SlideShare a Scribd company logo
2
Most read
8
Most read
10
Most read
EAP-TLS
KARRI HUHTANEN
RADIATOR SOFTWARE OY
Background
I have been working with RADIUS based roaming since 2002, eduroam from
2003 — first as a researcher at Tampere University of Technology.

Founded a company called Arch Red to do Wi-Fi authentication and
roaming. Arch Red is running Finnish top-level RADIUS servers for CSC/
Funet as a production service since 2004.

Arch Red worked as a reseller for Open System Consultants’ Radiator
product since 2003. Later we did consultation, support and integration
under Open System Consultants’ brand.

In 2013 Arch Red acquired Open System Consultants and the Radiator
product.

Arch Red changed its name to Radiator Software and nowadays we focus in
developing Radiator AAA server products and services for our customers.
EAP-TLS is easy …
… for RADIUS server. At the minimum one needs only to
configure RADIUS server certificate and the CA certificate for
client certificate verification.

… to configure improperly. Understanding how certificates,
certificate revocation, root and intermediate CAs, PKI etc works
requires significant effort. Designing and deploying working
model requires even more.

… only when one does not need to care about the client
certificates, their configuration, provisioning and
management.
Deploying EAP-TLS
never start or settle requirements because of a product, solution
or technology
start with defining and designing
policies (validity, expiry times, authorisation, usage …)

PKI (hierarchy: CAs, intermediate CAs, certificate usage …)

configuration management
certificate provisioning
certificate requirements (roaming, use, technology …)

… but do pilot /trials simultaneously to learn and to see how
things do (or do not) work or scale with real users and
infrastructure
Start with simple trial …
Try self-signed CA, manually created
client certificates first (or Radiator’s
certificates directory)

eduroam managed IdP as a service for
roaming EAP-TLS tests

Verify first that your underlying network
and especially firewalls and their rules
work when using EAP-TLS

Firewalls filtering UDP fragments and
especially *BSD firewalls (scrub setting)
can cause problems.
Federation
Level
RADIUS
IdP/SP
RADIUS
Wi-Fi
network
(controller)
Client
devices
fragmentation
breaking
points
Why? Because network level has a lot to test…
Large certificates, long certificate chains can cause network
devices to fragment EAP-TLS authentication in different ways.

Firewalls configured to analyse/assemble or drop UDP/
RADIUS fragments may cause TLS communication to fail.

TLS communication failures can only be logged / detected in
the end user device or home organisation RADIUS.
eduroam managed IdP uses smaller elliptic curve based
certificates => does not proof that all certificates work
Radiator tips: EAPTLS_TraceState (for TLS debugging),
EAPTLS_MaxFragmentSize (adjust TLS max fragment size)
Add basic automatic certificate validation…
a separate Certificate Authority (CA) capable
of providing certificate revocation lists
(CRLs) or function as a Online Certificate
Status Protocol (OCSP) server is needed

several open source CAs/PKIs available:
easypki, dogtag, ejbca …

with this setup one can ensure that when
certificates expire, they do not work for
authentication anymore

automating the certificate validity check is
essential for using certificate authentication
Federation
Level
RADIUS
IdP/SP
RADIUS
Wi-Fi
network
(controller)
Certificate
Authority
(CA)
OCSP reqs.
CRLs, delta-
CRLs
Certificates
Tips and tricks with CAs and PKI…
The PKI on the left is designed and
implemented correctly.

The differences in the client, server and
service implementations cause
problems in practice.

Some problems can be solved by
using separate self-signed root CAs
instead of hierarchy.

Radiator tips:
EAPTLS_CAPartialChain (partial CA
chain), wide OCSP (stapling), CRL,
delta-CRL and customised certificate
check support
Root
Certificate
Authority
(CA)
Intermediate
Certificate
Authorities
RADIUS
server
certificate
client
device
certificate
personal
certificate
PersonsClient
Devices
Services
Problem: The client cannot check
partial certificate chain (or cannot
or is not configured to check
certificate details).
Problem: The RADIUS server
cannot check partial
certificate chain for client
certificate.
Problem: The CA cannot be
configured to issue
certificates with routable
realms.
Add connection to authorisation database…
Authorisation database can be Active
Directory, LDAP, SQL with additional
information about the client certificate.

CA, CRLs and OCSP can be sometimes
replaced by client certificate check
against the authorisation database.

