Authentication protocols in windows

Содержание
  1. Extensible Authentication Protocol (EAP) for network access
  2. Authentication methods
  3. EAP-TLS, PEAP, and EAP-TTLS
  4. Protected EAP Properties configuration settings
  5. Verify the server’s identity by validating the certificate
  6. Connect to these servers
  7. Trusted Root Certification Authorities
  8. Notifications before connecting
  9. Select authentication method
  10. Configure
  11. Enable fast reconnect
  12. Enforce network access protection
  13. Disconnect if server does not present cryptobinding TLV
  14. Enable identity privacy (Windows 8 only)
  15. Secure password properties configuration items
  16. Smart card or other certificate properties configuration items
  17. Use my smart card
  18. Use a certificate on this computer
  19. Use simple certificate selection (recommended)
  20. Advanced
  21. Verify the server’s identity by validating the certificate
  22. Connect to these servers
  23. Trusted root certification authorities
  24. View certificate
  25. Do not prompt user to authorize new servers or trusted certification authorities
  26. Use a different user name for the connection
  27. Configure New Certificate Selection configuration items
  28. Certificate Issuer
  29. Certificate Issuer list
  30. Extended Key Usage (EKU)
  31. All Purpose
  32. Client Authentication
  33. Any Purpose
  34. Remove
  35. Select EKUs
  36. Add or Edit EKU
  37. TTLS configuration items
  38. Enable Identity Privacy (Windows 8 only)
  39. Connect to these servers
  40. Trusted Root Certification Authorities
  41. Do not prompt user if unable to authorize server
  42. Select a non-EAP method for authentication
  43. Automatically use my Windows logon name and password
  44. Select an EAP method for authentication
  45. Configure
  46. EAP-SIM configuration settings
  47. EAP-AKA configuration settings
  48. EAP-AKA’ configuration settings
  49. Additional resources

Extensible Authentication Protocol (EAP) for network access

Applies to: Windows Server 2019, Windows Server 2016, Windows Server 2012 R2, Windows Server 2012, Windows 10, Windows 8.1

The Extensible Authentication Protocol (EAP) is an architectural framework that provides extensibility for authentication methods for commonly used protected network access technologies, such as IEEE 802.1X-based wireless access, IEEE 802.1X-based wired access, and Point-to-Point Protocol (PPP) connections such as Virtual Private Networking (VPN). EAP is not an authentication method like MS-CHAP v2, but rather a framework on the access client and authentication server that allows networking vendors to develop and easily install new authentication methods known as EAP methods.

Authentication methods

This topic contains configuration information specific to the following authentication methods in EAP. Note that EAP authentication methods that are used within tunneled EAP methods are commonly known as inner methods or EAP types.

Protected EAP (PEAP)

This section contains configuration information for the two default inner EAP methods that are provided with PEAP.

EAP-Transport Layer Security (TLS)

Appearing as Smart Card or other Certificate Properties in the operating system, EAP-TLS can be deployed as an inner method for PEAP or as a standalone EAP method. When it is configured as an inner authentication method, the configuration settings for EAP-TLS are identical to the settings that are used to deploy EAP-TLS as an outer method, except that it is configured to operate within PEAP. For configuration details, see Smart card or other certificate properties configuration items.

EAP-Microsoft Challenge Handshake Authentication Protocol version 2 (MS-CHAP v2)

Secure password EAP-MS-CHAP v2 is an EAP type that can be used with PEAP for password-based network authentication. EAP-MsCHAP v2 can also be used as a standalone method for VPN, but only as a PEAP inner method for wireless.

EAP-Tunneled Transport Layer Security (TTLS)

EAP-Subscriber Identity Module (SIM), EAP-Authentication and Key Agreement (AKA), and EAP-AKA Prime (AKA’)

Enables authentication by using SIM cards, and is implemented when a customer purchases a wireless broadband service plan from a mobile network operator. As part of the plan, the customer commonly receives a wireless profile that is preconfigured for SIM authentication.

