Institutional eduroam Implementation Plan

Institutional eduroam
Implementation Plan
Author: Neil Witheridge
Date: 21st April 2016
Version: 1.0
About This Document
This document describes the institutional eduroam implementation plan, addressing technical and
administrative requirements for participating in the national eduroam federation.
Contents
Introduction ........................................................................................................................ 3
Terminology ................................................................................................................................ 3
Institutional eduroam Service Type ........................................................................................................... 4
eduroam Prerequisites ................................................................................................................ 4
Information previously provided to the NRO ............................................................................................. 4
Implementation Plan Overview ......................................................................................... 5
Deployment Tasks ...................................................................................................................... 5
RADIUS Servers........................................................................................................................................ 6
Wireless Infrastructure .............................................................................................................................. 6
Network Access ......................................................................................................................................... 6
Institutional eduroam Support ................................................................................................................... 6
Institutional eduroam Webpage................................................................................................................. 6
Information Transfer to the NRO ................................................................................................. 7
Institutional eduroam Deployment Scenarios .............................................................................. 7
Typical Institution ....................................................................................................................................... 7
Institution acting as eduroam SP for Partners ........................................................................................... 8
Other Scenarios......................................................................................................................................... 8
NRO eduroam Operational Objectives ............................................................................. 9
National RADIUS Server Operation ............................................................................................ 9
Operability Monitoring ................................................................................................................. 9
Information Resources ................................................................................................................ 9
Support to Institutional Administrators......................................................................................... 9
Institution RADIUS Server(s) Deployment ..................................................................... 10
Implementation Items................................................................................................................ 10
Required .................................................................................................................................................. 10
Recommended ........................................................................................................................................ 13
Optional ................................................................................................................................................... 13
Discussion ................................................................................................................................ 13
Required RADIUS Attributes ................................................................................................................... 13
RADIUS Server Certificate ...................................................................................................................... 14
Filtering invalid usernames and realms ................................................................................................... 15
Non-responsive Server Handling ............................................................................................................ 16
RADIUS Server Logging ......................................................................................................................... 16
Information to be provided to the NRO ..................................................................................... 16
Wireless Infrastructure .................................................................................................... 18
Implementation Items................................................................................................................ 18
Required .................................................................................................................................................. 18
Recommended ........................................................................................................................................ 19
Information to be provided to the NRO ...................................................................................... 20
Network Access ............................................................................................................... 21
Implementation Items................................................................................................................ 21
Required .................................................................................................................................................. 21
Ver 1.0 21st April 2016
1 of 28
Neil Witheridge
Institutional eduroam Implementation Plan
Recommended ........................................................................................................................................ 21
Optional ................................................................................................................................................... 21
Discussion ................................................................................................................................ 21
Recommended Ports and Protocols........................................................................................................ 21
Information to be provided to the NRO ...................................................................................... 22
Institutional Support........................................................................................................ 23
Implementation Items................................................................................................................ 23
Mandatory................................................................................................................................................ 23
Recommended ........................................................................................................................................ 23
Discussion ................................................................................................................................ 23
Local eduroam Contacts ......................................................................................................................... 23
Local Support Workflow .......................................................................................................................... 24
Test accounts .......................................................................................................................................... 24
eduroam Configuration Assistant Tool .................................................................................................... 24
End-User Education ................................................................................................................................ 24
Information to be provided to the NRO ...................................................................................... 25
eduroam Webpage........................................................................................................... 26
Implementation Items................................................................................................................ 26
Mandatory................................................................................................................................................ 26
Required Information ................................................................................................................ 26
General Information ................................................................................................................................. 26
IdP-role-specific Information .................................................................................................................... 26
SP-role-specific Information .................................................................................................................... 26
Information to be provided to the NRO ...................................................................................... 27
Appendix A: Institutional eduroam Implementation Workflow .................................... 28
Ver 1.0 21st April 2016
2 of 28
Neil Witheridge
Institutional eduroam Implementation Plan
Introduction
The eduroam joining process for an institution consists of 4 steps:
1. Institution’s Application to the NRO to participate in eduroam, involving the exchange of institutional
and basic eduroam deployment planning information allowing the National Roaming Operator (the
NRO) to assess the institution’s satisfaction of pre-requisites and ability to operate sustainably as an
eduroam participant;
2. Deployment of eduroam, satisfying technical and administrative requirements;
3. eduroam Operability Auditing;
4. Commencement of participation, involving the NRO announcement of the institution’s participation in
eduroam to current eduroam national participants, and globally via upload of the institution’s
eduroam deployment data to the eduroam global database.
This document describes the implementation plan for Step 2.
Terminology
National Roaming Operator (the NRO): The entity that operates the eduroam service for a country or
economy. For example, the NRO may be a National Research and Education Network (NREN) operator. The
NROs are sometimes referred to as the “eduroam operators”.
The institution: The administrative organisation with overall responsibility for deployment of eduroam on
behalf of one or more institutions is referred to simply as ‘the institution’ in the following implementation
description.
eduroam username: institutional_username@institutional_realm
Following are components of eduroam infrastructure:

Supplicant i.e. software on an end-user’s mobile device responsible for establishing a wireless
connection. For eduroam, the supplicant implements the IEEE 802.1x protocol;

Network Access Server (NAS) i.e. a Wireless Access Point, Wireless LAN Controller. The NAS
implements the IEEE 802.1x protocol for communicating with the supplicant, and initiates an
authentication transaction with the supplicant. The NAS implements the RADIUS protocol for
communication with the Authentication Server. In performing authentication, both the IEEE 802.1x leg
and RADIUS leg use the EAP framework (Extensible Authentication Protocol). EAP is a framework
for conveying a variety of authentication methods.
For security and ease of implementation, eduroam uses tunneled EAP protocols. Basically this involves
a first step of TLS handshaking and establishing an encrypted tunnel (keys, keying materials) (and also
authenticating the home RADIUS server), and a second step of transferring encrypted user information in
RADIUS EAP attributes in order to perform secure user authentication. For eduroam, the predominant
authentication protocols (outer/inner) are PEAP/MSCHAPv2, TTLS/MSCHAPv2 and TTLS/PAP.

Authentication Server (AS) i.e. the institution’s RADIUS Server(s) configured in the NAS as the
destination of RADIUS authentication requests.

RADIUS is an ‘Authentication, Authorisation and Accounting’ (AAA) protocol. RADIUS implementations
support the use of a ‘realm’ part of the eduroam username (conveyed in the RADIUS User-Name
attribute) to determine whether to authenticate the user against a local identity store, or to forward (proxy)
the authentication request to the national eduroam RADIUS Server, which in turn will proxy the request to
the Regional or Top-Level eduroam RADIUS Server, or to the eduroam participating ‘home-institution’
RADIUS server responsible for authentication of user from the realm.