Authorisation database can contain
additional information such as VLAN
assignments, account active/locked etc.

How flexible/complex/simple the
authorisation checks can be depends on
the IdP RADIUS product.
Federation
Level
RADIUS
IdP
RADIUS
Wi-Fi
network
(controller)
Certificate
Authority
(CA)
OCSP reqs.
CRLs, delta-
CRLs
Certificates
LDAP,
SQL,
etc.
IdP
Authorisation
Database
(AD, LDAP,
SQL)
<Handler Realm=/^karrin.net$/>
Identifier AUTH-HANDLER-KARRIN-NET
AccountingAccepted
<AuthBy SQL>
Identifier AUTH-HANDLER-KARRIN-NET-AUTHBY-SQL
DBSource dbi:SQLite:dbname=/etc/radiator/userdb.sqlite3
AuthSelect SELECT PASSWORD,CHECKATTR,REPLYATTR FROM USERIDS WHERE
USERID=? AND STATUS='ACTIVE'
AuthSelectParam %0
AuthColumnDef 0, User-Password, check
AuthColumnDef 1, GENERIC, check
AuthColumnDef 2, GENERIC, reply
NoDefault
#EAPTLS_TraceState
#EAPType TLS,PEAP
EAPType TLS,TTLS,PEAP
EAPTLS_CertificateType PEM
#EAPTLS_Protocols TLSv1.2
EAPTLS_CAFile %D/certificates/karrin-net-people-ca.crt
# allow partial chain (whole CA chain is not validated)
EAPTLS_CAPartialChain
EAPTLS_CertificateChainFile %D/certificates/wifi.karrin.net-bundle.crt
EAPTLS_PrivateKeyFile %D/certificates/wifi.karrin.net.key
EAPTLS_MaxFragmentSize 1000
EAPAnonymous %0
EAPTLS_CopyToInnerRequest NAS-IP-Address, NAS-Identifier, NAS-Port,
Calling-Station-Id, Called-Station-Id, Operator-Name, Chargeable-User-Identity
AutoMPPEKeys
</AuthBy>
AuthLog AUTHLOG-FILE
AcctLog ACCTLOG-FILE
</Handler>
sqlite> .schema userids
CREATE TABLE USERIDS(
USERID TEXT NOT NULL,
PASSWORD TEXT NOT NULL,
CHECKATTR TEXT,
REPLYATTR TEXT,
STATUS TEXT NOT NULL);
CREATE INDEX IDX_USERID ON USERIDS(USERID);
CREATE INDEX IDX_USERID_STATUS ON
USERIDS(USERID,STATUS);
sqlite> select * from userids;
kh+ipad@karrin.net|********||Tunnel-
Type=1:VLAN,Tunnel-Medium-Type=1:Ether_802,Tunnel-
Private-Group-ID=1:64|ACTIVE
kh+nexus6@karrin.net|********||Tunnel-
Type=1:VLAN,Tunnel-Medium-Type=1:Ether_802,Tunnel-
Private-Group-ID=1:64|ACTIVE
kh+exopc@karrin.net|********||Tunnel-Medium-
Type=1:Ether_802,Tunnel-Private-Group-ID=1:128|ACTIVE
kh+exopc2@karrin.net|********||Tunnel-Medium-
Type=1:Ether_802,Tunnel-Private-Group-ID=1:256|ACTIVE
Radiator EAP-TLS handler and
sqlite3 authorisation database
for certificate authentication and
dynamic VLAN selection.
Deploy certificate management service…
Properly distributing and configuring
certificates in the end user devices is
difficult.

For managed devices (Windows domain/
Intune) or for Apple devices it is easier,
but Android/Linux devices are hard.

Currently there seems to be no better
approach than to have an app in the
device talking to a service.

One commercial option is SecureW2.

Certificate signing requests created in
the actual device are even harder.
IdP
RADIUS
Wi-Fi
network
(controller)
Certificate
Management
Service
OCSP reqs.
CRLs, delta-
CRLs
Certificates
LDAP,
SQL,
etc.
IdP
Authorisation
Database
(AD, LDAP,
SQL)
Certificate
(signing)
requests
Certificate
request
authorisation
requests
… and you are done… sort of … maybe …
If everything presented before works for you, it’s brilliant … and
you are brilliant.

Unfortunately any organisation who does not have the first step
right will break your organisation’s users’ roaming.

