Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!
INSIGHTS & UPDATES

SecureW2 Blogs

Stay informed with expert insights, best practices, and the latest developments in network security, identity management, and SecureW2 product updates.

Configuration Guide: Windows RADIUS Server 2012

Anytime there’s a discussion about a wired or wireless authentication, it’s probable that the word “RADIUS server” will come up sooner or later. RADIUS, also known as a “AAA server,” carries out the essential functions of Authentication, Accounting, and Authorization ... Read More

Read More
HIPAA Compliant Wireless 802.1X

The Health Insurance Portability and Accountability Act (HIPAA) has impacted the way healthcare organizations operate since its introduction in 1996. Its goal, ultimately, was to protect patient data by imposing requirements for how that data is accessed and maintained. Complying ... Read More

Read More
Azure AD Conditional Access with 802.1X

The post-pandemic world is witnessing an exponential surge in cloud-based network solutions as many businesses transition into digital mode. Interestingly, many cutting-edge wireless technologies like 5G, virtual reality, and AI are also changing the pattern of data consumption with each ... Read More

Read More
Device Authentication with User Attributes for Cloud Directories

When users and devices authenticate to your network, you should ideally have as much information from them as possible to make context-rich security decisions. Certificate-based authentication (CBA) empowers administrators to make those decisions by providing a detailed snapshot of each ... Read More

Read More
Auto-Enrolling Certificates in Jamf

Jamf customers experience a number of benefits by centralizing their device and authentication system under one roof. But Jamf doesn’t have the capability to handle the entire authentication process. An effective compromise is to combine Jamf with third-party solutions to ... Read More

Read More
Digital Signatures: Explained

An effective Zero Trust architecture is built on a foundation of identity context. Digital signatures support a Zero Trust initiative by cryptographically assuring the identity of the signee, answering questions such as: “How do you know if the person who ... Read More

Read More
[Solved] Okta Sign-in Error

Okta is one of the leading identity and authentication platforms compatible with both cloud and on-premise directories. They provide a great user experience and support, but you may still run into errors from time to time. These errors can provide ... Read More

Read More
Cloud 802.1x Explained

What Is Cloud 802.1x? An 802.1x network is unique in one major way; it uses a Cloud RADIUS server as a means of authenticating users. The Cloud RADIUS checks a user’s credentials to see if they are an active member ... Read More

Read More
What is Certificate Lifecycle Management?

Using X.509 digital certificates for authentication is an immediate and significant upgrade to credential (password) authentication, but it requires proper support infrastructure. Certificate Lifecycle Management systems (CLM/CLMS), also called Certificate Management Systems (CMS), provide that support. They allow admins to ... Read More

Read More
The Anatomy Of An X.509 Digital Certificate

Digital certificates are frequently used in the online world as a means of identification. The information embedded in the certificates lets anyone verify the identity of an entity with the utmost assurance that they are who they claim to be. ... Read More

Read More