EDV:EDUROAM: Difference between revisions

From KIP Wiki
ā§¼kip-jumptonavigationā§½ā§¼kip-jumptosearchā§½
mNo edit summary
No edit summary
Line 6: Line 6:


https://portal.kip.uni-heidelberg.de/x2go
https://portal.kip.uni-heidelberg.de/x2go

== Problems while updating eduroam certificates ==

If no longer a connection to eduroam can be established you have to update the certificates by installing eduroam again. You can get the installation tool on [https://cat.eduroam.org/# Configuration Assistant Tool (CAT)].

If it's not able to open a connection after updating the certificates, you have to delete the installed ones. The possibility to do this in Windows is opening the certificate manager "certmgr.msc". There you have to search the certificate "T-TeleSec GlobalRoot Class 2" and remove all that are not valid till 2033. And then also search for certificates from "DFN-Verein Global Issuing CA" and remove all which are not active till 2031.


== eduroam Ć¼ber wpa_supplicant (Linux) ==
== eduroam Ć¼ber wpa_supplicant (Linux) ==

Revision as of 07:51, 6 June 2019

Generelle Anleitungen fĆ¼r verschiedene Systeme und Plattformen finden Sie auf der eduroam Seite des URZ.

URZ Eduroam

Wichtige Infos findet man auch hier: (nur mit Login erreichbar)

https://portal.kip.uni-heidelberg.de/x2go

Problems while updating eduroam certificates

If no longer a connection to eduroam can be established you have to update the certificates by installing eduroam again. You can get the installation tool on Configuration Assistant Tool (CAT).

If it's not able to open a connection after updating the certificates, you have to delete the installed ones. The possibility to do this in Windows is opening the certificate manager "certmgr.msc". There you have to search the certificate "T-TeleSec GlobalRoot Class 2" and remove all that are not valid till 2033. And then also search for certificates from "DFN-Verein Global Issuing CA" and remove all which are not active till 2031.

eduroam Ć¼ber wpa_supplicant (Linux)

Hierzu gibt es eine Konfigurationsdatei:
File:Wpa supplicant.conf.txt

Die Datei sollte dann so aussehen:

# path to UNIX socket control interface
ctrl_interface=/var/run/wpa_supplicant

#eapol_version=1

ap_scan=1

network={
   ssid="eduroam"
   key_mgmt=WPA-EAP
   eap=TTLS
   proto=WPA RSN
   identity="uni-id@uni-heidelberg.de"
   anonymous_identity="anonymous@uni-heidelberg.de"
   ca_cert="/etc/ssl/certs/Deutsche_Telekom_Root_CA_2.pem"
   phase2="auth=PAP"
   # Hier entweder das Klartext Passwort oder einen Hash davon (mkntpwd)
   password="xxxx" 
}

Abspeichern zum Beispiel unter dem Namen eduroam.conf.

Das ganze kann man dann Starten mit:

wpa_supplicant -B -i wlan0 /etc/wpa_supplicant/eduroam.conf

Falls der Daemon schon lƤuft dann mit folgendem Befehl beenden:

killall -15 wpa_supplicant