Feel free to download the PDF or PowerPoint versions.
The latest versions of the Mi-Token installers can be found here - https://www.dropbox.com/sh/4r7wk769r8xuj5a/AABW0f_LoHtKwzGw07Rkxjh0a?dl=0
The individual installers can be downloaded or just download the bundle.zip to get them all.
Also can download the Administration and Installation Guide
Mi-Token Server Installation Guide
Version: 4.3.9.4
Author: Mi-Token Inc.
Date: March 2025
Contact: support@mi-token.io
1. System Requirements
Before proceeding with the installation, ensure your system meets the following requirements:
1.1 Operating System
• Windows Server 2016 / 2019 / 2022
• Active Directory Domain Controller (for AD integration)
1.2 Software Prerequisites
• Microsoft .NET Framework (latest version)
• Windows Network Policy Server (NPS)
• RADIUS configured on Windows Server
1.3 Hardware Requirements
• Minimum 4 vCPUs
• 8GB RAM
• 50GB free disk space
2. Installation Steps
2.1 Install Mi-Token Radius Plugin
1. Open Program Manager.
2. Double-click Mi-Token Stuff.
3. Double-click Mi-Token Radius Plug-in.
4. Click Install.
5. Accept the license agreement and click Install.
6. After installation, open Mi-Token Configuration Wizard.
7. Click Next multiple times until the wizard completes.
8. Click Finish and then Close.
2.2 Install Mi-Token Active Directory UI
1. Double-click Mi-Token Active Directory UI_64bit.
2. Click Install.
3. Accept the license agreement and click Install.
4. Click Finish, then Close.
3. Post-Installation Configuration
3.1 Configuring Mi-Token Administration UI
1. Click Start → Open Search Pane (Administration UI Quick-Start).
2. Click Add to Desktop, then OK.
3. Open RADIUS Plug-in Management.
4. Click Add to Desktop, then OK.
5. Click Launch.
3.2 Configuring RADIUS Settings
1. In Mi-Token (Local), navigate to Connection Request Policies.
2. Click Enable Mi-Token.
3. Navigate to NPS (Local) → RADIUS Clients and Servers.
4. Select RADIUS Clients, then click New.
5. Enter:
• Friendly Name
• IP Address / DNS
6. Click Generate, then enter a Shared Secret.
7. Click OK.
3.3 Configuring Network Policies
1. Go to Policies → Network Policies.
2. Double-click Connections to other access servers.
3. Select Grant access if the connection request matches this policy.
4. Under Constraints, enable:
• Encrypted Authentication (CHAP)
• Unencrypted Authentication (PAP, SPAP)
5. Click Apply, then OK.
3.4 Token Management Configuration
1. Open Token Management.
2. Click Launch and then OK.
3. In Active Directory Users and Computers, maximize the window.
4. Navigate to Tokens [mitokenserver.mitoken.local:5000].
5. Right-click and select Properties.
6. Under Miscellaneous, enable Tokens.
7. Set a Validity Window and click Apply.
3.5 Configuring Bypass Codes
1. Navigate to Desktop Login.
2. Enable Centrally Managed Bypass Codes.
3. Click Configure Bypass Codes.
4. Click Add → New Bypass.
5. Enable All Users.
6. Click OK three times.
3.6 Testing the Installation
1. Open Mi-Token - Active Directory Users & Computers.
2. Right-click Tokens [mitokenserver.mitoken.local:5000].
3. Select Generate temp-token.
4. Enter an object name and click Check Names.
5. Click OK.
6. Open Radius Tester.
7. Fill in all required fields.
8. Uncheck all unnecessary options.
9. Click Go RADIUS! to test the authentication.
4. Troubleshooting
Issue 1: RADIUS Authentication Fails
• Verify NPS Policies.
• Ensure Shared Secret matches on both client and server.
• Check firewall rules for UDP 1812 & 1813 (RADIUS ports).
Issue 2: Tokens Not Syncing
• Restart Mi-Token Service.
• Verify Active Directory Integration.
• Ensure Token Validity Window is correctly set.
5. Final Notes
• Ensure to backup configurations before making changes.
• If further support is needed, contact support@mi-token.io.
This document provides a detailed step-by-step installation guide for setting up Mi-Token Server, If any additional configurations are required, please refer to the Mi-Token Administrator Guide or contact Mi-Token Support.