This topic provides information about the following:

EAP-TLS, PEAP, and EAP-TTLS

You can access the EAP properties for 802.1X authenticated wired and wireless access in the following ways:

By configuring the Wired Network (IEEE 802.3) Policies and Wireless Network (IEEE 802.11) Policies extensions in Group Policy.

By manually configuring wired or wireless connections on client computers.

You can access the EAP properties for virtual private network (VPN) connections in the following ways:

By using Connection Manager Administration Kit (CMAK) to configure VPN connections.

By manually configuring VPN connections on client computers.

By default, you can configure EAP settings for the following network authentication methods for 802.1X authenticated wired access, 802.1X authenticated wireless access, and VPN:

  • Microsoft: Smart card or other certificate (EAP-TLS)
  • Microsoft: Protected EAP (PEAP)
  • Microsoft: EAP-TTLS

Additionally, the MS-CHAP-V2 network authentication method is available for VPN by default.

Protected EAP Properties configuration settings

This section lists the settings that can be configured for Protected EAP.

Deploying the same type of authentication method for PEAP and EAP creates a security vulnerability. When you deploy both PEAP and EAP (which is not protected), do not use the same authentication type. For example, if you deploy PEAP-TLS, do not also deploy EAP-TLS.

Verify the server’s identity by validating the certificate

This item specifies that the client verifies that server certificates presented to the client computer have the correct signatures, have not expired, and were issued by a trusted root certification authority (CA). The default setting is «enabled.» If you disable this check box, client computers cannot verify the identity of your servers during the authentication process. If server authentication does not occur, users are exposed to severe security risks, including the possibility that users might unknowingly connect to a rogue network.

Connect to these servers

This item allows you to specify the name for Remote Authentication Dial-In User Service (RADIUS) servers that provide network authentication and authorization. Note that you must type the name exactly as it appears in the Subject field of each RADIUS server certificate, or use regular expressions to specify the server name. The complete syntax of the regular expression can be used to specify the server name, but to differentiate a regular expression with the literal string, you must use at least one «» in the string specified. For example, you can specify nps.example.com to specify the RADIUS server nps1.example.com or nps2.example.com.

Even if no RADIUS servers are specified, the client will verify that the RADIUS server certificate was issued by a trusted root CA.

  • Wired and wireless = not enabled
  • VPN = enabled

Trusted Root Certification Authorities

This item lists the trusted root certification authorities. The list is built from the trusted root CAs that are installed in the computer and in the user certificate stores. You can specify which trusted root CA certificates supplicants use to determine whether they trust your servers, such as your server running Network Policy Server (NPS) or your provisioning server. If no trusted root CAs are selected, the 802.1X client verifies that the computer certificate of the RADIUS server was issued by an installed trusted root CA. If one or multiple trusted root CAs are selected, the 802.1X client verifies that the computer certificate of the RADIUS server was issued by a selected trusted root CA. Even if no trusted root CAs are selected, the client will verify that the RADIUS server certificate was issued by a trusted root CA.

If you have a public key infrastructure (PKI) on your network, and you use your CA to issue certificates to your RADIUS servers, your CA certificate is automatically added to the list of trusted root CAs.

You can also purchase a CA certificate from a non-Microsoft vendor. Some non-Microsoft trusted root CAs provide software with your purchased certificate that automatically installs the purchased certificate into the Trusted Root Certification Authorities certificate store. In this case, the trusted root CA automatically appears in the list of trusted root CAs.

Do not specify a trusted root CA certificate that is not already listed in client computers’ Trusted Root Certification Authorities certificate stores for Current User and Local Computer. If you designate a certificate that is not installed on client computers, authentication will fail.

Default = not enabled, no trusted root CAs selected

Notifications before connecting

This item specifies whether the user is notified if the server name or root certificate is not specified, or whether the server’s identity cannot be verified.

