www.securew2.com Open in urlscan Pro
18.238.243.24  Public Scan

URL: https://www.securew2.com/solutions/wpa2-enterprise-and-802-1x-simplified
Submission: On September 03 via manual from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

Want to learn the best practice for configuring Chromebooks with 802.1X
authentication?

Sign up for a Webinar!
 * Why SecureW2?
 * Solutions
   Technology Solutions
    * PKI & Certificate Services
       * Managed Cloud PKI
       * Certificate Security for Azure AD & Okta
       * Auto-Enrollment & APIs for Managed Devices
       * YubiKey / Smart Card Management System (SCMS)
       * Desktop Logon via Windows Hello for Business
       * Document Signing
       * SSL Decryption for Firewalls
   
    * RADIUS AAA
       * Secure Password-less Cloud RADIUS
       * Policy Engine for Cloud Identities
       * Multi-Tenant RADIUS for MSPs
   
    * Wi-Fi, ZTNA and VPN Security
       * Zero Trust Network Security Solutions
       * Passwordlesss Okta & Azure Security Solutions for Wi-Fi / VPN
       * Secure VPN Authentication
       * EAP-TLS Authentication
       * Eduroam
       * Wired Solutions
       * Preventing Over-the-Air Credential Theft
       * Passpoint / Hotspot 2.0 Enabled 802.1x Solutions
       * BYOD Onboarding
   
    * Security for Azure
       * Azure VPN Solutions
       * Azure Wi-Fi Security Solutions
       * Azure Solutions for Partners
   
    * Security for Okta
       * Okta VPN Solutions
       * Okta Wi-Fi Security Solutions
       * Okta Solutions for Partners
   
   Vertical Solutions
    * For Enterprise
    * For SMB
    * For Higher Education
    * For K12
    * For Service Providers

 * Products
   
    * JOINNOW CONNECTOR PKI
      
      Powerful PKI Services coupled with the industries #1 Rated Certificate
      Delivery Platform.
   
    * JOINNOW CLOUD RADIUS
      
      The only Cloud RADIUS solution that doesn’t rely on legacy protocols that
      leave your organization susceptible to credential theft.
   
    * JOINNOW MULTIOS
      
      Protect the security of your unmanaged devices/BYODs by eliminating the
      possibility of misconfiguration.
   
    * JOINNOW NETAUTH
      
      Ultra secure partner and guest network access.

 * Resources
   
    * FEATURED CUSTOMERS
      
      Some of our featured customers.
   
    * CUSTOMER STORIES
      
      Hear from our customers how they value SecureW2.
   
    * DOCUMENTATION
      
      Learn how our solutions integrate with your infrastructure.

 * Blogs
 * Contact Us
   North America Sales (888) 363-3824 (512) 900-5515
   UK, Europe and Middle East Sales +44 20 3912 9916
   
   
   * Or you could choose to fill out this form and tell us a little about
   yourself:
   
   Contact Us Form
   

 * Login
 * Check our Prices

 * Login
 * Pricing


 * Why SecureW2?
 * Solutions
   Technology Solutions
    * PKI & Certificate Services
       * Managed Cloud PKI
       * Certificate Security for Azure AD & Okta
       * Auto-Enrollment & APIs for Managed Devices
       * YubiKey / Smart Card Management System (SCMS)
       * Desktop Logon via Windows Hello for Business
       * Document Signing
       * SSL Decryption for Firewalls
   
    * RADIUS AAA
       * Secure Password-less Cloud RADIUS
       * Policy Engine for Cloud Identities
       * Multi-Tenant RADIUS for MSPs
   
    * Wi-Fi, ZTNA and VPN Security
       * Zero Trust Network Security Solutions
       * Passwordlesss Okta & Azure Security Solutions for Wi-Fi / VPN
       * Secure VPN Authentication
       * EAP-TLS Authentication
       * Eduroam
       * Wired Solutions
       * Preventing Over-the-Air Credential Theft
       * Passpoint / Hotspot 2.0 Enabled 802.1x Solutions
       * BYOD Onboarding
   
    * Security for Azure
       * Azure VPN Solutions
       * Azure Wi-Fi Security Solutions
       * Azure Solutions for Partners
   
    * Security for Okta
       * Okta VPN Solutions
       * Okta Wi-Fi Security Solutions
       * Okta Solutions for Partners
   
   Vertical Solutions
    * For Enterprise
    * For SMB
    * For Higher Education
    * For K12
    * For Service Providers

 * Products
   
    * JOINNOW CONNECTOR PKI
      
      Powerful PKI Services coupled with the industries #1 Rated Certificate
      Delivery Platform.
   
