Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

Group Policy scripts with WPA2 WiFi are not launched

Posted on 2009-04-07
3
Medium Priority
?
345 Views
Last Modified: 2012-05-06
We setup a WiFi network with WPA2.  It uses User certificates, so wireless kicks in only after username/password have been entered.  The problem is that with this scenario a laptop thinks it is not on the network when it begins a login process, so AD's drive mapping, as well as Group Policy login scripts are not launched.

Is there a workaround for this?  Can user certificate be authenticated before the login process kicks in?

Greg
0
Comment
Question by:grkugel
3 Comments
 
LVL 3

Expert Comment

by:mikey1h
ID: 24092719
If your users are in need of these resources, an quick and easy fix would be to create a batch file on the all users desktop that calls for the script from a share on the server.   after they login and establish connectivity, they double click the batch file and scripts will execute as written
0
 
LVL 4

Expert Comment

by:dj_relentless
ID: 24093402
Can you not make them machine certificates? or are they shared computers.
0
 

Accepted Solution

by:
grkugel earned 0 total points
ID: 24161767
OK, a MS TechNet article available for download here: http://technet.microsoft.com/en-us/library/cc527055.aspx answers my question.  Chapter 6, page 151 is where it starts to get interesting.

The key here is to setup a Group Policy that is configured for WPA2 with re-authentication.  Re-authentication uses a computer certificate when nobody is logged in, then switches to computer/user certificates when somebody is trying to login.

It's important to note that only Vista or Windows Server 2008 will let you configure a group policy for WPA2.  I also couldn't configure re-authentication on a single computer, without getting group policy involved.
0

Featured Post

Evaluating UTMs? Here's what you need to know!

Evaluating a UTM appliance and vendor can prove to be an overwhelming exercise.  How can you make sure that you're getting the security that your organization needs without breaking the bank? Check out our UTM Buyer's Guide for more information on what you should be looking for!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.
DECT technology has become a popular standard for wireless voice communication. DECT devices are not likely to be affected by other electronic devices and signals because they operate in a separate frequency-band.
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…

564 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question