eduroam on Linux and Ubuntu (wpa-supplicant)
Please use eduroam Devicemanager to generate eduroam credentials for every device in use. You will find a tutorial here.
Please note that login names generated with the help of eduroam Devicemanager will end with @rwth.edufi.de for members of the RWTH Aachen University and with @fzj.edufi.de for the members of the FZ Jülich.
Setup with EAP-PWD method
To set up eduroam with the help of the EAP-PWD method, create a configuration data named /etc/wpa_supplicant/wpa_supplicant.conf and enter the settings provided in the box.
Tip:
As "identity" and "password", please enter the eduroam login name and password that you have generated in eduroam Devicemanager (www.rwth-aachen.de/eduroam).
Please note that Login names generated for members of the FZ Jülich end with @fzj.edufi.de.
network={ ssid="eduroam" key_mgmt=WPA-EAP eap=PWD identity="EGM_KENNUNG@rwth.edufi.de" password="CLEAR_TEXT_PASSWORD" } |
Setup with EAP-PEAP method (with security certificate)
To set up eduroam with the help of the EAP-PEAP method, create a configuration data named /etc/wpa_supplicant/wpa_supplicant.conf and enter the settings provided in the box.
Tip:
As "identity" and "password", please enter the eduroam login name and password that you have generated in eduroam Devicemanager (www.rwth-aachen.de/eduroam).
Please note that Login names generated for members of the FZ Jülich end with @fzj.edufi.de.
network={ ssid="eduroam" key_mgmt=WPA-EAP eap=PEAP ca_cert="/etc/ssl/certs/AKTUELLES_ROOT_CERT.pem" phase2="auth=MSCHAPV2" identity="EGM_KENNUNG@rwth.edufi.de" domain_suffix_match="radius.rz.rwth-aachen.de" # the option is only available for newer versions of wpa-supplicant, # should match to the Radius-Realm or Radius-Server subject_match="radius.rz.rwth-aachen.de" # for older versions is weaker than domain_suffix_match # should match to the Radius-Realm or Radius-Server anonymous_identity="anonymous@rwth.edufi.de" password="CLEAR_TEXT_PASSWORD" |
Please check the general configuration of eduroam for information on current root certificates.