    * JOINNOW CLOUD RADIUS
      
      The only Cloud RADIUS solution that doesn’t rely on legacy protocols that
      leave your organization susceptible to credential theft.
   
    * JOINNOW MULTIOS
      
      Protect the security of your unmanaged devices/BYODs by eliminating the
      possibility of misconfiguration.
   
    * JOINNOW NETAUTH
      
      Ultra secure partner and guest network access.

 * Resources
   
    * FEATURED CUSTOMERS
      
      Some of our featured customers.
   
    * CUSTOMER STORIES
      
      Hear from our customers how they value SecureW2.
   
    * DOCUMENTATION
      
      Learn how our solutions integrate with your infrastructure.

 * Blogs
 * Contact Us
   North America Sales (888) 363-3824 (512) 900-5515
   UK, Europe and Middle East Sales +44 20 3912 9916
   
   
   * Or you could choose to fill out this form and tell us a little about
   yourself:
   
   Contact Us Form
   

Login Check our Prices


SIMPLIFYING WPA2-ENTERPRISE AND 802.1X

WPA2-Enterprise has been around since 2004 and is still considered the gold
standard for wireless network security, delivering over-the-air encryption and a
high level of security. In conjunction with the effective authentication
protocol known as 802.1X, users have been successfully authorized and
authenticated for secure network access for many years.

But in that time, WPA2-Enterprise hasn't gotten any easier to manually
configure. Regardless of whether you are deploying a wireless network for the
first time or a seasoned expert, there are always unique challenges ready to
give you a headache. Our Cloud RADIUS server is a turnkey solution for
organizations of all sizes. What follows is a comprehensive guide on every
aspect of WPA2-Enterprise network authentication via the 802.1X protocol.


Table of Contents
 1. WPA2-PSK and WPA2-Enterprise: What's the Difference?
     1. WPA2-PSK
     2. WPA3-PSK
     3. WPA2-Enterprise
     4. WPA3-Enterprise

 2. Deploying WPA2-Enterprise and 802.1x
 3. The Components of 802.1x
     1. Client / Supplicant
     2. Switch / Access Point / Controller
     3. RADIUS Server
     4. Identity Store

 4. WPA2-Enterprise Protocols
     1. EAP-TLS
     2. EAP-TTLS/PAP
     3. PEAP-MSCHAPv2

 5. 802.1x Authentication Methods
     1. Password-Based Authentication
     2. Token-Based Authentication
     3. Certificate-Based Authentication

 6. WPA2-Enterprise Challenges
     1. Drawback #1: Device variation
     2. Drawback #2: MITM and delivering certificates
     3. Drawback #3: The Password change problem
     4. Drawback #4: Changing user expectation

 7. Simplifying WPA2-Enterprise with JoinNow
     1. Efficiency Through Onboarding
     2. 
     3. Certificate-Hardened WPA2-Enterprise
     4. WPA2-Enterprise Managed Device Configuration
     5. RADIUS Servers and Policy Driven Access Control

 8. FAQ
     1. Can a router be a RADIUS server?
     2. How do I setup a RADIUS server as a WiFi hotspot?
     3. How do I setup a wireless RADIUS server?
     4. How does WiFi RADIUS authentication work?
     5. What is the benefit of RADIUS?

Navigate To
Access Point Integrations: RADIUS and Onboarding SSID Setups
Aruba Instant Access Points Extreme Networks Cisco WLC Cisco Meraki Cambium
Aerohive Ubiquiti
MDM / EMMs Integrations: Certificate Auto-Enrollment API Gateway
Google Chromebooks MEM Intune Jamf Kandji Workspace One AD Domain Windows
MobileIron Addigy
Identity Provider Integrations: Certificate Enrollment
Azure AD Okta Google Workspace Shibboleth
Identity Provider Integrations: RADIUS Authentication
RADIUS Integrations Microsoft NPS Cisco ISE Extreme Control Aruba Clearpass
Radiator
Dynamic RADIUS with IdPs Azure AD Okta
VPN Integrations: RADIUS Setups
Azure AD MFA Palo Alto


WPA2-PSK AND WPA2-ENTERPRISE: WHAT'S THE DIFFERENCE?


WPA2-PSK

WPA2-PSK (Wi-Fi Protected Access 2 Pre-Shared Key) is a type of network that is
protected by a single password shared between all users. It's generally accepted
that a single password to access Wi-Fi is safe, but only as much as you trust
those using it. Otherwise, it's trivial for someone who has obtained the
password through nefarious means to infiltrate the network. This is why WPA2-PSK
is often considered insecure.

There are only a few situations in which WPA2-PSK should be deployed:

 * The network has just a few devices, all of which are trusted. This could be a
   home or small office.
 * As a way to restrict casual users from joining an open network when unable to
   deploy a captive portal. This could be a coffee shop or guest network.
 * As an alternative network for devices not compatible with 802.1x. An example
   being game consoles in a student dorm.


