User guide
Specifying User Info 39
Chapter 5: Managing Profiles
TTLS—The EAP-TTLS outer protocols and, where they apply, one or more inner
protocols. See “TTLS Settings” on page 48.
PEAP—The EAP-PEAP outer protocols and, where they apply, one or more
inner protocols. See “PEAP Settings” on page 51.
JUAC—If you intend to connect to and be authenticated by an Infranet
Controller, you must use JUAC as an inner authentication protocol. See “Setting
JUAC as an Inner Authentication Protocol for TTLS” on page 53 and “Setting
JUAC as an Inner Authentication Protocol for PEAP” on page 54.
Specifying Profile Names
When you add a profile to OAC, specify a unique name for the profile in the Profile
name field of the Profile Properties dialog. For example, you can use Office for the
profile name of your corporate network and Home for your home network. You
can use the IP address of the network for the profile name. If you use one or more
hotspot networks frequently, you can add a named profile for each of them.
You cannot change the name of a profile after you save it. However, you can
modify any other profile properties. You can remove a profile and create a new one
with a different name.
Specifying User Info
From the User Info tab, configure the login name and your password, certificate,
soft token, or SIM card (if you are using EAP-SIM) based on the login credentials that
you intend to use. See “Using SIM Cards (EE and EF only)” on page 43 for details
about using SIM cards. This information is likely to be different for each network
and requires a separate profile.
Specifying a Login Name
Enter your user name in the Login name field. This is the name presented to the
network when you request a network connection. If you authenticate against a
Windows Active Directory, use the form domain\user_name (for example,
Acme\george). See your network administrator for the required format.
The User Info tab has sections that you can configure from the following subtabs:
Password—Configure this section when you use authentication protocols that
require or permit a password (such as EAP-TTLS). You can specify how the
password should be retrieved (“Setting Passwords” on page 40).
Using Certificates—Configure this section when you use authentication
protocols that require a client-side certificate (for example, EAP-TLS) or if you
use a smart card for authentication (see “Using Certificates for Authentication”
on page 42).
Soft Token—Configure this section if you are required to use a soft token as part
of authenticating to the network when you log in.