Specifications
Windows Recommendations and Best Practices
Summit WM20 Technical Reference Guide, Software Version 4.256
Alternately, you can use network management software to change registry settings on managed
computers
Summary
You can perform secure wireless authentication with either EAP-TLS or PEAP-MS-CHAP v2. For EAP-
TLS, you must deploy a certificate infrastructure capable of issuing computer certificates to your IAS
servers and both computer and user certificates to your wireless client computers and users. For PEAP-
MS-CHAP v2, you only need to install computer certificates on the IAS servers, provided that the
appropriate root CA certificates are already installed on the wireless clients. For both cases, you must
manage your Active Directory users and groups for wireless access, configure your IAS servers as
RADIUS servers to the wireless APs, and configure your wireless APs as RADIUS clients to the IAS
servers. You can also configure Internet access for business partners, use third-party CAs, and use IAS
RADIUS proxies for cross-forest authentication or load balancing.