WPA3-PSK

To improve the effectiveness of PSK, updates to WPA3-PSK offer greater
protection by improving the authentication process. A strategy to do this uses
Simultaneous Authentication of Equals (SAE) to make brute-force dictionary
attacks far more difficult for a hacker. This protocol requires interaction from
the user on each authentication attempt, causing a significant slowdown for
those attempting to brute-force through the authentication process.


WPA2-ENTERPRISE

Deploying WPA2-Enterprise requires a RADIUS server, which handles the task of
authenticating network users access. The actual authentication process is based
on the 802.1x policy and comes in several different systems labelled EAP.
Because each device is authenticated before it connects, a personal, encrypted
tunnel is effectively created between the device and the network.

The WPA2 (Enterprise) RADIUS combination affords networks the highest level of
cybersecurity, especially when X.509 digital certificates are used for
authentication. WPA2 Enterprise requires an 802.1X authentication server anyway,
so it's only logical to implement the best possible authentication security
during configuration.


WPA3-ENTERPRISE

A significant improvement that WPA3-Enterprise offers is a requirement for
server certificate validation to be configured to confirm the identity of the
server to which the device is connecting.

Interested in learning more about WPA3? Get the details about the changes WPA3
is poised to bring in this article.

KEY TAKEAWAYS

 * WPA2-PSK is the simplest form of authentication security and it shouldn't be
   used outside of protecting home Wi-Fi networks.
 * WPA2-Enterprise requires networking infrastructure and somewhat complex
   configuration, but it's significantly more secure.
 * WPA3 is still in the preliminary stages and for now WPA2-Enterprise is the
   gold standard for wireless security.


DEPLOYING WPA2-ENTERPRISE AND 802.1X



An 802.1X RADIUS server for WiFi authentication is a necessary component of
enterprise network security. Remote Authentication Dial In User Service (RADIUS)
secures WiFi by requiring a unique login for each user, as well as recording
event logs and applying authorization policies.

There are just a few components that are needed to make 802.1x work.
Realistically, if you already have access points and some spare server space,
you possess all the hardware needed to make secure wireless happen. Sometimes
you don't even need the server: some access points come with built-in software
that can operate 802.1x (though only for the smallest of small deployments).
Regardless of whether you purchase professional solutions or build one yourself
from open source tools, the quality and ease of 802.1x is entirely a function of
design.

KEY TAKEAWAYS

 * The best way to deploy the gold standard of wireless security
   (WPA2-Enterprise with 802.1X) is a passwordless solution that leverages
   digital certificates.
 * Tie your Cloud Identity to network security by deploying WPA2-enterprise for
   Wi-Fi and VPN authentication.


THE COMPONENTS OF 802.1X




CLIENT / SUPPLICANT

In order for a device to participate in the 802.1x authentication, it must have
a piece of software called a supplicant installed in the network stack. The
supplicant is necessary as it will participate in the initial negotiation of the
EAP transaction with the switch or controller and package up the user
credentials in a manner compliant with 802.1x. If a client does not have a
supplicant, the EAP frames sent from the switch or controller will be ignored
and the switch will not be able to authenticate.

Fortunately, almost all devices we might expect to connect to a wireless network
have a supplicant built-in. SecureW2 provides a 802.1x supplicant for devices
that don't have one natively.

Thankfully, the vast majority of device manufacturers have built-in support for
802.1x. The most common exceptions to this might be consumer gear, such as game
consoles, entertainment devices or some printers. Generally speaking, these
devices should be less than 10% of the devices on your network and are best
treated as the exception rather than the focus.

KEY TAKEAWAYS

 * The client contains the user's credentials and connects with the
   switch/controller so the authentication process can initiate.


SWITCH / ACCESS POINT / CONTROLLER

The switch or wireless controller plays an important role in the 802.1x
transaction by acting as a ‘broker' in the exchange. Until a successful
authentication, the client does not have network connectivity, and the only
communication is between the client and the switch in the 802.1x exchange. The
switch/controller initiates the exchange by sending an EAPOL-Start packet to the
client when the client connects to the network. The client's responses are
forwarded to the correct RADIUS server based on the configuration in the
Wireless Security Settings. When the authentication is complete, the
switch/controller makes a decision whether to authorize the device for network
access based on the user's status and possibly the attributes contained in the
Access_Accept packet sent from the RADIUS server.

