{"id":19020,"date":"2018-08-17T08:00:34","date_gmt":"2018-08-17T14:00:34","guid":{"rendered":"https:\/\/www.jumpcloud.com\/?p=19020"},"modified":"2023-06-12T18:49:39","modified_gmt":"2023-06-12T22:49:39","slug":"definition-of-wifi-authentication","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/definition-of-wifi-authentication","title":{"rendered":"Definition of WiFi Authentication"},"content":{"rendered":"\n

Many people take WiFi for granted due to its ubiquity, but that doesn\u2019t change the fact that it is one of the most wide reaching innovations of the modern era. The convenience of connecting wirelessly to a network has had an incredible effect on users, IT admins, and <\/span>cost<\/span><\/a>. But, in order to access the network, users must authenticate. So, what is the definition of WiFi authentication?<\/span><\/p>\n\n\n\n

How WiFi Enables Freedom<\/span><\/h2>\n\n\n
\n
\"WiFi<\/figure><\/div>\n\n\n

Untethering from a desk and wirelessly authenticating to the network allows users a boost in collaboration, flexibility, and convenience. With freedom from wires, laptops now allow for users to take their work into the conference room with them for a meeting. IT admins no longer have to hire contractors to pull ethernet cords throughout an entire building and into a server room. <\/span>WiFi<\/span><\/a> even allowed users to work remotely from anywhere with a signal. Clearly, WiFi has made networking a much more convenient affair for both users and admins. But, convenience often leads to risk. <\/span><\/p>\n\n\n\n

Before WiFi networks, users connected to the Internet in their offices via wired connections that were managed by a domain controller within Microsoft\u00ae<\/sup> Active Directory<\/a>\u00ae<\/sup> (MAD or AD). The domain controller would authenticate users and allows access to specific computer resources, including the network. This setup allowed for proximity-based security. If you could plug in an ethernet cord to your system, you could gain access to the network by leveraging your unique credentials. Credentials were not shared, which leads us to the biggest issue with conventional WiFi authentication. <\/span><\/p>\n\n\n\n

Shared WiFi Credentials Results in Risk<\/span><\/h2>\n\n\n
\n
\"WiFi<\/figure><\/div>\n\n\n

Wireless networks are often authenticated to via a single shared SSID and password. These credentials usually get passed around via sticky note, email, or word of mouth. Any of these means of communication pose the risk of interception by bad actors. Now, should the IT admin even find out a breach occurred, they have to undergo the annoying and security-deficient task of changing the password and disseminating that information company wide\u2014more passed sticky notes?<\/span><\/p>\n\n\n\n

Further, WiFi signals broadcast throughout the entire office but spill out into the parking lot, street, and offices above, below, and to the sides. This means that any so-so hacker with an open source program and malicious intent could sit in the parking lot and crack the WEP or WPA security mechanism. These security protocols are considered out of date and do not provide the security of a physical connection to the network. Even WPA2 fell to <\/span>KRACK<\/span><\/a> and continues to face <\/span>new security concerns<\/span><\/a>. So, all a hacker needs to do is get within range of the wireless access point (WAP), fire up their laptop, and leverage an open source program to exploit these weaknesses. If you think of your networking security as a castle, WiFi has effectively drained the moat.  <\/span><\/p>\n\n\n\n

Tough Choices<\/span><\/h2>\n\n\n\n

IT admins have a tough choice to make: risk security with flimsy WiFi security measures or spend limited IT resources on setting up systems to ensure security. Too often, IT organizations are forced to take the route of decreased security due to time constraints, budget issues, and lack of tooling.<\/span><\/p>\n\n\n\n

One option for WiFi authentication is to back-end the WiFi infrastructure with LDAP<\/a> and create a hotel-like experience where users authenticate via a splash page and remain connected to the network for a set amount of time. This option is great for hotels, airports, cafes, and more, but often not as enticing to IT admins with offices of people.<\/span><\/p>\n\n\n\n

