IndexLayout.skipToMainContent

EAP-TLS सह Android डिव्हाइसेसवर Enterprise WiFi कसे सेट करावे

हे तांत्रिक संदर्भ मार्गदर्शक वरिष्ठ IT नेत्यांना Android डिव्हाइसेसवर 802.1X EAP-TLS प्रमाणीकरण तैनात करण्यासाठी एक व्यापक योजना प्रदान करते. यात आर्किटेक्चरल मेकॅनिक्स, मॅन्युअल आणि MDM-आधारित अंमलबजावणी धोरणे आणि एंटरप्राइझ वायरलेस नेटवर्क सुरक्षित करण्यासाठी आवश्यक असलेल्या समस्यानिवारण पद्धतींचा समावेश आहे.

📖 5 min read📝 1,161 words🔧 2 worked examples3 practice questions📚 8 key definitions

Listen to this guide

View podcast transcript
How to Set Up Enterprise WiFi on Android Devices with EAP-TLS A Purple Technical Briefing — Approximately 10 Minutes --- INTRODUCTION AND CONTEXT — approximately 1 minute Welcome to the Purple Technical Briefing series. I'm your host, and today we're getting into the specifics of deploying 802.1X EAP-TLS authentication on Android devices — whether you're managing a hotel estate, a retail chain, a stadium, or a public-sector campus. If you're responsible for a network that needs to authenticate corporate or BYOD Android devices without relying on shared passwords, this episode is for you. EAP-TLS is the gold standard for enterprise WiFi security — it uses mutual certificate-based authentication, which means no credentials to phish, no passwords to rotate, and a compliance posture that satisfies PCI DSS, ISO 27001, and most public-sector security frameworks. By the end of this briefing, you'll understand exactly how EAP-TLS works on Android, what your deployment options are, and the three most common mistakes that cause failed rollouts. Let's get into it. --- TECHNICAL DEEP-DIVE — approximately 5 minutes Let's start with the architecture. 802.1X is the IEEE standard that governs port-based network access control. When an Android device connects to an enterprise WiFi network — one configured as WPA2-Enterprise or WPA3-Enterprise — the access point acts as what's called an authenticator. It doesn't make the authentication decision itself; it passes the conversation between the device and a RADIUS server, which is the actual authentication server. EAP-TLS — that's Extensible Authentication Protocol with Transport Layer Security — is the authentication method running inside that 802.1X framework. What makes it different from EAP-PEAP or EAP-TTLS, which use username and password inside a TLS tunnel, is that EAP-TLS uses X.509 certificates on both sides. The RADIUS server presents a server certificate to the device, and the device presents a client certificate back to the RADIUS server. Both parties validate each other. That's mutual authentication, and it's what makes EAP-TLS the most secure option available. Now, on Android specifically, there are a few things you need to understand. Android 11 and later introduced stricter certificate validation requirements. If you're deploying on Android 11 or above — which at this point is the vast majority of your estate — the device will refuse to connect unless the RADIUS server certificate is explicitly trusted. You cannot rely on the system trust store alone; you must either push the root CA certificate to the device or configure the WiFi profile to explicitly reference it. Let's talk about the certificate chain. You need three components in place before a single Android device can authenticate via EAP-TLS. First, a Certificate Authority — either your internal PKI, Microsoft Active Directory Certificate Services, or a cloud PKI like SCEP via Intune. Second, a server certificate issued to your RADIUS server, signed by that CA. Third, a unique client certificate issued to each device or user, also signed by the same CA. The device presents its client certificate during the TLS handshake, and the RADIUS server validates it against the CA's certificate revocation list, or CRL, or via OCSP — Online Certificate Status Protocol. For Android, the client certificate and private key are typically packaged as a PKCS12 file — that's a dot-P12 or dot-PFX file — which contains both the certificate and the encrypted private key. On a manually configured device, the user imports this file through Settings, then Security, then Install a Certificate. On an MDM-managed device, the certificate is silently pushed to the device's managed keystore — no user interaction required. Now let's talk about the WiFi profile itself. When configuring an enterprise WiFi connection on Android, you need to specify: the SSID, the security type — WPA2-Enterprise or WPA3-Enterprise — the EAP method — which is TLS — the CA certificate for server validation, the client certificate for device authentication, and the identity string, which is typically the device's Common Name or the user's UPN. On Android 11 and above, you also need to specify the domain suffix match or the server certificate subject to prevent man-in-the-middle attacks. For MDM deployments — and this is where the real scale comes in — you're pushing all of this as a structured configuration profile. In Microsoft Intune, you create a SCEP certificate profile that automatically requests and installs a unique client certificate on each enrolled Android device. You then create a WiFi configuration profile that references that certificate profile. When the device checks in, it receives both the