Meraki Whitepaper Active Directory Integration
Meraki Whitepaper Active Directory Integration
Meraki Whitepaper Active Directory Integration
Authentication enables administrators to identify the users connecting to
a wireless network. Authentication can be at the device level (blocking
or allowing a MAC address) or at the user level (validating a username
and password). Compared to user authentication, device authentication
is trivial (and insecure, since MAC addresses can be spoofed). This
white paper focuses on robust, secure, and easy-to-implement
techniques for wireless user authentication.
"
!
Copyright
© 2009 Meraki, Inc. All rights reserved.
Trademarks
Meraki® is a registered trademark of Meraki, Inc.
www.meraki.com
($( # $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ +
($) /')$(!#$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ ,
($* "#
# $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ -
)$( $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ .
)$) $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ .
)$* ! $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ /
)$+
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ /
)$, $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ 0
)$,$(
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ 0
)$- $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ ((
)$. $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ ((
*(*
There are two methods for obtaining user credentials from a wireless
user:
Once the user credentials have been obtained, there are two ways to
validate those credentials:
802.1x is an IEEE standard for authenticating a user who is trying to
associate to a wireless network. The standard utilizes the Extensible
Authentication Protocol (EAP), which provides a mechanism for
establishing a secure tunnel between participants involved in an
authentication exchange. Three roles are defined:
There are different combinations of EAP methods, cipher suites, and key
exchange algorithms that can be used in an 802.1x exchange. For
instance, PEAPv0/EAP-MSCHAPv2 is a method that is often deployed in
wireless networks. (PEAPv0 is the outer EAP method, and EAP-
MSCHAPv2 is the inner EAP method.)
Active Directory (AD) is a Microsoft software suite that provides, among
other services, a user database. An AD server can validate user
credentials using a protocol called RADIUS (Remote Authentication Dial-
In User Service). Microsoft’s RADIUS module is called Network Policy
Server, or NPS (it was formerly called Internet Authentication Service, or
IAS.) When NPS runs on the AD server, the authenticator forwards user
credentials to the authentication server via RADIUS. The authentication
server then accepts or rejects the user’s credentials.
Administrators will need to choose an authentication method supported
by the devices that will be connecting to the wireless network. For
instance, a splash page login will be incompatible with devices that do
not have web browsers (e.g., barcode scanners). These same devices
may not even be able to perform 802.1x authentication. In this case,
access to the wireless network should be controlled using an encryption
method, such as a WPA2-Personal pre-shared key (PSK). Because this
passphrase is shared, it should be rotated periodically to ensure that
unwanted devices that have obtained the passphrase do not retain
access to the wireless network.
Authentication has client-side configuration implications. Splash page
login requires the least amount of client-side work because the splash
page displays in the client’s browser. The splash page should be served
securely via HTTPS, so that the credentials are encrypted when sent
back to the splash page’s web server. For splash page login,
administrators should confirm that the splash page displays correctly in
the supported browsers, and that the wireless clients are able to validate
the server certificate of the splash page’s web server. (The wireless
client validates the server certificate when it establishes the HTTPS
connection.)
The user database validates user credentials either for the wireless
network only, or for both wired and wireless users, depending on its
scope and placement in the network. The wireless-only user database is
useful for managing wireless users separately from wired users. For
instance, a wireless-only user database is able to keep guest accounts
separate from employee accounts. In contrast, a single, centralized user
database enables employees to connect to the corporate network
regardless of whether they are wired or wireless.
An AD server is commonly used as the centralized user database for
both wired and wireless user authentication. To handle incoming
RADIUS requests for user authentication, the AD server must be
configured as follows:
Figure 2: Under the Network Policy and Access Services role, install the
Network Policy Server role service.
Administrators should monitor user authentication attempts to see who is
trying to access the wireless network. With splash page login,
authentication failures can be logged by the splash page’s web server
and/or the authentication server. With 802.1x, authentication failures can
be logged by the AP and/or the backend user database.
Administrators should be able to manage user authentication easily—
adding, modifying, and deleting user accounts; troubleshooting wireless
users who are unable to authenticate successfully; and troubleshooting
the backend infrastructure (e.g., to ensure that the RADIUS server is
configured correctly).