Chromebook Authentication with Windows RADIUS…Seriously!

Date Published
Dec 10, 2021 1:56:11 PM
Reading Time
Reading Time: 4 min
Chromebook Authentication with Windows Radius

School administrators have been plagued with the impossibility complexity of configuring managed Chromebooks to authenticate with a RADIUS or 802.1X wireless network. Wireless networks configured with RADIUS are far more secure than those configured with a pre-shared key.

However, there are challenges for this type of authentication:

  • Windows RADIUS interacts directly with Active Directory and it does not interact with Google Workspace at all unless:
    • A Google Workspace AD Sync is set up
    • SSO SAML authentication is setup
  • Students have to KNOW their AD credentials (many schools don’t create AD accounts for students anymore) 
  • Two logins occur; one to authenticate with the wireless network, the second to authenticate on the managed Chromebook 
  • A portal method (like when you use hotel wifi and put in your room number) isn’t feasible unless the chrome browser is published as a kiosk app, which somewhat defeats the purpose of managing the Chromebook in the first place 
  • The one viable option that doesn’t require student interaction is to create an AD user account for every single Chromebook where the MAC address is the AD username. This is just a fancy form of MAC address filtering with two drawbacks;
    • Mac address filtering is widely considered unsecure as MAC spoofing is incredibly easy
    • The process is time-consuming and error-prone when creating each individual account. 

Managed Chromebook RADIUS authentication is not easy. Luckily, we have developed a method that allows Chromebooks to authenticate with a windows RADIUS (or NPS) server with absolutely ZERO student interaction…seriously! 

Here is what you need to setup Chromebook RADIUS authentication: 

Prerequisites 

  1. Windows NPS server (Microsoft calls RADIUS by the name of Network Policy Server or NPS) 
  2. Active Directory Certificate Authority with at least SHA256.  This has to be on a different server than NPS.  One server can’t hold both NPS and CA Roles. If that isn’t available, it is beyond the scope of this article. 
  3. Google Workspace Admin Console 
  4. Creation of one service account and one service security group. We called our user account “ChromeStudent”.  This is a regular AD account with no special permissions or access. Create a security group and make this user account a member of that group. 
  5. 802.1X (or RADIUS) wireless SSID created, configured, and documented in your wireless system.

Certificate Authority Server 

  1. Open up the Certificate Authority snap-in.
     Certificate Authority
  2. Confirm the CA is at SHA256  We need to export the root CA certificate. You’ll HAVE to use Internet Explorer for this next step.
  3. Type in this url: https://<CA-server-name>/certsrv
  4. Click on “Download a CA certificate”
    Download CA Certificate
  5. Click through the warning box (if presented).
  6. Choose “Current,”  Select “Base 64”, and click to download.
    MicrosoftTeams-image (6)
  7. Save this certificate, you’ll need it later.  

We are using the root certificate of the CA of your Windows domain. This certificate validates that the windows user you created for this project is a member of the domain.

NPS or RADIUS Server 

  1. Open the Certificate Authority console. Confirm that the NPS server you are working on has a valid certificate issued by CA server. A certificate is issued to all domain-joined computers & servers. Expand “Personal,” click on “Certificates” and confirm the machine cert is there. If the certificate isn’t there, you’ll have to go back and troubleshoot your CA. 
    NPS Cert
  2. Open up NPS Console, expand “Policies” Click on “Configure Connection Request Policies."
    NPS_request-policy
  3. Select “NAS Port Type” and click “Add” Choose “Wireless-IEEE 802.11” and click ok. This limits the types of connections to this RADIUS as just wireless devices.
    NPS_NAS-wireless
  4. Click on “Network Policies” right click and choose “New.” Give the policy a friendly name and click “Next.” Click the “Add” button to add a condition. Choose “Windows Groups” and click the “Add” button.
    Network Policies
  5. Add the service group you created earlier. Click the “Next” button.
    NPS Service Group
  6. Select “Access Granted” and click the “Next” button.
  7. For EAP types click the “Add” button and choose “PEAP.” Deselect all checkboxes and click the “Next” button.
    NPS PEAP
  8. Click through the rest of the wizard with the default selections and click “Finish."
  9. Right-click the policy you just created and select “Properties.” Click on the “constraints” tab. Select PEAP in the EAP Types and click on the “Edit” button. Confirm the RADIUS server’s name, the CA server's name. Click on “Enable Fast Reconnect.” This is just a double check to make sure your NPS server is communicating with the CA server. Click the “OK” button.
    NPS Confirm PEAP
  10. Depending on your brand of wireless access points and/or controller, you’ll have to add in the APs (or controller) into the “RADIUS Clients and Servers” area. Check your wireless documentation for this; it is slightly different for every brand/manufacture. This configuration is directly tied to the 802.1X wireless SSID you create and configure with a shared secret.

The Connection Request Policy confirms the request is coming from a wireless device. The Network Policy validates the certificate is from the root domain CA and the user credentials are tied to the correct security group. The “RADIUS clients and servers” configuration is wholly dependent on your wireless implementation. 

 Google Workspace Admin Console 

  1. Log into the Google Workspace admin console with administrative privileges.
  2. Expand “Devices” in the left navigation tree.  Select “Networks."
    Google Workspace Networks
  3. In the middle navigation tree, select the OU where the devices you want to join the RADIUS SSID are located. In this example, there is a “STUDENTS” OU.
  4. Click on the “Certificates” section.
    Google Workspace Certs
  5. Upload the certificate you exported from the CA. Give it a friendly name. Mark the checkbox by “Chromebook.” Click the “ADD” button.
    Google Workspace Add Cert
  6. In the middle navigation tree, select the OU where the student Chromebooks are located and click on the “Wi-Fi” area. 
  7. Click “ADD WI-FI."
  8. Fill in the following settings:   
    1. Checkmark by “Chromebooks"
    2. Name of wifi-network
    3. SSID of configured RADIUS network
    4. Checkbox by “Automatically connect”
    5. Security types is “WPA/WPA2 Enterprise (802.1X)”
    6. Protocol is “PEAP"
    7. Inner protocol is “Automatic”
    8. Username/password is the service account you created previously. Put in AD username and password.
    9. Server Certificate Authority; select the cert you uploaded in step 5.
    10. IP setting, accept defaults.
    11. Click on the “SAVE” button.
      Google Workspace WiFi 1
      Google Workspace WiFi 2
  9. Test, test, and test some more.

The final step of the process is to upload the certificate to the Google Workspace admin console, configure the RADIUS wifi network to use the service account already created, and automatically connect to the RADIUS network w/the AD credentials, confirmed by the presence of the certificate provided by the domain CA.

Summary

While this solution doesn't allow for the user granularity that a normal RADIUS deployment would, it allows for automated deployment and added security utilizing certificates and Active Directory authentication - instead of simply using MAC addresses that can be spoofed or a WPA key that would allow anyone with the password access to your secure network.

We hope this will save you some time and headache in deploying wireless to your next wave of Chromebooks.


This blog was written by Kate Swistowicz and Morgan Pagett.

Discusion

You may also be Interested in the Following Blogs:

Follow Pine Cove On Social Media

For news, satire, and information.