Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!

Blogs

  • Use Azure AD B2C for 802.1x Authentication

    Microsoft employs a myriad of acronyms for their product names, so it’s often difficult to tell them apart or to guess their function. “Azure AD (Microsoft Entra ID) B2C” is one such product. It doesn’t have a very information-rich name; ...

    Read More
  • What Is RADIUS Redundancy?

    In all manner of security, redundancy is strength. It’s a way to ensure that no matter what goes wrong, there is a backup plan in action that can certify safety. Network security is no different; a properly redundant RADIUS server ...

    Read More
  • Multi-Factor Authentication for Okta VPN

    When it comes to authentication security, one of the simplest upgrades you can make that will drastically improve your network’s safety is to implement Multi-Factor Authentication (MFA). Simply put, MFA is any security system that requires multiple forms of identification ...

    Read More
  • How to Use VPN With Azure AD

    As cloud-based solutions are gaining popularity, many organizations are having trouble transitioning to their on-prem servers. To help alleviate some stress, Microsoft created Azure AD (Microsoft Entra ID) to aid clients in moving their AD instance to the cloud. However, ...

    Read More
  • Okta SSO With Certificate Authentication

    A major issue that organizations face for authentication is managing different credentials for various web applications. Traditionally, web app authentication requires a unique and complex set of credentials to ensure only those with approved access can log in. However, this ...

    Read More
  • Okta Vs. LDAP

    For many years, LDAP has been the dominant protocol for secure user authentication for on-premise directories. Organizations have used LDAP to store and retrieve data from directory services and it is a critical part of the Active Directory (AD) ecosystem. ...

    Read More
  • User Lookup With Certificate-Based Authentication

    Traditionally, the process of authenticating certificates for network access is independent of the user directory. And in a normally-functioning network environment, this is perfectly acceptable. Certificate-based authentication is ironclad and protects the network from unauthorized entry. Only in very rare, ...

    Read More
  • Dynamic RADIUS Policy Enforcement with Static Certificates

    Certificate-based WPA2-Enterprise networks are extremely secure, but x.509 digital certificates can be a hassle to manage. Although SecureW2 has one of the best certificate management platforms in the industry, we’re always looking for ways to make EAP-TLS authentication safer and ...

    Read More
  • A Cloud PKI Solution for Azure AD

    Azure AD (Microsoft Entra ID) customers can ditch password-based authentication and switch to x.509 certificate-based authentication. Digital certificates offer vast improvements to network security, efficiency, and user experience. But in order to deploy certificates, organizations will need to implement a ...

    Read More
  • Active Directory Vs. LDAP

    Active Directory (AD) and Lightweight Directory Access Protocol (LDAP) are two terms frequently used regarding directory services. These solutions are essential frameworks for managing user identities, resources, and network configurations in an IT infrastructure. While LDAP is a standardized protocol ...

    Read More