\"RADIUS<\/figure><\/span><\/h2>\n\n\n\n

The second option is to stand up a RADIUS server on-prem, connect it to the directory service (an LDAP server or Microsoft Active Directory implementation) and point it at the WAPs. The WAPs talk with the RADIUS server, which then verifies the user\u2019s identity against the directory service. This solution allows users to connect to the network using their own unique credentials. Plus, they\u2019ll be able to remain connected and not have to reauthenticate. No more shared usernames and passwords; hackers would now have to steal individual user credentials. Should these credentials become discovered though, an IT admin would have a much easier time expelling the intruder. <\/span><\/p>\n\n\n\n

With the rise in security comes a hit to convenience for IT admins, though. IT admins, in this scenario, would now be forced to set up additional infrastructure and devote time to its ongoing maintenance. All of this is neither cheap or easy.<\/span><\/p>\n\n\n\n

The Third Option for WiFi Authentication, Security<\/span><\/h2>\n\n\n\n

It is clear that shoring up WiFi authentication is crucial to the security of an organization\u2019s network security. And, fortunately, there is a solution that provides security and convenience to both users and IT admins.<\/span><\/p>\n\n\n

\n
\"RADIUS<\/figure><\/div>\n\n\n

The third option is JumpCloud\u00ae<\/sup> Directory-as-a-Service\u00ae<\/sup>. Cloud-based directory services from JumpCloud leverage both LDAP and RADIUS<\/a> from the cloud so there is no additional hardware to set up on-prem. All admins have to do is point their <\/span>WiFi infrastructure<\/span><\/a> to the cloud-based <\/span>LDAP-as-a-Service<\/span><\/a> or RADIUS-as-a-Service<\/a> infrastructure and their users will be able to access the network with a single, unique set of credentials. No more juggling passwords for <\/span>systems<\/span><\/a>, <\/span>cloud and on-prem file servers<\/span><\/a>, <\/span>web applications<\/span><\/a>, and SSID\/password combinations\u2014JumpCloud DaaS allows for the integration of all these resources into one centralized platform.<\/span> Learn more about WiFi and identity-as-a-service<\/a>.<\/p>\n\n\n\n

Learn More About JumpCloud<\/span><\/h2>\n\n\n\n

Defining WiFi authentication poses many solutions, but only one from the cloud. Give JumpCloud Directory-as-a-Service a <\/span>try for free<\/span><\/a> today and authenticate up to 10 WiFi users in your office for free, forever. If you\u2019re in need of managing more than 10 users, we offer <\/span>special pricing<\/span><\/a> on both the LDAP-as-a-Service and RADIUS-as-a-Service protocols. Check out JumpCloud RADIUS-as-a-Service<\/a> to learn more today, or <\/span>drop us a note<\/span><\/a>. We\u2019d love to talk to you more about the definition of WiFi authentication. <\/span><\/p>\n","protected":false},"excerpt":{"rendered":"