certificate and the WiFi profile, and it connects to your 802.1X network automatically. No user interaction, no support calls. If you're using Intune for this, our companion guide on how to use Microsoft Intune to push WiFi certificates to devices walks through the exact configuration steps — I'd recommend reading that alongside this briefing. For VMware Workspace ONE and Jamf Connect, the process is architecturally identical — SCEP or PKCS certificate profile, followed by a WiFi profile that references it. The specific UI differs, but the certificate chain and RADIUS configuration requirements are the same. One thing worth flagging on the RADIUS side: if you're running FreeRADIUS, Microsoft NPS, or Cisco ISE, make sure your server certificate includes the correct Extended Key Usage attributes — specifically, Server Authentication, OID 1.3.6.1.5.5.7.3.1. Android is strict about this. A certificate that works fine with Windows clients may fail on Android if the EKU is missing or misconfigured. --- IMPLEMENTATION RECOMMENDATIONS AND PITFALLS — approximately 2 minutes Right, let's talk about what actually goes wrong in the field, because this is where most deployments hit trouble. The first and most common failure is certificate trust. Android 11 and above will not connect if the RADIUS server's certificate chain cannot be validated. The fix is straightforward: push your root CA certificate to the device's user certificate store via MDM, and explicitly reference it in the WiFi profile's CA certificate field. Do not leave this as "Do not validate" — that's a security hole and it will fail on some Android versions anyway. The second pitfall is certificate expiry. Client certificates typically have a one- to two-year validity period. If you don't have automated renewal in place via SCEP or NDES, you will wake up one morning to find that half your device estate has lost WiFi access simultaneously. Build certificate renewal automation into your MDM workflow from day one, not as an afterthought. The third issue is RADIUS server capacity. EAP-TLS handshakes are computationally more expensive than PEAP handshakes because of the full mutual certificate exchange. At a stadium or conference centre with thousands of simultaneous authentications, an undersized RADIUS server will become a bottleneck. Size your RADIUS infrastructure for peak concurrent authentications, not average load. Finally, on the Android side, be aware that different manufacturers — Samsung, Google, Xiaomi — have slightly different implementations of the WiFi configuration API. Test your MDM-pushed profiles on representative devices from each manufacturer in your estate before rolling out at scale. Samsung devices in particular have historically required the identity field to be explicitly set, even when it can be inferred from the certificate. --- RAPID-FIRE Q AND A — approximately 1 minute A few quick questions I get asked regularly. Can I use EAP-TLS for BYOD devices? Yes, but it requires the user to install a client certificate on their personal device. For BYOD at scale, consider whether EAP-TTLS with PAP or PEAP-MSCHAPv2 is a more practical trade-off, with EAP-TLS reserved for corporate-owned devices. Does EAP-TLS work with WPA3-Enterprise? Yes, and WPA3-Enterprise with 192-bit mode actually mandates EAP-TLS. If you're deploying WPA3-Enterprise in high-security environments, EAP-TLS is your only compliant option. What's the minimum Android version I should target? Android 8 and above supports EAP-TLS natively. For Android 11 and above, enforce explicit CA certificate validation. For Android 13 and above, you can leverage the improved certificate management APIs for more granular control. Can Purple's platform integrate with EAP-TLS networks? Purple's guest WiFi and analytics platform operates on a separate SSID from your 802.1X corporate network. Your corporate devices authenticate via EAP-TLS on the secure SSID, while guest devices use Purple's captive portal on the guest SSID. The two coexist on the same access point infrastructure, with VLAN separation providing the security boundary. --- SUMMARY AND NEXT STEPS — approximately 1 minute To wrap up: EAP-TLS on Android is the most secure enterprise WiFi authentication method available, and with modern MDM tooling it's entirely practical to deploy at scale. The three things to get right are: a properly configured PKI with automated certificate renewal, explicit CA certificate trust on Android 11 and above, and a RADIUS infrastructure sized for peak load. If you're deploying at a venue with mixed corporate and guest traffic, Purple's platform gives you the analytics and engagement layer on the guest network while your EAP-TLS infrastructure secures the corporate side. The two complement each other well. For your next steps: review our architecture diagram in the full guide, work through the Intune deployment walkthrough, and run a pilot on a subset of devices before rolling out to your full estate. Start with a controlled group of fifty devices, validate certificate delivery and WiFi connectivity, then scale with confidence. Thanks for listening to the Purple Technical Briefing. You'll find the full written guide, diagrams, and configuration references at purple.ai. Until next time.

