Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!

Blogs

  • Azure AD Conditional Access with 802.1X

    The post-pandemic world is witnessing an exponential surge in cloud-based network solutions as many businesses transition into digital mode. Interestingly, many cutting-edge wireless technologies like 5G, virtual reality, and AI are also changing the pattern of data consumption with each ...

    Read More
  • Device Authentication with User Attributes for Cloud Directories

    When users and devices authenticate to your network, you should ideally have as much information from them as possible to make context-rich security decisions. Certificate-based authentication (CBA) empowers administrators to make those decisions by providing a detailed snapshot of each ...

    Read More
  • [Solved] Jamf Casper Certificate Error

    Apple devices and gadgets have been unparalleled in cutting-edge technology and customer satisfaction over the years. In a recent interview, the CIO of Jamf Linh Lam predicted Apple to reach the pinnacle of enterprise endpoint by 2030. On a similar ...

    Read More
  • Auto-Enrolling Certificates in Jamf

    Jamf customers experience a number of benefits by centralizing their device and authentication system under one roof. But Jamf doesn’t have the capability to handle the entire authentication process. An effective compromise is to combine Jamf with third-party solutions to ...

    Read More
  • Digital Signatures: Explained

    An effective Zero Trust architecture is built on a foundation of identity context. Digital signatures support a Zero Trust initiative by cryptographically assuring the identity of the signee, answering questions such as: “How do you know if the person who ...

    Read More
  • [Solved] Okta Sign-in Error

    Okta is one of the leading identity and authentication platforms compatible with both cloud and on-premise directories. They provide a great user experience and support, but you may still run into errors from time to time. These errors can provide ...

    Read More
  • Cloud 802.1x Explained

    What Is Cloud 802.1x? An 802.1x network is unique in one major way; it uses a Cloud RADIUS server as a means of authenticating users. The Cloud RADIUS checks a user’s credentials to see if they are an active member ...

    Read More
  • What is Certificate Lifecycle Management?

    Using X.509 digital certificates for authentication is an immediate and significant upgrade to credential (password) authentication, but it requires proper support infrastructure. Certificate Lifecycle Management systems (CLM/CLMS), also called Certificate Management Systems (CMS), provide that support. They allow admins to ...

    Read More
  • The Anatomy Of An X.509 Digital Certificate

    Digital certificates are frequently used in the online world as a means of identification. The information embedded in the certificates lets anyone verify the identity of an entity with the utmost assurance that they are who they claim to be. ...

    Read More
  • Code Signing with Digital Certificates: Explained

    Imagine you’re installing an application and a pop-up like the screenshot above comes up. How can you be sure that the application you’re about to download is really safe? The answer is code signing certificates, which attest that the software ...

    Read More