Configuring Certificate Authentication for a Wireless Network - risual (2024)

risualmarketing | 23rd August 2018 | Windows

Recently we had a customer who wanted to pilot the use of certificate-based authentication for their wireless network.

They had a new internal Public Key Infrastructure (PKI) capable of issuing required certificates and built a new Network Policy (NPS) server. Their wireless access points were Cisco Meraki devices, and the network team had created a new SSID with the relevant configuration on the network side.

The customer had Windows 10 devices and wished to have machines automatically connect to the new Wi-Fi network when in the office, only allowed on if they have the appropriate certificates present. They wanted to use PEAP with Certificates (EAP-TLS) which requires the presence of a computer certificate and a user certificate on the Windows 10 device and they wanted the Windows 10 devices to be able to authenticate to the Wi-Fi before user logon, so that various domain based scripts and processes were able to run before the user logged in. Currently they are using group policy to manage Windows 10 rather than Intune although this is coming in the near future.

So, the job was to make it work given the current setup. There are some reasonable bits and pieces of info out there about it, but we could not really find anything that collected everything in one place, so in this blog I’m trying to summarise the steps we performed in each area.

There were several areas we had to look at:

  • NPS server configuration
  • Group Policy (for deployment of wireless settings)
  • Client certificates
  • Meraki Configuration

This blog assumes some understanding of the components we configured and shows how we dealt with some of the “gotchas”. It may not be applicable for every scenario.

The following Microsoft article was used as a rough guide https://blogs.technet.microsoft.com/networking/2012/05/30/creating-a-secure-802-1x-wireless-infrastructure-using-microsoft-windows/

NPS server

The things to consider when configuring the NPS server (we looked at these as pre-requisite checks)

  • The NPS server should be a domain joined server.
  • It should be in the RAS and IAS servers AD group; this will allow it to enrol for a server a certificate from the RAS and IAS servers Certificate template (assuming this template has been published on your Certificate Authority).
  • Following on from this, ensure the NPS server has the appropriate root CA / issuing CA certs in the appropriate local stores and there is an autoenrollment policy that enrols the NPS server cert from the RAS and IAS certificate template. If you don’t have a valid chain of trust you will hit issues, and if you don’t have autoenrollment you’ll need to remember to manually renew the NPS server certificate around the end of the validity period.
  • The NPS server will need to be authorised in AD from NPS console.
  • Enable NPS logging to full range of events can be seen in event viewer auditpol /set /subcategory:”Network Policy Server” /success:enable /failure:enable – a useful thing from another risual blog!

The first thing we did in the NPS console was create a RADIUS client for the Meraki Wireless Access point working with the network team – this is fairly straightforward; we gave the Radius client a friendly name, IP address and working with the network team entered a shared secret. This shared secret the network team generated was 60+ characters, it did not have any special characters just a mix of upper and lower case and numbers. Further down the line when testing connectivity, we found we were getting NPS errors Event ID 18 every time we tried to connect to the Wi-Fi.

Configuring Certificate Authentication for a Wireless Network - risual (1)

This is indicative of a shared secret issue. I’m not sure where the limitation lies, the Meraki or the Microsoft side, but when we generated a 30-character secret and updated both ends, we no longer had an issue.

The following NPS settings were deployed via the setup wizard, which gave us two polices – a connection request policy and a network policy.

Configuring Certificate Authentication for a Wireless Network - risual (2)

Configuring Certificate Authentication for a Wireless Network - risual (3) Configuring Certificate Authentication for a Wireless Network - risual (4)

Configuring Certificate Authentication for a Wireless Network - risual (5) Configuring Certificate Authentication for a Wireless Network - risual (6)

The rest of the Wizard was completed with default settings.

There is not a great deal to look at in the Connection Request Policy created. It shows the use of Wireless 802.1x and the requests being authenticated on the server.

In the network policy, we made sure that in the constraints that PEAP is the only authentication method and all the less secure authentication methods are unchecked and these settings reflect what was chosen in the NPS 802.1x wizard.

Configuring Certificate Authentication for a Wireless Network - risual (7)

This should be sufficient configuration on the NPS server side.

GPO for Wireless settings

The following settings were configured in GPO to apply Wireless 802.11 settings to some test clients

In a GPO: Computer configuration > Policies > Windows settings > Security settings > Wireless Network IEEE (802.11) Settings

We created a new policy and gave it a friendly name and added a new Infrastructure profile to this. The SSID created on the Meraki was hidden, and the Profile name in this GPO is what the clients could see as a wireless network.

Configuring Certificate Authentication for a Wireless Network - risual (8) Configuring Certificate Authentication for a Wireless Network - risual (9)

Configuring Certificate Authentication for a Wireless Network - risual (10)

A couple of things to note here:

We had an issue when testing where we could see on the NPS server logs the computer account being denied certificate logon via NPS, but the user was granted. We found that in the GPO on the security tab of the profile, advanced settings, checking the ‘Enable Single Sign on’ check box and the radio button ‘Perform immediately before user logon’ sorted this issue . This setting specifies 802.1x authentication happens before user logon, and meant that we could see after this was applied a successful grant of access on the computer logon on the NPS server. After this when the user logged on, we could see that some computer-based scripts were running successfully as the domain connectivity was there though the Wi-Fi before the user logged on.