header_image.png

कार्यकारी सारांश

क्रेडेंशियल चोरी आणि अनधिकृत प्रवेशापासून एंटरप्राइझ वायरलेस नेटवर्क सुरक्षित करण्यासाठी सामायिक पासवर्डच्या पलीकडे जाणे आवश्यक आहे. कॉर्पोरेट वातावरणातील Android डिव्हाइस फ्लीट्ससाठी, 802.1X EAP-TLS (Extensible Authentication Protocol with Transport Layer Security) हे निश्चित सुरक्षा मानक आहे. परस्पर प्रमाणपत्र-आधारित प्रमाणीकरणाचा लाभ घेऊन, EAP-TLS पासवर्ड थकवा, फिशिंग आणि कमकुवत क्रेडेंशियल्सशी संबंधित धोके दूर करते.

हे तांत्रिक संदर्भ मार्गदर्शक नेटवर्क आर्किटेक्ट्स, IT व्यवस्थापक आणि CTOs यांना Android डिव्हाइसेसवर EAP-TLS तैनात करण्यासाठी कृती करण्यायोग्य धोरणे प्रदान करते. Retail मधील पॉइंट-ऑफ-सेल टर्मिनल्स, Healthcare मधील क्लिनिकल डिव्हाइसेस किंवा Hospitality मधील बॅक-ऑफ-हाऊस ऑपरेशन्स व्यवस्थापित करत असताना, या उपयोजनावर प्रभुत्व मिळवल्याने मजबूत सुरक्षा अनुपालन (PCI DSS, GDPR, ISO 27001) सुनिश्चित होते, तसेच अंतिम वापरकर्त्यांसाठी अखंड कनेक्शन अनुभव मिळतो. आम्ही BYOD वातावरणासाठी मॅन्युअल कॉन्फिगरेशन आणि कॉर्पोरेट-मालकीच्या फ्लीट्ससाठी झिरो-टच MDM प्रोव्हिजनिंग दोन्हीचा समावेश करतो.


ब्रीफिंग ऐका


तांत्रिक सखोल विश्लेषण

802.1X आर्किटेक्चर आणि EAP-TLS मेकॅनिक्स

त्याच्या गाभ्यामध्ये, 802.1X हे पोर्ट-आधारित नेटवर्क ॲक्सेस कंट्रोलसाठी IEEE मानक आहे. वायरलेस संदर्भात, ॲक्सेस पॉइंट ऑथेंटिकेटर म्हणून कार्य करतो, Android डिव्हाइस (सप्लिकंट) आणि RADIUS सर्व्हर (ऑथेंटिकेशन सर्व्हर) यांच्यातील संवाद सुलभ करतो.

PEAP किंवा TTLS च्या विपरीत, जे TLS मध्ये लेगसी पासवर्ड प्रमाणीकरण टनेल करतात, EAP-TLS पूर्णपणे X.509 प्रमाणपत्रांवर अवलंबून असते. हे एक परस्पर प्रमाणीकरण प्रतिमान तयार करते:

  1. नेटवर्क कायदेशीर असल्याचे सिद्ध करण्यासाठी RADIUS सर्व्हर त्याचे प्रमाणपत्र Android डिव्हाइसला सादर करतो.
  2. Android डिव्हाइस अधिकृत एंडपॉइंट असल्याचे सिद्ध करण्यासाठी त्याचे अद्वितीय क्लायंट प्रमाणपत्र RADIUS सर्व्हरला सादर करतो.

eap_tls_architecture_overview.png

Android-विशिष्ट प्रमाणपत्र आवश्यकता

Android वर उपयोजन केल्याने विशिष्ट मर्यादा येतात, विशेषतः Android 11 पासून पुढे. मॅन-इन-द-मिडल (MitM) हल्ले कमी करण्यासाठी Google ने सर्व्हर प्रमाणपत्रांसाठी "Do not validate" पर्याय रद्द केला. परिणामी, Android डिव्हाइसकडे RADIUS सर्व्हरच्या प्रमाणपत्रावर स्वाक्षरी केलेले रूट CA प्रमाणपत्र असणे आवश्यक आहे.

