Nile Service Block
...
Security
Zero Trust Campus
Zero Trust Access
6min
what is zero trust access? providing authentication mechanisms for all users and devices across wired and wireless networks can be frustrating and overly complex zero trust access delivers a simplified and unified access approach by delivering functionalities like 802 1x, mab, and sso, for both wired and wireless networks always available and enabled on every component of the nile service nile's architecture by design offer zero trust isolation where every connection flows through a central policy enforcement point authentication methods in the nile access service building a zero trust campus the nile access service is built on the principles of the "zero trust campus," ensuring that no user or device is implicitly trusted by implementing strong authentication methods and granular access controls, the nile access service helps organizations secure their network resources and protect against unauthorized access the following authentication methods are supported within the nile access service, each playing a crucial role in establishing a zero trust campus 802 1x wired and wireless wired mac authentication unique psk single sign on (sso) let's review each of these in more detail wired and wireless 802 1x strong authentication for zero trust 802 1x is an ieee standard for port based network access control, providing strong authentication and encryption for both wired and wireless connections by implementing 802 1x, organizations can ensure that only authenticated users and devices can access network resources, aligning with the principles of the zero trust campus nile integrates with existing radius infrastructure for centralized authentication and authorization learn more http //app archbee com/docs/jugamsswawauxxjhmyr53/la50uqubaltrcinfc5ygx about configuring 802 1x in the nile access service to strengthen your zero trust campus mac authentication securing devices in a zero trust campus mac authentication is an authentication method that grants network access based on a device's mac address while mab is useful for devices that don't support 802 1x, it's essential to implement additional security measures to maintain the integrity of the zero trust campus nile's mab implementation includes quarantine all new devices by default centralized configuration through the nile customer portal create custom rules based on match criteria; exact mac address fingerprint mac oui wired sso optionally integration with external mac address databases (e g aruba clearpass and cisco ise) for granular access control explore the configuration and best practices http //app archbee com/docs/jugamsswawauxxjhmyr53/knkxjniq0i0a2lp 4vq y for mab in the nile access service to secure devices within your zero trust campus unique passphrase (upsk) the nile access service offers the unique passphrase (upsk) feature to enhance the security of wireless network access unlike traditional pre shared key (psk) wireless networks, where a single key is shared among all devices, upsk assigns a unique key to every authenticated user or device nile also provides a self registration portal that allows users to securely onboard their devices, including byod and corporate assets, using upsk and single sign on (sso) authentication the unique passphrase (upsk) feature in the nile access service enables secure network access for a wide range of devices, including internet of things (iot) equipment, av equipment, and employee owned devices it can work with or without an external radius server single sign on (sso) streamlining zero trust access single sign on allows users to access multiple applications with a single set of credentials, streamlining the user experience while maintaining the principles of the zero trust campus by integrating sso with the nile access service, organizations can enforce consistent authentication and authorization policies across their network resources nile's sso integration provides support for popular sso protocols, including saml, to ensure compatibility with leading identity providers centralized sso configuration through the nile customer portal discover how sso http //app archbee com/docs/jugamsswawauxxjhmyr53/3qldjh3ggdemuizg1ma2p can be seamlessly integrated into the nile access service to enhance your zero trust campus by leveraging these authentication methods and following best practices, organizations can build a robust zero trust campus with the nile access service, ensuring secure access to network resources and protecting against unauthorized access authentication comparison authentication method description zero trust campus benefits wired & wireless 802 1x ieee standard for port based network access control supports various eap methods (peap, eap tls, eap ttls) provides strong authentication and encryption ensures only authenticated users and devices access network resources enables granular access control based on user identity integrates with existing radius infrastructure for centralized management mac authentication and fingerprinting authenticates devices based on their mac address or fingerprint useful for devices that don't support 802 1x (printers, iot devices) provides network access for devices that can't support 802 1x serves as a fallback method to ensure maximum device coverage centralized configuration through the nile customer portal unique psk allows users or device groups (printers, cameras etc ) to have a unqiue psk a single user's compromise key does not affect all users and devices with sso on top of upsk, deactivated users in idp will loose network access immediately with scim integration wired & wireless single sign on (sso) allows users to access multiple applications with a single set of credentials supports popular sso protocols (saml, oauth, openid connect) reduces password fatigue and improves user experience enforces consistent authentication and authorization policies provides granular access control based on user attributes and group membership streamlines user experience while maintaining zero trust principles scim integration ensures deactivated users loose network access immediately read next 802 1x authentication , single sign on (sso) , mac authentication