Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!

Blogs

  • MacOS AD Bind Issues Post Microsoft Kerberos Update

    On October 11th, 2022 Microsoft pushed an update to enforce domain controller validation for Active Directory. The purpose of this update is to shore up a security bypass vulnerability that affects the Kerberos Privilege Attribute Certificate (PAC), allowing hackers to ...

    Read More
  • Smart Cards for Identity Authentication and Access Security

    Smart cards, occasionally called chip cards or integrated circuit cards (IC or ICC), are a broad family of physical electronic authentication devices. More practically, they’re physically-secured microprocessors used to control access to resources. From ID cards to security keys, smart ...

    Read More
  • List of Devices Supporting 802.1x

    It is hard to imagine life without Wi-Fi, both in personal or professional spaces but we can not deny that it has parallelly caused the transmission of more and more sensitive information over the air. The evolution of WPA2-Enterprise has ...

    Read More
  • How to Enable Windows Machine Certificate Authentication

    Whether you use Windows, macOS, or any other operating system, deploying digital certificates for your device can be the most impactful step to strengthening your network security. Digital certificates use superior asymmetric encryption, which uses two pairs of public and ...

    Read More
  • LDAP Authentication with Azure AD

    LDAP (Lightweight Directory Access Protocol) authentication can confirm user identities across a network. It uses a centralized directory system for user authorization and authentication. On the other hand, Microsoft offers a cloud-based identity and access management solution called Azure Active ...

    Read More
  • Understanding Phishing-Resistant MFA in Azure AD

    On an average day, most employees have to log into numerous different applications and resources at work. The influx of applications necessary for work has led to an exponential increase in login and authentication methods, including things such as one-time ...

    Read More
  • How to Generate Root & Intermediate CAs

    With 10 million attacks targeting usernames and passwords occur every day. it’s not a bad idea to drop passwords wherever possible.  A proper PKI allows your network to utilize certificate-based authentication. Root CAs and Intermediate CAs are both parts of ...

    Read More
  • What’s the Difference between RADIUS, TLS, and EAP-TLS?

    There are many components involved in running a secure network. It’s very easy to get bogged down by different terminology and be confused about what exactly each component does. This is especially true in regards to 802.1X. 62% of breaches ...

    Read More
  • How To Set Up 802.1X Using Azure AD

    You can configure 802.1X using Azure AD by syncing it with an LDAP server or enrolling every device with an x.509 certificate.

    Read More