शिवाय, RADIUS सर्व्हर प्रमाणपत्रात योग्य Extended Key Usage (EKU) ॲट्रिब्यूट्स असणे आवश्यक आहे—विशेषतः Server Authentication (OID 1.3.6.1.5.5.7.3.1). याशिवाय, Android सप्लिकंट TLS हँडशेक शांतपणे रद्द करेल.

क्लायंट बाजूसाठी, Android ला खाजगी की आणि प्रमाणपत्र बंडल केलेले असणे आवश्यक आहे, सामान्यतः PKCS#12 फॉरमॅटमध्ये (.p12 किंवा .pfx).

Purple च्या इकोसिस्टमसह एकत्रीकरण

EAP-TLS तुमच्या कॉर्पोरेट डिव्हाइसेस आणि ऑपरेशनल इन्फ्रास्ट्रक्चर सुरक्षित करत असताना, ठिकाण चालकांना अभ्यागत प्रवेश देखील व्यवस्थापित करणे आवश्यक आहे. येथेच ड्युअल-SSID धोरण महत्त्वाचे ठरते. तुमचा कॉर्पोरेट SSID 802.1X EAP-TLS वापरतो, तर तुमचा सार्वजनिक SSID Purple च्या Guest WiFi प्लॅटफॉर्मचा लाभ घेतो. हे विभाजन ऑपरेशनल सुरक्षा सुनिश्चित करते, तसेच मार्केटिंग टीमला गेस्ट नेटवर्कवर WiFi Analytics चा लाभ घेण्याची परवानगी देते. भौतिक पायाभूत सुविधा सुरक्षित करण्याच्या व्यापक दृष्टिकोनासाठी, Access Point Security: Your 2026 Enterprise Guide चा संदर्भ घ्या.


अंमलबजावणी मार्गदर्शक

Android वर EAP-TLS तैनात करणे लहान BYOD उपयोजनांसाठी मॅन्युअली किंवा एंटरप्राइझ स्तरासाठी Mobile Device Management (MDM) द्वारे केले जाऊ शकते.

mdm_deployment_comparison.png

पद्धत 1: मॅन्युअल कॉन्फिगरेशन (BYOD / लहान प्रमाणात)

ही पद्धत सपोर्ट-केंद्रित आहे आणि केवळ मर्यादित रोलआउट्स किंवा चाचणीसाठी शिफारस केली जाते.

  1. प्रमाणपत्र वितरण: .p12 क्लायंट प्रमाणपत्र आणि रूट CA .cer फाइल Android डिव्हाइसवर सुरक्षितपणे वितरित करा (उदा. सुरक्षित पोर्टल किंवा एन्क्रिप्टेड ईमेलद्वारे).
  2. स्थापना:
    • सेटिंग्ज > सुरक्षा > एन्क्रिप्शन आणि क्रेडेंशियल्स > प्रमाणपत्र स्थापित करा येथे नेव्हिगेट करा.
    • रूट CA ला "Wi-Fi प्रमाणपत्र" म्हणून स्थापित करा.
    • .p12 फाइल स्थापित करा, प्रॉम्प्ट केल्यावर एक्सट्रॅक्शन पासवर्ड प्रदान करा.
  3. नेटवर्क कॉन्फिगरेशन:
    • सेटिंग्ज > नेटवर्क आणि इंटरनेट > Wi-Fi वर जा आणि "नेटवर्क जोडा" निवडा.
    • SSID प्रविष्ट करा.
    • सुरक्षा WPA/WPA2/WPA3-Enterprise वर सेट करा.
    • EAP पद्धत TLS वर सेट करा.
    • CA प्रमाणपत्र स्थापित रूट CA वर सेट करा.
    • ऑनलाइन प्रमाणपत्र स्थिती प्रमाणपत्र स्थितीची विनंती करा वर सेट करा.
    • RADIUS सर्व्हरच्या प्रमाणपत्राच्या Subject Alternative Name (SAN) शी जुळण्यासाठी डोमेन सेट करा.
    • स्थापित क्लायंट प्रमाणपत्र निवडा.
    • ओळख प्रविष्ट करा (सामान्यतः वापरकर्त्याचे UPN किंवा डिव्हाइस MAC).

