<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: dot1x: common name for radius certificate in Wireless Questions and Best Practices</title>
    <link>https://community.ruckuswireless.com/t5/Wireless-Questions-and-Best/dot1x-common-name-for-radius-certificate/m-p/53566#M2235</link>
    <description>&lt;P&gt;hello,&lt;/P&gt;&lt;P&gt;so, you suggest a public CA with 12 month certificate (my other option was a self signed with 10 year expiration, but I fear some issue with client not accepting so long expiration).&lt;BR /&gt;&lt;BR /&gt;if I can correctly understand, with this configuration (public CA signing crt for 1 year) the client will have to accept the crt on first connection to the network and then to re-accept the new certificate every year.&lt;BR /&gt;&lt;BR /&gt;is there a way to avoid this manual trust of the crt (i.e. I'm inventing, using the name of the realm as common name of the radius crt or something like this)?&lt;BR /&gt;&lt;BR /&gt;do you suggest some good book or online resource about this argument?&lt;BR /&gt;&lt;BR /&gt;thanks&lt;/P&gt;</description>
    <pubDate>Tue, 14 Feb 2023 08:30:27 GMT</pubDate>
    <dc:creator>ebi</dc:creator>
    <dc:date>2023-02-14T08:30:27Z</dc:date>
    <item>
      <title>dot1x: common name for radius certificate</title>
      <link>https://community.ruckuswireless.com/t5/Wireless-Questions-and-Best/dot1x-common-name-for-radius-certificate/m-p/53502#M2231</link>
      <description>&lt;P&gt;hello,&lt;/P&gt;&lt;P&gt;in order to autenticate users with dot1x I need to install a ssl certificate on the radius server;&lt;/P&gt;&lt;P&gt;is there a best practices about the common name, expiration time and signing CA to use for the certificate in order to have as much compatibility as possibile?&lt;/P&gt;&lt;P&gt;(user devices will not be on my control, nor joined to a AD, so I will not have the possibility to configure system trust on a specific certificate or CA).&lt;/P&gt;</description>
      <pubDate>Mon, 13 Feb 2023 09:51:09 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Wireless-Questions-and-Best/dot1x-common-name-for-radius-certificate/m-p/53502#M2231</guid>
      <dc:creator>ebi</dc:creator>
      <dc:date>2023-02-13T09:51:09Z</dc:date>
    </item>
    <item>
      <title>Re: dot1x: common name for radius certificate</title>
      <link>https://community.ruckuswireless.com/t5/Wireless-Questions-and-Best/dot1x-common-name-for-radius-certificate/m-p/53517#M2234</link>
      <description>&lt;P&gt;Hi, in your case you will need to acquire a SSL certificate from a public know CA and set it to be used a radius certificate.&lt;/P&gt;&lt;P&gt;Common name should be the name of your radius server.&lt;/P&gt;&lt;P&gt;Avoid using a wildcard certificate for radius auth as some devices cannot work with wildcard certificate in radius auth.&lt;/P&gt;&lt;P&gt;The validity of public certificates is usually 1 year, so be prepared to renew it every year or you will have issues after the expiration date.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Feb 2023 17:17:34 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Wireless-Questions-and-Best/dot1x-common-name-for-radius-certificate/m-p/53517#M2234</guid>
      <dc:creator>bruno_andrade</dc:creator>
      <dc:date>2023-02-13T17:17:34Z</dc:date>
    </item>
    <item>
      <title>Re: dot1x: common name for radius certificate</title>
      <link>https://community.ruckuswireless.com/t5/Wireless-Questions-and-Best/dot1x-common-name-for-radius-certificate/m-p/53566#M2235</link>
      <description>&lt;P&gt;hello,&lt;/P&gt;&lt;P&gt;so, you suggest a public CA with 12 month certificate (my other option was a self signed with 10 year expiration, but I fear some issue with client not accepting so long expiration).&lt;BR /&gt;&lt;BR /&gt;if I can correctly understand, with this configuration (public CA signing crt for 1 year) the client will have to accept the crt on first connection to the network and then to re-accept the new certificate every year.&lt;BR /&gt;&lt;BR /&gt;is there a way to avoid this manual trust of the crt (i.e. I'm inventing, using the name of the realm as common name of the radius crt or something like this)?&lt;BR /&gt;&lt;BR /&gt;do you suggest some good book or online resource about this argument?&lt;BR /&gt;&lt;BR /&gt;thanks&lt;/P&gt;</description>
