Many organizations are moving on from the cumbersome LDAP protocol

Why Most Are Leaving LDAP With WPA2-Enterprise Behind

Jake Ludin Tech Trends

Why Most Are Leaving LDAP With WPA2-Enterprise Behind

For years, the credential-based network authentication standard was the Lightweight Directory Access Protocol (LDAP). The security and efficiency offered by LDAP provided the necessary protection levels for everyday WPA2-Enterprise operations. But as time progressed, new methods of authentication have been …

eap and peap

Can I Use PEAP-MSCHAPv2 and EAP-TLS Authentication on My Network?

Patrick Grubbs Education

Can I Use PEAP-MSCHAPv2 and EAP-TLS Authentication on My Network?

The short answer is: Yes. Organizations that are interested in moving from the unsecure PEAP-MSCHAPv2 protocol to the superior EAP-TLS protocol might be worried about huge infrastructure overhaul or the network downtime it might entail. We’ve helped many organizations over …

Simple Certificate Enrollment Protocol (SCEP): Explained

Samuel Metzler Education

Simple Certificate Enrollment Protocol (SCEP): Explained

Distributing certificates to managed devices can be a monumental task with a lot of moving parts that need to be accounted for: PKI integration, establishing a gateway, configuration policies, certificate enrollment, device authentication, and much more. Luckily, SCEP provides a …

Establishing trust through authentication

EAP-TLS vs. PEAP-MSCHAPv2: Which Authentication Protocol is Superior?

Jake Ludin Education

EAP-TLS vs. PEAP-MSCHAPv2: Which Authentication Protocol is Superior?

Ensuring network users are able to securely authenticate to the wireless network is paramount to the overall safety and security of your organization. The most widely used wireless network protocols today are the Extensible Authentication Protocols (EAP) used in WPA2-Enterprise. …

TTLS-PAP as an authentication method is weaker than others available

EAP-TTLS/PAP Authentication Protocol Is Not Secure

Jake Ludin Uncategorized

EAP-TTLS/PAP Authentication Protocol Is Not Secure

When designing a new network, there are countless features to consider that have a significant impact on the organization at large. Few functions of the network impact the users more than the authentication method chosen by decision makers. If an …

How to Configure WPA2-Enterprise on Each Operating System

Samuel Metzler Education

How to Configure WPA2-Enterprise on Each Operating System

Automation is key for a positive user experience; the faster a monotonous task can be finished, the more time users can focus on important activities. Network authentication operates the same. Manually configuring operating systems can be a daunting task, even ...
wpa2 enterprise protocols

WPA2-Enterprise Authentication Protocols Comparison

Jake Ludin Education

WPA2-Enterprise Authentication Protocols Comparison

Securely authenticating network users is a fundamental aspect of network security and is the source of significant challenges for many network administrators. The network authentication method is one of the first lines of defense that protect users and the network …

Reducing IT support tickets

How to Efficiently Onboard Thousands of Devices

Jake Ludin Education

How to Efficiently Onboard Thousands of Devices

Each year, college campuses must navigate the trials associated with successfully connecting thousands of new students to the wireless network. This may have been moderately challenging 10 years ago, but the explosion of wireless devices in the past few years …