EAP TLS uses Public Key Infrastructure (PKI) digital
certificates to provide mutual authentication between the EAP client and
the RADIUS server. A PKI certificate is a file created by a program called
a Certificate Authority. The certificate contains the name of the server
or user that has been issued to. The EAP client and RADIUS server use the
certificates to verify that the other party is indeed who it claims to be.
In EAP TLS, a PKI certificate is required for the Radiator RADIUS server
and for each and every EAP TLS client. EAP TLS does support dynamic WEP
keys.
You can obtain certificates from a Public Certificate
authority such as
Thawte 
. The advantage of Public Certificates is
that they will generally be recognised by any client or server without
taking any special steps. A disadvantage of Public certificates is that
you usually have to pay an annual fee for each one. With a Private
Certificate Authority, you can generate your own server and client
certificates for free, but you will generally have to install the ‘Root
Certificate’ from your Certificate Authority on each client before it will
recognise a private server certificate. Private Certificates are
considered by many to be more secure that Public Certificates.
The
basic steps of EAP TLS authentication are:
- The EAP TLS client and RADIUS server establish a communications
channel via the RADIUS protocol.
- The RADIUS server sends its Server PKI Certificate to the
client.
- The client verifies that the server certificate is valid and is
the correct certificate for the RADIUS server it is communicating
with. It uses the Root Certificate of the Certificate Authority that
issued the Server Certificate to validate the Server Certificate.
(Root Certificates for most Public Certificate Authorities are built
in to most clients. If the Server Certificate was issued by a Private
Certificate Authority, the client requires a copy of the Root
Certificate to be installed in order to validate the Server
Certificate.)
- If the client validates the server certificate, it then sends the
user's PKI certificate to the RADIUS server.
- The RADIUS server verifies that the client certificate is valid
and is the correct certificate for the user name that is being
authenticated. The RADIUS server can be configured to validate Private
Client Certificates using a locally installed copy of the Root
Certificate of the Certificate Authority that issued the client
certificate.
- If the RADIUS server validates the client certificate then the
authentication is successful, and the client is permitted to be
connected to the network.
EAP TLS does not use or exchange any passwords, but you can use
AuthBy methods in Radiator to enable or disable EAP TLS users based on
their user name, time of day etc.