siteadmin:freeradius_certificate_tls_authentication
Differences
This shows you the differences between two versions of the page.
| Next revision | Previous revision | ||
| siteadmin:freeradius_certificate_tls_authentication [2021/05/07 07:28] – created admin | siteadmin:freeradius_certificate_tls_authentication [2021/05/07 08:11] (current) – [Apple MacOS configuration] admin | ||
|---|---|---|---|
| Line 5: | Line 5: | ||
| The hard bit is the certificates themselves. Not only do they have to work with RADIUS but they also have to cope with the idiosyncrasies of the operating systems they' | The hard bit is the certificates themselves. Not only do they have to work with RADIUS but they also have to cope with the idiosyncrasies of the operating systems they' | ||
| - | Instructions for generating client certificate PKI. | + | [[Client Certificate PKI Configuration|Instructions for generating client certificate PKI]]. |
| + | If you've got a RADIUS configuration that works for EAP-PEAP then the changes would be in the mods-available/ | ||
| + | < | ||
| + | eap { | ||
| + | ... | ||
| + | | ||
| + | tis-config { | ||
| + | ... | ||
| + | |||
| + | | ||
| + | | ||
| + | | ||
| + | ... | ||
| + | |||
| + | } | ||
| + | | ||
| + | |||
| + | </ | ||
| + | |||
| + | The private_key_file and the certificate_file define the server identity. The client carries the Root CA so that it can authenticate that the server is derived from the PKI. IF these are already set as part of the EAP-PEAP config then there' | ||
| + | |||
| + | The ca_file is actually used to authenticate the clients in the same way as above. When the client sends the certificate the server uses the Root CA to prove that the client is derived from the PKI. | ||
| + | |||
| + | =====eapol_test configuration===== | ||
| + | |||
| + | Using eapol_test is the easiest and most reliable way to test EAP-TLS | ||
| + | |||
| + | < | ||
| + | network={ | ||
| + | ssid=" | ||
| + | key_mgmt=WPA-EAP | ||
| + | eap=TLS | ||
| + | identity="< | ||
| + | ca_cert="< | ||
| + | client_cert="< | ||
| + | private_key="< | ||
| + | eapol_flags=3 | ||
| + | } | ||
| + | </ | ||
| + | |||
| + | =====Apple MacOS configuration===== | ||
| + | |||
| + | ProfileCreator and the CAT aren't good enough to generate suitable mobileconfig files. ProfileCreator doesn' | ||
| + | |||
| + | The only way appears to be to use Apple Configurator 2. | ||
| + | |||
| + | Create a profile that contains the client certificate, | ||
| + | |||
| + | {{: | ||
| + | |||
| + | {{: | ||
siteadmin/freeradius_certificate_tls_authentication.1620372510.txt.gz · Last modified: 2021/05/07 07:28 by admin
