Re: [WIRELESS-LAN] 802.1x Certificates for RADIUS
On Wed Sep 24 2014 15:07:33 CDT, Jason Wang j.w...@its.utexas.edu wrote: I'm curious which CA's you are using for your RADIUS servers for your 802.1x implementations. We use the Comodo certs available via InCommon. -- Julian Y. Koh Acting Associate Director, Telecommunications and Network Services Northwestern University Information Technology (NUIT) 2001 Sheridan Road #G-166 Evanston, IL 60208 847-467-5780 NUIT Web Site: http://www.it.northwestern.edu/ PGP Public Key:http://bt.ittns.northwestern.edu/julian/pgppubkey.html ** Participation and subscription information for this EDUCAUSE Constituent Group discussion list can be found at http://www.educause.edu/groups/.
RE: [WIRELESS-LAN] 802.1x Certificates for RADIUS
AddTrust via InCommon -Original Message- From: The EDUCAUSE Wireless Issues Constituent Group Listserv [mailto:WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU] On Behalf Of Julian Y Koh Sent: Wednesday, September 24, 2014 3:09 PM To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU Subject: Re: [WIRELESS-LAN] 802.1x Certificates for RADIUS On Wed Sep 24 2014 15:07:33 CDT, Jason Wang j.w...@its.utexas.edu wrote: I'm curious which CA's you are using for your RADIUS servers for your 802.1x implementations. We use the Comodo certs available via InCommon. -- Julian Y. Koh Acting Associate Director, Telecommunications and Network Services Northwestern University Information Technology (NUIT) 2001 Sheridan Road #G-166 Evanston, IL 60208 847-467-5780 NUIT Web Site: https://urldefense.proofpoint.com/v1/url?u=http://www.it.northwestern.edu/k=yYSsEqip9%2FcIjLHUhVwIqA%3D%3D%0Ar=eHsexY0U6WY24UhDK4eLQbvXOPzMySRoCq87DX3WV5M%3D%0Am=9scvih8TMbNyOJPy%2BXmetY%2F%2BwLbtFGYPjA2hFgpaxiY%3D%0As=1df79b678494e8e680884fc237a95301594a4ee0cd89611fd3a2e7fe4f2eb9b0 PGP Public Key:https://urldefense.proofpoint.com/v1/url?u=http://bt.ittns.northwestern.edu/julian/pgppubkey.htmlk=yYSsEqip9%2FcIjLHUhVwIqA%3D%3D%0Ar=eHsexY0U6WY24UhDK4eLQbvXOPzMySRoCq87DX3WV5M%3D%0Am=9scvih8TMbNyOJPy%2BXmetY%2F%2BwLbtFGYPjA2hFgpaxiY%3D%0As=bd32fe194524bafc8941843868771f8616f2b47548323c9c20ba3ffec648cfd3 ** Participation and subscription information for this EDUCAUSE Constituent Group discussion list can be found at https://urldefense.proofpoint.com/v1/url?u=http://www.educause.edu/groups/k=yYSsEqip9%2FcIjLHUhVwIqA%3D%3D%0Ar=eHsexY0U6WY24UhDK4eLQbvXOPzMySRoCq87DX3WV5M%3D%0Am=9scvih8TMbNyOJPy%2BXmetY%2F%2BwLbtFGYPjA2hFgpaxiY%3D%0As=5e9dd316267e81eb6f4909211544230054542e4a2d22c654c70674356edb4995. ** Participation and subscription information for this EDUCAUSE Constituent Group discussion list can be found at http://www.educause.edu/groups/.
RE: [WIRELESS-LAN] 802.1x Certificates for RADIUS
We use our own internal certificate authority. We WERE using a public CA. Ultimately we decided that if used our own CA, we were in total control, and not subject to changes and policies made on a public CA. Since people have to onboard with cloudpath to access our secure SSID, we can load the private CA chains, and there are no problems. Plus, its free to generate certificates. I'd suggest that route. We had issues generating radius certificates that might change an intermediate from one issuance to another that could cause issues with clients. Hated the thought of a D-Day when we update our new externally signed certificates, requiring everyone to onboard again. Ryan H Turner Senior Network Engineer The University of North Carolina at Chapel Hill CB 1150 Chapel Hill, NC 27599 +1 919 445 0113 Office +1 919 274 7926 Mobile -Original Message- From: The EDUCAUSE Wireless Issues Constituent Group Listserv [mailto:WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU] On Behalf Of Jason Wang Sent: Wednesday, September 24, 2014 4:08 PM To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU Subject: [WIRELESS-LAN] 802.1x Certificates for RADIUS I'm curious which CA's you are using for your RADIUS servers for your 802.1x implementations. We are looking to renew our cert (coming up on expiration), which is signed by one of the Thawte CA's that is being deprecated. At the time we selected that CA because it was widely supported natively or was pre-installed in nearly all platforms / operating systems we see on our campus. Our two main concerns are compatibility (we've seen over 200k distinct devices authenticated onto our 802.1x WiFi over the past 6 months) and longevity (seems most only offer up to 3 years). After just a cursory check, it looks like a lot of sites dealing with financial transactions use Verisign, while some of the popular social media sites use DigiCert. Google has their own intermediate CA issued by GeoTrust. I would expect any of those would be very widely supported, but am curious what others' experiences are. Thanks, Jason ** Participation and subscription information for this EDUCAUSE Constituent Group discussion list can be found at http://www.educause.edu/groups/.