Conference Paper/Proceeding/Abstract 151 views
Easy 802.1X Onboarding with EAPConfig files and Supplicant Configuration Automatic Discovery
Swansea University Author:
Gareth Ayres
Abstract
Enterprise networks are now well established and there exists many standards which are used to guarantee security and provide mechanisms for devices and users to attach to the LAN or WLAN. An example of this is eduroam[1] which is built on top of IEEE 802.1X[2] to allow academics and students from p...
Published: |
2015
|
---|---|
URI: | https://cronfa.swan.ac.uk/Record/cronfa26717 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
first_indexed |
2016-03-09T02:06:45Z |
---|---|
last_indexed |
2018-02-09T05:09:00Z |
id |
cronfa26717 |
recordtype |
SURis |
fullrecord |
<?xml version="1.0"?><rfc1807><datestamp>2016-03-08T16:33:31.5886268</datestamp><bib-version>v2</bib-version><id>26717</id><entry>2016-03-08</entry><title>Easy 802.1X Onboarding with EAPConfig files and Supplicant Configuration Automatic Discovery</title><swanseaauthors><author><sid>fe862943cbab3ed08a0b886c6e9e194a</sid><ORCID>0000-0002-7472-6272</ORCID><firstname>Gareth</firstname><surname>Ayres</surname><name>Gareth Ayres</name><active>true</active><ethesisStudent>false</ethesisStudent></author></swanseaauthors><date>2016-03-08</date><deptcode>INFR</deptcode><abstract>Enterprise networks are now well established and there exists many standards which are used to guarantee security and provide mechanisms for devices and users to attach to the LAN or WLAN. An example of this is eduroam[1] which is built on top of IEEE 802.1X[2] to allow academics and students from participating institutions to securely roam to networks all over the world using their home institutions credentials. While eduroam has proven massively successful, the guarantee of secured roaming and access is based on the assumption that user’s devices (that is to say, their supplicants) are configured correctly and fully. While BYOD users need to configure their devices to facilitate access, it is possible to partially configure the supplicant so that access is granted but the end device is not fully secured against all methods of attack. A fully configured device will provide network access, guarantee the security of the user’s credentials and be privacy-preserving.</abstract><type>Conference Paper/Proceeding/Abstract</type><journal></journal><volume></volume><journalNumber></journalNumber><paginationStart/><paginationEnd/><publisher/><placeOfPublication/><isbnPrint/><isbnElectronic/><issnPrint/><issnElectronic/><keywords/><publishedDay>7</publishedDay><publishedMonth>8</publishedMonth><publishedYear>2015</publishedYear><publishedDate>2015-08-07</publishedDate><doi/><url/><notes/><college>COLLEGE NANME</college><department>Digital Infrastructure</department><CollegeCode>COLLEGE CODE</CollegeCode><DepartmentCode>INFR</DepartmentCode><institution>Swansea University</institution><apcterm/><lastEdited>2016-03-08T16:33:31.5886268</lastEdited><Created>2016-03-08T16:33:31.5886268</Created><path><level id="1">Faculty of Science and Engineering</level><level id="2">School of Engineering and Applied Sciences - Uncategorised</level></path><authors><author><firstname>Gareth</firstname><surname>Ayres</surname><orcid>0000-0002-7472-6272</orcid><order>1</order></author></authors><documents/><OutputDurs/></rfc1807> |
spelling |
2016-03-08T16:33:31.5886268 v2 26717 2016-03-08 Easy 802.1X Onboarding with EAPConfig files and Supplicant Configuration Automatic Discovery fe862943cbab3ed08a0b886c6e9e194a 0000-0002-7472-6272 Gareth Ayres Gareth Ayres true false 2016-03-08 INFR Enterprise networks are now well established and there exists many standards which are used to guarantee security and provide mechanisms for devices and users to attach to the LAN or WLAN. An example of this is eduroam[1] which is built on top of IEEE 802.1X[2] to allow academics and students from participating institutions to securely roam to networks all over the world using their home institutions credentials. While eduroam has proven massively successful, the guarantee of secured roaming and access is based on the assumption that user’s devices (that is to say, their supplicants) are configured correctly and fully. While BYOD users need to configure their devices to facilitate access, it is possible to partially configure the supplicant so that access is granted but the end device is not fully secured against all methods of attack. A fully configured device will provide network access, guarantee the security of the user’s credentials and be privacy-preserving. Conference Paper/Proceeding/Abstract 7 8 2015 2015-08-07 COLLEGE NANME Digital Infrastructure COLLEGE CODE INFR Swansea University 2016-03-08T16:33:31.5886268 2016-03-08T16:33:31.5886268 Faculty of Science and Engineering School of Engineering and Applied Sciences - Uncategorised Gareth Ayres 0000-0002-7472-6272 1 |
title |
Easy 802.1X Onboarding with EAPConfig files and Supplicant Configuration Automatic Discovery |
spellingShingle |
Easy 802.1X Onboarding with EAPConfig files and Supplicant Configuration Automatic Discovery Gareth Ayres |
title_short |
Easy 802.1X Onboarding with EAPConfig files and Supplicant Configuration Automatic Discovery |
title_full |
Easy 802.1X Onboarding with EAPConfig files and Supplicant Configuration Automatic Discovery |
title_fullStr |
Easy 802.1X Onboarding with EAPConfig files and Supplicant Configuration Automatic Discovery |
title_full_unstemmed |
Easy 802.1X Onboarding with EAPConfig files and Supplicant Configuration Automatic Discovery |
title_sort |
Easy 802.1X Onboarding with EAPConfig files and Supplicant Configuration Automatic Discovery |
author_id_str_mv |
fe862943cbab3ed08a0b886c6e9e194a |
author_id_fullname_str_mv |
fe862943cbab3ed08a0b886c6e9e194a_***_Gareth Ayres |
author |
Gareth Ayres |
author2 |
Gareth Ayres |
format |
Conference Paper/Proceeding/Abstract |
publishDate |
2015 |
institution |
Swansea University |
college_str |
Faculty of Science and Engineering |
hierarchytype |
|
hierarchy_top_id |
facultyofscienceandengineering |
hierarchy_top_title |
Faculty of Science and Engineering |
hierarchy_parent_id |
facultyofscienceandengineering |
hierarchy_parent_title |
Faculty of Science and Engineering |
department_str |
School of Engineering and Applied Sciences - Uncategorised{{{_:::_}}}Faculty of Science and Engineering{{{_:::_}}}School of Engineering and Applied Sciences - Uncategorised |
document_store_str |
0 |
active_str |
0 |
description |
Enterprise networks are now well established and there exists many standards which are used to guarantee security and provide mechanisms for devices and users to attach to the LAN or WLAN. An example of this is eduroam[1] which is built on top of IEEE 802.1X[2] to allow academics and students from participating institutions to securely roam to networks all over the world using their home institutions credentials. While eduroam has proven massively successful, the guarantee of secured roaming and access is based on the assumption that user’s devices (that is to say, their supplicants) are configured correctly and fully. While BYOD users need to configure their devices to facilitate access, it is possible to partially configure the supplicant so that access is granted but the end device is not fully secured against all methods of attack. A fully configured device will provide network access, guarantee the security of the user’s credentials and be privacy-preserving. |
published_date |
2015-08-07T03:32:08Z |
_version_ |
1763751314193383424 |
score |
11.016392 |