WIP


What does passpoint do

connecting to Wi-Fi networks, particularly public hotspots.It allows users to automatically and securely connect to Wi-Fi networks without needing to manually select SSIDs or enter credentials each time they connect to a new network

Process

Use cases

Appendix

    1. Steps to Map SIM-Based Authentication with Wi-Fi Passpoint

Example Workflow of SIM-Based Authentication with Passpoint

This method allows with Wi-Fi Passpoint involves using EAP-TLS (Extensible Authentication Protocol - Transport Layer Security), where client devices authenticate to the Wi-Fi network using digital certificates rather than usernames, passwords, or SIM credentials. This ensures a high level of security, especially in environments such as enterprises, or public Wi-Fi hotspots

Steps to Map Certificate Authentication with Wi-Fi Passpoint:
        1. Understanding EAP-TLS (Certificate-Based Authentication):

          • EAP-TLS is an authentication method within the EAP framework that uses digital certificates for mutual authentication between the client and the server.
          • In this method, both the client and the network's RADIUS server exchange certificates to authenticate each other securely.
          • Certificates are issued and managed by a Certificate Authority (CA).
        2. Components Involved in EAP-TLS Authentication with Passpoint:

          • Passpoint Profile: Configured on the client device to connect to Passpoint-enabled Wi-Fi networks that support certificate-based authentication (EAP-TLS).
          • Access Point (AP): Configured to use WPA2-Enterprise or WPA3-Enterprise security, with EAP-TLS as the authentication method.
          • RADIUS Server: Handles the authentication process and validates the client certificates using the CA's public key.
          • Client Device: Must have a digital certificate installed, along with a private key that corresponds to the certificate. This certificate is typically issued by the network provider or organization.
          • Certificate Authority (CA): Issues the certificates for the client and RADIUS server, allowing mutual authentication.

Steps to Implement Certificate-Based Authentication in Wi-Fi Passpoint:

            1. Set Up a Certificate Authority (CA):

              • To use certificate-based authentication, you need a trusted Certificate Authority (CA) that issues certificates to both the client devices and the RADIUS server.
              • This can be an external CA (e.g., VeriSign, Let’s Encrypt) or an internal enterprise CA for organizations that want to manage their own certificates.

              Steps:

              • Set up a CA that can issue both client certificates and server certificates.
              • Ensure that both the client and RADIUS server are configured with certificates signed by the CA.
              • Issue certificates to users (client devices) that will connect to the Wi-Fi network.
            2. Configure the RADIUS Server to Support EAP-TLS:

              • The RADIUS server must be configured to use EAP-TLS for authentication.
              • The server needs a server certificate signed by the CA and must be able to validate client certificates during the authentication process.

              Steps:

              • Install the RADIUS server certificate signed by the CA.
              • Configure the RADIUS server to authenticate users using EAP-TLS by validating the client's digital certificate.
              • Configure the RADIUS server to handle certificate revocation lists (CRL) or use Online Certificate Status Protocol (OCSP) to check the status of client certificates.
              • Example configuration for FreeRADIUS (a popular open-source RADIUS server)
            3. Configure the Wi-Fi Access Point for WPA2/WPA3-Enterprise:

              • The Wi-Fi AP must be configured to use WPA2-Enterprise (or WPA3-Enterprise) security mode.
              • The AP should also be configured to use the RADIUS server for authentication and EAP-TLS as the supported authentication method.

              Steps:

              • Set the Security Mode on the AP to WPA2-Enterprise or WPA3-Enterprise.
              • Specify the RADIUS server IP address and shared secret on the AP, so that the AP can forward authentication requests to the RADIUS server.
              • Enable EAP-TLS as the authentication method.
            4. Configure the Passpoint Profile for Certificate-Based Authentication:

              • Passpoint profiles on client devices include settings that define how the device should connect to the Wi-Fi network. For EAP-TLS, the profile should specify that certificate-based authentication is required.
              • The profile will also contain the identity provider (IDP) information, allowing the device to automatically connect to networks using the correct certificates.

