I don't think this is correct (in the context of client VPN, for switches and APs it would be correct). The MX should validate the certificate as the first step and pass the username and password to the RADIUS server as a second step. And with this, I would not use a Cloud RADIUS for the MX because the password protection relies on the completely outdated RADIUS protocol, which is based on MD5 security.
If you found this post helpful, please give it Kudos. If my answer solves your problem, please click Accept as Solution so others can benefit from it.