This feature is available to Smallstep Enterprise RADIUS customers.
A minimal Go implementation and reference for building webhook endpoints that participate in Smallstep Enterprise RADIUS EAP‑TLS authentication flows.
This is an example implementation and is not intended for production use. For reference, see our RADIUS webhook documentation.
With RADIUS authentication webhooks, you can integrate Smallstep’s RADIUS workflow with your own device posture or authorization checks during EAP‑TLS connection requests. Your webhook evaluates the presented client certificate and returns an allow/deny decision.
- A client attempts EAP‑TLS authentication to Smallstep RADIUS.
- After certificate verification, Smallstep invokes your configured webhook(s) with a JSON payload that includes the client certificate and metadata.
- Your webhook server returns an allow/deny decision.
- Smallstep enforces the decision. Timeouts or non‑200 responses are treated as deny.
Multiple webhooks are supported and are called sequentially with no guaranteed order.