Читайте также:  Каким антивирусом лучше пользоваться windows 10

By default, the following options are provided:

Case 1: Do not ask user to authorize new servers or trusted CAs specifies that if:

  • The server name is not in the Connect to these servers list
  • or the root certificate is found but is not selected in the list of Trusted Root Certification Authorities in PEAP Properties
  • or the root certificate is not found on the computer

then the user is not notified, and the connection attempt fails.

Case 2: Tell user if the server name or root certificate is not specified specifies that if:

  • The server name is not in the Connect to these servers list
  • or the root certificate is found but is not selected in the list of Trusted Root Certification Authorities in PEAP Properties

then the user is prompted whether to accept the root certificate. If the user accepts the certificate, authentication proceeds. If the user rejects the certificate, the connection attempt fails. In this option, if the root certificate is not present on the computer, the user is not notified, and the connection attempts fails.

Case 3: Tell user if the server’s identity cannot be verified specifies that if:

  • The server name is not in the Connect to these servers list
  • or the root certificate is found but is not selected in the list of Trusted Root Certification Authorities in PEAP Properties
  • or the root certificate is not found on the computer

then the user is prompted whether to accept the root certificate. If the user accepts the certificate, authentication proceeds. If the user rejects the certificate, the connection attempt fails.

Select authentication method

This item allows you to select the EAP type to use with PEAP for network authentication. By default, two EAP types are available, Secure password (EAP-MSCHAP v2) and Smart card or other certificate (EAP-TLS). However, EAP is a flexible protocol that allows inclusion of additional EAP methods, and it is not restricted to these two types.

For more information, see:

Default = Secure password (EAP-MSCHAP v2)

Configure

This item provides access to property settings for the specified EAP type.

Enable fast reconnect

Enables the ability to create a new or refreshed security association more efficiently or in a smaller number of round-trips, in the case where a security association was previously established.

For VPN connections, Fast Reconnect uses IKEv2 technology to provide seamless and consistent VPN connectivity, when users temporarily lose their Internet connections. Users who connect by using wireless mobile broadband will benefit most from this capability.

An example of this benefit is a common scenario in which a user is traveling on a train, uses a wireless mobile broadband card to connect to the Internet, and then establishes a VPN connection to the corporate network.

As the train passes through a tunnel, the Internet connection is lost. When the train is outside the tunnel, the wireless mobile broadband card automatically reconnects to the Internet.

Fast Reconnect automatically re-establishes active VPN connections when internet connectivity is re-established. Although the reconnection might take several seconds to occur, it is performed transparently to users.

Enforce network access protection

This item specifies that before connections to a network are permitted, system health checks are performed on EAP supplicants to determine if they meet system health requirements.

Default = not enabled

Disconnect if server does not present cryptobinding TLV

This item specifies that connecting clients must end the network authentication process if the RADIUS server does not present cryptobinding Type-Length-Value (TLV). Cryptobinding TLV increases the security of the TLS tunnel in PEAP by combining the inner method and the outer method authentications together so that attackers cannot perform man-in-the-middle attacks by redirecting an MS-CHAP v2 authentication by using the PEAP channel.

Default = not enabled

Enable identity privacy (Windows 8 only)

Specifies that clients are configured so that they cannot send their identity before the client has authenticated the RADIUS server, and optionally, provides a place to type an anonymous identity value. For example, if you select Enable Identity Privacy and then type “guest” as the anonymous identity value, the identity response for a user with identity alice@example is guest@example. If you select Enable Identity Privacy but do not provide an anonymous identity value, the identity response for the user alice@example is @example.

This setting applies only to computers running Windows 8 and earlier.

Default = not enabled

Secure password properties configuration items

Checking Automatically use my Windows logon name and password (and domain if any) specifies that the current user-based Windows sign in name and password are used as network authentication credentials.

  • Wired and wireless = enabled
  • VPN = not enabled

Smart card or other certificate properties configuration items

This section lists the items that can be configured for EAP-TLS.

Use my smart card

This item specifies that clients making authentication requests must present a smart card certificate for network authentication.