If the RADIUS server sends an Access_Accept packet as a result of an
authentication, it may contain certain attributes which provide the switch
information on how to connect the device on the network. Common attributes will
specify which VLAN to assign a user, or possibly a set of ACLs (Access Control
List) the user should be given once connected. This is commonly called ‘User
Based Policy Assignment', as the RADIUS server is making the decision based on
user credentials. Common use cases would be to push guest users to a ‘Guest
VLAN' and employees to an ‘Employee VLAN'.

KEY TAKEAWAYS

 * These components facilitate communication between the end-user device and the
   RADIUS server.
 * They can be configured with low-security authentication protocols like
   WPA-PSK that do not require a RADIUS.
 * The switch is where you configure the network to use 802.1x instead of
   WPA2-PSK.


RADIUS SERVER

RADIUS is an acronym for Remote Authentication Dial In User Service. It's
sometimes called an AAA server, which is an intialism for Authentication,
Authorization, and Accounting. RADIUS is a WiFi security necessity - it replaces
a single preshared key with unique credentials per user or device.

The on-premise or Cloud RADIUS server acts as the “security guard” of the
network; as users connect to the network, the RADIUS authenticates their
identity and authorizes them for network use. A user becomes authorized for
network access after enrolling for a certificate from the PKI (Private Key
Infrastructure) or confirming their credentials. Each time the user connects,
the RADIUS confirms they have the correct certificate or credentials and
prevents any unapproved users from accessing the network. A key security
mechanism to employ when using a RADIUS is server certificate validation. This
guarantees that the user only connects to the network they intend to by
configuring their device to confirm the identity of the RADIUS by checking the
server certificate. If the certificate is not the one which the device is
looking for, it will not send a certificate or credentials for authentication.

RADIUS servers can also be used to authenticate users from a different
organization. Solutions like Eduroam have RADIUS servers work as proxies (such
as RADSEC) so that if a student visits a neighboring university, the RADIUS
server can authenticate their status at their home university and grant them
secure network access at the university they are currently visiting.

KEY TAKEAWAYS

 * RADIUS Servers serve as a “security guard” of the network by authenticating
   clients, authorizing client access, and monitoring client activity.
 * RADIUS servers take attributes from the client and determine their
   appropriate level of access.


IDENTITY STORE

The Identity Store refers to the entity in which usernames and passwords are
stored. In most cases, this is Active Directory, or potentially an LDAP server.
Almost any RADIUS server can connect to your AD or LDAP to validate users. There
are a few caveats when LDAP is used, specifically around how the passwords are
hashed in the LDAP server. If your passwords are not stored in cleartext or an
NTLM hash, you will need to choose your EAP methods carefully as certain
methods, such as EAP-PEAP, may not be compatible. This is not an issue caused by
RADIUS servers, but rather from the password hash.

SecureW2 can help you set up SAML to authenticate users, on any Identity
Provider, for Wi-Fi access. Here are guides to integrating with some popular
products.

To set up SAML authentication within Google Workspace, click here.

Configuring WPA2-Enterprise with Okta, click here.

For a guide on SAML Authentication using Shibboleth, click here.

To configure WPA2-Enterprise with ADFS, click here.

Developing a robust WPA2-Enterprise network requires additional tasks, like
setting up a PKI or CA (Certificate Authority), to seamlessly distribute
certificates to users. But contrary to what you might think, you can make any of
these upgrades without buying new hardware or making changes to the
infrastructure. For example, rolling out guest access or changing the
authentication method can be accomplished without additional infrastructure.
Recently, many institutions have been switching EAP methods from PEAP to EAP-TLS
after seeing noticeable improvement in connection time and roaming ability or
switching from a physical RADIUS server to a Cloud RADIUS solution. Improving
the functionality of wireless networks can be gained without changing a single
piece of hardware.


KEY TAKEAWAYS

 * 802.1x only includes four major components: client, switch, RADIUS server,
   and directory
 * 802.1x requires a directory so the RADIUS can identify each end user and what
   level of access they are allowed.
 * Although it consists of just a few components, 802.1x is incredibly complex
   to enable and you could risk misconfiguration when leaving setup to the end
   user.
 * The best practice is to integrate an onboarding application that allows
   devices to self-service with 802.1x settings.


WPA2-ENTERPRISE PROTOCOLS

What follows is a brief summary of the primary WPA2-Enterprise Authentication
Protocols. If you'd like a more in-depth compare-and-contrast, read the
full-length article.


EAP-TLS

EAP-TLS is a certificate-based protocol that is is widely considered one of the
most secure EAP standards because it eliminates the risk of over-the-air
credential theft. It's also the protocol that provides the best user experience,
as it eliminates password-related disconnects due to password-change policies.
In the past, there was a misconception that certificate-based authentication was
difficult to setup and/or manage, but now EAP-TLS is regarded by many to
actually be easier to setup and manage than the other protocols.
Want to learn more about the advantages of EAP-TLS and how SecureW2 can help
your implement it in your own network? Click the link!


