Funk Software Odyssey Server
May 05, 2004
Two servers/50 clients/two contracts: $5,750
- Ease of Use:
- Value for Money:
- Overall Rating:
: Simplified Radius authentication, easy to use, supports a range of security standards and protocols.
: Running on Windows as its underlying platform makes it subject to any issues associated with that operating system.
: Odyssey is a comprehensive Radius server that runs under Windows, but which can also be integrated with other Radius servers adding to its functionality.
Installation was a breeze: we put in the CD and followed the wizard. After a reboot, the Odyssey server was ready as a Win32 service, running in the background. Configuration is handled via the Odyssey server administrator, which runs as a snap-in tool added to the Microsoft Management Console.
We then configured the Radius settings (Odyssey can process authentication and accounting data) and set values and "shared secrets" for the related APs. You can define policies, but the default setting is comprehensive. We then established authentication settings and protocols. Odyssey supports EAP authentication (EAP-TTLS, EAP-TLS, Cisco's LEAP, and EAP-MD5). We had to provide and install a security certificate and private key on the server to use these protocols. You then add any APs on your network – set up as Radius clients – and set up groups or users.
The Odyssey client, packaged with Odyssey Server and Steel Belted Radius, is a Windows-based authentication client installed on users' PCs. When an Odyssey client connects to an AP, it requests an identity from the client. The client sends the user name, which the AP forwards as an access request to the Odyssey server. The server replies with a challenge based on the type of security being used, which the AP forwards to the client. The client and server then exchange messages to complete the authentication, resulting in acceptance or rejection.
The Odyssey Server can authenticate users directly against Windows NT Domains or Windows 2000 Native Domains, giving you a centralized method to authenticate users. It can also be used with other Radius servers, forwarding requests and authenticating users against non-Windows databases such as SQL or LDAP.
SC Webcasts UK
Information Security Manager
Infosec People - Hammersmith, West London
Information Security Risk Manager, £45-55k + bens
Infosec People - West Midlands, England, Coventry
SOC Analyst, Aldershot, £55-63k + benefits
Infosec People - England, Aldershot, Hampshire
Security Architect, Cardiff - to £70k Basic
Infosec People - Cardiff, Wales
Interim CISO (Chief Information Security Officer) - Cyber Security Director
CYBER EXECS - London (Central), London (Greater)
Sign up to our newsletters
SC Magazine UK Articles
- Gooligan ad fraud malware infects 1.3M Android users, installs over 2M unwanted apps
- Met Police grab suspect with phone unlocked to get hold of data
- Cyber-security must reflect risk not just regulation
- Data centres are on the move - where will they end up?
- Same fate befalls Post Office broadband as hit DT?
- SC Awards Europe 2016 winners announcements!
- ISIS radicalises 'lone wolves' through strong social media presence
- Updated: How will Brexit affect the cyber-security industry in UK and Europe?
- 9.2 million medical records for sale on darkweb
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- Over 400,000 phishing sites have been detected each month in 2016
- TalkTalk customers urged to get routers swapped over hacker fears
- Report: Mirai 'is just the tip of the iceberg'
- Avalanche takedown involved searches in 40 countries
- India Supreme Court calls on tech giants to curb sexual assault, cyber-crime