Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!

Blogs

  • How to Integrate with Entra ID For Effective Certificate Management

    The transition from on-premise Active Directory (AD) to cloud-based Azure AD (Microsoft Entra ID) can be tricky, leaving Azure admins searching for an easy way to migrate. Unlike AD, there isn’t a straightforward solution for deploying 802.1x authentication on Azure ...

    Read More
  • How to Configure Dynamic VLAN for EAP-TLS

    Researching and implementing new cybersecurity technologies is a vital aspect of maintaining an effective network for your organization. But transitioning to more up to date security measures often comes with growing pains. Ensuring the network operates smoothly to specifications can ...

    Read More
  • Benefits of Digital Certificates For Secure Eduroam Wi-Fi

    Eduroam has become crucial for colleges worldwide, providing students and staff with seamless, cross-campus Wi-Fi connectivity. However, as more institutions use Eduroam as their principal Wi-Fi network, security and accessibility problems emerge, particularly for networks that use the Protected Extensible ...

    Read More
  • Certificate Lifetimes – Is 20 Years Too long?

    Over the last few years, software makers have begun cracking down on certificates that do not expire soon enough. Most browsers will reject any SSL certificate with a lifetime longer than 39 months. This may seem like a long time, ...

    Read More
  • Can I Use OAuth 2 With ADFS?

    What is ADFS? Active Directory Federation Service (ADFS) is a software component developed by Microsoft to provide Single Sign-On (SSO) authorization services to users on Windows Server Operating Systems. ADFS allows users across organizational boundaries to access applications on Windows ...

    Read More
  • Best EAP Method to Configure a Secure WiFi Network

    Extensible Authentication Protocol (EAP) is a strong security layer and authentication framework used in Wi-Fi networks. It provides various methods to verify the identities of users and devices before granting access. These methods include wireless access using IEEE 802.1X, wired ...

    Read More
  • The Importance of Device Attestation for Zero Trust

    Here, you can learn the concepts of device trust and cryptographic principles of attestation in ensuring security of your organization.

    Read More
  • Adding a Trusted Root Certificate Authority to Group Policy Objects

    Organizations that want the best in authentication security should look no further than certificate-based authentication. When compared to using credentials for authentication, it’s simply no contest. The two pillars supported by certificates are efficiency and security. A certificate-based network can ...

    Read More
  • PKI Smart Card Authentication for Enterprise

    Companies and governments around the world are finding more and more uses for PKI smart cards – especially for identity management. These tiny chips can be found in a multitude of applications ranging from ID cards, credit/debit cards, SIM cards, ...

    Read More