802.1X EAP-TLS Authentication Flow Explained

For many organizations, the IEEE 802.1X authentication mechanism for Port-Based Network Access Control is the first line of defense against outside attack. It’s also one of the most commonly targeted attack vectors, which makes it a security priority.

One of the most common authentication methods used to send client information over-the-air via 802.1X is the Extensible Authentication Protocol (EAP). There are multiple EAP methods, and while each one utilizes the EAP tunnel to send information through an encrypted channel, only EAP-TLS supports certificate-based authentication, the gold standard of authentication.

Below we will detail the steps involved in the 802.1X EAP-TLS authentication flow and how it results in a secured network connection.

What’s Involved in EAP-TLS?

EAP-TLS authentication involves 3 parties, the supplicant (user’s device), the authenticator (switch or controller), and the authentication server (RADIUS server). The authentication process can first be broken down into 4 broad categories: initialization, initiation, negotiation, and authentication.

  1. Initialization – the authenticator detects a supplicant seeking to authenticate to the secure network.
  2. Initiation – essentially a process of saying hello between the supplicant, authenticator, and authentication server.
  3. Negotiation – the supplicant and authentication server exchange identifying information to determine whether the user should be authenticated to the network.
  4. Authentication – the process is completed, opening a port for the confirmed user to connect to the 802.1X network and browse securely.

EAP-TLS authentication is typically faster than credential-based authentication, and it occurs automatically without involvement from the user. When the device is in range of the secure network, it will initiate and complete the connection on its own. But what are the actual steps involved?

802.1X Flow Broken Down

Pictured here is a step-by-step image showing the 802.1X EAP-TLS authentication method broken down.

https://mrncciew.files.wordpress.com/2014/08/eap-tls-20.png

  1. Client-side certificates issued to supplicants by PKI, Public server-side certificate issued to supplicants out-of-band
  2. Establish 802.11 Data Link
  3. EAPoL Start
  4. Identity Section
  5. RADIUS Access Request (anonymous)
  6. RADIUS Access (or Reject)
  7. EAP Success (or Failure)
  8. Message 1: EAPOL-Key
  9. Message 2: EAPOL-Key
  10. Message 3: EAPOL-Key
  11. Message 4: EAPOL-Key
  12. Encrypted Channel

How to Implement EAP-TLS for 802.1X

Overall, the 802.1X EAP-TLS authentication process is extremely fast. The entire 12 steps occurs faster than human comprehension, and when compared to other methods such as PEAP-MSCHAPv2 and EAP-TTLS/PAP, the difference is still considerable. In high-traffic networks, EAP-TLS’ simpler authentication flow can prevent congestion at peak times.

If strong network security and a rapid, user-friendly authentication process are your cybersecurity goals, 802.1X is the answer. SecureW2 provides all the tools to configure 802.1X and simplify the distribution and management of digital certificates.

Check out our pricing page to see if your organization should have a certificate-based future.

Learn about this author

Eytan Raphaely

Eytan Raphaely is a digital marketing professional with a true passion for writing things that he thinks are really funny, that other people think are mildly funny. Eytan is a graduate of University of Washington where he studied digital marketing. Eytan has diverse writing experience, including studios and marketing consulting companies, digital comedy media companies, and more.