eduroam (education roaming) allows users (researchers, teachers, students, staff) from participating institutions to securely access the Internet from any eduroam-enabled institution. The eduroam principle is based on the fact that the user's authentication is done by the user's home institution, whereas the authorisation decision allowing access to the network resources is done by the visited network.
To learn more about eduroam, please read also the section about.
As end-user you will only be able to use eduroam if your institution provides electronic identity (e.g. account for network access). In that case you will need to contact your administrator and ask for an account. You (or your network administrator) will have to configure your computer to enable eduroam access.
eduroam is free for its users, there is no charge for eduroam use world-wide. The providers of eduroam hotspots make the service available to benefit all members of the research and education community.
eduroam separates the concepts of authentication (identity providers) and hotspots (service providers) allowing public, commercial or city wifi initiatives to offer eduroam in addition to research and education institutions.
What commercial entities cannot do is become identity providers and offer a service to their customers that will work with eduroam. so any partnership with a commercial wifi service needs to respect that users of this hotspot cannot be charged for accessing the network.
In order to enable your users to access eduroam in your campus, you need to maintain an Identity Management System (IdMs), where your users' electronic identities are stored.
You also need a RADIUS server, which will have to be connected to your IdMs.
To set up an eduroam service point in your institution you have to configure your wireless LAN according to the eduroam requirements.
Your institution must be part of an eduroam service, which is provided by your National Roaming Operator (in most cases your National Research and Education Network (NREN)).
The NREN in your country must participate in eduroam. To find out more about the NREN in your country please refer to the eduroam map. Your NREN representative will be able to inform you about the formal rules for participation.
For more detailed information on how to set up eduroam, please consult the eduroam Cookbook.
When a user tries to log on to the wireless network of a visited eduroam-enabled institution, the user's authentication request is sent to the user's home institution. This is done via a hierarchical system of RADIUS servers. The user's home institution verifies the user's credentials and sends to the visited institution (via the RADIUS servers) the result of such a verification.
IIn eduroam, communication between the access point and the user's home institution is based on IEEE 802.1X standard; 802.1X encompasses the use of EAP, the Extensible Authentication Protocol, which allows for different authentication methods. Depending on the type of EAP method used, either a secure tunnel will be established from the user’s computer to his home institution through which the actual authentication information (username/password etc.) will be carried (EAP-TTLS or PEAP), or mutual authentication by public X.509 certificates, which is not vulnerable to eavesdropping, will be used (EAP-TLS).
eduroam is based on the most secure encryption and authentication standards in existence today. Its security by far exceeds typical commercial hotspots. Be aware though that when using the general Internet at an eduroam hotspot, the local site security measures at that hotspot will apply to you as well. For example, the firewall settings at the visited place may be different from those you are used to at home, and as a guest you may have access to fewer services on the Internet than you have at home.
No. Web Portal, Captive Portal or Splash-Screen based authentication mechanisms are not a secure way of accepting eduroam credentials, even if the website is protected by an HTTPS secure connection. The distributed nature of eduroam would mean that many different pages, languages and layouts would be presented to eduroam users making it impossible to distinguish between legitimate and bogus sites (even a consistent layout can be mimicked by an adversary).
eduroam requires the use of 802.1x which provides end-to-end encryption to ensure that your private user credentials are only available to your home institution. The certificate of your home institution is the only point you need to trust regardless of who operates any intermediate infrastructure. Web portals require you to trust their infrastructure as they receive your password in clear text, this breaks the end-to-end encryption tenants of eduroam.
eduroam uses open standards to enable cross platform uniform access. This means that eduroam works on Windows, Linux, MAC OS, and even Windows CE.
iPhone (and iPod) works perfectly together with eduroam. If you try to connect for the first time, the iPhone assumes that the PEAP/MSCHAPv2 authentication method will be used.
For many eduroam Identity Providers, this will make eduroam work automatically, but not for all. If your eduroam Identity Provider uses a different setup for authentication, this will require manual changes to the iPhone network settings.
You can either ask your eduroam Identity Provider whether an iPhone configuration profile is available, or, if you feel comfortable working with the "iPhone Configuration Utility", you can create such a configuration profile yourself.
The iPhone Configuration Utility can be downloaded from "http://www.apple.com/support/iphone/enterprise/. Ask your eduroam Identity Provider for the exact connection parameters. Please contact your eduroam Identity Provider for any further details.
Unfortunately we don't have the resources to provide individual assistance and feedback on device compatibility with eduroam or your local wireless setup. Check with your organizations IT helpdesk in the first instance.
An explanation of the acronyms and abbreviations used on this site and relating to eduroam and wireless authentication is available on this site.