WIP


What does passpoint do

connecting to Wi-Fi networks, particularly public hotspots.It allows users to automatically and securely connect to Wi-Fi networks without needing to manually select SSIDs or enter credentials each time they connect to a new network

Process

Use cases

Appendix

    1. Steps to Map SIM-Based Authentication with Wi-Fi Passpoint

Example Workflow of SIM-Based Authentication with Passpoint

This method allows with Wi-Fi Passpoint involves using EAP-TLS (Extensible Authentication Protocol - Transport Layer Security), where client devices authenticate to the Wi-Fi network using digital certificates rather than usernames, passwords, or SIM credentials. This ensures a high level of security, especially in environments such as enterprises, or public Wi-Fi hotspots

Steps to Map Certificate Authentication with Wi-Fi Passpoint:

        1. Understanding EAP-TLS (Certificate-Based Authentication):

          • EAP-TLS is an authentication method within the EAP framework that uses digital certificates for mutual authentication between the client and the server.
          • In this method, both the client and the network's RADIUS server exchange certificates to authenticate each other securely.
          • Certificates are issued and managed by a Certificate Authority (CA).
        2. Components Involved in EAP-TLS Authentication with Passpoint:

          • Passpoint Profile: Configured on the client device to connect to Passpoint-enabled Wi-Fi networks that support certificate-based authentication (EAP-TLS).
          • Access Point (AP): Configured to use WPA2-Enterprise or WPA3-Enterprise security, with EAP-TLS as the authentication method.
          • RADIUS Server: Handles the authentication process and validates the client certificates using the CA's public key.
          • Client Device: Must have a digital certificate installed, along with a private key that corresponds to the certificate. This certificate is typically issued by the network provider or organization.
          • Certificate Authority (CA): Issues the certificates for the client and RADIUS server, allowing mutual authentication.

Steps to Implement Certificate-Based Authentication in Wi-Fi Passpoint:

            1. Set Up a Certificate Authority (CA):

              • To use certificate-based authentication, you need a trusted Certificate Authority (CA) that issues certificates to both the client devices and the RADIUS server.
              • This can be an external CA (e.g., VeriSign, Let’s Encrypt) or an internal enterprise CA for organizations that want to manage their own certificates.

              Steps:

              • Set up a CA that can issue both client certificates and server certificates.
              • Ensure that both the client and RADIUS server are configured with certificates signed by the CA.
              • Issue certificates to users (client devices) that will connect to the Wi-Fi network.
            2. Configure the RADIUS Server to Support EAP-TLS:

              • The RADIUS server must be configured to use EAP-TLS for authentication.
              • The server needs a server certificate signed by the CA and must be able to validate client certificates during the authentication process.

              Steps:

              • Install the RADIUS server certificate signed by the CA.
              • Configure the RADIUS server to authenticate users using EAP-TLS by validating the client's digital certificate.
              • Configure the RADIUS server to handle certificate revocation lists (CRL) or use Online Certificate Status Protocol (OCSP) to check the status of client certificates.
              • Example configuration for FreeRADIUS (a popular open-source RADIUS server)
            3. Configure the Wi-Fi Access Point for WPA2/WPA3-Enterprise:

              • The Wi-Fi AP must be configured to use WPA2-Enterprise (or WPA3-Enterprise) security mode.
              • The AP should also be configured to use the RADIUS server for authentication and EAP-TLS as the supported authentication method.

              Steps:

              • Set the Security Mode on the AP to WPA2-Enterprise or WPA3-Enterprise.
              • Specify the RADIUS server IP address and shared secret on the AP, so that the AP can forward authentication requests to the RADIUS server.
              • Enable EAP-TLS as the authentication method.
            4. Configure the Passpoint Profile for Certificate-Based Authentication:

              • Passpoint profiles on client devices include settings that define how the device should connect to the Wi-Fi network. For EAP-TLS, the profile should specify that certificate-based authentication is required.
              • The profile will also contain the identity provider (IDP) information, allowing the device to automatically connect to networks using the correct certificates.

              Steps:

              • The ANQP (Access Network Query Protocol) settings should be configured on the AP to inform clients that EAP-TLS is available.
              • The Passpoint profile on the client device must include:
                • The CA certificate (for server verification).
                • The client certificate (issued by the network or organization).
                • The private key associated with the client certificate.
            5. Install Certificates on Client Devices:

              • The client device (laptop, smartphone, tablet, etc.) must have a client certificate and private key installed. This certificate is typically issued by the organization or service provider offering the Wi-Fi network.

              Steps:

              • Install the client certificate and corresponding private key on the client device.
              • Ensure that the device trusts the CA certificate of the RADIUS server to validate the server's identity during the authentication process.
              • Example on Windows/macOS/Linux:

                • Use the system’s certificate manager to install the certificates and configure the Wi-Fi connection settings to use EAP-TLS.
                • For Android and iOS devices, profiles can be pushed by the network provider or manually installed via the settings menu.
            6. EAP-TLS Authentication Workflow: When a client with a Passpoint profile and a client certificate attempts to connect to a Passpoint-enabled network that supports EAP-TLS, the following occurs:

              Steps:

              1. The client sends a TLS handshake request to the Wi-Fi access point.
              2. The AP forwards this request to the RADIUS server.
              3. The RADIUS server responds with its own certificate for the client to verify.
              4. The client validates the server's certificate using the CA certificate it trusts.
              5. The client sends its client certificate to the RADIUS server for authentication.
              6. The RADIUS server validates the client's certificate using the CA that issued it.
              7. Upon successful mutual authentication, the client is granted access to the Wi-Fi network.
              8. A secure TLS session is established between the client and the network.
            7. Advantages of Certificate-Based Authentication in Passpoint:

              • Higher Security: EAP-TLS provides strong mutual authentication, making it difficult for attackers to intercept or impersonate clients or servers.
              • Eliminates Passwords: Users do not need to remember or enter passwords, which reduces the risk of weak or compromised credentials.
              • Automated Authentication: With Passpoint, client devices can automatically connect to trusted Wi-Fi networks using certificates, ensuring a seamless experience.
              • Mutual Authentication: Both the client and the RADIUS server authenticate each other, reducing the risk of man-in-the-middle attacks