EAP-TTLS/PAP

EAP-TTLS/PAP is a credential-based protocol that was created for an easier setup
because it only requires the server to be authenticated, while user
authentication is optional. TTLS creates a “tunnel” between the client and the
server and gives you multiple choices for authentication.

But TTLS includes many vulnerabilities. The configuration process can be
difficult for inexperienced network users, and a single misconfigured device can
result in significant loss to the organization. The protocol allows credentials
to be sent over the air in Cleartext, which can be vulnerable to cyber attacks
like Man-In-The-Middle and easily repurposed to accomplish the hacker's goals.

If you'd like to know more about the vulnerabilities of TTLS-PAP, read the full
article here.


PEAP-MSCHAPV2

PEAP-MSCHAPv2 is a credential-based protocol that was designed by Microsoft for
Active Directory environments. Although it's one of the most popular methods for
WPA2-Enterprise authentication, PEAP-MSCHAPv2 does not require the configuration
of server-certificate validation, leaving devices vulnerable to Over-the-Air
credential theft. Device misconfiguration, when left to end-users, is relatively
common which is why most organizations rely on Onboarding Software to configure
devices for PEAP-MSCHAPv2. Read how this top university converted from
PEAP-MSCHAPv2 to EAP-TLS authentication to provide more stable authentication to
network users.
For more information on PEAP MSCHAPv2, read this article.

KEY TAKEAWAYS

 * WPA2-Enteprise protocols can either be credential-based (EAP-TTLS/PAP and
   PEAP-MSCHAPv2) or certificate-based (EAP-TLS)
 * EAP-TLS is a certificate-based authentication protocol that is recommended by
   industry titans like Microsoft and NIST.
 * Security professionals advise against using credential-based auth protocol
   like TTLS/PAP and MSCHAPv2 and instead integrating passwordless auth
   protocols.


802.1X AUTHENTICATION METHODS

Before users can be authenticated for network access day-to-day, they must be
onboarded to the secure network. Onboarding is the process of reviewing and
approving users so they can connect to the secure network using a form of
identification, such as username/password or certificates. This process often
becomes a significant burden because it requires users to get their devices
configured for the network. For regular network users, the process can prove to
be too difficult because it requires high-level IT knowledge to understand the
steps. For example, universities at the beginning of an academic year experience
this when onboarding hundreds or even thousands of student's devices and results
in long lines of support tickets. Onboarding clients offer an easy-to-use
alternative that enables end users to easily self-configure their devices in a
few steps, saving users and IT admins a ton of time and money.


PASSWORD-BASED AUTHENTICATION

The vast majority of authentication methods rely on a username/password. It's
the easiest to deploy since most institutions already have some sort of
credentials set up, but the network is susceptible to all of the problems of
passwords without an onboarding system (see below).

For password-based authentication, there are basically 2 options: PEAP-MSCHAPv2
and EAP-TTLS/PAP. They both function similarly, but TTLS is not supported by any
Microsoft OS before Windows 8 without using a third-party 802.1x supplicant,
such as our Enterprise Client. At this point, most institutions have deployed or
made the switch to PEAP. However, you can't deploy PEAP without either using
Active Directory (a proprietary Microsoft service) or leaving your passwords
unencrypted.

KEY TAKEAWAYS

 * Over 80% of data breaches can be traced back to lost and stolen passwords. C
   onsider moving towards certificate-based authentication.


TOKEN-BASED AUTHENTICATION

Historically, tokens were physical devices in the form of key fobs or dongles
that would be distributed to users. They generated numbers in sync with a server
to add additional validation to a connection. Even though you can carry them
around and utilize advanced features like fingerprint scanners or as USB
plug-ins, dongles do have downsides. They can be expensive and are known to
occasionally lose connection to the servers.

Physical tokens are still in use, but their popularity is waning as smartphones
have made them redundant. What was once loaded onto a fob you can now put into
an app. In addition, there are other methods for two-factor authentication
outside of the EAP method itself, such as text or email confirmations to
validate a device.

KEY TAKEAWAYS

 * There is no standard structure for an access token; it can theoretically
   contain anything and the client would have no way of knowing.
 * A bad actor can easily inject a leaked or stolen access token and impersonate
   the resource server when the client accepts access tokens.


CERTIFICATE-BASED AUTHENTICATION

Certificates have long been a mainstay of authentication in general, but are not
typically deployed in BYOD settings since certificates require users to install
them on their own devices. However, once a certificate is installed, they are
amazingly convenient: they are not affected by password change policies, is far
safer than usernames/passwords, and devices are authenticated faster.

