What is NAS-ID?

Patrick Grubbs Education

What is NAS-ID?

The Network Access Server (NAS) is the frontline of authentication – it’s the first server that fields network authentication requests before they pass through to the RADIUS. The NAS Identifier (NAS-ID) is a feature that allows the RADIUS server to …

Motherboard

What is a TPM?

Kainoa Lee Education

What is a TPM?

A TPM, also known as a Trusted Platform Module, is an international standard for a secure cryptoprocessor and is a chip found on the computer’s motherboard. The function of a TPM is to generate encryption keys and keep a part …

Can I Set Up Microsoft NPS in the Cloud?

Jake Ludin Education, Tech Trends

Can I Set Up Microsoft NPS in the Cloud?

Microsoft’s Network Policy Server (NPS) is a AAA RADIUS server used for a number of different types of network connections. It can be used for wireless authentication, VPN connections, dial-up, and more. But as organizations continue to move to cloud-based …

How to Use Yubikeys for VPN

Eytan Raphaely Education

How to Use Yubikeys for VPN

Yubikeys are a useful and secure tool for protecting yourself from data theft. They add a layer of authentication and can be used with other authentication methods to further protect your data. While Yubikeys are already a powerful multi-factor authentication …

Many Universities make the same assupmtions concerning PEAP-MSCHAPv2

Top 3 PEAP-MSCHAPv2 Mistakes Made by Universities

Jake Ludin Consumer Protection, Education

Top 3 PEAP-MSCHAPv2 Mistakes Made by Universities

Credential-based authentication with PEAP-MSCHAPv2 is still commonly used, and for some network types it is appropriate. A home network or a small coffee shop offering free wireless can benefit from its convenience. But for any institution or university hosting valuable …

microsoft ad

Digital Certificates vs Password Authentication

Sam Metzler Education, Security Threats

Digital Certificates vs Password Authentication

Businesses understand the importance of passwords for private data security, but might not realize that using a network with passwords poses many security threats. Every advancement in security technology is followed by more sophisticated hacking techniques. Credentials require password change …

Using incorrect certificates on your network

Stop using self-signed certificates for 802.1X

Adam Education, Uncategorized

Stop using self-signed certificates for 802.1X

When setting up 802.1X we often run into questions about using self signed certificates for WPA2-Enterprise server certificate validation.  First, we should clarify the difference between a self-signed certificate and a private Certificate Authority — this is often a point of …