              Steps:

              • The ANQP (Access Network Query Protocol) settings should be configured on the AP to inform clients that EAP-TLS is available.
              • The Passpoint profile on the client device must include:
                • The CA certificate (for server verification).
                • The client certificate (issued by the network or organization).
                • The private key associated with the client certificate.
            5. Install Certificates on Client Devices:

              • The client device (laptop, smartphone, tablet, etc.) must have a client certificate and private key installed. This certificate is typically issued by the organization or service provider offering the Wi-Fi network.

              Steps:

              • Install the client certificate and corresponding private key on the client device.
              • Ensure that the device trusts the CA certificate of the RADIUS server to validate the server's identity during the authentication process.
              • Example on Windows/macOS/Linux:

                • Use the system’s certificate manager to install the certificates and configure the Wi-Fi connection settings to use EAP-TLS.
                • For Android and iOS devices, profiles can be pushed by the network provider or manually installed via the settings menu.
            6. EAP-TLS Authentication Workflow: When a client with a Passpoint profile and a client certificate attempts to connect to a Passpoint-enabled network that supports EAP-TLS, the following occurs:

              Steps:

              1. The client sends a TLS handshake request to the Wi-Fi access point.
              2. The AP forwards this request to the RADIUS server.
              3. The RADIUS server responds with its own certificate for the client to verify.
              4. The client validates the server's certificate using the CA certificate it trusts.
              5. The client sends its client certificate to the RADIUS server for authentication.
              6. The RADIUS server validates the client's certificate using the CA that issued it.
              7. Upon successful mutual authentication, the client is granted access to the Wi-Fi network.
              8. A secure TLS session is established between the client and the network.
            7. Advantages of Certificate-Based Authentication in Passpoint:

              • Higher Security: EAP-TLS provides strong mutual authentication, making it difficult for attackers to intercept or impersonate clients or servers.
              • Eliminates Passwords: Users do not need to remember or enter passwords, which reduces the risk of weak or compromised credentials.
              • Automated Authentication: With Passpoint, client devices can automatically connect to trusted Wi-Fi networks using certificates, ensuring a seamless experience.
              • Mutual Authentication: Both the client and the RADIUS server authenticate each other, reducing the risk of man-in-the-middle attacks

To map Wi-Fi Passpoint with Username and Password Authentication, you would typically use EAP-TTLS (Tunneled Transport Layer Security) or EAP-PEAP (Protected Extensible Authentication Protocol). These authentication methods allow the use of usernames and passwords securely over Wi-Fi networks. In these protocols, an outer TLS tunnel is established to protect the inner authentication, where the user credentials (username and password) are verified

Steps to Map Username and Password Authentication with Wi-Fi Passpoint

1. Understanding EAP-TTLS and EAP-PEAP:

2. Components Involved:

3. Configure the RADIUS Server for EAP-TTLS or EAP-PEAP:

The RADIUS server must be configured to support EAP-TTLS or EAP-PEAP. The RADIUS server will authenticate the username and password against a backend database, such as LDAP, Active Directory, or a local user database.

Steps:

4.Configure the Wi-Fi Access Point:

The Wi-Fi AP must be configured to use WPA2-Enterprise (or WPA3-Enterprise) and must use EAP-TTLS or EAP-PEAP as the authentication methods.

Steps:

5. Configure the Passpoint Profile for Username and Password Authentication:

Steps:

6.Install the Passpoint Profile on Client Devices:

Steps:

7. EAP-TTLS or EAP-PEAP Authentication Workflow:

When the client with a Passpoint profile containing the username and password tries to connect to a Passpoint-enabled Wi-Fi network, the following occurs:

Steps:

        1. The client sends an authentication request to the AP.
        2. The AP forwards this request to the RADIUS server.
        3. The RADIUS server responds with its certificate to establish a secure TLS tunnel.
        4. The client validates the server certificate (using the CA certificate installed on the client device).
        5. The client sends the username and password (inside the secure TLS tunnel) to the RADIUS server.
        6. The RADIUS server verifies the username and password by checking the credentials against its backend database (such as LDAP, AD, etc.).
        7. Upon successful authentication, the client is granted access to the Wi-Fi network.
        8. A secure TLS session is established for the client’s data to be transmitted securely.

8. User Experience:

Once the Passpoint profile with the username and password is configured, the client device can automatically connect to Passpoint-enabled networks that support EAP-TTLS or EAP-PEAP without needing to re-enter the credentials.

The client device will also automatically authenticate securely, ensuring a seamless and secure experience.