SecureW2's PKI services, combined with the JoinNow onboarding client, create a
turnkey solution for certificate-based Wi-Fi authentication. An effective PKI
provides all the necessary infrastructure to implement a certificate-based
network and maintains the security and distribution of all network
certificates.. Organizations can now seamlessly distribute certificates to
devices and manage them with ease using our powerful certificate management
features.

KEY TAKEAWAYS

 * 802.1x is used to secure end users to an enterprise network and its
   applications through Wi-Fi or VPN.
 * An ideal 802.1x deployment method is a passwordless onboarding service that
   automates 802.1x configuration rather than relying on end-users to configure.
 * Digital certificates are a passwordless solution because they can be
   programmed to guide the end user through the onboarding process.


WPA2-ENTERPRISE CHALLENGES

In our experience, we've found that the average WPA2-Enterprise network suffers
from a combination of these 4 problems:


DRAWBACK #1: DEVICE VARIATION

When IEEE created the 802.1x protocol in 2001, there were few devices that could
use wireless access and network management was much simpler. Since then, the
number of device manufacturers has exploded with the rise of mobile computing.
To give some perspective, there are more flavors of Android today than there
were entire operating systems in 2001.

Support for 802.1x is inconsistent across devices, even between devices of the
same OS. Each device has unique characteristics that can make them behave
unpredictably. This problem is made worse by unique drivers and software
installed on the device.


DRAWBACK #2: MITM AND DELIVERING CERTIFICATES

While WPA2 offers a very secure connection, you also have to be sure that the
users will only connect to the secure network. A secure connection is
meaningless if the user unknowingly connected to a honeypot or imposter signal.
Institutions often sweep for and detect rogue access points, including
Man-in-the-Middle attacks, but users can still be vulnerable off-site. A person
with a laptop can attempt to quietly gather user credentials at a bus stop,
coffee shop, or anywhere devices might pass through and try to auto-connect.

Even if the server has a certificate properly configured, there's no guarantee
that users won't connect to a rogue SSID and accept any certificates presented
to them. The best practice is to install the public key on the user's device to
automatically verify the certificates presented by the server.

To learn more about MITM attacks, read our breakdown here.


DRAWBACK #3: THE PASSWORD CHANGE PROBLEM

Networks with passwords that expire on a regular basis face an additional burden
with WPA2-Enterprise. Each device will lose connectivity until reconfigured.
This was less of an issue when the average user had only one device, but in
today's BYOD environment, each user is likely to have multiple devices that all
require a secure network connection. Depending on how password changes are
enacted or the users' abilities to manage passwords, this can be a burden on
helpdesks.

It's even worse on networks that have unexpected password changes due to data
breaches or security vulnerabilities. In addition to having to roll out new
credentials site-wide, IT has to deal with an influx of helpdesk tickets related
to Wi-Fi.


DRAWBACK #4: CHANGING USER EXPECTATION

By far the most difficult part of completing a WPA2-Enterprise network setup is
training the users. Users today have incredibly high expectations for ease of
use. They also have more options than ever to work around official access. If
the network is too hard to use, they'll use data. If the certificate is bad,
they will ignore it. If they can't access something they want, they will use a
proxy.

For WPA2-Enterprise to be effective, you need to make it as easy as possible for
network users to navigate without sacrificing security.

Before you get started on your WPA2-Enterprise network, check out our primer on
the most common mistakes people make when setting up WPA2-Enterprise.

KEY TAKEAWAYS

 * WPA2-Enterprise isn't without its challenges ; the main vulnerabilities in
   WPA2-Enterprise can be traced to stolen credentials and misconfigured
   clients.
 * These issues can be addressed by tying network security with your Cloud
   Identity using certificates.


SIMPLIFYING WPA2-ENTERPRISE WITH JOINNOW

A properly configured WPA2-Enterprise network utilizing 802.1x authentication is
a powerful tool for protecting the safety of network users and securing valuable
data; but by no means is this the end of network considerations you need to
make. Many components contribute to the security and usability of the network as
a complete system. If just the authentication method is secure while the
configuration of managed devices is left to the average network user, there is a
serious risk to the integrity of the network. SecureW2 recognizes that every
facet of the wireless network must work in unison for iron-clad security, so
we've provided some turnkey concepts that every network administrator needs to
consider in their network planning.

KEY TAKEAWAYS

 * Streamline WPA2-Enterprise implementation with a Managed PKI service that is
   designed to easily integrate into your existing architecture.
 * The JoinNow Connector leverages digital certificate and allows organizations
   to implement Zero Trust initiatives.