Sometimes even the packet filters / firewalls in front of federation
level RADIUS servers need configuration adjustments.

Deploying certificate based authentication requires design,
competence and support from infrastructure and service
vendors — choose wisely, select vendors and solutions, for
which you can get support for design, deployment and
production.
Questions?
Find this presentation and more from:
https://blog.radiatorsoftware.com/
https://slideshare.net/radiatorsoftware/
https://slideshare.net/khuhtanen/
https://twitter.com/OSCRadiator
This presentation will be presented second time in the JISC govroam stakeholders’ meeting
(23rd of October 2019 in London, United Kingdom)

More Related Content

PDF
Routing host certificates in eduroam/govroam
PDF
Routing host certificates in eduroam
PDF
TLS and Certificates
PDF
PDF
Security issues in RADIUS based Wi-Fi AAA
ODP
AAA in a nutshell
PDF
radius dhcp dot1.x (802.1x)
PDF
AAA & RADIUS Protocols
Routing host certificates in eduroam/govroam
Routing host certificates in eduroam
TLS and Certificates
Security issues in RADIUS based Wi-Fi AAA
AAA in a nutshell
radius dhcp dot1.x (802.1x)
AAA & RADIUS Protocols

What's hot (20)

PDF
Ieee 802.1 x
PPT
Ali shahbazi khojasteh dot1X
PPT
Implementing 802.1x Authentication
PPTX
PIW ISE best practices
PDF
At8000 s configurando_8021x
PPT
10215 A 14
PPTX
Build and Operate Your Own Certificate Management Center of Mediocrity
PPT
RADIUS
PPTX
802.1x Authentication Standard
PPT
Implementing Cisco AAA
PPSX
NetScaler 11 Update
PPTX
The Future of PKI. Using automation tools and protocols to bootstrap trust in...
PDF
Cisco acs configuration guide
PDF
An introduction to X.509 certificates
RTF
Kerberos case study
PPT
Kerberos
PPTX
Kerberos protocol
PDF
The Three Musketeers (Authentication, Authorization, Accounting)
PPTX
Kerberos : An Authentication Application
DOCX
Palo Alto Networks PANOS 5.0 Radius Authentication OTP using Yubikey
Ieee 802.1 x
Ali shahbazi khojasteh dot1X
Implementing 802.1x Authentication
PIW ISE best practices
At8000 s configurando_8021x
10215 A 14
Build and Operate Your Own Certificate Management Center of Mediocrity
RADIUS
802.1x Authentication Standard
Implementing Cisco AAA
NetScaler 11 Update
The Future of PKI. Using automation tools and protocols to bootstrap trust in...
Cisco acs configuration guide
An introduction to X.509 certificates
Kerberos case study
Kerberos
Kerberos protocol
The Three Musketeers (Authentication, Authorization, Accounting)
Kerberos : An Authentication Application
Palo Alto Networks PANOS 5.0 Radius Authentication OTP using Yubikey
Ad

Similar to EAP-TLS (extended version) (20)

PDF
RADIUS in Action: Securing, Monitoring and Protecting Network Infrastructure
PDF
RADIUS in Action: Securing, Monitoring and Protecting Network Infrastructure
PPT
E Snet Raf Essc Jan2005
PDF
8021x feature config_guide
PPTX
Diameter Presentation
PDF
TekRADIUS applications
PDF
Wi-Fi Roaming Security and Privacy
PDF
Disobey 2024: Karri Huhtanen: Wi-Fi Roaming Security and Privacy
DOCX
AAA server
PPTX
Oralce SSL walelt -TCPS_Troubleshooting_PB.pptx
PPTX
Sem cis ise
PPTX
SDWAN Concept - Certificate and keys Roles in Controllers and vEdge Router Au...
PDF
Computer Security - CCNA Security - Lecture 2
PPTX
SVR402: DirectAccess Technical Drilldown, Part 2 of 2: Putting it all together.
PDF
Basic Network Support Certification
PDF
Private cloud networking_cloudstack_days_austin
PDF
siemens-tcp-ip-ethernet-manual.pdf
PPTX
Keystone - Openstack Identity Service
PDF
IEEE 802.1X and Axis’ Implementation
PPT
Securing Network Access with Open Source solutions
RADIUS in Action: Securing, Monitoring and Protecting Network Infrastructure
RADIUS in Action: Securing, Monitoring and Protecting Network Infrastructure
E Snet Raf Essc Jan2005
8021x feature config_guide
Diameter Presentation
TekRADIUS applications
Wi-Fi Roaming Security and Privacy
Disobey 2024: Karri Huhtanen: Wi-Fi Roaming Security and Privacy
AAA server
Oralce SSL walelt -TCPS_Troubleshooting_PB.pptx
Sem cis ise
SDWAN Concept - Certificate and keys Roles in Controllers and vEdge Router Au...
Computer Security - CCNA Security - Lecture 2
SVR402: DirectAccess Technical Drilldown, Part 2 of 2: Putting it all together.
Basic Network Support Certification
Private cloud networking_cloudstack_days_austin
siemens-tcp-ip-ethernet-manual.pdf
Keystone - Openstack Identity Service
IEEE 802.1X and Axis’ Implementation
Securing Network Access with Open Source solutions
Ad