पद्धत 2: MDM-पुश केलेले प्रोफाइल (एंटरप्राइझ स्केल)

मोठ्या इस्टेटसाठी, जसे की विद्यापीठाचे कॅम्पस किंवा Transport मधील लॉजिस्टिक्स हब, MDM अनिवार्य आहे. हे झिरो-टच प्रोव्हिजनिंग आणि लाइफसायकल व्यवस्थापन प्रदान करते.

  1. PKI एकत्रीकरण: SCEP किंवा NDES वापरून तुमचा MDM (Intune, Workspace ONE, Jamf) तुमच्या प्रमाणपत्र प्राधिकरणाशी कनेक्ट करा.
  2. प्रमाणपत्र प्रोफाइल: रूट CA डिव्हाइस ट्रस्ट स्टोअरमध्ये पुश करण्यासाठी कॉन्फिगरेशन प्रोफाइल तयार करा. अद्वितीय क्लायंट प्रमाणपत्राची आपोआप विनंती करण्यासाठी आणि स्थापित करण्यासाठी दुसरे प्रोफाइल (SCEP) तयार करा.
  3. WiFi प्रोफाइल: तैनात केलेल्या प्रमाणपत्राला जोडणारे Wi-Fi कॉन्फिगरेशन प्रोफाइल तयार कराtes.
    • सुरक्षा प्रकार: WPA2/WPA3 Enterprise
    • EAP प्रकार: EAP-TLS
    • प्रमाणीकरण पद्धत: प्रमाणपत्र
    • सर्व्हर विश्वास: Root CA आणि अचूक सर्व्हर डोमेन नाव निर्दिष्ट करा.

मायक्रोसॉफ्ट-विशिष्ट तपशीलवार सूचनांसाठी, आमचे मार्गदर्शक पहा: How to Use Microsoft Intune to Push WiFi Certificates to Devices .


सर्वोत्तम पद्धती

  1. WPA3-Enterprise लागू करा: जिथे हार्डवेअर समर्थन करते, तिथे WPA3-Enterprise अनिवार्य करा. 192-बिट सुरक्षा सूटला EAP-TLS ची स्पष्टपणे आवश्यकता असते, ज्यामुळे सर्वोच्च क्रिप्टोग्राफिक मानके सुनिश्चित होतात.
  2. प्रमाणपत्र जीवनचक्र स्वयंचलित करा: क्लायंट प्रमाणपत्रे कालबाह्य होतात. जर तुम्ही मॅन्युअल नूतनीकरणावर अवलंबून असाल, तर तुम्हाला मोठ्या प्रमाणात व्यत्यय येतील. मुदतवाढीच्या 30 दिवस आधी प्रमाणपत्रे आपोआप नूतनीकरण करण्यासाठी SCEP/NDES लागू करा.
  3. मजबूत DNS लागू करा: प्रमाणपत्र रद्दबातल सूची (CRL) तपासणी आणि OCSP ला एजवरून विश्वसनीय DNS रिझोल्यूशनची आवश्यकता असते. अधिक माहितीसाठी Protect Your Network with Strong DNS and Security येथे वाचा.
  4. VLAN विभाजन: प्रमाणपत्र गुणधर्मांवर आधारित विशिष्ट VLANs मध्ये EAP-TLS प्रमाणित सत्रे मॅप करा (उदा. POS टर्मिनल्सना व्यवस्थापक टॅब्लेटपासून वेगळे करणे) Tunnel-Private-Group-Id सारख्या RADIUS गुणधर्मांचा वापर करून.

समस्यानिवारण आणि जोखीम कमी करणे

जेव्हा Android उपकरणे EAP-TLS द्वारे कनेक्ट होण्यात अयशस्वी होतात, तेव्हा समस्या जवळजवळ नेहमीच प्रमाणपत्र साखळीत किंवा RADIUS कॉन्फिगरेशनमध्ये असते.