Infrastructure Servers are responsible for proxying the authentication request between institutional
RADIUS servers, and include both the National RADIUS Servers (NRS) and Regional or Top-Level
RADIUS servers (TLRS).
Ver 1.0 21st April 2016
3 of 28
Neil Witheridge
Institutional eduroam Implementation Plan
eduroam participant roles:

Identity Provider (IdP): the institution authenticates its users according to its local realm; and

Service Provider (SP): the institution provides network access to visitors by virtue of their successful
remote authentication via eduroam by their ‘home institution’.
the NROs also operate an eduroam Test and Monitoring Server (TMS) which comprises both a RADIUS
client, issuing authentication requests using the ‘rad_eap_test’ client software, and a RADIUS Server which
authenticates the NRO-provided institutional SP test accounts.
Institutional eduroam Service Type
The eduroam service-type for institutions is usually IdP+SP, i.e. authenticating the institutions own users as
they travel to other eduroam participating institutions, as well as providing network access to visitors via
eduroam. Institutions may also operate as SP-only participants, and in special cases as IdP-only
participants.
eduroam Prerequisites
Step 1. of the eduroam joining process, the institutional application to participate in eduroam, involves
sharing basic institutional information and eduroam deployment and technical contact information. The
institution is evaluated in its satisfying the pre-requisites for eduroam participation, being:

Understanding of eduroam and willingness/ability to comply with technical and administrative policy
requirements for operating as an eduroam IdP+SP;

Effective identity management & secure identity store;

Effective wireless network infrastructure with support for IEEE 802.1x (WPA2 Enterprise);

Effective internal networking and internet access via NREN or other ISP, with the requirement for their
users (staff, students) to conform to the institution’s network access Acceptable Use Policy (AUP);

IT capability necessary to deploy and sustainably operate the eduroam RADIUS Server;

IT support capability necessary to provide IT support to local staff and visitors;

Administrative capability necessary to publish an institutional eduroam webpage providing eduroam
configuration and usage information for local users and visitors.
If the NRO deems the institution as satisfying the pre-requisites, Step 1. concludes with an invitation from the
NRO to the institution to proceed to deploy eduroam infrastructure and establish administrative processes
required for eduroam participation i.e. an invitation to proceed to Step 2.
Information previously provided to the NRO
The following information will have been provided to the NRO during step 1 of the joining process:
Information item
Description/Comment
Institution name
Formal name, including “The” if appropriate
Institution address
Street,City,State,Postcode
Primary domain name
Registered primary domain name, will be use as the institution
label in monitoring, metrics etc.
Institution webpage
URL of institution’s website home-page
Link to Institution’s network AUP
URL of institution’s network access Acceptable Use Policy
Ver 1.0 21st April 2016
4 of 28
Neil Witheridge
Institutional eduroam Implementation Plan
Information item
Description/Comment
Institution’s Identity Store info
Authentication system/identity store vendor, model/name, version
Intended local realms
Intended local realms, of form (sub) primary domain name
Local test account(s)
Confirm willingness to provide eduroam test accounts for each
local realm
Wireless Infrastructure info
Wireless equipment vendor, model/name, version. Confirm
support for multiple SSIDs, IEEE 802.1x capable.
Wireless coverage map (if any)
Link to institution’s wireless coverage map
Intended eduroam coverage
Names & addresses of campuses where eduroam coverage will
be provided
Potential eduroam overlap
Assessment of potential for eduroam coverage overlap with
another institution
RADIUS server info (if any)
Implementation vendor, model/name, version of existing RADIUS
server, or preferred implementation if any.
Configure trust for eduroam the NRO Confirmation of willingness to configure trust for the eduroam the
TMS
NRO Test&Monitoring servers in institutional RADIUS servers.
ISP information
Internet Service Provider and link to the institution’s Access
Agreement if available
Network service for local users
Description of network service, in particular IP addressing,
application proxies & content filtering if any, restrictions e.g.
ports/protocols, bandwidth, data quotas.
Intended eduroam network service
Intended network service for eduroam users, plan for eduroam
user traffic segregation e.g. via VLAN
Institution IT Support info
Number of IT support staff, link to IT support helpdesk, support
request ticketing system
Estimate of number of users
Estimate of number of users/identities across the institution
eduroam Technical Contact
Full name, email address, phone, mobile (for SMS comms) of the
primary technical contact who will be responsible for eduroam
deployment.
Implementation Plan Overview
The eduroam service relies on consistent implementation achieved in conformance with global and national
eduroam policy.
Deployment Tasks
An outline of each deployment task is provided below.
Ver 1.0 21st April 2016
5 of 28
Neil Witheridge
Institutional eduroam Implementation Plan
RADIUS Servers

RADIUS server deployment satisfying requirements for the eduroam service, including
o
Choosing a RADIUS Server Platform
o
Deploying the RADIUS Server(s) & DNS name server configuration
o
Firewall configuration to allow access to RADIUS servers from the National RADIUS Server
o
Acquiring a server certificate for the RADIUS Server(s) to enable home RADIUS server
authentication
o
Based on local realms and how associated users credentials are stored, and which OS’s the
institution will support for eduroam access, determine which EAP authentication protocols are
applicable.
o
Receipt of user authentication requests from wireless network infrastructure and eduroam
infrastructure (national RADIUS server (NRS), also the eduroam test&monitoring server (TMS)), and
based on ‘realm’ part of username

authentication of local user against institutional identity store (IdP role)

proxying visitor authentication requests to eduroam infrastructure (national RADIUS server)
(SP role)

interoperating with the NRO test and monitoring server (operability monitoring)
o
Authentication transaction logging (ensuring the required attributes are logged)
o
Configuration for trust for the eduroam the NRO TMS in each of the institution’s eduroam RADIUS
servers for eduroam operability monitoring.
To assist with RADIUS Server deployment, the NRO will configure National RADIUS Servers (NRSs) to
enable testing during the deployment step. Configuration of NRS involves establishing trust for receipt of
authentication requests from and proxying of authentication requests to the institution RADIUS server(s). The
NRO will assist the institution by performing tests to confirm technical readiness.
Wireless Infrastructure

Planning and implementation of eduroam coverage area by configuration of wireless infrastructure to
broadcast the “eduroam” SSID and configuration of the ‘eduroam network’ for IEEE 802.1x authentication
at required locations (institution sites/campuses).
Network Access

