YILDIZ TECHNICAL UNIVERSITY
EDUROAM

What is eduroam?

eduroam (education roaming) allows users (researchers, teachers, students, staff) from participating institutions to securely access the Internet from any eduroam-enabled institution. The eduroam principle is based on the fact that the user’s authentication is done by the user’s home institution, whereas the authorisation decision allowing access to the network resources is done by the visited network. To learn more about eduroam, please read also the section about.

eduroam is a global initiative supported by GÉANT, the National Research and Education networks and individual institutions. Each participating organisation contributes time, manpower and resources to help support the collaborative efforts.

Overall governance of eduroam is provided by the Global eduroam Governance Committee which currently comprises eleven senior representatives of roaming operators in Africa, Asia-Pacific, Latin America, North America and Europe.

eduroam separates the concepts of authentication (identity providers) and hotspots (service providers) allowing public, commercial or city wifi initiatives to offer eduroam in addition to research and education institutions.

What commercial entities cannot do is become identity providers and offer a service to their customers that will work with eduroam. so any partnership with a commercial wifi service needs to respect that users of this hotspot cannot be charged for accessing the network. As a network administrator, what do I need to do to set up eduroam in my campus? In order to enable your users to access eduroam in your campus, you need to maintain an Identity Management System (IdMs), where your users’ electronic identities are stored.

When a user tries to log on to the wireless network of a visited eduroam-enabled institution, the user’s authentication request is sent to the user’s home institution. This is done via a hierarchical system of RADIUS servers. The user’s home institution verifies the user’s credentials and sends to the visited institution (via the RADIUS servers) the result of such a verification.

In eduroam, communication between the access point and the user’s home institution is based on IEEE 802.1X standard; 802.1X encompasses the use of EAP, the Extensible Authentication Protocol, which allows for different authentication methods. Depending on the type of EAP method used, either a secure tunnel will be established from the user’s computer to his home institution through which the actual authentication information (username/password etc.) will be carried (EAP-TTLS or PEAP), or mutual authentication by public X.509 certificates, which is not vulnerable to eavesdropping, will be used (EAP-TLS).

eduroam is based on the most secure encryption and authentication standards in existence today. Its security by far exceeds typical commercial hotspots. Be aware though that when using the general Internet at an eduroam hotspot, the local site security measures at that hotspot will apply to you as well. For example, the firewall settings at the visited place may be different from those you are used to at home, and as a guest you may have access to fewer services on the Internet than you have at home.

No. Web Portal, Captive Portal or Splash-Screen based authentication mechanisms are not a secure way of accepting eduroam credentials, even if the website is protected by an HTTPS secure connection. The distributed nature of eduroam would mean that many different pages, languages and layouts would be presented to eduroam users making it impossible to distinguish between legitimate and bogus sites (even a consistent layout can be mimicked by an adversary). eduroam requires the use of 802.1x which provides end-to-end encryption to ensure that your private user credentials are only available to your home institution. The certificate of your home institution is the only point you need to trust regardless of who operates any intermediate infrastructure. Web portals require you to trust their infrastructure as they receive your password in clear text, this breaks the end-to-end encryption tenets of eduroam.

You can either ask your eduroam Identity Provider whether an iPhone configuration profile is available, or, if you feel comfortable working with the “iPhone Configuration Utility”, you can create such a configuration profile yourself. The iPhone Configuration Utility can be downloaded from http://www.apple.com/support/iphone/enterprise/. Ask your eduroam Identity Provider for the exact connection parameters. Please contact your eduroam Identity Provider for any further details.

You can either ask your eduroam Identity Provider whether an iPhone configuration profile is available, or, if you feel comfortable working with the “iPhone Configuration Utility”, you can create such a configuration profile yourself. The iPhone Configuration Utility can be downloaded from http://www.apple.com/support/iphone/enterprise/. Ask your eduroam Identity Provider for the exact connection parameters. Please contact your eduroam Identity Provider for any further details.