Many people take WiFi for granted due to its ubiquity, and to access a network you need authentication. What is the definition of WiFi authentication?<\/p>\n","protected":false},"author":74,"featured_media":19033,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_oasis_is_in_workflow":0,"_oasis_original":0,"_oasis_task_priority":"","inline_featured_image":false,"footnotes":""},"categories":[23,2781],"tags":[],"collection":[2779,2775],"platform":[],"funnel_stage":[3016],"coauthors":[2517],"acf":[],"yoast_head":"\nDefinition of WiFi Authentication - JumpCloud<\/title>\n<meta name=\"description\" content=\"Many people take WiFi for granted due to its ubiquity, and to access a network you need authentication. What is the definition of WiFi authentication?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jumpcloud.com\/blog\/definition-of-wifi-authentication\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Definition of WiFi Authentication\" \/>\n<meta property=\"og:description\" content=\"Many people take WiFi for granted due to its ubiquity, and to access a network you need authentication. What is the definition of WiFi authentication?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jumpcloud.com\/blog\/definition-of-wifi-authentication\" \/>\n<meta property=\"og:site_name\" content=\"JumpCloud\" \/>\n<meta property=\"article:published_time\" content=\"2018-08-17T14:00:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-12T22:49:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2018\/08\/pablo-15.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Ryan Squires\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ryan Squires\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/definition-of-wifi-authentication#article\",\"isPartOf\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/definition-of-wifi-authentication\"},\"author\":{\"name\":\"Ryan Squires\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/person\/5b6df96d8f46ff33ce7a9be80ff8aa82\"},\"headline\":\"Definition of WiFi Authentication\",\"datePublished\":\"2018-08-17T14:00:34+00:00\",\"dateModified\":\"2023-06-12T22:49:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/definition-of-wifi-authentication\"},\"wordCount\":963,\"publisher\":{\"@id\":\"https:\/\/jumpcloud.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/definition-of-wifi-authentication#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2018\/08\/pablo-15.png\",\"articleSection\":[\"Best Practices\",\"How-To\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/definition-of-wifi-authentication\",\"url\":\"https:\/\/jumpcloud.com\/blog\/definition-of-wifi-authentication\",\"name\":\"Definition of WiFi Authentication - JumpCloud\",\"isPartOf\":{\"@id\":\"https:\/\/jumpcloud.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/definition-of-wifi-authentication#primaryimage\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/definition-of-wifi-authentication#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2018\/08\/pablo-15.png\",\"datePublished\":\"2018-08-17T14:00:34+00:00\",\"dateModified\":\"2023-06-12T22:49:39+00:00\",\"description\":\"Many people take WiFi for granted due to its ubiquity, and to access a network you need authentication. What is the definition of WiFi authentication?\",\"breadcrumb\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/definition-of-wifi-authentication#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jumpcloud.com\/blog\/definition-of-wifi-authentication\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/definition-of-wifi-authentication#primaryimage\",\"url\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2018\/08\/pablo-15.png\",\"contentUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2018\/08\/pablo-15.png\",\"width\":1024,\"height\":512,\"caption\":\"WiFi Authentication\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/definition-of-wifi-authentication#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jumpcloud.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Definition of WiFi Authentication\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jumpcloud.com\/#website\",\"url\":\"https:\/\/jumpcloud.com\/\",\"name\":\"JumpCloud\",\"description\":\"Daily insights on directory services, IAM, LDAP, identity security, SSO, system management (Mac, Windows, Linux), networking, and the cloud.\",\"publisher\":{\"@id\":\"https:\/\/jumpcloud.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jumpcloud.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jumpcloud.com\/#organization\",\"name\":\"JumpCloud\",\"url\":\"https:\/\/jumpcloud.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png\",\"contentUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png\",\"width\":598,\"height\":101,\"caption\":\"JumpCloud\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/person\/5b6df96d8f46ff33ce7a9be80ff8aa82\",\"name\":\"Ryan Squires\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/person\/image\/233244f19bef07f72392272652561847\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/70505725d9ff990c42181476b14b03e3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/70505725d9ff990c42181476b14b03e3?s=96&d=mm&r=g\",\"caption\":\"Ryan Squires\"},\"description\":\"Ryan Squires is a content writer at JumpCloud, a company dedicated to connecting users to the IT resources they need securely and efficiently. He has a degree in Journalism and Media Communication from Colorado State University.\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Definition of WiFi Authentication - JumpCloud","description":"Many people take WiFi for granted due to its ubiquity, and to access a network you need authentication. What is the definition of WiFi authentication?