EFFICIENCY THROUGH ONBOARDING




One of the greatest challenges for network administrators is efficiently and
accurately onboarding users to the secure network. If left to their own devices,
many users will misconfigure. Configuring for a WPA2-Enterprise network with
802.1x authentication is not a simple process and involves several steps that a
person unfamiliar with IT concepts would not understand. If users are not
connecting to the secure SSID and are not properly set up for WPA2-Enterprise,
the security benefits admins expect will be lost. For those that want the
advantages that come with certificate-based networks, many opt to deploy an
onboarding client that will automatically configure users devices.

Onboarding clients, such as those offered by SecureW2, eliminate the confusion
for users by prompting them with only a few, simple steps designed to be
completed by K-12 age students and up. The result is a properly configured
WPA2-Enterprise network with 802.1x authentication that has successfully
onboarded all network users to the secure network.

Want more info on the advantages of a streamlined and secure Bring Your Own
Device (BYOD) Onboarding software? Check out this informative piece on
onboarding!

KEY TAKEAWAYS

 * The best PKI solution provides self-service software for BYOD and unmanaged
   devices that automatically administers 802.1x settings.


CERTIFICATE-HARDENED WPA2-ENTERPRISE

A PKI enables organizations to use x.509 certificates and distribute them to
network users. It consists of an HSM (Hardware Security Module), CAs, client,
public and private keys, and a CRL (Certificate Revocation List). An effective
PKI significantly bolsters network security, allowing organizations to eliminate
password-related issues with certificate-based authentication. Once the PKI is
configured, network users can begin enrolling for certificates. This is a
challenging task to complete, but organizations that have used an onboarding
client have had the most success distributing certificates. SecureW2 is able to
provide all the tools needed for a successful PKI deployment and efficient
distribution of certificates. After equipping their devices with a certificate,
users are ready to be authenticated for the wireless network. Beyond secure
wireless authentication, certificates can be used for VPN, Web application
authentication, SSL Inspection security, and much more.

KEY TAKEAWAYS

 * Our JoinNow Connector PKI supplies a robust framework for passwordless
   security to strongly authenticate devices, networks, and apps.


WPA2-ENTERPRISE MANAGED DEVICE CONFIGURATION



Enterprises with managed devices often lack a unified method of getting devices
configured for certificate-driven security. Allowing users to self-configure
often results in many misconfigured devices, and leaving the task to IT can be
mountainous. Configuring dozens, or sometimes even hundreds, of devices manually
for a secure WPA2-Enterprise network is often considered too labor-intensive to
be worthwhile. SecureW2's advanced SCEP and WSTEP gateways provide a means to
auto-enroll managed devices with no end user interaction. In one fell swoop,
these gateways allow an IT department to configure managed devices from any
major vendor for certificate-driven network security.

KEY TAKEAWAYS

 * Use your device management platforms (including IoT) and MDM / EMM platforms
   via JoinNow's APIs to distribute and manage certificates.


RADIUS SERVERS AND POLICY DRIVEN ACCESS CONTROL

The RADIUS server plays a critical role in the network, authenticating every
device when they connect to the network. SecureW2's JoinNow solution comes
built-in with a world-class Cloud RADIUS server, providing powerful,
policy-driven 802.1x authentication. Backed by AWS, it delivers high
availability, consistent and quality connections, and requires no physical
installation. The server can be easily configured and customized to fit any
organizations' requirements, with no forklift upgrades of existing
infrastructure required. Once fully integrated, the certificate-based network is
ready to begin authenticating network users.

SecureW2 also offers an industry-first technology we call Dynamic Cloud RADIUS
that allows the RADIUS to directly reference the directory – even cloud
directories like Google, Azure, and Okta. Instead of making policy decisions
based on static certificates, the RADIUS makes runtime-level policy decisions
based on user attributes stored in the directory.

Dynamic RADIUS is an enhanced RADIUS with better security and easier user
management. Want to know more? Talk to one of our experts to see if your
WPA2-Enterprise network can benefit from Dynamic RADIUS.

The keys to a successful RADIUS deployment are availability, consistency, and
speed. SecureW2's Cloud RADIUS equips organizations with the tools they need to
make the secure network easy to connect to and always available so users are
consistently protected from outside threats.

Ready to take the next step in improving user experience and hardening your
network security? The transition process is easier than you think. Click here if
you'd like to get in touch with one of our experts.

KEY TAKEAWAYS

 * Certificate security requires high-performance authentication - you need to
   implement a cloud-native RADIUS designed for passwordless and cloud
   identity-driven security.


FAQ


CAN A ROUTER BE A RADIUS SERVER?

A router cannot be used as a RADIUS server. In order to achieve its core
function of authenticating other devices on your network, a RADIUS needs to be
its own separate machine dedicated to authentication specifically.


HOW DO I SETUP A RADIUS SERVER AS A WIFI HOTSPOT?

