MSCHAPv2 to Certificate Migration
Executive Summary
Password-based 802.1X (MSCHAPv2) presents significant security risks:
-
Credential theft via phishing
-
Relay attacks
-
Brute force attacks
-
No device attestation
This guide provides a phased approach to migrate to certificate-based authentication.
Migration Phases
| Phase | Scope | Method | Timeline |
|---|---|---|---|
Phase 1 |
Managed devices (domain-joined) |
EAP-TLS |
Weeks 1-4 |
Phase 2 |
BYOD devices |
EAP-TEAP (cert + password fallback) |
Weeks 5-8 |
Phase 3 |
MSCHAPv2 sunset |
Policy enforcement |
Week 9+ |
Success Criteria
-
100% managed devices on EAP-TLS
-
BYOD devices using EAP-TEAP
-
MSCHAPv2 disabled in allowed protocols
-
No password-based authentications in logs