Configuring Certificate Authentication for a Wireless Network - risual (11)

We also had an issue where sometimes the computer appeared to connect to the Wi-Fi profile at the logon screen, sometimes not it almost seemed like sometimes the network was there, sometimes it wasn’t. We used the check box on the connection tab of the profile ‘connect even if the network is not broadcasting’. After this was applied, the computer consistently always automatically connected to the Wi-Fi profile.

Clients and users

The Microsoft documentation states that if using PEAP-TLS to have User certificate and computer certificate; we did try testing without a user certificate deployed and got the error “You do not have a valid certificate” when trying to connect to the WiFi.

There doesn’t seem to be much guidance as to what certificate templates to use, so as a test we duplicated the default User and Computer templates in PKI. They both have uses of client authentication in their properties. For ease of management there should be some sort of autoenrollment mechanism configured in AD GPOs to get these user and computer certs out and also the root / intermediate certificates to clients.

Note also if in the Certificate templates, the option to publish in AD has been enabled, and the setting which says ‘don’t allow duplicate certificates against an account’ is checked then a user logging on to a second machine won’t get a certificate on the 2nd machine. May be something to look out for if you are having trouble getting certificates issued. Also remember if you are adding users and computers to groups then there may need to be a logoff / on or reboot to update permissions and a Gpupdate before you see a certificate in the appropriate personal store.

Meraki

We didn’t have much visibility of what the configuration was here but was assured for the Meraki we had it was up to date with all the latest firmware (this has bitten me before when working with 802.1x having creaking old network kit!). Also assured that the right ports were configured for communicating with the NPS server and there was nothing in the way.

As mentioned above we had the issue with the SSID. The Meraki was set to not broadcast its network SSID – we did find that checking the IEEE 802.11 GPO setting to “connect if network not broadcasting” seemed to solve the intermittent connectivity issues we had and connectivity to the new network at the logon sceen was consistent after that.

Summary

With this all in place, we were able to see:

  • Client connecting automatically to the wireless profile at logon screen
  • On the NPS server could see a granted event on Protected EAP / Smart card or other certificate against the computer account.
  • User logged on; could see one of the customers own logon processes running as we would if the machine was connected to the wired network before user logon
  • On the NPS server, could see granted event on Protected EAP / Smart card or other certificate against the user account
  • The user could access network resources as per being on the corporate network, and the network team could see us connected on the Meraki side.

SHARE

About the author

risualmarketing

Configuring Certificate Authentication for a Wireless Network - risual (2024)

FAQs

What is wireless certificate authentication? ›

Granular Access Control: WiFi certificate authentication allows administrators to implement granular access controls. Different users or devices can be granted different levels of access based on their credentials, providing administrators with fine-tuned control over network permissions.

How do I set up certificate-based authentication? ›

Certificate-based authentication
  1. Load required key pairs and certificates for Code Signing.
  2. Prepare Circle of Trust certificates.
  3. Import and install certificates for Circle of Trust.
  4. Turn on Code Signing.
  5. Create Code Signing key pairs and certificates.
  6. Specify custom rules in ECC firewall.

What is the authentication method used for the wireless network? ›

There are three main methods of authentication that are used on today's wireless LANs: open authentication. shared authentication. EAP (Extensible Authentication Protocol) authentication.

What does it mean when Wi-Fi asks for certificate? ›

Certificate-based Wi-Fi authentication is a method of authentication that uses digital certificates to establish the identity of a user or device on a Wi-Fi network.

What is an example of certificate authentication? ›

Certificate-Based Authentication Definition

A couple of notable examples of its ubiquity include the humble smart card often used for access to offices and other buildings, the widely used SSL/TLS protocol featured in web browsers, and CBA is even found in any implementation of Public-Key Infrastructure (PKI).

What is the best authentication method for wireless? ›

When choosing from among WEP, WPA, WPA2 and WPA3 wireless security protocols, experts agree WPA3 is best for Wi-Fi security. As the most up-to-date wireless encryption protocol, WPA3 is the most secure choice. Some wireless APs do not support WPA3, however.

How do I create a certificate of authentication? ›

What should you include on a Certificate of Authenticity?
  1. Signature (preferably of the artist, hand signed, not photocopied)
  2. Name of piece/subject featured.
  3. Date it of creation.
  4. Dimensions.
  5. Details of the medium used.
  6. Number of prints made (if the piece is a limited edition)
  7. Any extra details you see fit.

How do I create a client certificate authentication? ›

How to establish client certificate authentication
  1. The client sends a request to the server.
  2. The server presents its SSL certificate to the client.
  3. The client validates the server's SSL certificate with the certificate authority that issued the server's certificate.

How do I authenticate a network device? ›

1 Password-based authentication

The simplest and most common way to authenticate network access is by using passwords. Users enter their username and password to log in to a network service or device. Passwords are stored in a database or directory service, such as Active Directory, and checked against the user input.