Network service provision for eduroam users supporting the range of required protocols (the goal being to
provide an equivalent network access service to users as would be available if the user were on their
home campus)
o
Establishing a VLAN/network service for eduroam with appropriate IP addressing
o
Network access logging, associating access events with the user device’s MAC address and
assigned IP address (including DHCP logging, address translation if user network addressing is
NAT’ed).
Institutional eduroam Support

Establishment of an eduroam end-user support capability (including training of local support staff,
publication of an eduroam IT Support workflow) and promotion of the eduroam service to local users.
o
Provision of an institutional test account for each local realm;
o
Access to the eduroam Configuration Assistant Tool.
Institutional eduroam Webpage

Creation of a public eduroam informational webpage, providing comprehensive eduroam service
information to local users and visitors.
Ver 1.0 21st April 2016
6 of 28
Neil Witheridge
Institutional eduroam Implementation Plan
Information Transfer to the NRO
Each of the above tasks involves providing deployment information to the NRO in order that the NRO can
create an accurate record of the institution’s eduroam deployment in the eduroam the NRO “AdminTool”. The
AdminTool generates a data file, which is used to populate the global eduroam database and inform global
eduroam of the institution’s participation.
Following the above tasks and completion of information transfer to the NRO, the institution will perform selfmonitoring and internal testing to ensure readiness for eduroam operability auditing (step 3 of the eduroam
Joining Process).
Institutional eduroam Deployment Scenarios
Below are 2 examples of possible eduroam deployment scenarios for institutions.
Typical Institution
From an eduroam perspective, it is anticipated that typically the institution manages its own identities
(students and staff), operates its own network infrastructure (including wireless network and ISP agreement),
will deploy its own eduroam RADIUS server and provide support and web informational resources locally.
This scenario is depicted in Figure 1.
Figure 1.
Ver 1.0 21st April 2016
Typical Institutional eduroam Deployment Scenario
7 of 28
Neil Witheridge
Institutional eduroam Implementation Plan
Institution acting as eduroam SP for Partners
eduroam deployment topology may vary depending on complexity of agreements between institutions and
the NRO. Below is an example of a more complex eduroam deployment.
It may be appropriate that a large institution provides eduroam connectivity for partner institutions. Those
partner institutions may have their own identity management and network infrastructure (including wireless
and ISP agreement). However the large institution (‘Meta-Institution’) may provide eduroam connectivity
(including RADIUS servers and support elements such as IT support and informational webpage) to its
Partners. From an eduroam operational perspective, Partner Institutions are seen as realms of the MetaInstitution, and the Meta-Institution is responsible for Partner institution compliance with eduroam IdP policy.
This scenario is depicted in Figure 2.
Figure 2.
Public Institutional eduroam Deployment Scenario
Notes:
1. In the above diagram the ‘anchor controller’ operated by the Meta-Institution may not exist i.e. wireless
infrastructure at each Partner Institution may be stand-alone and be configured to authenticate against the
Meta-Institution RADIUS server.
2. It is assumed that each Partner Institution will have its own ‘realm’ (depicted as “partner1.edu.au”,
“partner2.edu.au”, “partner3.edu.au”) and the institution RADIUS Server operated by the Meta-Institution will
be configured to handle (i.e. authenticate users from) those realms.
3. It is assumed that the Meta-Institution provides a centralised IT Support function. However it is anticipated
that each Partner Institution will also have a local IT support person who may be called upon to assist in
troubleshooting either directly by end-users or by the Meta-Institution IT support function.
Other Scenarios
There will be scenarios that merge or depart from the above scenarios, however it is envisaged the
description below can be readily adapted to other scenarios in consultation with the NRO.
Ver 1.0 21st April 2016
8 of 28
Neil Witheridge
Institutional eduroam Implementation Plan
NRO eduroam Operational Objectives
The implementation steps described in following sections reflect the NRO’s operational objectives in
delivering the eduroam service to institutions.
National RADIUS Server Operation
As the eduroam National Roaming Operator, the NRO’s primary responsibility is to operate the National
RADIUS Server (NRS), which routes eduroam authentication requests from the visited institution to the
user’s home institution.
This involves establishing a trust relationship (by virtue of a RADIUS ‘secret’) between the NRS institution
RADIUS servers, and configuring the routing of authentication requests to institutional RADIUS servers (and
establishing the appropriate order if fail-over is used for high-availability deployment).
Operability Monitoring
The NRO’s operability monitoring objectives are intended to provide information to institutional administrators
on the status of their own and other institution’s RADIUS servers. Each RADIUS server deployed by an
institution will be monitored according to its role (i.e. IdP or SP role). Monitoring will make use of trust
configured in each Institutional RADIUS Server (IRS) for the NRO hosted eduroam ‘Test & Monitoring
Server’ (TMS), and make use of test/monitoring accounts provided by institutions and maintained by the
eduroam TMS.
Information Resources
In order to minimize support costs for eduroam, the NRO’s goal is to ensure that comprehensive information
is provided to both institutional eduroam administrators and end-users.
Based on information provided by institutions, the NRO (see Note 1) will publish information which will allow
other eduroam participating institutions to understand the eduroam deployment at an institution as may be
required for supporting its own users travelling to other institutions.
The NRO ensures that institutions provide required information to populate the national eduroam
deployment database, and also provide information to the global eduroam database (hosted by eduroam’s
European confederation).
The NRO will also provide usage metrics to institutions to inform institutional stakeholders of the value the
institution is deriving from eduroam participation.
Support to Institutional Administrators
The NRO is responsible for providing support to institutional administrators. Hence it is important that the
NRO has accurate information on the eduroam deployment at institutions.
Institutional eduroam Administrators are responsible for providing support to their local IT Support Helpdesk
(responsible for 1st line eduroam support to end-users). This involves providing configuration information to
local end-users. The NRO will enable institutions to make use of the eduroam “Configuration Assistant Tool”
in order to enable scripted configuration of devices.
Note 1: Institutional Deployment Information Self-Maintenance (Future)
In the future, the NRO will provide an interface to the “eduroam AdminTool” which will enable institutional
eduroam administrators to maintain accurate deployment information via the tool.
The NRO is in the process of making this tool available, and prior to production deployment of the tool, will
populate data on behalf of institutions.
Ver 1.0 21st April 2016
