Eduroam
[!WARNING]
NetworkManagerusewpa_supplicantas the backend for wifi connection - even if you set to a different backend - you cannot connect to eduoram- We are going to use purely
iwdas our wifi manager, this replaceswpa_supplicant
1. Enable/Disable the WiFi-backend
-
Navigate to
sudo vim /etc/NetworkManager/config.d/wifi_backend.conf. -
We need to disable
wpa_supplicantso that we can useiwd.sudo systemctl stop wpa_supplicant sudo systemctl disable wpa_supplicant sudo systemctl status wpa_supplicant○ wpa_supplicant.service - WPA supplicant Loaded: loaded (/lib/systemd/system/wpa_supplicant.service; disabled; preset: enabled) Active: inactive (dead)systemctlis the primary command-line interface for controllingsystemd, theinitsystem and service manager used by most modern Linux distributions. It allows administrators and users to inspect,start,stop,enable,disable,restartand otherwise manage system services and the overall system state. -
Enable
iwd● iwd.service - Wireless service Loaded: loaded (/lib/systemd/system/iwd.service; enabled; preset: enabled) Active: active (running) since Wed 2026-02-04 06:56:32 GMT; 15min ago Docs: man:iwd(8) man:iwd.config(5) man:iwd.network(5) man:iwd.ap(5) Main PID: 616 (iwd) Tasks: 1 (limit: 9577) CPU: 25ms CGroup: /system.slice/iwd.service └─616 /usr/libexec/iwd
2. Configure iwd eduroam.8021x
-
Create the following configuration file for the enterprise network
[Security] EAP-Method=PEAP EAP-Identity=USERNAME@gre.ac.uk EAP-PEAP-Phase2-Method=MSCHAPV2 EAP-PEAP-Phase2-Identity=USERNAME@gre.ac.uk EAP-PEAP-Phase2-Password=UoG_Account_Password EAP-PEAP-CACERT=/etc/ssl/certs/Gre_Eduroam_CA.pemSee
man 5 iwd.networkBelow is an explanation of each settings. Using the man page for iwd tells you this information.
-
EAP-Identity=-
What it is:
- The outer (anonymous-visible) identity presented during the initial EAP exchange.
-
Why it is used:
-
Allows the RADIUS infrastructure to route authentication requests to the correct home institution
-
Often visible to the network before encryption is complete
-
-
-
EAP-PEAP-Phase2-Method=MSCHAPV2-
What it is:
- Defines the inner authentication protocol used inside the PEAP tunnel.
-
Why it is used:
-
MSCHAPv2supports username/password authentication -
Compatible with Active Directory / LDAP-backed RADIUS servers
-
Standard choice for eduroam-style deployments
-
-
-
EAP-PEAP-Phase2-Identity=-
What it is:
- The inner identity, used during Phase 2 authentication.
-
Why it is used:
-
This identity is sent inside the encrypted tunnel
-
Used by the authentication backend (e.g. AD) to locate the user account
-
-
-
AP-PEAP-Phase2-Password=-
What it is:
- The password associated with the Phase 2 identity.
-
Why it is used:
-
Authenticates the user against the institution’s directory service
-
Never transmitted in plaintext due to the PEAP TLS tunnel
-
-
-
AP-PEAP-CACERT=/etc/ssl/certs/-
What it is:
- The trusted Certificate Authority (CA) used to validate the RADIUS server’s TLS certificate.
-
Why it is used (critically important):
-
Prevents evil twin / rogue access point attacks
-
Ensures the client only trusts legitimate university authentication servers
-
Required for secure PEAP operation
-
-
-
3. Connect to Eduroam
-
Then use
iwctlcommand, this will open put you in an subshell:Station: wlan0 -------------------------------------------------------------------------------------- Settable Property Value -------------------------------------------------------------------------------------- Scanning no State connected Connected network eduroam IPv4 address 172.19.105.111 .... -
Confirm by sending a ping to google.com (8.8.8.8)
SUCCESS!