What are the three major types of authentication in modern Wi-Fi networks? ›

For any Wi-Fi network, there are 3 available authentication modes: Open, Personal, Enterprise (more on these later). Encryption provides data confidentiality. It prevents unauthorised parties from being able to read the data transmitted between a device and an access point.

What authentication does my Wi-Fi use? ›

Access the Wi-Fi connection settings. Find your wireless network on the list of available networks. Tap the network name or info button to pull up the network configuration. Check the network configuration for the security type.

How to install wireless network certificate? ›

Tap Settings > Security or Settings > Security & location > Encryption and credentials (depending on the Android version) Tap "install from storage". Navigate to the location where you saved the certificate or key store. Tap the certificate or key store to install it.

What certificate should I use for Wi-Fi? ›

CWT® - Certified Wireless Technician is an entry-level certification for teaching technicians to install and configure Wi-Fi at the basic level. CWT provides the skills needed to install and configure an AP to specifications and configure a client device to connect to and use the WLAN.

How do I fix my Wi-Fi certificate? ›

If the problem persists, you can manually reset the network by following the given instructions.
  1. Navigate to Settings in the Start menu.
  2. Click Network & Internet option.
  3. Navigate to the Status icon.
  4. Click and open the Network Reset option.
  5. Click the Reset Now tab and open it.
Dec 16, 2022

What is the purpose of certificate authentication? ›

Certificate-based authentication is a much stronger form of authentication and eliminates vulnerable passwords. Eliminating passwords also decreases the possibility of phishing or brute force attacks from bad actors. Streamline authentication.

What does it mean when a Wi-Fi certificate is not trusted? ›

The most common cause of a "certificate not trusted" error is that the certificate installation was not properly completed on the server (or servers) hosting the site.

What is a certificate of authentication? ›

A certificate of authenticity is a document guaranteeing the authenticity of an artwork. It confirms that the artwork has been created by the artist associated with it.

What does it mean when Wi-Fi says authentication? ›

A Wi-Fi authentication error appears when a device cannot securely connect to the Wi-Fi network even when using the correct password. In many cases, this problem occurs because your device fails to verify its identity to the Wi-Fi access point or doesn't meet the authentication requirements set by the Wi-Fi network.

References

Top Articles
21 Easy Fall Dinner Recipes That Will Best For Celebrate!
Simple Living Eating: Healthy Recipes, Meal Plans & Nutrition Tips
Tlc Africa Deaths 2021
Breaded Mushrooms
Ofw Pinoy Channel Su
Red Wing Care Guide | Fat Buddha Store
Bluegabe Girlfriend
Clafi Arab
Rochester Ny Missed Connections
Palace Pizza Joplin
Animal Eye Clinic Huntersville Nc
10 Free Employee Handbook Templates in Word & ClickUp
Seattle Rpz
Missing 2023 Showtimes Near Landmark Cinemas Peoria
Leader Times Obituaries Liberal Ks
Fdny Business
Transfer and Pay with Wells Fargo Online®
Video shows two planes collide while taxiing at airport | CNN
Joann Ally Employee Portal
Why Does Lawrence Jones Have Ptsd
Wgu Academy Phone Number
Ahrefs Koopje
Kaitlyn Katsaros Forum
Quest: Broken Home | Sal's Realm of RuneScape
Ppm Claims Amynta
Dewalt vs Milwaukee: Comparing Top Power Tool Brands - EXTOL
Craigslist Maryland Trucks - By Owner
Apparent assassination attempt | Suspect never had Trump in sight, did not get off shot: Officials
Watson 853 White Oval
Cable Cove Whale Watching
2015 Kia Soul Serpentine Belt Diagram
Hannah Jewell
Die wichtigsten E-Nummern
What Is The Lineup For Nascar Race Today
Chadrad Swap Shop
Have you seen this child? Caroline Victoria Teague
Helloid Worthington Login
20 Best Things to Do in Thousand Oaks, CA - Travel Lens
Sam's Club Gas Prices Deptford Nj
Letter of Credit: What It Is, Examples, and How One Is Used
Sams Gas Price Sanford Fl
Tricia Vacanti Obituary
Florida Lottery Claim Appointment
Autum Catholic Store
Mychart Mercy Health Paducah
Brake Pads - The Best Front and Rear Brake Pads for Cars, Trucks & SUVs | AutoZone
Juiced Banned Ad
Hillsborough County Florida Recorder Of Deeds
Lagrone Funeral Chapel & Crematory Obituaries
Latest Posts
Article information

Author: Chrissy Homenick

Last Updated:

Views: 6428

Rating: 4.3 / 5 (54 voted)

Reviews: 93% of readers found this page helpful

Author information

Name: Chrissy Homenick

Birthday: 2001-10-22

Address: 611 Kuhn Oval, Feltonbury, NY 02783-3818

Phone: +96619177651654

Job: Mining Representative

Hobby: amateur radio, Sculling, Knife making, Gardening, Watching movies, Gunsmithing, Video gaming

Introduction: My name is Chrissy Homenick, I am a tender, funny, determined, tender, glorious, fancy, enthusiastic person who loves writing and wants to share my knowledge and understanding with you.