Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!
Case Studies

Antelope Valley USD Union High School Protects Their VPN from Attack with Certificates

Device Onboarding
Google
Jamf
K-12
MDM
PKI
Wi-Fi
Case Study Hero BG

Deployment Timeline

Dan, the Information Systems Director of Antelope Valley High School, never liked using a password to secure his school’s Wi-Fi network to begin with. He’d known for a long time that Pre-Shared Key (PSK) networks simply aren’t as secure as other alternatives.

When a student brought in a hacking tool and grabbed the encrypted password over-the-air one day, he knew he had to make a change. After reaching out to a few different vendors, including Meraki, Dan contacted SecureW2 in October of 2023. After some discussion with our team, they were able to deploy quickly over winter break in December.

Remembering the beginning of his search for a solution, Dan recalled:

Quote Left Icon
We went through all sorts of alternatives trying to find an answer. We talked to Meraki and they didn’t have what I would consider a real solution. Then I stumbled across SecureW2, and it was like the only site that had answers for the issues we were facing.
Dan, the Information Systems Director

Challenges

The Antelope Valley High School District has a large number of students and devices. One of the greatest challenges Dan faces is the sheer number of managed 1:1 devices the district has; with well over 40,000 Chromebooks and other devices to manage, he simply didn’t have time to configure them all.

The student password-hacking incident was a major motivator for moving away from a PSK network, but Dan also understood that having to manually configure each Chromebook would take too much of the already little time he had. On top of that, he had concerns about the school’s VPN. Although they didn’t have as many devices on the VPN, he didn’t want to leave it open to the same kind of hack that the Wi-Fi had already endured.

Quote Left Icon
Working in education, everything is a compromise. Basically, you do the best you can to lock everything down as best you can
Dan, the Information Systems Director

Finally, there was the challenge of the school’s infrastructure to consider. While many organizations have moved much of their infrastructure to the cloud, AVHSD has an on-premise Active Directory server it needs. Any solution they implemented would have to be capable of integrating with their existing infrastructure as seamlessly as possible.

Solution

 

SecureW2 has worked with hundreds of K-12 schools in the past, so we were familiar with environments like AVHSD’s. Issuing certificates to Chromebooks wasn’t a challenge for us at all.

First, we helped them set up our cloud PKI, JoinNow Connector, so they could issue certificates from anywhere. With our PKI, they can distribute as many client certificates as they need for Wi-Fi authentication rapidly and from one single management portal.

Chromebooks are a bit unique in certificate distribution. However, we’ve developed an exclusive Chrome extension that allows Chromebooks to request and install certificates quickly. JoinNow can also use the Simple Certificate Enrollment Protocol (SCEP)  with Google Workspace to auto-enroll Chromebooks. Either method allows administrators like Dan to automatically push certificates out to Chromebooks without having to rely on students or staff for the configuration.

Quote Left Icon
Once we worked out some issues on our end, the certificate enrollment was fast. We enrolled around 28,000 Chromebooks in two days, and we hardly had to train our staff at all on it. Most of it was automated
Dan, the Information Systems Director
 

Our team of experts also helped the school set up multiple Certificate Authorities (CAs) for different MDMs, such as Jamf Pro or Google Workspace. This empowered Dan to create uniquely tailored network access policies, including segmenting devices onto their own VLANs based on which MDM is used.

After the first wave of certificates was issued to their Chromebooks for Wi-Fi authentication, we began working on the next goal on Dan’s checklist: locking down their VPN with certificates, too. Although Wi-Fi authentication through client certificates is a popular use case for our PKI, we also support other use cases - including VPN authentication, code-signing, and server/SSL certificates.

For the occasional unmanaged device on the network, we provided JoinNow MultiOS. JoinNow MultiOS is a user-friendly, self-service device onboarding application that makes it simple for users to request certificates and configure their devices for secure Wi-Fi access in seconds.

 

Evaluating Success

As it turned out, the Antelope Valley High School District was going to see firsthand a compelling argument for the use of certificate-driven security. Just weeks after they implemented certificates for their VPN, the school district survived an attack on their firewall. 

Reflecting on the incident, Dan said:

Quote Left Icon
Adding certificates to our VPN config on Palo Alto saved us. Even though hackers got partial control of our firewall, they couldn’t get in through the compromised VPN accounts because they didn’t have valid certificates. The logs were filled with all these attempts to get in, and none of them worked. SecureW2 worked as intended.
Dan, the Information Systems Director

Nowadays, Dan can rest easy knowing that his VPN and his wireless network are locked down - he’s seen himself how it works. He’s considering expanding his use of our PKI to SSL certificates for his servers or even setting up a wired 802.1X network. With our WSTEP gateway support, he could even leverage our certificates for his AD domain-joined devices. The possibilities are endless.

Quote Left Icon
The main value is just making it difficult, if not impossible, to access the network unless we want you to. By adjusting the policies, I can start issuing certificates to pretty much anything I want.
Dan, the Information Systems Director