<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: 802.1x Authentication by Security Group in Active Directory in Wireless Questions and Best Practices</title>
    <link>https://community.ruckuswireless.com/t5/Wireless-Questions-and-Best/802-1x-Authentication-by-Security-Group-in-Active-Directory/m-p/9446#M519</link>
    <description>Yes, you can employ Role-Based Access Control (RBAC) to allow Users to be
&lt;BR /&gt;
permitted to use WLANs based on the Role (group attribute) you return from NPS.
&lt;BR /&gt;
Note, 802.1x requires RADIUS in front of your AD database.</description>
    <pubDate>Fri, 17 Oct 2014 23:27:18 GMT</pubDate>
    <dc:creator>michael_brado</dc:creator>
    <dc:date>2014-10-17T23:27:18Z</dc:date>
    <item>
      <title>802.1x Authentication by Security Group in Active Directory</title>
      <link>https://community.ruckuswireless.com/t5/Wireless-Questions-and-Best/802-1x-Authentication-by-Security-Group-in-Active-Directory/m-p/9445#M518</link>
      <description>I am looking for a solution that will provide 802.1x authentication by security group in Active Directory for our corporate WLAN. Guest WLAN will stay the same with open authentication method. I started following this thread: &lt;A href="http://techblog.mirabito.net.au/?p=87" rel="nofollow"&gt;http://techblog.mirabito.net.au/?p=87&lt;/A&gt;. Is this method overkill? Is there a simpler process? We have ZD 3000 version 9.6.1. Thank you.</description>
      <pubDate>Fri, 17 Oct 2014 15:00:45 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Wireless-Questions-and-Best/802-1x-Authentication-by-Security-Group-in-Active-Directory/m-p/9445#M518</guid>
      <dc:creator>gfi_capital</dc:creator>
      <dc:date>2014-10-17T15:00:45Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x Authentication by Security Group in Active Directory</title>
      <link>https://community.ruckuswireless.com/t5/Wireless-Questions-and-Best/802-1x-Authentication-by-Security-Group-in-Active-Directory/m-p/9446#M519</link>
      <description>Yes, you can employ Role-Based Access Control (RBAC) to allow Users to be
&lt;BR /&gt;
permitted to use WLANs based on the Role (group attribute) you return from NPS.
&lt;BR /&gt;
Note, 802.1x requires RADIUS in front of your AD database.</description>
      <pubDate>Fri, 17 Oct 2014 23:27:18 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Wireless-Questions-and-Best/802-1x-Authentication-by-Security-Group-in-Active-Directory/m-p/9446#M519</guid>
      <dc:creator>michael_brado</dc:creator>
      <dc:date>2014-10-17T23:27:18Z</dc:date>
    </item>
  </channel>
</rss>

