You are viewing an old version of this page. View the current version.

Compare with Current View Page History

Version 1 Next »

Given the current trend by the CA/Browser Forum drive to progressively shorten certificate lifetimes in the near future, the question of how to handle certificate renewal and automation becomes ever more urgent. This generally affects web services, but for eduroam this is just as relevant, since certificates are an integral part of many EAP methods usable within eduroam. Currently the automation affects certificates that are signed by public certificate authorities (which fall under the CA/B Forum remit), but not certificates from enterprise certificate authorities (i.e. private certificate authorities). This may however change given how operating systems handle certificates and often (falsely) assume that certificate use is limited to the web.

Those who simply allow their users to tap on the eduroam network to connect without using a tool like the eduroam CAT website or the geteduroam app will need to be aware that their users will be prompted to accept a new certificate when your certificate rolls over. This may not be entirely user friendly. Using a properly configured CAT profile (or profile from an equivalent tool) that correctly configures server certificate validation (which is what CAT profiles do) can make that a non-issue since the certificate's certificate authority root certificate is used to verify the server certificate's validity, along with the common name of the certificate.

However, this comes with the caveat that should you choose to change your certificate authority for your eduroam server certificate, all devices configured with proper server certificate validation for the old certificate authority will fail to authenticate, unless a transition period is implemented where the devices are configured to accept certificates from the old and the new certificate authority! 

So, if you choose a certificate authority like Let's Encrypt (which has implemented automation from the beginning), stick to it, and your users with devices correctly configured with server certificate validation will never know that the server certificate rolls over every month, while those who just tapped on the network to connect will.


This topic is still under construction. 


More information

Universiteit Twente (Netherlands) has some advice here: Automate your certificate management with ACME and SURF certificates

The GÉANT TCS has a timeline of changes here: HARICA TCS Updates

The Jisc Certificate Service has this link: Security certificate automation

  • No labels