Windows - TTLS + PAP Configuration
Configure Windows devices to connect to IronWiFi WPA-Enterprise wireless networks using EAP-TTLS with PAP inner authentication. This method is essential for integrating with external identity providers like Microsoft Entra ID (without password hash sync), LDAP directories, and legacy systems that don't support MSCHAPv2.
Overview
EAP-TTLS creates a secure TLS tunnel and uses PAP for inner authentication. This method is useful when integrating with external identity providers that don't support MSCHAPv2.
Prerequisites
- Windows 10 or 11
- Valid user credentials
- Wireless network configured with WPA2-Enterprise
Configuration Steps
Windows 10/11
- Open Settings > Network & Internet > WiFi
- Click Manage known networks
- Click Add a new network
- Configure:
- Network name: Your SSID
- Security type: WPA2-Enterprise
- Click Save
Advanced Configuration via Control Panel
- Open Control Panel > Network and Sharing Center
- Click Set up a new connection or network
- Select Manually connect to a wireless network
- Enter:
- Network name: Your SSID
- Security type: WPA2-Enterprise
- Encryption type: AES
- Check Start this connection automatically
- Click Next, then Change connection settings
- Go to the Security tab
- Set Authentication method to Microsoft: EAP-TTLS
- Click Settings:
- Enable Identity Privacy: Enter or leave blank
anonymous - Connect to these servers: (optional) Enter RADIUS server hostname
- Check Verify the server's identity by validating the certificate
- Select authentication method: PAP
- Enable Identity Privacy: Enter
- Click OK to save all settings
Identity Privacy
EAP-TTLS supports identity privacy (anonymous outer identity):
- Outer Identity: Sent unencrypted (use )
anonymous@yourdomain.com - Inner Identity: Your actual username, sent encrypted
To configure:
- In EAP-TTLS settings, enable Identity Privacy
- Enter an anonymous identity or leave blank
Troubleshooting
EAP-TTLS Option Not Available
- Ensure you're running Windows 10 or later
- Update wireless adapter drivers
- Check for Windows updates
Authentication Fails
- Verify credentials are correct
- Ensure PAP is enabled on the RADIUS server
- Check IronWiFi console for authentication logs
Certificate Validation Issues
- Install the RADIUS server's CA certificate
- Add it to the Trusted Root Certification Authorities store
- Select the CA in EAP-TTLS settings
Use Cases
EAP-TTLS + PAP is particularly useful for:
- Microsoft Entra ID integration without password hash sync
- LDAP authentication with external directories
- Legacy systems that don't support MSCHAPv2
- Third-party identity providers
Related Topics
Same protocol on other devices
Other protocols on Windows
- Windows — EAP-PEAP — password-based auth
- Windows — EAP-TLS — certificate-based auth
Foundational reading
Was this page helpful?