Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!

Blogs

  • Can I Use OAuth 2 With ADFS?

    What is ADFS? Active Directory Federation Service (ADFS) is a software component developed by Microsoft to provide Single Sign-On (SSO) authorization services to users on Windows Server Operating Systems. ADFS allows users across organizational boundaries to access applications on Windows ...

    Read More
  • Best EAP Method to Configure a Secure WiFi Network

    Extensible Authentication Protocol (EAP) is a strong security layer and authentication framework used in Wi-Fi networks. It provides various methods to verify the identities of users and devices before granting access. These methods include wireless access using IEEE 802.1X, wired ...

    Read More
  • The Importance of Device Attestation for Zero Trust

    Here, you can learn the concepts of device trust and cryptographic principles of attestation in ensuring security of your organization.

    Read More
  • Adding a Trusted Root Certificate Authority to Group Policy Objects

    Organizations that want the best in authentication security should look no further than certificate-based authentication. When compared to using credentials for authentication, it’s simply no contest. The two pillars supported by certificates are efficiency and security. A certificate-based network can ...

    Read More
  • PKI Smart Card Authentication for Enterprise

    Companies and governments around the world are finding more and more uses for PKI smart cards – especially for identity management. These tiny chips can be found in a multitude of applications ranging from ID cards, credit/debit cards, SIM cards, ...

    Read More
  • You Don’t Need LDAP for 802.1X Anymore

    Without protection, your organization’s network is vulnerable to cyber attacks. The 802.1X protocol heightens network security by introducing RADIUS servers for authentication, and Lightweight Directory Access Protocol (LDAP) has commonly been used alongside RADIUS due to its ability to quickly ...

    Read More
  • Using Multi-Factor Authentication for Network Security

    Many inquiries that we receive reference Multi-Factor Authentication (MFA) and how it can be used to improve the network security. MFA is a process that requires more than one form of identity to authenticate a user and approve network access. ...

    Read More
  • How to Check if a Digital Certificate is Revoked

    A critical component of EAP-TLS certificate-based authentication is properly managing certificates, which includes confirming that they have been properly revoked AND placed on the list of revoked certificates so the RADIUS server is aware of the new status of the ...

    Read More