  • Wired and wireless = not enabled
  • VPN = enabled

Use a certificate on this computer

This item specifies that authenticating clients must use a certificate located in the Current User or Local Computer certificate stores.

  • Wired and wireless = enabled
  • VPN = not enabled

This item specifies whether Windows filters out certificates that are unlikely to meet authentication requirements. This serves to limit the list of available certificates when prompting the user to select a certificate.

  • Wired and wireless = enabled
  • VPN = not enabled

Advanced

This item opens the Configure Certificate Selection dialog box. For more information about Configure Certificate Selection, see Configure New Certificate Selection configuration items.

Verify the server’s identity by validating the certificate

This item specifies that the client verifies that the server certificates presented to the client computer have the correct signatures, have not expired, and were issued by a trusted root certification authority (CA). Do not disable this check box or client computers cannot verify the identity of your servers during the authentication process. If server authentication does not occur, users are exposed to severe security risks, including the possibility that users might unknowingly connect to a rogue network.

Connect to these servers

This item allows you to specify the name for RADIUS servers that provide network authentication and authorization. Note that you must type the name exactly as it appears in the Subject field of each RADIUS server certificate, or use regular expressions to specify the server name. The complete syntax of the regular expression can be used to specify the server name, but to differentiate a regular expression with the literal string, you must use at least one «» in the string that is specified. For example, you can specify nps.example.com to specify the RADIUS server nps1.example.com or nps2.example.com.

Even if no RADIUS servers are specified, the client will verify that the RADIUS server certificate was issued by a trusted root CA.

  • Wired and wireless = not enabled
  • VPN = enabled

Trusted root certification authorities

This item lists the trusted root certification authorities. The list is built from the trusted root CAs that are installed in the computer and user certificate stores. You can specify which trusted root CA certificates that supplicants use to determine whether they trust your servers, such as your server running NPS or your provisioning server. If no trusted root CAs are selected, the 802.1X client verifies that the computer certificate of the RADIUS server was issued by an installed trusted root CA. If one or multiple trusted root CAs are selected, the 802.1X client verifies that the computer certificate of the RADIUS server was issued by a selected trusted root CA.

If you have a public key infrastructure (PKI) on your network, and you use your CA to issue certificates to your RADIUS servers, your CA certificate is automatically added to the list of trusted root CAs.

Читайте также:  Туристический навигатор для windows phone

You can also purchase a CA certificate from a non-Microsoft vendor. Some non-Microsoft trusted root CAs provide software with your purchased certificate that automatically installs the purchased certificate into the Trusted Root Certification Authorities certificate store. In this case, the trusted root CA automatically appears in the list of trusted root CAs. Even if no trusted root CAs are selected, the client will verify that the RADIUS server certificate was issued by a trusted root CA.

Do not specify a trusted root CA certificate that is not already listed in client computers’ Trusted Root Certification Authorities certificate stores for Current User and Local Computer.

If you designate a certificate that is not installed on client computers, authentication will fail.

Default = not enabled, no trusted root CAs selected.

View certificate

This item enables you to view the properties of the selected certificate.

Do not prompt user to authorize new servers or trusted certification authorities

This item prevents the user from being prompted to trust a server certificate if that certificate is incorrectly configured, is not already trusted, or both (if enabled). It is recommended that you select this check box to simplify the user experience and to prevent users from inadvertently choosing to trust a server that is deployed by an attacker.

Default = not enabled

Use a different user name for the connection

This item specifies whether to use a user name for authentication that is different from the user name in the certificate.

Default = not enabled

Configure New Certificate Selection configuration items

Use New Certificate Selection to configure the criteria that client computers use to automatically select the right certificate on the client computer for the purpose of authentication. When the configuration is provided to network client computers through the Wired Network (IEEE 802.3) Policies, the Wireless Network (IEEE 802.11) Policies, or through Connection Manager Administration Kit (CMAK) for VPN, clients are automatically provisioned with the specified authentication criteria.

This section lists the configuration items for New Certificate Selection, along with a description of each.

