Configure EAP (Extensible Authentication Protocol) types for Wi-Fi

By Rick Metzner

Configure devices to connect to 802.1X enterprise Wi-Fi networks using Extensible Authentication Protocol (EAP) types

Numerous options are available for authenticating to Wi-Fi networks, especially if your infrastructure supports more than one authentication type. Each option has unique settings you need to configure. This article covers the most common configuration options.

Your network infrastructure must support the chosen EAP types and be configured correctly to allow authentication. If you do not know how your network is configured, work with your network administrators to determine how they want network clients to connect.

Configure EAP-TLS

EAP-TLS uses Transport Layer Security and an identity certificate to authenticate devices to the network.

You must provide an identity certificate to use EAP-TLS.
  1. Select TLS under Accepted EAP Types.
  2. To prevent using older and weaker TLS versions, select the TLS minimum version you would like to allow.
  3. If your infrastructure does not support the latest versions of TLS, select the TLS maximum version you want to use.
  4. Select a method to provide an identity certificate and configure applicable settings. See Configure the Wi-Fi Library Item to learn more.

Configure EAP-TTLS

Tunneled Transport Layer Security uses a TLS tunnel to encrypt another authentication protocol. It does not require an identity certificate.

Devices can use a username and password or device-based directory credentials to authenticate. 

Username and password authentication:

  1. Choose Username and password for Authentication.
  2. Optionally, provide the Username. You can use a static value or one of Kandji’s global variables. For example, CN=$EMAIL. If you do not enter a username, the device prompts the user to enter one when connecting to the network.
  3. Select how often to prompt the user for their password. If you choose Once and don’t provide a password, the device will prompt the user once for their password and remember it. If you select, Every time the user connects to the network, the device will not remember the password.
  4. If devices use a shared username and password, enter the password in the Password field. If you do not enter a password, the device prompts the user to enter a password when connecting to the network.

Device-based directory authentication for a Mac bound to a directory service:

  1. Choose either Computer AD system authentication to use the Active Directory computer account or Computer OD system authentication to use the Open Directory computer account.

Configure the remaining TTLS settings:

  1. When you select TTLS, your device will use a username and password or device directory credentials for authentication. If your network requires an identity certificate as a second authentication factor, select Require Two-Factor Authentication.
  2. For Inner authentication, choose the authentication protocol to use inside the TLS tunnel.
  3. Optionally specify Outer identity. It is different from the identity used inside the tunnel and is specified to prevent exposing the inner identity. 
  4. To prevent using older and weaker TLS versions, select the TLS minimum version you would like to allow
  5. If your infrastructure does not support the latest versions of TLS, select the TLS maximum version you want to use.

Configure EAP-LEAP

Lightweight Extensible Authentication Protocol is an older authentication method based on
MS-CHAP and Dynamic WEP. It does not use an identity certificate.

Devices can use a username and password or device-based directory credentials to authenticate. 

Username and password authentication:

  1. Choose Username and password for Authentication.
  2. Optionally, provide the Username. You can use a static value or one of Kandji’s global variables. For example, CN=$EMAIL. If you do not enter a username, the device prompts the user to enter one when connecting to the network.
  3. Select how often to prompt the user for their password. If you choose Once and don’t provide a password, the device will prompt the user once for their password and remember it. If you select Every time the user connects to the network, the device will not remember the password.
  4. If devices use a shared username and password, enter the password in the Password field. If you do not enter a password, the device prompts the user to enter a password when connecting to the network.

Device-based directory authentication for a Mac bound to a directory service:

  1. For Authentication, choose Computer AD system authentication to use the Active Directory computer account or Computer OD system authentication to use the Open Directory computer account.

Configure EAP-PEAP

Protected Extensible Authentication Protocol addresses shortcomings of previous Extensible Authentication Protocols such as LEAP. Like EAP-TTLS, PEAP uses a TLS tunnel to encrypt another authentication protocol. It does not require an identity certificate.

