Sunday, February 1, 2015

How to ensure secure communications using the equipment … – Computerworld

It is worth to discuss how 802.1X configuration mechanisms Android and Apple devices, not only with the use of a username and password, and also certificates. When a secure corporate network are connected Android device, users often are asked about the parameters that are not fully understood. When we connect the device supported by iOS – iPad, iPhone, iPod – it’s easier, users are usually only asked for a username and password. They do not need to edit the advanced 802.1X settings on the device.

In the case of certificates 802.1X authentication, we can achieve in two ways. The first method uses the certificate to verify the identity of the authentication server. User authentication is performed here in a second step, using the user name and password. The second method uses the certificate to verify the identity of the authentication server and the user’s certificate to verify the user.

See also:

Configure 802.1X settings on Android

When a user joins Android for the first time the company and a secure Wi-Fi network through 802.1X protocol, you will see a dialog box with information about the authentication settings. Settings may seem difficult to understand for many users, but usually require two fields: “Identity (username)” and “Password”.

If you have not selected the correct EAP method, it is necessary to indicate the method used by authentication server (PEAP, TLS, TTLS, FAST, LEAP). Then, for the majority of EAP methods, it is possible to determine the certificate, which should be installed. For TLS method can also specify a user certificate, which should be installed.

Configure 802.1X Android – parameters

Authentication Phase 2 (Phase 2 Authentication) – specifies the external authentication method, for example, MS-CHAPv2. Select the method supported by the authentication server. If you are not sure, try to select “None”.

Identity (Identity) – indicate the user name, which may include a domain name, for example adam@idg.com.pl, depending on the individual networks.

An anonymous identity (Anonymous Identity) – the default user (Identity) is sent twice to the authentication server. For the first time, shipping is not encrypted and is determined by the external name of identity (Anonymous Identity). The second time, the identity is sent inside an encrypted tunnel, which is referred to the name of the inner identity. In most cases, is not used in the first internal identity and the identity of the non-encrypted transmission, which prevents peering and capturing credentials. It is possible that the authentication server will require a valid transfer of the domain name. It is recommended to use a random user name, such as “anonymous” or “anonymous@domain.com” if you are required to enter the domain name.

Enter password (Enter password) – the place in which it is placed on the password associated with username.

You can always edit the settings discussed in the future. Just specify the network name and select “Modify network config.”

Installation of certificates in Android

If the network model is used for authentication based on certificates – for example, TLS – the first thing you should take is to install a digital certificate of the server and / or user. Find out more about how to install the certificate on Android devices, even if it is not used for configuration of authentication based on certificates. For most of the authentication methods, you can optionally install the certificate from Certificate Authority, which is used to verify the authentication server. Just like in Windows, secured communication prevents attacks certificates MITM (Man In The Middle). Digital certificates are small files with extensions, for example, p12, .pfx, .crt.

Welcome to conferences and workshops
 


 
  5-6 March 2015.
 
  Sign up
 

 Topics relating to safety is an important aspect of the IT companies. In addition to resolving the current problems it is necessary to strictly technological knowledge of current legislation on the protection of information in the company both from external threats and dangerous activity of employees. The aim of the workshop is to provide practical knowledge about the internal monitoring of workers ‘and employers’ relatio ns, data protection …

 


 
  19 February 2015.
 
  Sign up
 

 Complement fixed speeches at the conference in 2015 Techworld e-seminars will be delivered online via the Internet. In this electronic form will provide information relating to these aspects of infrastructure that is difficult to show on stage. Participants will learn about such aspects as the implementation process, some technical details, and also shown live elements discussed infrastructure. E-seminars are conducted in an inter active format, so …

LikeTweet

No comments:

Post a Comment