Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124
Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124
As cyber threats continue to evolve, securing access to your VMware ESXi 8 environment is more critical than ever. While traditional username-password authentication provides a basic level of security, it is no longer sufficient against modern attack vectors like credential theft, brute-force attacks, and phishing. Two-Factor Authentication (2FA) adds an additional layer of protection by requiring a second form of verification, such as a one-time password (OTP) or a push notification, before granting access.
In this guide, we will walk through the process of configuring Windows Server 2022 as a RADIUS (Remote Authentication Dial-In User Service) server for integrating 2FA authentication in VMware ESXi 8. By leveraging Network Policy Server (NPS) on Windows Server 2022, you can enforce strong authentication policies, restrict unauthorized access, and comply with security standards like ISO 27001, PCI DSS, and HIPAA.

This tutorial is designed for IT administrators who want to enhance their ESXi security posture by implementing Multi-Factor Authentication (MFA) with RADIUS. We will cover the installation of NPS, RADIUS client configuration, network policies, and integration with ESXi 8, ensuring a seamless and secure authentication workflow.
Open Server Manager > Click on Manage >

Select Add Roles and Features.
Choose Role-based or feature-based installation and click Next.

Select the Windows Server 2022 where NPS will be installed and click Next.
Under Server Roles, select Network Policy and Access Services > Click Next.

Under Role Services, check Network Policy Server (NPS) > Click Next.

Click Install and wait for the installation to complete.
Open NPS Console (Run nps.msc from the Start menu).

Right-click NPS (Local) and select Register Server in Active Directory.
Click OK to confirm registration.
In NPS Console, expand RADIUS Clients and Servers > Right-click RADIUS Clients > Select New.

Enter a Friendly Name (e.g., VMware-ESXi-8). Enter the IP address of your ESXi 8 host.

Click on the verify button to verify the IP address of VMware ESXi 8.
Choose a Shared Secret (store this safely; you will need it for ESXi configuration).
Click OK to save the client settings.
In NPS Console, navigate to Policies > Network Policies.

Click New and provide a Policy Name (e.g., “VMware ESXi Authentication”).

Select Grant Access if the request matches the conditions.

Under Conditions, click Add:

Under Authentication Methods, ensure Microsoft Encrypted Authentication (MS-CHAP v2) is enabled.
Click Next and then Finish to save the policy.

Log in to the VMware ESXi 8 Web UI.
Navigate to Manage > Security & Users > Authentication Services.

Click Edit and select RADIUS Authentication.
Enter the Windows Server 2022 IP Address as the Primary RADIUS Server.
Enter the Shared Secret (same as configured in NPS). Set the Authentication Timeout (e.g., 10 seconds).
Click Save.
By integrating Windows Server 2022 as a RADIUS server for 2FA authentication, you significantly enhance VMware ESXi 8 security. This setup ensures that even if credentials are compromised, unauthorized users cannot gain access without the second authentication factor.
🔹 Key Benefits:
💡 Next Steps: Implement audit logging in NPS for monitoring and configure backup authentication methods for failover security.
