Can I Use Passpoint with G-Suite?

Patrick Grubbs Education

Can I Use Passpoint with G-Suite?

Passpoint is the premier tool for ensuring your users have network access while roaming, but it can be a little difficult to deploy. Fortunately, SecureW2 has a solution that integrates into your existing infrastructure to allow you to utilize Passpoint …

Can I Use The Okta RADIUS Agent For My Wi-Fi?

Eytan Raphaely Education

Can I Use The Okta RADIUS Agent For My Wi-Fi?

An Okta RADIUS server agent is a lightweight program that runs as a service outside of Okta. It is usually installed outside of a firewall which gives Okta a route to communicate between an on-premise server and Okta’s cloud network. …

Top 3 Mistakes Setting Up AD CS Certificate Templates

Eytan Raphaely Uncategorized

Top 3 Mistakes Setting Up AD CS Certificate Templates

In order to use certificates for authentication, a security trend caused by the inadequacies of password-based authentication, a public key infrastructure (PKI) must be in place. Active Directory Certificates Services (AD CS) is Microsoft’s on-premise PKI solution and while it …

What is Passpoint?

Patrick Grubbs Education

What is Passpoint?

Simply put, Passpoint is a protocol developed by the Wi-Fi alliance to allow users to easily transition between partner networks. The vision is that people using mobile devices like smartphones and laptops will have reduced reliance on mobile data and ...

Creating Private Certificates Authorities for Internal Use

Eytan Raphaely Uncategorized

Creating Private Certificates Authorities for Internal Use

What is a Certificate Authority? A certificate authority (CA) is an entity that distributes digital certificates to devices. These certificates cryptographically tie an identity to a public key, ensuring that individuals online are who they say they are. Certificate authorities …

How to Manage Certificates on G-Suite

Sam Metzler Education

How to Manage Certificates on G-Suite

Many organizations with a Google Apps network use credential-based authentication for network access. While it is pretty straightforward, authenticating with passwords is incredibly risky nowadays. An overwhelming majority of cyber attacks were able to infiltrate the network through weak or …