Data Bites

RADIUS security news and updates from the Cloud RADIUS team.

A Stepwise Guide to Integrate Azure AD With RADIUS and PKI

In a bid to keep up with the rapid expansion of cloud computing, Microsoft rolled out Azure AD so their clients are able to migrate their AD-domain environments to the cloud. Cloud-based solutions are on the rise because of improved security measures, reduced costs, and increased versatility compared to on-prem solutions. While Azure AD is […]

Read Story

Is LDAP Outdated For Today’s Cloud Environment?

Due to the difficulties of on-prem LDAP, many IT admins are looking for cloud-hosted LDAP alternatives they can take advantage of. Let’s take a look at some of the options available.

Read Story

802.1X Authentication With EAP-MD5 Is Insecure

In November 2022, the French data protection authority (CNIL) announced that it had issued a fine of over $600,000 against a French energy company (EDF). The findings stated that the energy company failed to handle customers’ data reliably. The regulator also found that user credentials were stored and protected with an MD5 hash declared cryptographically […]

Read Story

2022 Security Analysis of PEAP-MSCHAPv2

The authentication protocol you use determines the strength of your organization’s security against the soaring number of cyberattacks these days. A protocol heavily dependent on passwords is always vulnerable to various cyberattacks. Even Microsoft Exchange has warned finance personnel to minimize the use of passwords as hackers easily target them during authentication for spray attacks. […]

Read Story

Beginner’s Guide to Wireless Authentication Protocols

Wireless networks have become an integral part of our daily routine as they interconnect our devices and provide us with the convenience of mobile internet access. The convenience of wireless connectivity necessitates robust security measures to protect our sensitive information and privacy. This is why implementing wireless authentication protocols is of the utmost importance. Wireless […]

Read Story

A Comprehensive RADIUS Setup Guide For GSuite

It's a misconception that you can't use G-Suite credentials for 802.1x. Click here to learn everything you need to know about using RADIUS with Google.

Read Story

A Guide to Deploy RADIUS with Microsoft Office 365 Suite

You can leverage your existing Office 365 subscription to access the intrinsic Azure AD directory for RADIUS authentication. Here's how.

Read Story

A Detailed Overview Of  802.1X Network Configuration

IEEE 802.1X To deploy WPA in a wireless network, an access point uses 802.1X. A wireless client must be authenticated using WPA before it can establish a connection with the access point. Switches use 802.1X to perform port-based authentication for wire-based networks. WPA-PSK (pre-shared key, commonly known as WPA-Personal) and WPA/WPA2 Enterprise are the most […]

Read Story