More from Karri Huhtanen (20)

PDF
Fault-tolerant, distrbuted AAA architecture supporting connectivity disruption
PDF
SIM Authentication Architectures and Interfaces
PDF
OpenRoaming and CapPort
PDF
Suomen eduroam-juuripalvelun uudistukset
PDF
Adding OpenRoaming to existing IdP and roaming federation service
PDF
OpenRoaming -- Wi-Fi Roaming for All
PDF
Beyond eduroam: Combining eduroam, (5G) SIM authentication and OpenRoaming
PDF
Cooperative labs, testbeds and networks
PDF
Privacy and traceability in Wi-Fi networks
PDF
What is Network Function Virtualisation (NFV)?
PDF
What is Network Function Virtualisation (NFV)?
PDF
Building secure, privacy aware, quality Wi-Fi coverage via cooperation
PDF
Connecting the Dots: Integrating RADIUS to Network Measurement and Monitoring
PDF
Building city and nationwide Wi-Fi coverage via cooperation
PDF
eduroam diagnostics in NTLR, IdPs and SPs
PDF
Using NoSQL databases to store RADIUS and Syslog data
PDF
Open WiFi or Broken WiFi?
PDF
Cloud Based Identity Management
PDF
eduroam ennen, nyt ja tulevaisuudessa
PDF
Joukkoliikennedatan ongelmat ja ratkaisuja
Fault-tolerant, distrbuted AAA architecture supporting connectivity disruption
SIM Authentication Architectures and Interfaces
OpenRoaming and CapPort
Suomen eduroam-juuripalvelun uudistukset
Adding OpenRoaming to existing IdP and roaming federation service
OpenRoaming -- Wi-Fi Roaming for All
Beyond eduroam: Combining eduroam, (5G) SIM authentication and OpenRoaming
Cooperative labs, testbeds and networks
Privacy and traceability in Wi-Fi networks
What is Network Function Virtualisation (NFV)?
What is Network Function Virtualisation (NFV)?
Building secure, privacy aware, quality Wi-Fi coverage via cooperation
Connecting the Dots: Integrating RADIUS to Network Measurement and Monitoring
Building city and nationwide Wi-Fi coverage via cooperation
eduroam diagnostics in NTLR, IdPs and SPs
Using NoSQL databases to store RADIUS and Syslog data
Open WiFi or Broken WiFi?
Cloud Based Identity Management
eduroam ennen, nyt ja tulevaisuudessa
Joukkoliikennedatan ongelmat ja ratkaisuja

Recently uploaded (20)

PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Machine Learning_overview_presentation.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPT
Teaching material agriculture food technology
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
1. Introduction to Computer Programming.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPTX
A Presentation on Artificial Intelligence
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Tartificialntelligence_presentation.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
OMC Textile Division Presentation 2021.pptx
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
TLE Review Electricity (Electricity).pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Encapsulation theory and applications.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Machine Learning_overview_presentation.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
Teaching material agriculture food technology
Per capita expenditure prediction using model stacking based on satellite ima...
1. Introduction to Computer Programming.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Assigned Numbers - 2025 - Bluetooth® Document
A Presentation on Artificial Intelligence
Unlocking AI with Model Context Protocol (MCP)
Tartificialntelligence_presentation.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
OMC Textile Division Presentation 2021.pptx
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
A comparative analysis of optical character recognition models for extracting...
Spectral efficient network and resource selection model in 5G networks
TLE Review Electricity (Electricity).pptx
Network Security Unit 5.pdf for BCA BBA.
Encapsulation_ Review paper, used for researhc scholars
Encapsulation theory and applications.pdf

