Mandatory server-certificate validation
Clients must verify the RADIUS server's certificate before sending credentials. Closes the evil-twin attack that plagued mis-configured WPA2-Enterprise deployments.
Deploy WPA2-Enterprise or WPA3-Enterprise with 802.1X on your existing access points. Every user authenticates against your identity provider, every device gets a unique session key, and access can be revoked per-device in a single click. Purple operates the RADIUS and certificate infrastructure as a cloud service — you keep the hardware you already own.
The WPA standard has two modes. WPA-Personal (WPA2-PSK, WPA3-SAE) uses a single password shared across everyone who joins the SSID. Good enough for a home. WPA-Enterprise authenticates each user or device individually via 802.1X against a RADIUS server. Required for any venue that cares about revocation, audit, or compliance.
| WPA-Personal (PSK / SAE) | WPA-Enterprise (802.1X) | |
|---|---|---|
| Credential | Shared passphrase | Per-user certificate, password, or iPSK |
| Infrastructure | Just the access points | APs + RADIUS server (or RADIUS-as-a-Service) |
| Revocation | Rotate the network-wide passphrase | Disable one user in the IdP |
| Audit trail | None — all devices look identical | Per-user session logs |
| Right for | Homes, tiny single-trust venues | Offices, hotels, campuses, stadiums, anything regulated |
WPA3 is not just a bigger WPA2. Four changes matter for enterprise deployments.
Clients must verify the RADIUS server's certificate before sending credentials. Closes the evil-twin attack that plagued mis-configured WPA2-Enterprise deployments.
Deauthentication and disassociation frames are cryptographically signed, so attackers can no longer knock clients off the network with spoofed frames.
Optional high-security mode for government, defence, and critical infrastructure. Suite B cryptography throughout — key exchange, encryption, and MAC.
WPA3-Enterprise can run in transition mode on the same SSID as WPA2, so you do not need a hard cutover. Newer clients negotiate WPA3; older ones fall back to WPA2-Enterprise.
Three actors, one handshake. The sequence is the same whether you use EAP-TLS, PEAP, or EAP-TTLS.
Access-Accept with VLAN and policy; the AP opens the controlled port to the correct segment.Purple operates the RADIUS and (optionally) the certificate authority as cloud services. You keep your existing access points.
WPA-Enterprise is the IEEE 802.11 security mode designed for organisations. Instead of a single shared password (WPA-Personal), each user or device authenticates individually against a RADIUS server via 802.1X, typically with a certificate (EAP-TLS) or username and password (PEAP). Every session gets a unique encryption key, and access can be revoked per-device without disrupting the rest of the network.
WPA3-Enterprise fixes known weaknesses in WPA2-Enterprise. The most important changes: server-certificate validation is now mandatory (closes the evil-twin attack vector that plagued WPA2), management frames are protected, and the optional 192-bit Suite B mode offers defence-grade cryptography. WPA3-Enterprise is backwards-compatible with WPA2-Enterprise in a transition mode, so you can upgrade gradually.
Three parties are involved. The supplicant (client device) asks to join. The authenticator (access point) holds the client in a quarantine state and forwards its EAP messages to an authentication server (RADIUS). The RADIUS server validates the credential — certificate, password, or token — and tells the access point to admit or reject. Each successful session gets a unique encryption key derived from the authentication, so one compromised device cannot decrypt another.
EAP-TLS uses a TLS handshake with mutual certificate authentication. The client proves its identity with a device certificate, the server proves its identity with a server certificate, and the session key is negotiated inside the encrypted tunnel. There is no password to phish or steal — you would have to extract the private key from the device itself. For managed fleets with an MDM, EAP-TLS is the right default.
Most enterprise-grade access points released from 2020 onwards support WPA3-Enterprise in firmware. You typically enable WPA3-Enterprise on the SSID and keep WPA2 as a fallback during the transition. Older APs may only support WPA2-Enterprise — those are still secure when paired with cloud RADIUS and EAP-TLS, so a forklift upgrade is rarely needed.
Yes — WPA-Enterprise is defined around an external authentication server, which in practice means RADIUS. You can run it on-premise (FreeRADIUS, Microsoft NPS, Cisco ISE) or consume it as a service. Purple RADIUS-as-a-Service is the cloud-hosted option most customers pick when they do not want to operate servers.
Yes, when deployed correctly. The known attacks on WPA2-Enterprise all require either a mis-configured client (no server-certificate validation, which is what WPA3 makes mandatory) or physical access to a device. Enforcing server-certificate validation via MDM and using EAP-TLS closes the practical risks. WPA3-Enterprise is still preferred going forward, but there is no reason to panic-migrate a working WPA2-Enterprise deployment.
Two good options. First, iPSK (Identity PSK) gives each device a unique pre-shared key on a single SSID — the user experience of WPA-Personal, the per-device revocation of WPA-Enterprise. Second, MAC Authentication Bypass (MAB) admits known-good MAC addresses to a constrained VLAN. Purple supports both alongside WPA2/3-Enterprise on the same network.
Purple layers WPA2/3-Enterprise, cloud RADIUS, and managed certificates on top of Cisco, Aruba, Ruckus, Juniper Mist, Meraki, or Ubiquiti. Live in days.