      <pubDate>Tue, 14 Feb 2023 08:30:27 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Wireless-Questions-and-Best/dot1x-common-name-for-radius-certificate/m-p/53566#M2235</guid>
      <dc:creator>ebi</dc:creator>
      <dc:date>2023-02-14T08:30:27Z</dc:date>
    </item>
    <item>
      <title>Re: dot1x: common name for radius certificate</title>
      <link>https://community.ruckuswireless.com/t5/Wireless-Questions-and-Best/dot1x-common-name-for-radius-certificate/m-p/53590#M2236</link>
      <description>&lt;P&gt;Hi.&lt;/P&gt;&lt;P&gt;The idea to use a certificate from a know public CA is to avoid the devices to have to accept the certificate. As the certificate is from a know trust public CA, the device should accept the certificate without any additional action (the devices already have some public CA in his trust list).&lt;/P&gt;</description>
      <pubDate>Tue, 14 Feb 2023 19:02:05 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Wireless-Questions-and-Best/dot1x-common-name-for-radius-certificate/m-p/53590#M2236</guid>
      <dc:creator>bruno_andrade</dc:creator>
      <dc:date>2023-02-14T19:02:05Z</dc:date>
    </item>
    <item>
      <title>Re: dot1x: common name for radius certificate</title>
      <link>https://community.ruckuswireless.com/t5/Wireless-Questions-and-Best/dot1x-common-name-for-radius-certificate/m-p/53646#M2238</link>
      <description>&lt;P&gt;hello,&lt;/P&gt;&lt;P&gt;are you sure it's &lt;SPAN&gt;enough it's signed by a trusted CA?&lt;BR /&gt;&lt;BR /&gt;my experience is different, it always ask me to MANUALLY trust the radius certificate (at least the first time I see this radius, then my device will cache the trust)&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;for a website I ask for a particular site name, the web server send me the certificate with the exaclty same common name as the site name I asked for and if this certificate is trusted by one of my ca, I can trust I'm taking to the correct server I asked for.&lt;BR /&gt;&lt;BR /&gt;with dot1x I ask to join an ssid, but the AP send me back the certificate with the (different than ssid) common name of a radius server I don't know... it may send me the certificate of radius.bad-and-untrusted-guy.com and I will not trust it even if it's signed by a trusted CA&lt;/P&gt;</description>
      <pubDate>Wed, 15 Feb 2023 17:15:48 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Wireless-Questions-and-Best/dot1x-common-name-for-radius-certificate/m-p/53646#M2238</guid>
      <dc:creator>ebi</dc:creator>
      <dc:date>2023-02-15T17:15:48Z</dc:date>
    </item>
    <item>
      <title>Re: dot1x: common name for radius certificate</title>
      <link>https://community.ruckuswireless.com/t5/Wireless-Questions-and-Best/dot1x-common-name-for-radius-certificate/m-p/53767#M2239</link>
      <description>&lt;P&gt;Hello, you will need to configure your devices supplicant, so yes, the first time you will have to manually check to trust the CA.&lt;/P&gt;&lt;P&gt;The idea of ​​using a public certificate is that you don't need to install the CA certificate on the device as it already has some public CA installed.&lt;/P&gt;&lt;P&gt;The common name of the certificate doesn't matter in this case (but don't use a wildcard certificate, as explained before), on most radius server you can only have one certificate for Radius and this works for any SSID (and also for wired auth).&lt;/P&gt;&lt;P&gt;If you are looking for a way to make it easier for your users you might want to check out the CloudPath solution, with CP you can redirect your users to a portal to sign up without an IT specialist doing all the steps on all devices.&lt;/P&gt;</description>
      <pubDate>Thu, 16 Feb 2023 19:38:34 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Wireless-Questions-and-Best/dot1x-common-name-for-radius-certificate/m-p/53767#M2239</guid>
      <dc:creator>bruno_andrade</dc:creator>
      <dc:date>2023-02-16T19:38:34Z</dc:date>
    </item>
  </channel>
</rss>

