EDV:EDUROAM: Difference between revisions
mNo edit summary |
No edit summary |
||
Line 6: | Line 6: | ||
https://portal.kip.uni-heidelberg.de/x2go |
https://portal.kip.uni-heidelberg.de/x2go |
||
== Problems while updating eduroam certificates == |
|||
If no longer a connection to eduroam can be established you have to update the certificates by installing eduroam again. You can get the installation tool on [https://cat.eduroam.org/# Configuration Assistant Tool (CAT)]. |
|||
If it's not able to open a connection after updating the certificates, you have to delete the installed ones. The possibility to do this in Windows is opening the certificate manager "certmgr.msc". There you have to search the certificate "T-TeleSec GlobalRoot Class 2" and remove all that are not valid till 2033. And then also search for certificates from "DFN-Verein Global Issuing CA" and remove all which are not active till 2031. |
|||
== eduroam Ć¼ber wpa_supplicant (Linux) == |
== eduroam Ć¼ber wpa_supplicant (Linux) == |
Revision as of 07:51, 6 June 2019
Generelle Anleitungen fĆ¼r verschiedene Systeme und Plattformen finden Sie auf der eduroam Seite des URZ.
Wichtige Infos findet man auch hier: (nur mit Login erreichbar)
https://portal.kip.uni-heidelberg.de/x2go
Problems while updating eduroam certificates
If no longer a connection to eduroam can be established you have to update the certificates by installing eduroam again. You can get the installation tool on Configuration Assistant Tool (CAT).
If it's not able to open a connection after updating the certificates, you have to delete the installed ones. The possibility to do this in Windows is opening the certificate manager "certmgr.msc". There you have to search the certificate "T-TeleSec GlobalRoot Class 2" and remove all that are not valid till 2033. And then also search for certificates from "DFN-Verein Global Issuing CA" and remove all which are not active till 2031.
eduroam Ć¼ber wpa_supplicant (Linux)
Hierzu gibt es eine Konfigurationsdatei:
File:Wpa supplicant.conf.txt
Die Datei sollte dann so aussehen:
# path to UNIX socket control interface ctrl_interface=/var/run/wpa_supplicant #eapol_version=1 ap_scan=1 network={ ssid="eduroam" key_mgmt=WPA-EAP eap=TTLS proto=WPA RSN identity="uni-id@uni-heidelberg.de" anonymous_identity="anonymous@uni-heidelberg.de" ca_cert="/etc/ssl/certs/Deutsche_Telekom_Root_CA_2.pem" phase2="auth=PAP" # Hier entweder das Klartext Passwort oder einen Hash davon (mkntpwd) password="xxxx" }
Abspeichern zum Beispiel unter dem Namen eduroam.conf.
Das ganze kann man dann Starten mit:
wpa_supplicant -B -i wlan0 /etc/wpa_supplicant/eduroam.conf
Falls der Daemon schon lƤuft dann mit folgendem Befehl beenden:
killall -15 wpa_supplicant