9 of 28
Neil Witheridge
Institutional eduroam Implementation Plan
Institution RADIUS Server(s) Deployment
The global eduroam service relies on remote authentication of visiting users, authentication requests routed
via institutional, national and regional RADIUS servers to the user’s home institution.
An institution participating in eduroam needs to deploy and operate a RADIUS server which authenticates
local users and forwards (proxies) authentication requests of visiting users to the National RADIUS Server
(thence to their ‘home’ institution RADIUS server, potentially via regional and national RADIUS servers, for
remote authentication).
Implementation Items
Institutions typically operate as both an eduroam IdP and SP i.e. their RADIUS servers will perform both IdP
and SP roles. However in the general case of eduroam implementation, individual RADIUS servers may be
configured to perform an IdP-only role, or SP-only role, or both. This is reflected in the implementation plan
description below.
Required
For each RADIUS server deployed, the following items are required:
Item
Description
General
Choose appropriate RADIUS Deploy an implementation of RADIUS which is compliant with RFC2865.
implementation and install on Primary candidates are FreeRADIUS, Radiator, Cisco ISE, Microsoft NPS. A
server
comparison of RADIUS Server implementations for eduroam is available at
https://community.jisc.ac.uk/groups/dot1x-sig/document/radius-server-choice-guide-eduroam
RADIUS Server network
configuration
Servers with public IP addresses, listening on standard RADIUS protocol
ports (auth 1812, acct 1813). Domain name registration is optional.
Institutional Firewall
Configuration
Institutional RADIUS Server must be accessible from NRS and TMS (on
auth/acct ports), and must be able to issue authentication requests to the
NRS. Also enable ICMP Echo Requests sent by the NRS & TMS.
Server time synchronisation
For logging & traceability purposes, server clocks must be accurately
synchronised e.g. using NTP.
Authentication Request
Logging
Log RADIUS authentication requests, ensuring attributes are logged
providing traceability from network access to user authentication. Ensure log
retention is managed securely, e.g. using Syslog.
SP
Trusted client config of
Configure as trusted clients the institutional wireless infrastructure (Access
wireless AP/WLC & eduroam Points/ Wireless LAN controller) using 802.1x, and the NRO operated NRS
infrastructure (NRS,TMS)
and TMS
Filtering (local rejection) of
malformed usernames and
invalid realms
Ver 1.0 21st April 2016
Reject authentication requests with malformed username or invalid realms.
10 of 28
Neil Witheridge
Institutional eduroam Implementation Plan
Proxy authentication
Proxy authentication requests for non-local realms to the NRS.
requests for non-local realms
to the NRS
RADIUS attributes in proxied Include the minimal set of required attributes in proxied authentication
request only required set
requests (filter out other attributes sent from wireless infrastructure).
Release of Operator-Name
Release the Operator-Name attribute in proxied authentication requests.
Operator-Name should be of the correct format according to RFC5580
Request Chargeable-UserIdentity in proxied requests
Request Chargeable-User-Identity in proxied authentication requests (i.e.
visitor authentication requests proxied to the NRS) according to RFC4372
Release Framed-MTU
attribute with correct value
If Framed-MTU is not set correctly as per RFC2865, over-sized UDP packets
may be sent resulting in silent discarding of UDP packets. RADIUS server
implementations used for eduroam should respect Framed-MTU settings
(i.e. fragment EAP packets as required to avoid oversized UDP packets).
Release Calling-Station-ID
For the purpose of user traceability, it is necessary that the user device’s
populated with user-device’s MAC address is populated and delivered via the proxied authentication
MAC address
request in Calling-Station-ID.
IdP
Server and CA Certificates
Procure a server certificate for purpose of home RADIUS server
authentication & establishing a TLS session (encrypted tunnel) with the user
device (supplicant). Make the CA and intermediate certificates available if
not pre-trusted. The same certificate should be used for all RADIUS servers
acting as IdPs by the institution.
Choice of Local Realms
Local realms chosen depending on target user groups, identity stores in use,
and RADIUS server capabilities to chain authentication attempts to multiple
identity stores.
Choice of tunnelled EAP
Authentication Methods
Choice is dependent on password storage in identity store, and required
support of client devices. Choose either PEAP/MSCHAPv2 +
TTLS/MSCHAPv2 (password available in clear, hence able to be used to
generate response to challenge) or TTLS/PAP (not available in clear, sent in
clear for matching with stored credential). See:
https://wiki.geant.org/display/H2eduroam/How+to+deploy+eduroam+onsite+or+on+campus#Howtodeployeduroamon-siteoroncampus-IdentityManagementSystem
Authentication of local-realm Authenticate users for local realms against the appropriate identity store.
users
Local-domain authentication requests may be received from the institutional
wireless infrastructure, the NRSs or TMS.
Authenticate local users
connecting locally
Authenticate the institutions users accessing the institutions local network
while on campus. (Network access must be sufficient to enable confirmation
of correct authentication configuration, i.e. local users authenticating locally
should not be rejected.)
Release of ChargeableUser-Identity if requested
Release Chargeable-User-Identity (according to RFC, release CUI if
requested in proxied authentication request from NRS) according to
RFC4372
Local Test account
Provide local test accounts for each local realm either provisioned in the
RADIUS server (e.g. users file) or in the institutional identity store, and
usable with enabled authentication protocols.
Ver 1.0 21st April 2016
11 of 28
Neil Witheridge
Institutional eduroam Implementation Plan
Ver 1.0 21st April 2016
12 of 28
Neil Witheridge
Institutional eduroam Implementation Plan
Recommended
Item
Description
General
High availability deployment
It is recommended that institutions deploy two RADIUS servers, either using
fail-over or load-balancing, in order to provide high-availability. In the case of
load-balanced deployments, each RADIUS server should also be publicly
addressable for monitoring via the NRO’s TMS.
IdP
Disallow anonymous outer
identity
It is recommended that use of anonymous outer identity be disallowed for
local users. This is particularly important if Chargeable-User-Identity is not
released. Otherwise per-unique-user metrics are not achievable.
SP
Terminate Local Accounting
Request (do not proxy
accounting packets)
Accounting requests should not be proxied i.e. accounting requests arising
locally associated with visitor authentications should be terminated locally
i.e. not proxied to the NRS.
Optional
Item
Description
General
RADIUS Server domain
name registration
Registered domain names are not required as RADIUS configuration
referring to the server is by IP address.
Trusted Client config of local
test and monitoring server
Provision of local monitoring is an institutional decision. If provided,
configure trust for any local Test & Monitoring Server (i.e. any server to be
used for issuing authentication requests locally, e.g. using rad_eap_test, for
purposes of troubleshooting.
Discussion
Required RADIUS Attributes
The following are the RADIUS attributes that are required to be included in authentication requests
forwarded to the NRS for non-local users:

User-Name

Calling-Station-ID

Chargeable-User-Identifier

Operator-Name

Framed-MTU

NAS-IP-Address

NAS-Identifier

EAP Message

Message-Authenticator
Ver 1.0 21st April 2016
13 of 28
Neil Witheridge
Institutional eduroam Implementation Plan
RADIUS Server Certificate
When an Identity Provider deploys multiple RADIUS servers for HA, then all these servers should use the
same server certificate.
It is recommended to use a server name which is a fully-qualified domain name (however the domain name
needn’t be registered in DNS). The server name should then be both in certificate's Subject field (Common
Name) and subjectAltName:DNS.
The following additional certificate properties are non-standard and are of use in the eduroam context:
Property
Content
server name
parses as fully-qualified Server certificates with spaces, e.g. "RADIUS Service of Foo
domain name
University" are known to be problematic with some supplicants.
server name
Subject/CN ==
SubjectAltName:DNS
Some supplicants only consult the CN when checking the
name of an incoming server certificate; some check either of
the two; some will only check SubjectAltName:DNS. Keeping
the desired name in both fields in sync is a safe bet for
futureproofing.
Only use one CN. If you have multiple RADIUS servers, either
use the same certificate for all of them (there is no need for the
name to match the DNS name of the machine it is running on),
or generate multiple certificates, each with the same
CN/subjectAltName:DNS values.
server name
not a wildcard name
(e.g. "*.someidp.tld")
Some supplicants exhibit undefined/buggy behaviour when
attempting to parse incoming certificates with a wildcard.
signature
algorithm
Minimum: SHA-1
Recommended: SHA256 or higher
Server certificates signed with the signature algorithm MD5 are
considered invalid by many modern operating systems.
The continued use of SHA-1 as a signature algorithm is not
recommended, because several operating systems and
browser vendors already have a deprecation policy for SHA-1
support. While the deprecation in browser-based scenarios
does not have an immediate impact on EAP server usage, it is
possible that system libraries and operating system APIs will
over time penalise the use of SHA-1. Therefore, for new
certificates, SHA-256 is recommended to avoid problems with
the certificate in the future.
length of public
key
Minimum: 1024 Bit
Recommended: 2048
Bit or higher
Server certificates with a length of the public key below 1024
bit are considered invalid by some recent operating systems.
The continued use of 1024 bit length keys is not
recommended, because several operating systems and
browser vendors already have a deprecation policy for this key
length. While the deprecation in browser-based scenarios does
not have an immediate impact on EAP server usage, it is
possible that system libraries and operating system APIs will
over time penalise the use of short key lengths. For new
certificates, 2048 bit or more is recommended .
Extension:
Extended Key
Usage
TLS Web Server
Authentication
Even though the certificate is used for EAP purposes, some
popular operating systems require the certificate extension
"TLS Web Server Authentication" (OID: 1.3.6.1.5.5.7.3.1) to be
present.
Ver 1.0 21st April 2016
Remarks
14 of 28
Neil Witheridge
Institutional eduroam Implementation Plan
Property
Content
Remarks
Extension: CRL
HTTP/HTTPS URI
Distribution Point pointing to a valid CRL
Few very recent operating systems require this extension to be
present; otherwise, the certificate is considered invalid.
These operating systems appear to only require the extension
to be present; they don't actually seem to download the CRL
from that URL and check the certificate against it. However the
URL should be a valid otherwise this would make the
certificate invalid for all operating systems which do evaluate
the extension if present.
Extension:
BasicConstraint
(critical)
Server certificates need to be marked as not being a CA.
Omitting the BasicConstraint:CA totally is known to cause
certificate validation to fail with some OSs; setting it to TRUE is
a security issue in itself. Always set the BasicConstraint "CA"
to false, and mark the extension as critical.
CA:FALSE
Filtering invalid usernames and realms
Institutional RADIUS servers are recommended to filter out bad or bogus authentication requests containing
malformed or 'homeless' usernames (i.e. known invalid realms) in order to reduce unnecessary loading of
the national proxy servers.
In order to help maximise the proxy efficiency of the National RADIUS Servers (NRSs) all institutions
providing Visited services should filter malformed outgoing RADIUS authentication requests on their
Institutional RADIUS Servers (IRSs) and not pass bad requests to the NRSs. This minimises the
unsuccessful authentication attempts (ones which will never succeed) and means that genuine
authentication requests are dealt with as quickly as possible.
SPs should forward RADIUS requests originating from eduroam NASs which contain user names with nonlocal realms to a NRS. However, SPs should not forward requests containing user names which do not
include a realm nor any which are non-NAI compliant.
The first part of that statement is simple, user names MUST contain an "@" symbol (e.g.
[email protected]) and so bare usernames (e.g. "username" in this case) should be rejected locally.
The definition of "NAI compliant" for the realm part is quite complex but basically it boils down meaning that it
must be syntactically valid, i.e. the realm part of the user name must meet all of the following requirements:

must contain at least one dot ("."), e.g. "school.edu.au" is OK;

must not start or end with a dot, e.g. ".school.edu.au " or "school.edu.au." are both invalid;

must not have two or more sequential dots, e.g. " school.edu..au " is invalid,

must consist only of alphanumeric, hyphen and dot characters, so that's a-z, 0-9, "-" and ".", spaces are
explicitly not permitted, e.g. "school.edu au" is invalid,

following on from the previous point the realm must not start or end with a space, e.g. " school.edu.au" is
invalid.
SPs should not forward requests with user names matching any of the following,

ends with “@edu.au”

ends with “.local”

ends with the institution's own realm without the .edu.au (this applies only to institutions which are
IdP+SP participants)

also, those realms which are permutations of common typo errors in the institution's realm name (e.g.
these may be found through experience in the RADIUS server log as incorrect logins)
There is also a list of common realms which we ask Visited organisations to reject locally rather than forward
as, whilst they are syntactically valid, they are not eduroam members at this time and are not expected to be
in the future. This list currently comprises:
Ver 1.0 21st April 2016
15 of 28
Neil Witheridge
Institutional eduroam Implementation Plan

myabc.com

3gppnetwork.org (plus all sub-realms thereof)

