Overview

802.1X is an IEEE standard for securing communication over a LAN or WLAN wireless network using authentication. You can use one of the following authentication methods to verify the identity of a mobile device or computer when using 802.1X:

  • PEAP—This protocol is used if you want users to authenticate using a username and password.

  • TLS—This protocol is used if you want users to authenticate using a certificate.

You can choose which authentication method to used based on what your organization allows. For mobile devices, these are the only two methods you can use to configure 802.1X. For computers, you can choose to deploy an authentication configuration profile to users or computers.

Note: It is recommended that you deploy the configuration profile at the user-level to know when the user is accessing the network.

Use the following flowchart to determine the best authentication method for computers:

images/download/attachments/81933817/802.1X_Flowchart_-_Flowchart_%281%29.png

Copyright     Privacy Policy     Terms of Use     Security
© copyright 2002-2021 Jamf. All rights reserved.