<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>enterprise wifi on Referently.com</title>
    <link>https://referently.com/tags/enterprise-wifi/</link>
    <description>Recent content in enterprise wifi on Referently.com</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en-us</language>
    <lastBuildDate>Sat, 18 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://referently.com/tags/enterprise-wifi/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>How Enterprise WiFi Authentication Actually Works: 802.1X and RADIUS Explained</title>
      <link>https://referently.com/how-enterprise-wifi-authentication-actually-works-802.1x-and-radius-explained/</link>
      <pubDate>Sat, 18 Apr 2026 00:00:00 +0000</pubDate>
      
      <guid>https://referently.com/how-enterprise-wifi-authentication-actually-works-802.1x-and-radius-explained/</guid>
      <description>Every corporate WiFi network that prompts for a username and password rather than a passphrase is running 802.1X authentication backed by a RADIUS server. The mechanism is invisible to end users but structurally different from home WiFi in ways that matter enormously for security. Understanding how it works explains why enterprise networks handle compromised credentials, device theft, and regulatory compliance requirements in ways that passphrase-based networks cannot.
The Limitation of PSK Authentication Home and small office WiFi uses a pre-shared key: one passphrase, shared among all users and all devices.</description>
    </item>
    
  </channel>
</rss>
