eduroam

15 April 2021 at 5:55pm
Appendix 2 of the eduroam(UK) Technical Specification in quick checklist format Please visit https://community.jisc.ac.uk/library/network-and-technology-service-docs/technical-specification-requirements-checklists for the updated link.
15 April 2021 at 5:55pm
Appendix 1 of the eduroam(UK) Technical Specification in quick checklist format Please visit https://community.jisc.ac.uk/library/network-and-technology-service-docs/technical-specification-requirements-checklists for the updated link.
12 January 2017 at 4:48pm
The full MS Word version of the Technical Specification can be downloaded from icon above. The document can also be found in the Technical Reference Documents section of the eduroam area in Community Library. Appendix 1 - Summary of Requirements - Checklist Form
Released 1st April 2021 Updated 16th April 2021 This advisory applies to all organisations providing a Home (IdP) service who wish to support users on Android 11 devices. A number of issues have arisen simultaneously which have resulted in a complex situation which requires a careful response from member organisations to avoid user disappointment. The recommended actions are summarised at the bottom of this page. Contents:
May 2016 - 10/05/2016 This advisory applies to any member organisation that operates an ORPS that is configured to send RADIUS accounting packets to the NRPS. Originator: Edward Wincott Scope
Buried in the historic mail archives (and likely in some older eduroam documentation) are advisories concerning the type of RADIUS certificate that eduroam(UK) participants should be using.  Basically, do not use MD5 certificates. For some time now, MD5 has been deprecated and over the past few years Operating Systems have been dropping support for such certificates. e.g. http://support.apple.com/kb/HT4999  (since iOS 5 MD5 certs are only valid for CA certs not server certs)
Announcement regarding Windows Mobile 8 and 802.1X authentication with certificate validation Best practice is that clients must be configured to trust/verify the CA that signsthe RADIUS server that presents during an 802.1X authentication - a major securitypin for eduroam is this trust/check. It has been noted that Windows Mobile 8 (WM8) devices would not authenticate the userif this 'verify' option was chosen.
Status-Server (RADIUS Code Type 12 packet) uses RFC 5997 - http://www.ietf.org/rfc/rfc5997.txt - to deliver a method of one RADIUS server or client to know the status of an upstream or downstream server. 
eduroam(UK) Advisory: EAP server certificate considerations (July 2020)
Subscribe to eduroam