Certificate Issuer

This item specifies whether Certificate Issuer filtering is enabled.

Default = not selected

Certificate Issuer list

Used to specify one or multiple certificate issuers for the certificates.

Lists the names of all of the issuers for which corresponding certification authority (CA) certificates are present in the Trusted Root Certification Authorities or Intermediate Certification Authorities certificate store of local computer account.

Includes all the root certification authorities and intermediate certification authorities.

Contains only those issuers for which there are corresponding valid certificates that are present on the computer (for example, certificates that are not expired or not revoked).

The final list of certificates that are allowed for authentication contains only those certificates that were issued by any of the issuers selected in this list.

Default = none selected

Extended Key Usage (EKU)

You can select All Purpose, Client Authentication, Any Purpose, or any combination of these. Specifies that when a combination is selected, all the certificates satisfying at least one of the three conditions are considered valid certificates for the purpose of authenticating the client to the server. If EKU filtering is enabled, one of the choices must be selected; otherwise, the OK command control is disabled.

Default = not enabled

All Purpose

When selected, this item specifies that certificates having the All Purpose EKU are considered valid certificates for the purpose of authenticating the client to the server.

Default = selected when Extended Key Usage (EKU) is selected

Client Authentication

When selected, this item specifies that certificates having the Client Authentication EKU, and the specified list of EKUs are considered valid certificates for the purpose of authenticating the client to the server.

Default = selected when Extended Key Usage (EKU) is selected

Any Purpose

When selected, this item specifies that all certificates having Any Purpose EKU and the specified list of EKUs are considered valid certificates for the purpose of authenticating the client to the server.

Default = selected when Extended Key Usage (EKU) is selected

This item opens the Select EKUs dialog box, which enables you to add standard, custom, or vendor-specific EKUs to the Client Authentication or Any Purpose list.

Default = no EKUs listed

Remove

This item removes the selected EKU from the Client Authentication or Any Purpose list.

When both Certificate Issuer and Extended Key Usage (EKU) are enabled, only those certificates that satisfy both conditions are considered valid for the purpose of authenticating the client to the server.

Select EKUs

You can select an EKU from the list provided, or add a new EKU.

Item Details
Add Opens the Add or Edit EKU dialog box, which enables you to define and add custom EKUs. In Select the EKUs from the list below, select an EKU in the list, and then click OK to add that EKU to the Client Authentication or the Any Purpose list.
Edit Opens the Add or Edit EKU dialog box, and enables you to edit custom EKUs that you have added. You cannot edit the default, predefined EKUs.
Remove Removes the selected custom EKU from the list of EKUs in the Select EKUs dialog box. You cannot remove the default, predefined EKUs.

Add or Edit EKU

Item Details
Enter the name of the EKU Provides a place to type the name of the custom EKU.
Enter the EKU OID Provides a place to type the OID for the EKU. Only numeric digits, separators, and “.” are allowed. Wild cards are permitted, in which case all of the child OIDs in the hierarchy are allowed. For example, entering 1.3.6.1.4.1.311.* allows 1.3.6.1.4.1.311.42 and 1.3.6.1.4.1.311.42.2.1

TTLS configuration items

EAP-TTLS is a standards-based EAP tunneling method that supports mutual authentication and provides a secure tunnel for client inclusion authentication by using EAP methods and other legacy protocols. The addition of EAP-TTLS in Windows Server 2012 provides only client-side support, for the purpose of supporting interoperation with the most commonly-deployed RADIUS servers that support EAP-TTLS.

This section lists the items that can be configured for EAP-TTLS.

Enable Identity Privacy (Windows 8 only)

This item specifies that clients are configured so that they cannot send their identity before the client has authenticated the RADIUS server, and optionally, provides a place to type an anonymous identity value. For example, if you select Enable Identity Privacy, and then type “guest” as the anonymous identity value, the identity response for a user with identity alice@example is guest@example. If you select Enable Identity Privacy but do not provide an anonymous identity value, the identity response for the user alice@example is @example.

