Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!

Blogs

  • How to Renew Certificates from a Microsoft Certificate Authority

    One of the best ways for a company to keep their security robust is taking advantage of certificates for their network environment. Certificates utilize public-private key encryption to encrypt information sent securely over-the-air . While certificates offer numerous advantages, improper ...

    Read More
  • What is the Trusted Root Certification Authorities Store?

    A Certificate Authority (CA) is the entity that handles the certificate distribution for a PKI. Certificate Authorities assist in validating the identities of different websites, individuals, and devices by providing a trusted source for certificates. Certificate authorities are a key ...

    Read More
  • Designing a Zero Trust 802.1x Network

    As hackers get more sophisticated and hands-on, network security strategies have to adapt to meet the new challenge. An old idea that has recently been given new life is the concept of zero trust networks. This article will briefly discuss ...

    Read More
  • How to Configure Azure AD Attributes on Certificates

    Attribute mapping in Azure AD (Microsoft Entra ID) is easier than you might think. With a simple SAML application, you can use customizable Azure attributes to enforce dynamic policy options on your 802.1X network. What are Azure AD (Microsoft Entra ...

    Read More
  • How to Check if a Digital Certificate is Revoked

    A critical component of EAP-TLS certificate-based authentication is properly managing certificates, which includes confirming that they have been properly revoked AND placed on the list of revoked certificates so the RADIUS server is aware of the new status of the ...

    Read More
  • Using Okta to Implement Zero Trust Network Access

    Zero Trust is a cybersecurity concept that is being implemented by many security-conscious organizations to combat the external and internal threats they face. At its core, the purpose of Zero Trust is to ensure that each individual in an organization ...

    Read More
  • Can I Use Group Policy Objects with Azure?

    As technology continues to migrate to cloud-based networking, many organizations have sought to take advantage of efficient cloud solutions. As a result, Microsoft-based organizations have been transitioning to Azure for their directory services because Active Directory does not work natively ...

    Read More
  • What is a Microsoft Certificate Authority?

    Read More
  • How to Run Your Own Certificate Authority

    What is a Certificate Authority? A certificate authority (CA) is an entity that distributes digital certificates to devices. A digital certificate certifies the ownership of a public key by tying it cryptographically to the subject it is administered to. Certificate ...

    Read More