  • लक्षण: Android 11+ उपकरणे वापरकर्त्याला सूचित न करता त्वरित डिस्कनेक्ट होतात किंवा "Authentication error" दाखवतात.
    • मूळ कारण: डिव्हाइस RADIUS सर्व्हर प्रमाणपत्रावर विश्वास ठेवत नाही. WiFi प्रोफाइलमधील "Domain" फील्ड सर्व्हर प्रमाणपत्राच्या SAN शी तंतोतंत जुळले पाहिजे आणि Root CA स्थापित केलेला असावा.
  • लक्षण: TLS हँडशेक दरम्यान कनेक्शन टाइम आउट होते.
    • मूळ कारण: RADIUS सर्व्हर क्लायंट प्रमाणपत्राची रद्दबातल स्थिती सत्यापित करण्यासाठी CRL वितरण बिंदूपर्यंत पोहोचू शकत नाही. तुमच्या RADIUS सर्व्हरला तुमच्या PKI च्या CRL एंडपॉइंट्सवर आउटबाउंड HTTP प्रवेश असल्याची खात्री करा.
  • लक्षण: Windows उपकरणे कनेक्ट होतात, परंतु Android उपकरणे अयशस्वी होतात.
    • मूळ कारण: RADIUS प्रमाणपत्रावर Server Authentication EKU गहाळ आहे, किंवा Android सप्लिकंट असमर्थित सिफर सूट वापरण्याचा प्रयत्न करत आहे. TLS वाटाघाटीतील अपयशांसाठी RADIUS लॉग तपासा.

ROI आणि व्यवसाय परिणाम

EAP-TLS मध्ये संक्रमण करण्यासाठी PKI आणि MDM पायाभूत सुविधांमध्ये प्रारंभिक गुंतवणुकीची आवश्यकता असते, परंतु वरिष्ठ IT नेत्यांसाठी गुंतवणुकीवरील परतावा लक्षणीय असतो.

  • हेल्पडेस्क खर्च कमी करणे: पासवर्ड रीसेट हे IT हेल्पडेस्क तिकिटांपैकी 20-30% असतात. प्रमाणपत्र-आधारित प्रमाणीकरण नेटवर्क प्रवेशासाठी पासवर्ड रोटेशन धोरणे काढून टाकते, ज्यामुळे समर्थन खर्च मोठ्या प्रमाणात कमी होतो.
  • जोखीम कमी करणे: EAP-TLS क्रेडेंशियल हार्वेस्टिंग आणि ऑफलाइन डिक्शनरी हल्ल्यांपासून प्रतिकारशक्ती प्रदान करते. Healthcare सारख्या नियमन केलेल्या उद्योगात एकाच उल्लंघनाचा खर्च PKI च्या तैनाती खर्चापेक्षा खूप जास्त असतो.
  • कार्यक्षम सातत्य: स्वयंचलित प्रमाणपत्र तरतूद सुनिश्चित करते की गंभीर कार्यक्षम उपकरणे—वेअरहाऊस स्कॅनरपासून ते रिटेल POS प्रणालींपर्यंत—कालबाह्य क्रेडेंशियल्समुळे नेटवर्कमधून कधीही बाहेर पडत नाहीत. Purple आपली पोहोच वाढवत असताना, Purple Signals Higher Education Ambitions with Appointment of VP Education Tim Peers सारख्या अलीकडील धोरणात्मक हालचालींनी अधोरेखित केल्याप्रमाणे, मजबूत मूलभूत कनेक्टिव्हिटी प्रगत विश्लेषण आणि सहभागासाठी सक्षम बनते.

Key Definitions

802.1X

An IEEE standard for port-based Network Access Control (PNAC) that provides an authentication mechanism to devices wishing to attach to a LAN or WLAN.

The foundational framework that prevents unauthorised devices from accessing the corporate network at the edge.

EAP-TLS

Extensible Authentication Protocol with Transport Layer Security. An authentication framework that uses X.509 certificates for mutual authentication between the client and the server.

Considered the most secure EAP type, it eliminates password reliance, making it essential for high-security environments.

RADIUS

Remote Authentication Dial-In User Service. A networking protocol that provides centralised Authentication, Authorization, and Accounting (AAA) management.

The server component (e.g., Cisco ISE, Microsoft NPS) that validates the Android device's certificate against the PKI.

Supplicant

The client device (in this case, the Android smartphone or tablet) that is requesting access to the network.