EAP-TLS (extended version)

  • 2. Background I have been working with RADIUS based roaming since 2002, eduroam from 2003 — first as a researcher at Tampere University of Technology. Founded a company called Arch Red to do Wi-Fi authentication and roaming. Arch Red is running Finnish top-level RADIUS servers for CSC/ Funet as a production service since 2004. Arch Red worked as a reseller for Open System Consultants’ Radiator product since 2003. Later we did consultation, support and integration under Open System Consultants’ brand. In 2013 Arch Red acquired Open System Consultants and the Radiator product. Arch Red changed its name to Radiator Software and nowadays we focus in developing Radiator AAA server products and services for our customers.
  • 3. EAP-TLS is easy … … for RADIUS server. At the minimum one needs only to configure RADIUS server certificate and the CA certificate for client certificate verification. … to configure improperly. Understanding how certificates, certificate revocation, root and intermediate CAs, PKI etc works requires significant effort. Designing and deploying working model requires even more. … only when one does not need to care about the client certificates, their configuration, provisioning and management.
  • 4. Deploying EAP-TLS never start or settle requirements because of a product, solution or technology start with defining and designing policies (validity, expiry times, authorisation, usage …) PKI (hierarchy: CAs, intermediate CAs, certificate usage …) configuration management certificate provisioning certificate requirements (roaming, use, technology …) … but do pilot /trials simultaneously to learn and to see how things do (or do not) work or scale with real users and infrastructure
  • 5. Start with simple trial … Try self-signed CA, manually created client certificates first (or Radiator’s certificates directory) eduroam managed IdP as a service for roaming EAP-TLS tests Verify first that your underlying network and especially firewalls and their rules work when using EAP-TLS Firewalls filtering UDP fragments and especially *BSD firewalls (scrub setting) can cause problems. Federation Level RADIUS IdP/SP RADIUS Wi-Fi network (controller) Client devices fragmentation breaking points
  • 6. Why? Because network level has a lot to test… Large certificates, long certificate chains can cause network devices to fragment EAP-TLS authentication in different ways. Firewalls configured to analyse/assemble or drop UDP/ RADIUS fragments may cause TLS communication to fail. TLS communication failures can only be logged / detected in the end user device or home organisation RADIUS. eduroam managed IdP uses smaller elliptic curve based certificates => does not proof that all certificates work Radiator tips: EAPTLS_TraceState (for TLS debugging), EAPTLS_MaxFragmentSize (adjust TLS max fragment size)
  • 7. Add basic automatic certificate validation… a separate Certificate Authority (CA) capable of providing certificate revocation lists (CRLs) or function as a Online Certificate Status Protocol (OCSP) server is needed several open source CAs/PKIs available: easypki, dogtag, ejbca … with this setup one can ensure that when certificates expire, they do not work for authentication anymore automating the certificate validity check is essential for using certificate authentication Federation Level RADIUS IdP/SP RADIUS Wi-Fi network (controller) Certificate Authority (CA) OCSP reqs. CRLs, delta- CRLs Certificates
  • 8. Tips and tricks with CAs and PKI… The PKI on the left is designed and implemented correctly. The differences in the client, server and service implementations cause problems in practice. Some problems can be solved by using separate self-signed root CAs instead of hierarchy. Radiator tips: EAPTLS_CAPartialChain (partial CA chain), wide OCSP (stapling), CRL, delta-CRL and customised certificate check support Root Certificate Authority (CA) Intermediate Certificate Authorities RADIUS server certificate client device certificate personal certificate PersonsClient Devices Services Problem: The client cannot check partial certificate chain (or cannot or is not configured to check certificate details). Problem: The RADIUS server cannot check partial certificate chain for client certificate. Problem: The CA cannot be configured to issue certificates with routable realms.
