Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!

How to Set Up LDAP For Certificate-Based WPA2-Enterprise

Utilizing certificate-based authentication provides stronger security, easier authentication, and an improved user experience when compared to credential-based authentication – but only when it is supported by an efficient onboarding method. Integrating LDAP as your IDP with SecureW2’s certificate onboarding solutions allows users to provision their devices with certificates in only a few steps.

By connecting LDAP with effective certificate onboarding, your network can accurately distribute certificates to network users and ensure that no unapproved users can gain access. Since certificates from SecureW2 cannot be removed or transferred from the device, only those with valid LDAP credentials will be able to receive a certificate.

The following demonstrates the steps involved to configure the integration:

  1. Configure the Identity Provider
    • Begin by configuring the attribute mapping of the IDP. Here you will customize the fields that are populated by the attributes of your network users and will be used to define different user groups within your network.
  2. Configure the Network Policies
    • Nearly all organizations have different user groups that require varying levels of access to networks, servers, data, etc. By onboarding with SecureW2, you can automatically separate users into groups by configuring their attributes to identify and segment users. For example, a university would configure the onboarding software to segment users based on their status as a student or a professor.

NOTE: You will perform all of these procedures in the SecureW2 Management Portal.

Configure the Identity Provider

To configure the identity provider (IDP):

  1. From your SecureW2 Management Portal, go to Identity Management > Identity Providers
  2. Click Add Identity Provider
    • For Name, enter a name
    • Click the Type dropdown and select LDAP
    • Click Save
  3. Select the Connections tab and click Add Connection
    • For Name, enter a name
    • For Hostname, enter ‘54.191.110.124
    • For Port, enter ‘389
    • For Admin DN, enter ‘support.securew2.com
    • For Admin Password, enter the password
    • For Subject Base DN, enter ‘DC=securew2,DC=net
    • For Group Base DN, enter ‘DC=securew2,DC=net
    • For Server timeout, enter ‘30
  4. Click Test Connection

  5. After the connection is successfully tested, click Update
  6. Select the Basic tab
  7. For Subject Name Attribute, enter:
    • sAMAccountName‘ (users log in with only their username), or ‘userPrincipalNames‘ (users log in with their username and realm)
  8. Click Update
  9. Select the Attribute Mapping tab and click Add
    • For Local Attribute, enter ‘displayName
    • Click the Remote Attribute dropdown and select USER_DEFINED
    • In the field that appears, enter ‘displayName
  10. Click Next -> Add
    • For Local Attribute, enter ‘upn
    • Click the Remote Attribute dropdown and select USER_DEFINED
    • In the field that appears, enter ‘upn
  11. Click Next -> Add
    • For Local Attribute, enter ‘email
    • Click the Remote Attribute dropdown and select USER_DEFINED
    • In the field that appears, enter ‘email
  12. Click Next
  13. Select the Groups tab and click Add
    • For Local Group, enter a name
    • For Remote Group, enter ‘CN=SECUREW2-STAFF,CN=Users,DC=securew2,DC=net
      • NOTE: The value for Remote Group is case sensitive
  14. Click Next -> Update
    • To ensure that everything is working properly, select the Connections tab and test the connection again

Configure LDAP IDP Profile Policy

To configure the profile policy:

  1. From your SecureW2 Management Portal, go to Policy Management > Profile
  2. Click Add Profile Policy
  3. For Name, enter a name
  4. Click Save
  5. Select the Conditions tab
  6. Click the Profile dropdown and select the profile you created in the previous section
  7. Select the Settings tab
  8. Click the Identity Provider dropdown and select the IDP you created in the previous section
  9. Click Update

Configure LDAP IDP User Role Policy

To configure the user role policy:

  1. From your SecureW2 Management Portal, go to Policy Management > User Roles
  2. Click Add Role
  3. For Name, enter a name
  4. Click Save
  5. Select the Conditions tab
  6. Click the Identity Provider dropdown and select the IDP you created in the section “Configure the Identity Provider”
  7. Click Update

Configure the Enrollment Policy

To configure the enrollment policy:

  1. From your SecureW2 Management Portal, go to Policy Management > Enrollment
  2. Click Add Enrollment Policy
  3. For Name, enter a name
  4. Click Save
  5. Select the Conditions tab
  6. In the User Role list, select the user role you created in the previous section
  7. In the Device Role list, select DEFAULT DEVICE ROLE POLICY 1
  8. Click Update

SecureW2 offers a cost-effective solution to streamline device onboarding and strengthen network security. Head over to our pricing page to learn more.