RADIUS servers cannot be used as Wi-Fi hotspots. By definition, a RADIUS server
is its own separate device whose function is to authenticate users and devices
when they access your network. The RADIUS server is not itself an access point -
it simply tells the access point to grant network access to authorized users.


HOW DO I SETUP A WIRELESS RADIUS SERVER?

Setting up a wireless RADIUS server can vary depending on the APs you’re using
and, of course, your RADIUS provider. With Cloud RADIUS, however, it’s
relatively simple and can be completed in several easy steps:

 1. Create a RADIUS profile in your wireless controller.
 2. Navigate to AAA management, then AAA configuration in the SecureW2
    Management Portal.
 3. Note the Primary IP Address, Port, and Shared Secret.
 4. Input this information into the RADIUS profile you created.
 5. Save the new RADIUS profile.

You can learn more about configuring RADIUS with an AP in one of our integration
guides.


HOW DOES WIFI RADIUS AUTHENTICATION WORK?

RADIUS can be described as a virtual bouncer at a virtual gate. When a user
attempts to access your network, the RADIUS server checks that their credentials
or certificates are valid by comparing them to a directory or Certificate
Revocation List.


WHAT IS THE BENEFIT OF RADIUS?

The main benefit to RADIUS is that it makes it possible for users to each use
their own set of credentials to access the Wi-Fi or VPN, as opposed to sharing
credentials. Individual credentials increase security, and if they’re stolen,
the breach can be stopped by changing or revoking the single set of stolen
credentials rather than all of them.


SCHEDULE A DEMO

Sign up for a quick demonstration and see how SecureW2 can make your
organization simpler, faster, and more secure.

Schedule Now


PRICING INFORMATION

Our solutions scale to fit you. We have affordable options for organizations of
any size. Click here to see our pricing.

Check Pricing
Technology Solutions
 * PKI & Certificate Services
    * Managed PKI Solutions
    * Certificate Security for Azure AD & Okta
    * Auto-Enrollment & APIs for Managed Devices
    * YubiKey / Smart Card Management System (SCMS)
    * Desktop Logon via Windows Hello for Business
    * Document Signing
    * SSL Decryption for Firewalls

 * RADIUS AAA
    * Secure Password-less Cloud RADIUS
    * Policy Engine for Cloud Identities
    * Multi-Tenant RADIUS for MSPs

 * Wi-Fi, ZTNA and VPN Security
    * Zero Trust Network Security Solutions
    * Passwordlesss Okta & Azure Security Solutions for Wi-Fi / VPN
    * Secure VPN Authentication
    * EAP-TLS Authentication
    * Eduroam
    * Wired Solutions
    * Preventing Over-the-Air Credential Theft
    * Passpoint / Hotspot 2.0 Enabled 802.1x Solutions
    * BYOD Onboarding

 * Security for Azure
    * Azure VPN Solutions
    * Azure Wi-Fi Security Solutions
    * Azure Solutions for Partners

 * Security for Okta
    * Okta VPN Solutions
    * Okta Wi-Fi Security Solutions
    * Okta Solutions for Partners

Vertical Solutions
 * For Enterprise
 * For SMB
 * For Higher Education
 * For K12
 * For Service Providers

Products
 * JoinNow Connector PKI
 * JoinNow MultiOS
 * JoinNow Cloud RADIUS
 * JoinNow NetAuth

Resources
 * Documentation
 * WPA2 and 802.1x Simplified
 * PKI Explained
 * PEAP-MSCHAPv2 Vulnerability
 * Pitfalls of EAP-TTLS-PAP

Contact Us
 * North America Sales
   +1 888 363-3824
   +1 512 900-5515
 * UK, Europe and Middle East Sales
   +44 20 3912 9916
 * ISO 27001 Certified
   

Support
 * Submit a Support Ticket
 * Log In
 * Careers

Partners
 * 
 * 
 * 

All logos and trademarks are the property of their respective owners. 2023
SecureW2 Privacy Policy

We use cookies to provide the best user experience possible on our website. If
you would like to learn more click here. Accept
Privacy & Cookies Policy
Close

PRIVACY OVERVIEW

This website uses cookies to improve your experience while you navigate through
the website. Out of these, the cookies that are categorized as necessary are
stored on your browser as they are essential for the working of basic
functionalities of the ...
Necessary
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly.
This category only includes cookies that ensures basic functionalities and
security features of the website. These cookies do not store any personal
information.
Non-necessary
Non-necessary
Any cookies that may not be particularly necessary for the website to function
and is used specifically to collect user personal data via analytics, ads, other
embedded contents are termed as non-necessary cookies. It is mandatory to
procure user consent prior to running these cookies on your website.
SAVE & ACCEPT