This setting applies only to computers running Windows 8.

Default = not enabled

Connect to these servers

This item enables you to specify the name for RADIUS servers that provide network authentication and authorization. Note that you must type the name exactly as it appears in the Subject field of each RADIUS server certificate, or use regular expressions to specify the server name. The complete syntax of the regular expression can be used to specify the server name. But to differentiate a regular expression with the literal string, you must use at least one * in the string specified. For example, you can specify nps*.example.com to specify the RADIUS server nps1.example.com or nps2.example.com. Even if no RADIUS servers are specified, the client will verify that the RADIUS server certificate was issued by a trusted root CA.

Trusted Root Certification Authorities

This item lists the trusted root certification authorities. The list is built from the trusted root CAs that are installed in the computer and user certificate stores. You can specify which trusted root CA certificates that supplicants use to determine whether they trust your servers, such as your server running NPS or your provisioning server. If no trusted root CAs are selected, the 802.1X client verifies that the computer certificate of the RADIUS server was issued by an installed trusted root CA. If one or multiple trusted root CAs are selected, the 802.1X client verifies that the computer certificate of the RADIUS server was issued by a selected trusted root CA. Even if no trusted root CAs are selected, the client will verify that the RADIUS server certificate was issued by a trusted root CA.

If you have a public key infrastructure (PKI) on your network, and you use your CA to issue certificates to your RADIUS servers, your CA certificate is automatically added to the list of trusted root CAs. If selected, your root CA certificate is installed on a client computer when the computers are joined to the domain.

You can also purchase a CA certificate from a non-Microsoft vendor. Some non-Microsoft trusted root CAs provide software with your purchased certificate that automatically installs the purchased certificate into the Trusted Root Certification Authorities certificate store. In this case, the trusted root CA automatically appears in the list of trusted root CAs.

Do not specify a trusted root CA certificate that is not already listed in client computers’ Trusted Root Certification Authorities certificate stores for Current User and Local Computer.

If you designate a certificate that is not installed on client computers, authentication will fail.

Default = not enabled, no trusted root CAs selected

Do not prompt user if unable to authorize server

This item specifies (when not selected) that if server certificate validation fails due to any of the following reasons, the user is prompted to accept or reject the server:

  • A root certificate for the server certificate is not found or not selected in the Trusted Root Certification Authorities list.
  • One or more of the intermediate root certificates in the certificate chain is not found.
  • The subject name in the server certificate does not match any of the servers that are specified in the Connect to these servers list.

Default = not selected

Select a non-EAP method for authentication

Specifies whether a non-EAP or an EAP type is used for authentication. If Select a non-EAP method for authentication is selected, then Select an EAP method for authentication is disabled. If Select a non-EAP method for authentication is selected, the following non-EAP authentication types are provided in the drop-down list:

  • Select a non-EAP method for authentication = enabled
  • Non-EAP type = PAP

Automatically use my Windows logon name and password

When enabled, this item uses Windows sign in credentials. This check-box is enabled only if MS-CHAP v2 is selected in the Select a non-EAP method for authentication drop-down list. Automatically use my Windows logon name and password is disabled for PAP, CHAP, and MS-CHAP authentication types.

Select an EAP method for authentication

This item specifies whether an EAP type or a non-EAP type is used for authentication. If Select an EAP method for authentication is selected, then Select a non-EAP method for authentication is disabled. If Select a non-EAP method for authentication is selected, by default, the following non-EAP authentication types are provided in the drop-down list:

Microsoft: Smart Card or other Certificate

Microsoft: MS-CHAP v2

The Select an EAP method for authentication drop-down list will enumerate all the EAP methods that are installed on the server, except for PEAP and FAST tunnel methods. The EAP types are listed in the order that they are discovered by the computer.

Configure

Opens the properties dialog box of the specified EAP type. For details about the default EAP types, see Smart card or other certificate properties configuration items or Secure password (EAP-MSCHAP v2) properties configuration items.

