No Cover Image

Conference Paper/Proceeding/Abstract 151 views

Easy 802.1X Onboarding with EAPConfig files and Supplicant Configuration Automatic Discovery

Gareth Ayres Orcid Logo

Swansea University Author: Gareth Ayres Orcid Logo

Abstract

Enterprise networks are now well established and there exists many standards which are used to guarantee security and provide mechanisms for devices and users to attach to the LAN or WLAN. An example of this is eduroam[1] which is built on top of IEEE 802.1X[2] to allow academics and students from p...

Full description

Published: 2015
URI: https://cronfa.swan.ac.uk/Record/cronfa26717
Tags: Add Tag
No Tags, Be the first to tag this record!
first_indexed 2016-03-09T02:06:45Z
last_indexed 2018-02-09T05:09:00Z
id cronfa26717
recordtype SURis
fullrecord <?xml version="1.0"?><rfc1807><datestamp>2016-03-08T16:33:31.5886268</datestamp><bib-version>v2</bib-version><id>26717</id><entry>2016-03-08</entry><title>Easy 802.1X Onboarding with EAPConfig files and Supplicant Configuration Automatic Discovery</title><swanseaauthors><author><sid>fe862943cbab3ed08a0b886c6e9e194a</sid><ORCID>0000-0002-7472-6272</ORCID><firstname>Gareth</firstname><surname>Ayres</surname><name>Gareth Ayres</name><active>true</active><ethesisStudent>false</ethesisStudent></author></swanseaauthors><date>2016-03-08</date><deptcode>INFR</deptcode><abstract>Enterprise networks are now well established and there exists many standards which are used to guarantee security and provide mechanisms for devices and users to attach to the LAN or WLAN. An example of this is eduroam[1] which is built on top of IEEE 802.1X[2] to allow academics and students from participating institutions to securely roam to networks all over the world using their home institutions credentials. While eduroam has proven massively successful, the guarantee of secured roaming and access is based on the assumption that user&#x2019;s devices (that is to say, their supplicants) are configured correctly and fully. While BYOD users need to configure their devices to facilitate access, it is possible to partially configure the supplicant so that access is granted but the end device is not fully secured against all methods of attack. A fully configured device will provide network access, guarantee the security of the user&#x2019;s credentials and be privacy-preserving.</abstract><type>Conference Paper/Proceeding/Abstract</type><journal></journal><volume></volume><journalNumber></journalNumber><paginationStart/><paginationEnd/><publisher/><placeOfPublication/><isbnPrint/><isbnElectronic/><issnPrint/><issnElectronic/><keywords/><publishedDay>7</publishedDay><publishedMonth>8</publishedMonth><publishedYear>2015</publishedYear><publishedDate>2015-08-07</publishedDate><doi/><url/><notes/><college>COLLEGE NANME</college><department>Digital Infrastructure</department><CollegeCode>COLLEGE CODE</CollegeCode><DepartmentCode>INFR</DepartmentCode><institution>Swansea University</institution><apcterm/><lastEdited>2016-03-08T16:33:31.5886268</lastEdited><Created>2016-03-08T16:33:31.5886268</Created><path><level id="1">Faculty of Science and Engineering</level><level id="2">School of Engineering and Applied Sciences - Uncategorised</level></path><authors><author><firstname>Gareth</firstname><surname>Ayres</surname><orcid>0000-0002-7472-6272</orcid><order>1</order></author></authors><documents/><OutputDurs/></rfc1807>
spelling 2016-03-08T16:33:31.5886268 v2 26717 2016-03-08 Easy 802.1X Onboarding with EAPConfig files and Supplicant Configuration Automatic Discovery fe862943cbab3ed08a0b886c6e9e194a 0000-0002-7472-6272 Gareth Ayres Gareth Ayres true false 2016-03-08 INFR Enterprise networks are now well established and there exists many standards which are used to guarantee security and provide mechanisms for devices and users to attach to the LAN or WLAN. An example of this is eduroam[1] which is built on top of IEEE 802.1X[2] to allow academics and students from participating institutions to securely roam to networks all over the world using their home institutions credentials. While eduroam has proven massively successful, the guarantee of secured roaming and access is based on the assumption that user’s devices (that is to say, their supplicants) are configured correctly and fully. While BYOD users need to configure their devices to facilitate access, it is possible to partially configure the supplicant so that access is granted but the end device is not fully secured against all methods of attack. A fully configured device will provide network access, guarantee the security of the user’s credentials and be privacy-preserving. Conference Paper/Proceeding/Abstract 7 8 2015 2015-08-07 COLLEGE NANME Digital Infrastructure COLLEGE CODE INFR Swansea University 2016-03-08T16:33:31.5886268 2016-03-08T16:33:31.5886268 Faculty of Science and Engineering School of Engineering and Applied Sciences - Uncategorised Gareth Ayres 0000-0002-7472-6272 1
title Easy 802.1X Onboarding with EAPConfig files and Supplicant Configuration Automatic Discovery
spellingShingle Easy 802.1X Onboarding with EAPConfig files and Supplicant Configuration Automatic Discovery
Gareth Ayres
title_short Easy 802.1X Onboarding with EAPConfig files and Supplicant Configuration Automatic Discovery
title_full Easy 802.1X Onboarding with EAPConfig files and Supplicant Configuration Automatic Discovery
title_fullStr Easy 802.1X Onboarding with EAPConfig files and Supplicant Configuration Automatic Discovery
title_full_unstemmed Easy 802.1X Onboarding with EAPConfig files and Supplicant Configuration Automatic Discovery
title_sort Easy 802.1X Onboarding with EAPConfig files and Supplicant Configuration Automatic Discovery
author_id_str_mv fe862943cbab3ed08a0b886c6e9e194a
author_id_fullname_str_mv fe862943cbab3ed08a0b886c6e9e194a_***_Gareth Ayres
author Gareth Ayres
author2 Gareth Ayres
format Conference Paper/Proceeding/Abstract
publishDate 2015
institution Swansea University
college_str Faculty of Science and Engineering
hierarchytype
hierarchy_top_id facultyofscienceandengineering
hierarchy_top_title Faculty of Science and Engineering
hierarchy_parent_id facultyofscienceandengineering
hierarchy_parent_title Faculty of Science and Engineering
department_str School of Engineering and Applied Sciences - Uncategorised{{{_:::_}}}Faculty of Science and Engineering{{{_:::_}}}School of Engineering and Applied Sciences - Uncategorised
document_store_str 0
active_str 0
description Enterprise networks are now well established and there exists many standards which are used to guarantee security and provide mechanisms for devices and users to attach to the LAN or WLAN. An example of this is eduroam[1] which is built on top of IEEE 802.1X[2] to allow academics and students from participating institutions to securely roam to networks all over the world using their home institutions credentials. While eduroam has proven massively successful, the guarantee of secured roaming and access is based on the assumption that user’s devices (that is to say, their supplicants) are configured correctly and fully. While BYOD users need to configure their devices to facilitate access, it is possible to partially configure the supplicant so that access is granted but the end device is not fully secured against all methods of attack. A fully configured device will provide network access, guarantee the security of the user’s credentials and be privacy-preserving.
published_date 2015-08-07T03:32:08Z
_version_ 1763751314193383424
score 11.016392