  • 9. Add connection to authorisation database… Authorisation database can be Active Directory, LDAP, SQL with additional information about the client certificate. CA, CRLs and OCSP can be sometimes replaced by client certificate check against the authorisation database. Authorisation database can contain additional information such as VLAN assignments, account active/locked etc. How flexible/complex/simple the authorisation checks can be depends on the IdP RADIUS product. Federation Level RADIUS IdP RADIUS Wi-Fi network (controller) Certificate Authority (CA) OCSP reqs. CRLs, delta- CRLs Certificates LDAP, SQL, etc. IdP Authorisation Database (AD, LDAP, SQL)
  • 10. <Handler Realm=/^karrin.net$/> Identifier AUTH-HANDLER-KARRIN-NET AccountingAccepted <AuthBy SQL> Identifier AUTH-HANDLER-KARRIN-NET-AUTHBY-SQL DBSource dbi:SQLite:dbname=/etc/radiator/userdb.sqlite3 AuthSelect SELECT PASSWORD,CHECKATTR,REPLYATTR FROM USERIDS WHERE USERID=? AND STATUS='ACTIVE' AuthSelectParam %0 AuthColumnDef 0, User-Password, check AuthColumnDef 1, GENERIC, check AuthColumnDef 2, GENERIC, reply NoDefault #EAPTLS_TraceState #EAPType TLS,PEAP EAPType TLS,TTLS,PEAP EAPTLS_CertificateType PEM #EAPTLS_Protocols TLSv1.2 EAPTLS_CAFile %D/certificates/karrin-net-people-ca.crt # allow partial chain (whole CA chain is not validated) EAPTLS_CAPartialChain EAPTLS_CertificateChainFile %D/certificates/wifi.karrin.net-bundle.crt EAPTLS_PrivateKeyFile %D/certificates/wifi.karrin.net.key EAPTLS_MaxFragmentSize 1000 EAPAnonymous %0 EAPTLS_CopyToInnerRequest NAS-IP-Address, NAS-Identifier, NAS-Port, Calling-Station-Id, Called-Station-Id, Operator-Name, Chargeable-User-Identity AutoMPPEKeys </AuthBy> AuthLog AUTHLOG-FILE AcctLog ACCTLOG-FILE </Handler> sqlite> .schema userids CREATE TABLE USERIDS( USERID TEXT NOT NULL, PASSWORD TEXT NOT NULL, CHECKATTR TEXT, REPLYATTR TEXT, STATUS TEXT NOT NULL); CREATE INDEX IDX_USERID ON USERIDS(USERID); CREATE INDEX IDX_USERID_STATUS ON USERIDS(USERID,STATUS); sqlite> select * from userids; kh+ipad@karrin.net|********||Tunnel- Type=1:VLAN,Tunnel-Medium-Type=1:Ether_802,Tunnel- Private-Group-ID=1:64|ACTIVE kh+nexus6@karrin.net|********||Tunnel- Type=1:VLAN,Tunnel-Medium-Type=1:Ether_802,Tunnel- Private-Group-ID=1:64|ACTIVE kh+exopc@karrin.net|********||Tunnel-Medium- Type=1:Ether_802,Tunnel-Private-Group-ID=1:128|ACTIVE kh+exopc2@karrin.net|********||Tunnel-Medium- Type=1:Ether_802,Tunnel-Private-Group-ID=1:256|ACTIVE Radiator EAP-TLS handler and sqlite3 authorisation database for certificate authentication and dynamic VLAN selection.
  • 11. Deploy certificate management service… Properly distributing and configuring certificates in the end user devices is difficult. For managed devices (Windows domain/ Intune) or for Apple devices it is easier, but Android/Linux devices are hard. Currently there seems to be no better approach than to have an app in the device talking to a service. One commercial option is SecureW2. Certificate signing requests created in the actual device are even harder. IdP RADIUS Wi-Fi network (controller) Certificate Management Service OCSP reqs. CRLs, delta- CRLs Certificates LDAP, SQL, etc. IdP Authorisation Database (AD, LDAP, SQL) Certificate (signing) requests Certificate request authorisation requests
  • 12. … and you are done… sort of … maybe … If everything presented before works for you, it’s brilliant … and you are brilliant. Unfortunately any organisation who does not have the first step right will break your organisation’s users’ roaming. Sometimes even the packet filters / firewalls in front of federation level RADIUS servers need configuration adjustments. Deploying certificate based authentication requires design, competence and support from infrastructure and service vendors — choose wisely, select vendors and solutions, for which you can get support for design, deployment and production.
  • 13. Questions? Find this presentation and more from: https://blog.radiatorsoftware.com/ https://slideshare.net/radiatorsoftware/ https://slideshare.net/khuhtanen/ https://twitter.com/OSCRadiator This presentation will be presented second time in the JISC govroam stakeholders’ meeting (23rd of October 2019 in London, United Kingdom)