Devices can use a username and password or device-based directory credentials to authenticate. 

Username and password authentication:

  1. Choose Username and password for Authentication.
  2. Optionally, provide the Username. You can use a static value or one of Kandji’s global variables. For example, CN=$EMAIL. If you do not enter a username, the device prompts the user to enter one when connecting to the network.
  3. Select how often to prompt the user for their password. If you choose Once and don’t provide a password, the device will prompt the user once for their password and remember it. If you select, Every time the user connects to the network, the device will not remember the password.
  4. If devices use a shared username and password, enter the password in the Password field. If you do not enter a password, the device prompts the user to enter a password when connecting to the network.

Device-based directory authentication for a Mac bound to a directory service:

  1. For Authentication, choose Computer AD system authentication to use the Active Directory computer account or Computer OD system authentication to use the Open Directory computer account.

Configure the remaining PEAP settings:

  1. When you select PEAP, your device will use a username and password or device directory credentials for authentication. If your network requires an identity certificate as a second authentication factor, select Require Two-Factor Authentication.
  2. To prevent using older and weaker TLS versions, select the TLS minimum version you would like to allow.
  3. If your infrastructure does not support the latest versions of TLS, select the TLS maximum version you want to use.
  4. Optionally specify Outer identity. It is different from the identity used inside the tunnel and is specified to prevent exposing the inner identity. 

Configure EAP-FAST

Flexible Authentication via Secure Tunneling (FAST) uses a TLS tunnel to encrypt additional authentication information. FAST also supports fast re-establishment of the tunnel through Protected Access Credentials (PAC). It does not require an identity certificate.

Authentication can be provided by a username and password or device-based directory credentials.

Username and password authentication:

  1. Choose Username and password for Authentication.
  2. Optionally, provide the Username. You can use a static value or one of Kandji’s global variables. For example, CN=$EMAIL. If you do not enter a username, the device prompts the user to enter one when connecting to the network.
  3. Select how often to prompt the user for their password. If you choose Once and don’t provide a password, the device will prompt the user once for their password and remember it. If you select, Every time the user connects to the network, the device will not remember the password.
  4. If devices use a shared username and password, enter the password in the Password field. If you do not enter a password, the device prompts the user to enter a password when connecting to the network.

Device-based directory authentication for a Mac bound to a directory service:

  1. For Authentication, choose Computer AD system authentication to use the Active Directory computer account or Computer OD system authentication to use the Open Directory computer account.

Configure the remaining EAP-FAST settings:

  1. When you select EAP-FAST, your device will use a username and password or device directory credentials for authentication. If your network requires an identity certificate as a second authentication factor, select Require Two-Factor Authentication.
  2. Optionally specify Outer identity. It is different from the identity used inside the tunnel and is specified to prevent exposing the inner identity. 
  3. To use Protected Access Credentials, select Use PAC.
  4. To use Protected Access Credentials, select Provision PAC.
  5. If you would like to provision the PAC anonymously, select Provision PAC anonymously

Configure EAP-SIM

EAP-SIM uses a device’s Subscriber Identity Module (SIM) for a Global System for Mobile Communications (GSM) network to authenticate to Wi-Fi. This EAP type is used in very few environments —for example, if you are a Mobile Network Operator (MNO) or a Mobile Virtual Network Operator (MVNO). It does not require an identity certificate.

  1. Choose the Minimum number of RAND values the devices requires from the server. The available options are 3 (default), 2, or Don’t specify. More RAND challenges result in stronger keying material.

Configure EAP-AKA

EAP-AKA (Authentication and Key Agreement) uses a device’s identity module for a Universal Mobile Telecommunications System (UMTS) and CDMA2000 network to authenticate to Wi-Fi. This EAP type is used in very few environments —for example, if you are a Mobile Network Operator (MNO) or a Mobile Virtual Network Operator (MVNO). It does not require an identity certificate. There are no options to configure for this EAP type.