3gppnetworks.org (plus all sub-realms thereof)

gmail.com

googlemail.com

hotmail.com

hotmail.com.*

hotmail.co.*

live.com

outlook.com

yahoo.com
Standard filters for FreeRADIUS for filtering these should be made available from the NRO.
Non-responsive Server Handling
Due to the requirement to proxy authentication requests, through potentially a chain of RADIUS servers,
handling of non-responsiveness to authentication requests is an issue that must be addressed carefully.
Non-responsive Server Handling may be handled passively using RADIUS server configured timeouts, or
handled actively using the Status-Server capability if supported by the RADIUS implementation.
If the institution’s RADIUS server implementation is Status-Server capable, its use is strongly recommended.
RADIUS Server Logging
The following information & attributes must be logged:
Timestamp (UTC), Packet-Type (E.g. Access-Accept, Access-Reject), Reply-Message, User-Name,
Chargeable-User-Identity, Operator-Name, Calling-Station-ID, NAS-IP-Address, NAS-Identifier.
A compliant linelog configuration for FreeRADIUS should be made available from the NRO.
Logs must be retained for the minimum time specified in the eduroam policy (3 months).
Information to be provided to the NRO
The following information must be provided to the NRO for each RADIUS Server deployed.
This information allows the NRO to implement its operational objectives related to NRS configuration &
RADIUS server monitoring.
Ver 1.0 21st April 2016
16 of 28
Neil Witheridge
Institutional eduroam Implementation Plan
Information item
Description/Comment
RADIUS implementation
Vendor,name,version of RADIUS server implementation
RADIUS Server IP Address
IPv4 IP address, and IPv6 if IPv6 is supported
Registered domain-name
Registered domain name of RADIUS server
RADIUS Protocol Ports
RADIUS ports for authentication and accounting
RADIUS Secret
RADIUS secret, the same being used for both eduroam National
RADIUS Servers and the Test&Monitoring Server.
RADIUS Server, CA and
intermediate certificate
RADIUS server, CA and intermediate certificates for TLS session
establishment and home server authentication.
Confirm time synchronisation
Boolean indicating whether time synchronisation configured
Confirm log timestamps UTC
Boolean indicating whether log timestamps are UTC
RADIUS protocols supported
Confirmation of support for RADIUS authentication and
accounting protocols over UDP
Confirm accounting requests
terminated locally
Boolean indicating accounting requests are terminated locally
Logging of required information and
log retention
Boolean indicating logging is being performed as per policy
requirements
High availability mechanism
Flag indicating type of HA (none, fail-over or load-balancing)
Local realms and associated identity List of local realms supported by the RADIUS server and their
stores
associated identity stores
Authentication protocols
Outer and Inner authentication methods: combinations of
PEAP/MSCHAPv2, TTLS/MSCHAPv2,TTLS/PAP
Local test account (name, pwd, auth
protocols, RADIUS server or identity
store)
Local test accounts appropriate to be used for monitoring the
RADIUS server.
Release of Chargeable-User-Identity Confirmation of release of CUI for remote authentication via
proxied authentication request.
Anonymous outer-identify allowed
Boolean indicating whether anonymous outer identity is allowed.
Local user authentication performed
Confirmation of local user authentication and network access at
least to extent of confirming correct authentication configuration.
Non-local realms proxying server
priority
Order in which server should be listed in configuration for fail-over
for proxying authentication requests from NRS.
Status-Server enabled
Boolean indicating whether Status-Server capability is enabled.
Framed-MTU value
Value of Framed-MTU attribute
Release of MAC in Calling-Station-ID Confirmation of population of MAC in Calling-Station-ID,
formatted according to agreed standard.
Ver 1.0 21st April 2016
17 of 28
Neil Witheridge
Institutional eduroam Implementation Plan
Request for Chargeable-UserIdentity
Confirmation of request for CUI in proxied authentication
requests.
Release of Operator-Name
Confirmation of release of Operator-Name
Malformed username rejection
Confirmation of malformed username filtering
Invalid realm local rejection
Confirmation of invalid realm filtering
TMS Test account and password
Confirmation of receipt of the NRO TMS test account and
password
Load-balancer IP address
Confirmation of whether load-balanced deployment is used.
NRS non-response handling via
Status-Server
Confirmation of non-responsive NRS handling via Status-Server.
Wireless Infrastructure
Wireless infrastructure implementation applies to institutions operating as eduroam SPs.
The basic requirement is for institutional wireless infrastructure to support WPA2-Enterprise.
Wireless infrastructure may differ on a per-campus basis, hence if coverage involves multiple campuses,
providing campus-specific configuration information is required.
Implementation Items
Required
Item
Description
SSID “eduroam”
Broadcast the SSID “eduroam”. The eduroam service relies on all
participants broadcasting the same SSID “eduroam” and users configuring
their devices for auto-connection to the “eduroam” wireless network.
Encryption/Authentication:
AES, IEEE 802.1x
WPA2 Enterprise refers to a wireless encryption / authentication technology
set, where encryption is based on AES CCMP and authentication is
performed via the IEEE 802.1x protocol.
Coverage Plan & Campuses
Plan eduroam coverage, which campuses will eduroam be provided on.
Conceivably, each campus may have different wireless infrastructure and
network connectivity characteristics. Some campuses may even have
specific realms to be handled, and use specific authentication servers.
These per-campus differences must be identified and advised to the NRO,
as global eduroam tracks eduroam deployment and reflects it in the global
database down to specific campuses.
Configure local RADIUS as
Authentication Servers
Configuration of wireless infrastructure for IEEE 802.1x involves specifying
with Authentication Servers to use. The ASs are the institution’s local
RADIUS servers.
eduroam coverage overlap
If there is an overlapping eduroam coverage area (i.e. SSID “eduroam”
already visible from another institution) then it may be necessary to use a
different SSID e.g. eduroam-domain.name
Incidental authentications
Anticipate whether there will be incidental authentications which will use IP
addresses e.g. as users commute through the institution’s hotspot.
Ver 1.0 21st April 2016
18 of 28
Neil Witheridge
Institutional eduroam Implementation Plan
Recommended
Item
Description
Coverage Map
Coverage map, leveraging existing wireless networking coverage map.
Wireless equipment
Vendor, Make/Model, Version (informational purposes only for the NRO)
Ver 1.0 21st April 2016
19 of 28
Neil Witheridge
Institutional eduroam Implementation Plan
Information to be provided to the NRO
The following information will have been provided to the NRO during step 1 of the joining process:
Information item
Description/Comment
SSID
Confirm “eduroam” or eduroam-domain.name if overlapping