Understanding the supplicant's specific OS constraints (like Android 11's strict validation) is key to a successful deployment.

Authenticator

The network device (the WiFi Access Point) that facilitates the authentication process between the Supplicant and the RADIUS server.

The AP does not make the decision; it merely enforces the port control based on the RADIUS server's response.

PKI

Public Key Infrastructure. A set of roles, policies, hardware, software, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates.

The backbone of EAP-TLS. Without a robust PKI, certificate-based authentication is impossible.

SCEP

Simple Certificate Enrollment Protocol. A protocol designed to make the issuing and revocation of digital certificates as scalable as possible.

Used by MDM platforms to automatically provision client certificates to Android devices without user intervention.

SAN

Subject Alternative Name. An extension to X.509 that allows various values to be associated with a security certificate.

Android 11+ requires the 'Domain' field in the WiFi profile to match the SAN of the RADIUS server's certificate.

Worked Examples

A national retail chain needs to deploy 5,000 Android-based point-of-sale (POS) tablets. The security team mandates that these devices must not use shared passwords and must be immune to credential phishing. How should the infrastructure team approach this deployment?

The team must deploy a Mobile Device Management (MDM) solution integrated with their internal Public Key Infrastructure (PKI) via SCEP. The MDM will push a configuration profile containing the Root CA certificate, automatically request a unique client certificate for each POS tablet, and configure the WPA3-Enterprise WiFi profile to use EAP-TLS. The RADIUS server will be configured to assign these devices to an isolated POS VLAN based on successful certificate validation.

Examiner's Commentary: This is the optimal enterprise approach. Attempting manual configuration for 5,000 devices is operationally unviable. By using MDM and SCEP, the organisation achieves zero-touch provisioning and automated certificate renewal, satisfying the security mandate while minimising deployment friction.

A hospital IT manager is upgrading the wireless network. Following the upgrade, older Android 9 devices connect successfully to the EAP-TLS network, but newly procured Android 12 devices fail to authenticate, citing a trust error.

The IT manager must update the WiFi configuration profile pushed to the devices. Android 11+ enforces strict server certificate validation. The profile must be updated to explicitly define the Root CA certificate to trust and specify the exact 'Domain' (matching the RADIUS server's SAN) to prevent MitM attacks.

Examiner's Commentary: This highlights a critical OS-level change in Android's supplicant behaviour. Legacy 'Do not validate' configurations are a significant security risk and are hard-deprecated in modern Android versions. The solution correctly identifies the need for explicit trust configuration.

Practice Questions

Q1. Your organisation is migrating from PEAP-MSCHAPv2 to EAP-TLS. During the pilot phase, several Android 13 devices fail to connect. The RADIUS logs show that the TLS handshake is initiated but dropped by the client before the client certificate is sent. What is the most likely configuration error?

Hint: Consider the strict validation requirements introduced in recent Android versions regarding the server's identity.

View model answer

The most likely error is that the WiFi profile pushed to the Android 13 devices does not correctly specify the 'Domain' suffix match, or the Root CA is not properly linked in the profile. Android drops the connection to prevent a Man-in-the-Middle attack because it cannot validate the RADIUS server's certificate.

Q2. You are designing the architecture for a large stadium deployment. The client wants to use EAP-TLS for all staff devices. What specific infrastructure component must be scaled up compared to a standard WPA2-PSK network, and why?

Hint: EAP-TLS involves complex cryptographic operations during the connection phase.

View model answer

The RADIUS server infrastructure must be significantly scaled up. EAP-TLS requires full mutual certificate validation (asymmetric cryptography), which is computationally expensive. In a stadium environment with thousands of devices potentially roaming or authenticating simultaneously, an undersized RADIUS deployment will cause authentication timeouts and connection failures.

Q3. A client certificate is compromised on a lost Android tablet. What is the exact mechanism by which the network prevents this device from connecting via EAP-TLS?

Hint: How does the RADIUS server know the certificate is no longer valid before its expiration date?

View model answer

The IT administrator revokes the client certificate in the PKI. The PKI updates its Certificate Revocation List (CRL) or OCSP responder. When the lost tablet attempts to connect, the RADIUS server checks the client certificate against the CRL/OCSP. Seeing it is revoked, the RADIUS server rejects the authentication request.