Are we bypassing policy by using mac-address authorisation for devices that cannot do 802.1x or can but don't have a university username? Personally I don't think so.
We record the owner of the device and therefore have an auditable record of where the device authenticated by storing the mac-address in a mac-authorisation bypass file on the RADIUS Servers. This writes a log entry for all login attempts. After successful authentication and the...