This page provides answers to the most frequently asked questions relating to eduroam.
What is eduroam?
eduroam (education roaming) allows users (researchers, teachers, students, staff) from participating institutions to securely access the Internet from any eduroam-enabled institution. The eduroam principle is based on the fact that the user's authentication is done by the user's home institution, whereas the authorisation decision allowing access to the network resources is done by the visited network.
I am a student / researcher / professor, can I use eduroam?
As end-user you will only be able to use eduroam if your institution provides electronic identity (e.g. account for network access). You (or your network administrator) will have to configure your computer to enable eduroam access.
How can I get an account?
Users from Republic of Croatia need to get AAI@EduHr electronic identity from their institution's IT department. List of contacts for Croatian users can be found on contact page. Foreign users need to contact their home institution's IT department.
What's eduroam's signal coverage?
Locations of AP devices broadcasting eduroam wireless signal can be found on the maps page for institutions in Republic of Croatia and the rest of the world. Actual signal coverage depends on physical locations of AP devices, since the wireless signal can be blocked by obstacles such as buildings, walls, trees etc.
What does eduroam cost?
eduroam is free for its users, there is no charge for eduroam use world-wide. The providers of eduroam hotspots make the service available to benefit all members of the research and education community.
How does eduroam work?
When a user tries to log on to the wireless network of a visited eduroam-enabled institution, the user's authentication request is sent to the user's home institution. This is done via a hierarchical system of RADIUS servers. The user's home institution verifies the user's credentials and sends to the visited institution (via the RADIUS servers) the result of such a verification.
For example, let's consider two eduroam users inside University computing centre:
Pero - employee of University Computing Centre (Srce)
Ana - student at Faculty of Chemical Engineering and Technology
1. Both are trying to connect to eduroam with their laptop / smartphone / tablet. They send their encrypted credentials. Only the realm of the institution which they belong is visible: @srce.hr or @fkit.hr.
2. Encrypted credentials are delivered through network infrastructure to University Computing Centre's RADIUS server.
3. RADIUS server checks if realm on the credentials matches his own. Since user Pero has the same realm, authentication proces begins. His credentials are checked against the values stored in institution's LDAP directory.
3.a. Ana's credentials don't match University Computing Centre's RADIUS server realm so they are forwarded to top-level RADIUS server for .hr domain which forwards them to RADIUS server of Faculty of Chemical Engineering and Technology.
3.b. RADIUS server on Faculty of Chemical Engineering and Technology checks her credentials against values stored in institution's LDAP directory and sends authentication results back to University Computing Centre's RADIUS server.
4. Authentication result is sent back to access point.
5. Starting device recieves authentication result.
6. If the authentication result is positive, user can access the Internet and other network resources.
What technology does eduroam use?
In eduroam, communication between the access point and the user's home institution is based on IEEE 802.1X standard; 802.1X encompasses the use of EAP, the Extensible Authentication Protocol, which allows for different authentication methods. Depending on the type of EAP method used, either a secure tunnel will be established from the user’s computer to his home institution through which the actual authentication information (username/password etc.) will be carried (EAP-TTLS or PEAP), or mutual authentication by public X.509 certificates, which is not vulnerable to eavesdropping, will be used (EAP-TLS).
Is eduroam safe to use?
eduroam is based on the most secure encryption and authentication standards in existence today. Its security by far exceeds typical commercial hotspots. Be aware though that when using the general Internet at an eduroam hotspot, the local site security measures at that hotspot will apply to you as well. For example, the firewall settings at the visited place may be different from those you are used to at home, and as a guest you may have access to fewer services on the Internet than you have at home.
What certificates does eduroam use?
eduroam uses server certificates to ensure that client credentials are transfered in a secure tunnel. Diagram below explains steps of creating such a secure tunnel. Each identity provider's RADIUS server has two certificates:
- Root CA self-signed (SS) certificate - it serves as a common point of trust for both the RADIUS server and users it authenticates. Note: Self signed root CA certificates are used because of a bug in Android OS which doesn't support chains of certificates leading to the root CA.
- RADIUS certificate - it is signed by root CA certificate.
- Presumption is that the user's tablet is properly configured for eduroam. That means it already has the public key of root CA certificate from the identity provider.
- User sends Request authentication message to the access point.
- Access point responds with Request identity message.
- User sends his/her outer identity (eg srce.hr) which is used for routing the request to the correct RADIUS server.
- Server sends his RADIUS certificate that is signed with root CA private key.
- User receives the server's RADIUS certificate and validates the signature using root CA public key. If the signature checks out, user knows he can trust recieved certificate.
- User uses public key received in server's RADIUS certificate to encrypt data needed to establish the secured tunnel (pre shared secret).
- Server decrypts received data with his RADIUS certificate's private key.
- Based on pre shared secret, RADIUS server generates necessary data for establishing encrypted TLS tunnel.
- User sends his credentials through the encrypted TLS tunnel.
It can be concluded from the steps above that changing the RADIUS certificate has no effect on the end user as long as it is signed by the same root CA. This enables eduroam administrators to regenerate RADIUS certificates if they suspect it was compromised in some way or it has expired.
Users need to reconfigure their devices only in the case where the root CA certificate was changed.
Detailed instructions for certificate handling for eduroam administrators can be found on this link.
Does eduroam use a captive portal for authentication?
No. Web Portal, Captive Portal or Splash-Screen based authentication mechanisms are not a secure way of accepting eduroam credentials, even if the website is protected by an HTTPS secure connection. The distributed nature of eduroam would mean that many different pages, languages and layouts would be presented to eduroam users making it impossible to distinguish between legitimate and bogus sites (even a consistent layout can be mimicked by an adversary).
eduroam requires the use of 802.1x which provides end-to-end encryption to ensure that your private user credentials are only available to your home institution. The certificate of your home institution is the only point you need to trust regardless of who operates any intermediate infrastructure. Web portals require you to trust their infrastructure as they receive your password in clear text, this breaks the end-to-end encryption tenets of eduroam.
Does eduroam work on different platforms?
eduroam uses open standards to enable cross platform uniform access. This means that eduroam works on Windows, Linux, MacOS, iOS and Android operating systems.
Can you help me configure my device?
Unfortunately we don't have the resources to provide individual assistance and feedback on device compatibility with eduroam or your local wireless setup. Check with your organizations IT helpdesk in the first instance. List of contacts for Croatian users can be found on contact page. Foreign users need to contact their home institution's IT department.