limit of ten (10) simultaneous sessions
this means there is no user or device limit, only that a maximum of ten devices simultaneously may be connected at any given moment
High Availability (HA) is in effect disabled as for both VMs:
they are deployed to the same non-zonal region or zone in a zonal region
share the same fault domain so a hardware failure on one affects the other
Azure is instructed that both systems may be updated simultaneously causing outages
you should therefore only use the two system deployment when testing RADIUS failover scenarios
Accelerated Networking is disabled
Encryption at Host is disabled
EAP-(T)TLS only support RSA certificates which when compared to ECDSA certificates:
larger leading to slower authentications as they require more round trips to transmit certificate material
requires more CPU resources
TLS session resumption is disabled
impacts considerably device reconnection times for 802.1X when using EAP-(T)TLS
for deployments that have enabled MFA, it will be used for every device connection, including reconnections, making MFA support only suitable for evaluation purposes
limited to
Standard_B1instances (1 vCPU with up to 2GiB RAM)limited to Standard SDD and Standard HDD disk types for the OS
RADIUS accounting proxying is not available
Assigning governance related policies to instances
The ‘team’ tier removes most of these restrictions, in particularly:
Unlimited simultaneous sessions
Allow the use of
Standard_B2instancesHigh Availability (HA) is effective
Proxying RADIUS (federation only)
Suitable for use with eduroam® and OpenRoaming™
The ‘enterprise’ tier further allows for:
Use of any instance type
Assignment of governance related policies to instances
Proxying RADIUS Accounting (SSO)
Suitable for use with WatchGuard™ Firebox, Fortinet FortiOS and SonicWall
Integration with Microsoft Defender for Cloud
