTP/HOTP hardware token import and lifecycle management
Configure server infrastructure including Assisted Login, certificates, logging, Switch connectivity, and proxy.
- Assisted Login Profiles — approver-based authentication workflow configuration
- Certificate Management — TLS/SSL certificate and keystore management
- Log Configuration — runtime log level control and trace file generation
- Switch Configuration — Mideye Switch connection and air-gapped mode
- Proxy Configuration — HTTP proxy settings for outbound traffic
Configure externally accessible authentication and password reset endpoints.
- Magic Link Endpoints — passwordless SFWA authentication profiles with API token management
- Password Reset Endpoints — self-service assisted password reset portal configuration