I cannot seem to link PKI and the PMK infrastructures together at any level. They both seem to do the same thing in different ways. Is there one big flow chart or hierarchy diagram to see the whole picture? Any information or links are a big help.
A good article is posted on
. The PKI (or "Public") part of this comes into play with proving the identity of the network to the user. This is done via a digital certificate on the RADIUS server. So, when you authenticate using WPA/WPAv2, you select an EAP method. The most popular are PEAP or TTLS, which check the identity of the RADIUS server before passing your login information. Just like visiting an SSL website, the RADIUS server will have a digital certificate loaded on it, and if it is from a trusted source (Verisign, Entrust, etc.), your machine will trust that the network is how it says it is and will send credentials.
Dig Deeper on Wireless LAN (WLAN)
Our expert, Mike Puglia, gives us a synopsis on WLAN APs and their rates compared to client data rates.
In this response, our WLAN expert, Mike Puglia, answers "How many wireless devices can connect to an 802.11b access point if the maximum capacity ...
Read this Q&A to see how Microsoft RADIUS authentication works in Microsoft/Cisco PEAP 802.11 implementation.