Skip to Main Content
Wireless Security Architecture
book

Wireless Security Architecture

by Jennifer Minella, Stephen Orr
April 2022
Intermediate to advanced content levelIntermediate to advanced
624 pages
17h 17m
English
Wiley
Content preview from Wireless Security Architecture

CHAPTER 3Understanding Authentication and Authorization

Refill your coffee or Mountain Dew® because this chapter may require extra concentration. Here, we cover all the gory details of the authentication schemas used in Wi-Fi (and in other wired and wireless technologies). The majority of this chapter's content is most applicable to Wi-Fi, but many of the concepts translate to other wireless technologies.

Along with the authentication process of validating devices and/or users comes authorization, which defines what the user or device has access to once connected. We've already covered the mechanisms of segmentation, detailing exactly how the authorization policies may be enforced on the network.

Out of the three main types of security profiles for Wi-Fi, the most challenging and misunderstood concepts are related to the Enterprise (802.1X) secured networks because of their complexity. As you saw in Chapter 2, “Understanding Technical Elements,” for 802.1X to work configurations are required on the Wi-Fi infrastructure, the endpoints, and one or more authentication servers.

Because of that, the first three topics apply specifically to the configuration of 802.1X-secured networks—IEEE 802.1X, RADIUS, and EAP methods.

After that, certificates offer a good segue to the other types of security profiles since they apply not only to 802.1X networks, but also open networks servicing captive portals.

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Core Software Security

Core Software Security

James Ransome, Anmol Misra

Publisher Resources

ISBN: 9781119883050Purchase Link