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jumpcloud.com\/blog\/definition-of-wifi-authentication","og_locale":"en_US","og_type":"article","og_title":"Definition of WiFi Authentication","og_description":"Many people take WiFi for granted due to its ubiquity, and to access a network you need authentication. What is the definition of WiFi authentication?","og_url":"https:\/\/jumpcloud.com\/blog\/definition-of-wifi-authentication","og_site_name":"JumpCloud","article_published_time":"2018-08-17T14:00:34+00:00","article_modified_time":"2023-06-12T22:49:39+00:00","og_image":[{"width":1024,"height":512,"url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2018\/08\/pablo-15.png","type":"image\/png"}],"author":"Ryan Squires","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Ryan Squires","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jumpcloud.com\/blog\/definition-of-wifi-authentication#article","isPartOf":{"@id":"https:\/\/jumpcloud.com\/blog\/definition-of-wifi-authentication"},"author":{"name":"Ryan Squires","@id":"https:\/\/jumpcloud.com\/#\/schema\/person\/5b6df96d8f46ff33ce7a9be80ff8aa82"},"headline":"Definition of WiFi Authentication","datePublished":"2018-08-17T14:00:34+00:00","dateModified":"2023-06-12T22:49:39+00:00","mainEntityOfPage":{"@id":"https:\/\/jumpcloud.com\/blog\/definition-of-wifi-authentication"},"wordCount":963,"publisher":{"@id":"https:\/\/jumpcloud.com\/#organization"},"image":{"@id":"https:\/\/jumpcloud.com\/blog\/definition-of-wifi-authentication#primaryimage"},"thumbnailUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2018\/08\/pablo-15.png","articleSection":["Best Practices","How-To"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/jumpcloud.com\/blog\/definition-of-wifi-authentication","url":"https:\/\/jumpcloud.com\/blog\/definition-of-wifi-authentication","name":"Definition of WiFi Authentication - JumpCloud","isPartOf":{"@id":"https:\/\/jumpcloud.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jumpcloud.com\/blog\/definition-of-wifi-authentication#primaryimage"},"image":{"@id":"https:\/\/jumpcloud.com\/blog\/definition-of-wifi-authentication#primaryimage"},"thumbnailUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2018\/08\/pablo-15.png","datePublished":"2018-08-17T14:00:34+00:00","dateModified":"2023-06-12T22:49:39+00:00","description":"Many people take WiFi for granted due to its ubiquity, and to access a network you need authentication. What is the definition of WiFi authentication?","breadcrumb":{"@id":"https:\/\/jumpcloud.com\/blog\/definition-of-wifi-authentication#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jumpcloud.com\/blog\/definition-of-wifi-authentication"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/blog\/definition-of-wifi-authentication#primaryimage","url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2018\/08\/pablo-15.png","contentUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2018\/08\/pablo-15.png","width":1024,"height":512,"caption":"WiFi Authentication"},{"@type":"BreadcrumbList","@id":"https:\/\/jumpcloud.com\/blog\/definition-of-wifi-authentication#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jumpcloud.com\/"},{"@type":"ListItem","position":2,"name":"Definition of WiFi Authentication"}]},{"@type":"WebSite","@id":"https:\/\/jumpcloud.com\/#website","url":"https:\/\/jumpcloud.com\/","name":"JumpCloud","description":"Daily insights on directory services, IAM, LDAP, identity security, SSO, system management (Mac, Windows, Linux), networking, and the cloud.","publisher":{"@id":"https:\/\/jumpcloud.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jumpcloud.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/jumpcloud.com\/#organization","name":"JumpCloud","url":"https:\/\/jumpcloud.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/","url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png","contentUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png","width":598,"height":101,"caption":"JumpCloud"},"image":{"@id":"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/jumpcloud.com\/#\/schema\/person\/5b6df96d8f46ff33ce7a9be80ff8aa82","name":"Ryan Squires","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/#\/schema\/person\/image\/233244f19bef07f72392272652561847","url":"https:\/\/secure.gravatar.com\/avatar\/70505725d9ff990c42181476b14b03e3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/70505725d9ff990c42181476b14b03e3?s=96&d=mm&r=g","caption":"Ryan Squires"},"description":"Ryan Squires is a content writer at JumpCloud, a company dedicated to connecting users to the IT resources they need securely and efficiently. He has a degree in Journalism and Media Communication from Colorado State University."}]}},"_links":{"self":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts\/19020"}],"collection":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/users\/74"}],"replies":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/comments?post=19020"}],"version-history":[{"count":3,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts\/19020\/revisions"}],"predecessor-version":[{"id":90787,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts\/19020\/revisions\/90787"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/media\/19033"}],"wp:attachment":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/media?parent=19020"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/categories?post=19020"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/tags?post=19020"},{"taxonomy":"collection","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/collection?post=19020"},{"taxonomy":"platform","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/platform?post=19020"},{"taxonomy":"funnel_stage","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/funnel_stage?post=19020"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/coauthors?post=19020"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}