coverage.
Wireless Encryption/Authentication
Confirm WPA2-AES (i.e. IEEE 802.1x authentication) only
configured for eduroam
Map of eduroam coverage
Link to institution’s eduroam coverage map (likely same as
wireless coverage map)
Observed eduroam overlap
Confirm whether there is eduroam coverage overlap with another
institution
Anticipated ‘incidental’ authentication If the institution’s eduroam coverage includes a regular commute
path for students, then they will likely connect ‘incidentally’ as
they commute through the institution’s eduroam coverage area.
Per-Campus Information:
(for the case of public institutions, where the administering organisation provides identity
management, wireless infrastructure, eduroam infrastructure for a number of institutions, the
term ‘campus’ may be interpreted as individual institution).
Campus name
formal name, including ‘The’ if appropriate
Campus address
Street, City, State, Postcode
Campus location
Latitude and Longitude
Campus contact
Full name, email address, phone, mobile (for SMS notification).
Per-Campus SSID
If not specified, ‘institutional’ SSID is assumed
Per-Campus Wireless Encryption
If not specified, ‘institutional’ wireless encryption is assumed
Ver 1.0 21st April 2016
20 of 28
Neil Witheridge
Institutional eduroam Implementation Plan
Network Access
Configuration of network access for eduroam users applies to institutions operating as eduroam SPs.
The general ‘spirit’ of eduroam participation is to allow as functional (in terms of ports/protocols open,
bandwidth, data volume) network access as possible. Ideally users should receive the same or greater
network access than they would if on their own campus.
Network access may differ on a per-campus basis, hence if coverage involves multiple campuses, providing
campus-specific network access configuration information is required.
Implementation Items
Required
Item
Description
Protocols/Ports
Configure firewalls to allow required traffic according to the recommended
ports and protocols for eduroam users.
IP Addressing
Determine IP address range. Determine whether IPv6 addressing will be
assigned in addition to IPv4
DHCP
Configure DHCP to automatically configure networking of connecting
devices.
Logging
Ensure logging of network infrastructure is available, with timestamps and
data to ensure MAC address can be mapped to an IP address for network
access events, and with log retention equivalent to that for RADIUS logs.
Recommended
Item
Description
VLAN configuration
Configure VLAN to segregate visitor traffic from local user, or eduroam from
other corporate network.
Optional
Item
Description
Application Proxies (e.g.
content filtering)
Identify whether an application proxies are required for eduroam network.
NAT
Identity whether NAT’ing will be applied.
Rate restrictions
Identify whether any data rate throttling needs to be applied, based on local
policy.
Volume restrictions
Identify whether any quota needs to be applied, based on local policy.
Discussion
Recommended Ports and Protocols
The standard set of protocols and ports that are recommended to be provided to eduroam users are:
(List taken from https://www.eduroam.org/downloads/docs/GN3-12-192_eduroam-policy-servicedefinition_ver28_26072012.pdf )
Ver 1.0 21st April 2016
21 of 28
Neil Witheridge
Institutional eduroam Implementation Plan
Service
Protocol/Port
Direction
Standard IPsec VPN
IP protocol 50 (ESP)
incoming & outgoing
IP protocol 51 (AH)
incoming & outgoing
UDP/500 (IKE)
outgoing
OpenVPN 2.0
UDP/1194
incoming & outgoing
IPv6 Tunnel Broker Service
IP protocol 41
incoming & outgoing
IPSec NAT Traversal
UDP/4500
incoming & outgoing
Cisco IPSec VPN over TCP
TCP/10000
outgoing
PPTP VPN
IP protocol 47 (GRE)
TCP/1723 (PPTP)
incoming & outgoing
outgoing
SSH
TCP/22 (SSH)
outgoing
HTTP
TCP/80 (HTTP)
outgoing
TCP/443 (HTTPS)
outgoing
TCP/3128 (Squid proxy)
outgoing
TCP/8080 (HTTP proxy)
outgoing
TCP/465 (SMTPS)
outgoing
TCP/587 (SMTP message submission)
outgoing
TCP/143 (IMAP4)
outgoing
TCP/993 (IMAPS)
outgoing
TCP/110 (POP)
outgoing
TCP/995 (POP3S)
outgoing
TCP/21 (FTP)
outgoing
Mail Sending
Mail Receipt
FTP (passive)
Institutions may open additional protocols and ports as permitted by local policies.
Information to be provided to the NRO
The following information must be provided to the NRO per campus.
Note that one set of institution-wide data may be provided, and if individual campuses deviate from
institutional provision, the differences need to be described for those specific campuses.
Information item
Description/Comment
Protocols
Confirm that recommended protocols are enabled
IP Address Range
IP Address Range for eduroam users
DHCP
Confirm DHCP configuration of devices for network access
NAT
Boolean indicating whether NAT’ing is used
IPv6
Confirm whether IPv6 is enabled
eduroam VLANs
Confirm whether eduroam visitor network traffic is segregated
using VLAN
Bandwidth restriction
Describe any bandwidth restriction for eduroam users (throttling)
Volume restriction
Describe any volume restriction for eduroam users (quota)
Application Proxy
Describe whether application proxies are required to be
configured e.g. content filtering HTTP proxy.
Ver 1.0 21st April 2016
22 of 28
Neil Witheridge
Institutional eduroam Implementation Plan
Institutional Support
The institution is required to provide support to both local users, either on-campus or while travelling to other
eduroam participating institution, and to visitors from other eduroam participating institutions. eduroam
support is provided at 3 levels:
1. Local IT Support (Level 1 support, support requests tracked via the institution’s IT helpdesk)
2. Local eduroam technical administration (Level 2 support, support requests referred by the IT
helpdesk to the institution’s designated eduroam technical administrator(s).
3. eduroam the NRO (Level 3 support, support requests referred by the institutions designated
technical administrator to an the NRO eduroam email address)
Implementation Items
Mandatory
Item
Description
Institutional Contacts
Provide a list of institutional contacts and their type (technical, security,
management, campus)
Subscription to eduroam
administrative mail-lists
Ensure that technical contacts are subscribed to the local eduroam
administrator mail list.
Institutional Test Accounts
Provide institutional test accounts corresponding to each local realm
handled by the institution.
Institutional support training
Provide local institutional IT support with basic training on eduroam (training
on eduroam support workflow materials from the NRO) and the required support workflow.
Recommended
Item
Description
Configuration Assistant Tool
Collaborate with the NRO to enable access for the institutional users to the
eduroam Configuration Assistant Tool.
End-User Security Training
Provide training to institutional end-users on security aspects of eduroam. In
particular the need to authenticate the home RADIUS Server. Also general
advice regarding protecting passwords, not sharing accounts etc.
Discussion
Local eduroam Contacts
Information required for institutional contacts is: Full name, email address, phone number, mobile phone
number (for SMS communication).
Contact types are:

