JumpCloud Office Hours: Join our experts every Friday to talk shop. Register today

Cloud WiFi Authentication



It feels like every day brings new innovations in cloud based infrastructure. WiFi authentication is no exception. This blog post discusses the implications of cloud WiFi authentication and how Directory-as-a-Service® from JumpCloud can help secure your wireless network infrastructure.

Secure Authentication through RADIUS

Restricting network access is not a new idea. Network administrators recognized the necessity for security long before WiFi was even a thing. Back when everything was on-prem, it was a lot easier to restrict network access because users had to be hardwired into the network. Still, anyone with a network cable could conceivably gain access. Thus, the RADIUS protocol was born.

Identity Security

RADIUS is a simple protocol that exists primarily to authenticate and authorize users attempting to access a network. Yet it quickly became an industry standard, forming the symbiotic relationship between network innovation and security that has continued to evolve with the development of WiFi.

However, WiFi brought about it’s own set of challenges, many due in part to the fact that attackers no longer needed to be hardwired to access the network. Instead, anyone in range with an antenna posed a potential threat. As security systems became more sophisticated, so too did the attacks from the bad guys. The result of which was the beginning of a networking arms race that many organizations still struggle with today.

secure wifi and remote worker management

From Wired to WiFi

WiFi access is a core essential for just about any modern organization. Most mobile devices don’t even support a wired connection anymore, so it’s no surprise that WiFi has become a staple resource. Not to mention, most customers and employees have come to expect it for all of their devices. Yet, while WiFi is certainly critical in the modern office, it can be difficult to manage who has access. This is especially relevant when you consider former employees or visitors that often retain access until the SSID and passphrase have been changed. While most people don’t necessarily pose a threat to your organization, it opens the door to potentially devastating attacks. This revelation is why many organizations are looking for a proactive approach to network security.

Meraki’s WiFi management is a great example. Even though you have on-prem wireless access points – the management is in the cloud. Directory-as-a-Service takes it one step further by authenticating access to WiFi networks through the cloud. Our platform extends your WiFi security paradigm to uniquely authenticate each user to your network and tightly integrate with WAPs provided by companies such as Meraki, Aruba, Mist, and others – all without anything on-prem.

Here’s how it works:  you connect your WAPs via RADIUS to a cloud RADIUS server. The RADIUS server then integrates with an on-board directory service. You simply add your users and grant them access to whatever WiFi networks you want. The end user doesn’t need to install anything – they just login with their username and password which can be the same as their G Suite or Office 365 credentials.

cyberattack statistics

Secure WiFi Authentication with the Cloud

Directory-as-a-Service offers frictionless access for the end user’s experience but is also a big step up in IT security as there is no longer a need for shared SSIDs and passphrases. Each user logs in with their unique credentials. All of the infrastructure to do this is in the cloud – nothing on-prem except your WAPs.

jumpcloud learn more demo

This is just one benefit of a cloud based infrastructure. To discover more ways that Directory-as-a-Service can help your organization, sign up today and you and ten users can try it for free.


Recent Posts
The MDM Custom Configuration Profile policy gives admins new device management controls that they can use fit to their organizations’ needs.

Blog

Deploying Custom Configuration Profiles to MDM-Enrolled macOS Systems using a JumpCloud Policy

The MDM Custom Configuration Profile policy gives admins new device management controls that they can use fit to their organizations’ needs.

OpenLDAP and Apache Directory Server are both popular solutions — but another alternative is cloud-hosted LDAP. Try JumpCloud free today.

Blog

Apache Directory Server vs. OpenLDAP

OpenLDAP and Apache Directory Server are both popular solutions — but another alternative is cloud-hosted LDAP. Try JumpCloud free today.

See all of the new features and updates available in Directory-as-a-Service in the July '20 edition of the JumpCloud Newsletter.

Blog

July ’20 Newsletter

See all of the new features and updates available in Directory-as-a-Service in the July '20 edition of the JumpCloud Newsletter.