EAP-SIM configuration settings

EAP Subscriber Identity Module (SIM) is used for authentication and session key distribution for the Global System for Mobile Communications (GSM). EAP-SIM is defined in RFC 4186.

The following table lists the configuration settings for EAP-SIM.

Item Description
Use strong Cipher keys Specifies that if selected, the profile uses strong encryption.
Do not reveal real identity to server when pseudonym identity is available When enabled, forces the client to fail the authentication if server requests for permanent identity though the client have a pseudonym identity with it. Pseudonym identities are used for identity privacy so that the actual or permanent identity of a user is not revealed during authentication.
Enable usage of realms Provides a place to type the realm name. If this field is left blank with Enable usage of realms selected, the realm is derived from the International Mobile Subscriber Identity (IMSI) using the realm 3gpp.org, as described in the 3rd Generation Partnership Project (3GPP) standard 23.003 V6.8.0.
Specify a realm Provides a place to type the realm name

EAP-AKA configuration settings

EAP Authentication and Key Agreement (AKA) for Universal Mobile Telecommunications System (UMTS) is used for authentication and session key distribution by using the UMTS Universal Subscriber Identity Module (USIM). EAP AKA is defined in RFC 4187.

The following table lists the configuration settings for EAP-AKA.

Item Description
Do not reveal real identity to server when pseudonym identity is available When enabled, forces the client to fail the authentication if server requests for permanent identity though the client have a pseudonym identity with it. Pseudonym identities are used for identity privacy so that the actual or permanent identity of a user is not revealed during authentication.
Enable usage of realms Provides a place to type the realm name. If this field is left blank with Enable usage of realms selected, the realm is derived from the International Mobile Subscriber Identity (IMSI) using the realm 3gpp.org, as described in the 3rd Generation Partnership Project (3GPP) standard 23.003 V6.8.0.
Specify a realm Provides a place to type the realm name.

EAP-AKA’ configuration settings

EAP- AKA Prime (AKA’) is a modified version of EAP-AKA that is used to enable access to the 3rd-Generation Partnership Project (3GPP)-based networks by using non-3GPP standards, such as:

WiFi — sometimes referred to as wireless fidelity

Evolution-Data Optimized (EVDO)

Worldwide Interoperability for Microwave Access (WiMax)

EAP-AKA’ is defined in RFC 5448.

The following table lists the configuration settings for EAP-AKA’.

Item Description
Do not reveal real identity to server when pseudonym identity is available When enabled, forces the client to fail the authentication if server requests for permanent identity though the client have a pseudonym identity with it. Pseudonym identities are used for identity privacy so that the actual or permanent identity of a user is not revealed during authentication.
Enable usage of realms Provides a place to type the realm name. If this field is left blank with Enable usage of realms selected, the realm is derived from the International Mobile Subscriber Identity (IMSI) using the realm 3gpp.org, as described in the 3rd Generation Partnership Project (3GPP) standard 23.003 V6.8.0.
Specify a realm Provides a place to type the realm name.
Ignore network name mismatch The client compares the name of network known to it, with the name sent by the RADIUS server during authentication. If there is mismatch, it is ignored if this option is selected. If not selected, authentication fails.
Enable Fast Reauthentication Specifies that fast reauthentication is enabled. Fast Reauthentication is useful when SIM authentication happens frequently. The encryption keys that are derived from full authentication are reused. As a result, the SIM algorithm is not required to run for every authentication attempt, and the number of network operations that result from frequent authentication attempts is reduced.

Additional resources

For additional information about authenticated wireless settings in Group Policy, see Managing the New Wireless Network (IEEE 802.11) Policies Settings

For additional information about authenticated wired settings in Group Policy, see Managing the New Wired Network (IEEE 802.3) Policies Settings

For information about advanced settings for authenticated wired access and authenticated wireless access, see Advanced Security Settings for Wired and Wireless Network Policies.

Читайте также:  Logitech options windows 10
Оцените статью