Technical

Security

Management
The mandatory contacts are 2 technical contacts. These are regarded as the primary and secondary
eduroam administrators for the institution.
Ver 1.0 21st April 2016
23 of 28
Neil Witheridge
Institutional eduroam Implementation Plan
Participants must designate 2 technical contacts that can be contacted using e-mail and telephone during
normal business hours. The primary contact must be a named individual. The secondary contact may be an
organisational unit e.g. HelpDesk. Arrangements must be made to cover for absence of the named technical
contact owing to eventualities such as illness and holidays.
Institutional technical contacts should be enrolled in the appropriate mail-list.
Local Support Workflow
The support workflow is described in Appendix A.
In the event of a requirement to escalate a service request to the NRO, the request should be sent to the
NRO support email address.
Local support training should be undertaken. Resources are available for support training from the NRO.
Access to support should be made readily apparent to eduroam users. The means of obtaining support
should be described clearly on the eduroam webpage.
Test accounts
Provide a test account for the NRO’s use in monitoring the institution’s operability as an identity provider as
described in the application to join.
The account name should include the string "test" (e.g. eduroam-test, the string "test" being used as a filter
to remove monitoring authentication requests from usage metrics).
SMS the password to eduroam NRO.
the NRO will configure the institution visitor test account on the NRO’s test and monitoring RADIUS server
for your own testing,
e.g. [email protected]
and will advise you of the password via SMS (please provide your mobile number).
eduroam Configuration Assistant Tool
With the proliferation of mobile devices, and the trend for BYOD on campuses, configuration of devices for
connection to eduroam and authentication using institutional credentials may be a challenge for users.
In the past, there has been a requirement for institutions to describe manual connection for devices.
However a tool is available, hosted by eduroam EU, which may be used by institutions to provide scripts for
automated configuration for most platforms.
The tool, eduroam Configuration Assistant Tool, is available for use by institutional administrators.
Institutional administrators are provided access to this tool, and interfaces for populating data required to
generate the configuration scripts.
End-users may access the scripts via the CAT, or institutions may download the scripts and provide access
to them on a local intranet.
Information on CAT is available at:
https://wiki.geant.org/display/H2eduroam/A+guide+to+eduroam+CAT+for+institution+administrators
End-User Education
Users should be made aware of their need to protect their credentials, keeping their password private. Users
should also be made aware of security risks associated with eduroam, that is, the requirement to
authenticate their home RADIUS server. Implications of not doing so should be made clear, in particular for
those sites relying on TTLS/PAP where a rogue eduroam infrastructure may steal user credentials unless
users are vigilant in authenticating their home RADIUS server.
Ver 1.0 21st April 2016
24 of 28
Neil Witheridge
Institutional eduroam Implementation Plan
Information to be provided to the NRO
The following information must be provided to the NRO.
Note that one set of institution-wide data must be provided, and if individual campuses deviate from
institutional provision, the differences need to be described for those specific campuses.
Information item
Description/Comment
Institutional Contacts
Contact type, Full name, email address, phone number, and
mobile number for SMS.
At least 2 technical contacts. Security and Management contacts
optional.
Mail-List subscription
Confirmation of mail-list subscription of technical contacts
Institutional test accounts
Institutional test accounts for each realm, including appropriate
authentication methods.
SP Test Account
Confirmation of receipt of test account from the NRO and access
by IT support for testing SP operability.
Local IT Support eduroam and
Workflow education
Confirmation that local IT support has received basic training in
eduroam is aware of the eduroam support workflow and
escalation procedure.
End-user eduroam and security
education
Confirmation that local users have access to basic training
information on eduroam and security related aspects, in particular
need to authenticate their home RADIUS server.
Use of eduroam Configuration
Assistant Tool
Confirmation of use of eduroam CAT.
Confirmation of type of use (locally provided links or advice to
users to accessing CAT via its native interface).
Ver 1.0 21st April 2016
25 of 28
Neil Witheridge
Institutional eduroam Implementation Plan
eduroam Webpage
The institution is required to publish an institutional eduroam informational webpage. Essentially this page
should provide all information required for local users and visitors to connect to eduroam at the institution,
thereby enabling ‘self-service’ and avoiding support requests.
The NRO should provide a template (e.g. Word document) covering the requirements described below.
Implementation Items
Mandatory
Item
Description
Public institutional eduroam
webpage
Public eduroam webpage covering items described below.
Required Information
General Information

Information and link to global eduroam (http://eduroam.org) and the NRO eduroam sites

Statement of conformance with global eduroam and the NRO eduroam policies

A link to the institution’s network 'acceptable use policy' (AUP). eduroam users are required to conform to
their Home Institution AUP. However visitors are recommended to read and comply with the institutions
AUP. (The assumption is that R&E institution AUP's will be reasonably equivalent, hence compliance with
the Home institution AUP will deliver compliance with the institution AUP.)
IdP-role-specific Information

Clear statement on local user responsibilities (e.g. AUP conformance) in using eduroam on the
institution’s campuses and elsewhere

Links to information on authentication configuration for various devices (e.g. obtained via the eduroam
"Configuration Assistant Tool" which may be used to generate required device specific configuration
scripts)

Ability of the institution’s users to access their home institutional network while on their home institution
campus (at least required to initially configure eduroam authentication).

Strong recommendation to initially configure authentication while on their home institution campus prior to
travelling to another institution and using eduroam.

Link to eduroam support at the institution, and recommendation to seek support from their home
institution in first instance even when visiting another eduroam participating institution.
SP-role-specific Information

Technical information on connecting to the institution’s wireless infrastructure (WPA2-Enterprise),
description of network access restrictions for visitor access, and a link to the institution’s local support
with invitation to contact in case of connectivity or network access issues.

Link to the institution’s privacy statement and notification of logging of visitor's authentication requests
and network access for successfully authentications.
Ver 1.0 21st April 2016
26 of 28
Neil Witheridge
Institutional eduroam Implementation Plan
Information to be provided to the NRO
The following information must be provided to the NRO.
Note that one set of institution-wide data must be provided, and if individual campuses deviate from
institutional provision, the differences need to be described for those specific campuses.
Information item
Description/Comment
eduroam Webpage URL
When created, the institutional eduroam webpage URL should be
advised to the NRO for initial feedback.
The formal review of the website will be performed during Step 3.
of the joining process, the eduroam operability audit.
Ver 1.0 21st April 2016
27 of 28
Neil Witheridge
Institutional eduroam Implementation Plan
Appendix A: Institutional eduroam Implementation Workflow
Workflow for implementing eduroam IdP+SP operability:
Ver 1.0 21st April 2016
28 of 28
Neil Witheridge