gfaust_mudd t1_iy3sita wrote
Reply to comment by pacoii in Why did our school wanted us to install this? Can somebody explain what is the purpose? by 8046Ile
Wi-Fi is password protected and you agree to terms if/when you log into it. Profiles can allow unrestricted access and are generally used in managed environments. I’m yet to see a company that uses this method vs VPN for personal device use. And note I’m not talking about a phone your company provides you, I’m talking about your phone on their networks
CrypticMocha t1_iy40itn wrote
It is extremely common practice to have employees sign agreements and install profiles on BYOD (bring your own device) endpoints.
PADFTGW t1_iy45buw wrote
That it is common, won’t say it’s normal to do. They can get full access to your device by such profiles. You better can use your own mobile provider to access the internet instead of the company WiFi. Even without a installed profile they can track all your internet traffic.
jjeroennl t1_iy5g83p wrote
I’m pretty sure it’s illegal in the European Union, if your employer requires this they will need to provide the phone, laptop or tablet. Its also not allowed for employers to make you install an app on your personal phone for example.
Its even more not allowed to monitor network traffic, then you will be violating both employee rights and the GDPR.
Dutch source: https://www.everphone.com/nl/blog/scheiden-van-gegevens-bij-mobiele-telefoon-van-de-zaak/
pacoii t1_iy3sooo wrote
Many companies use Profiles. I’ve worked at them, lol!
cyberentomology t1_iy4a96y wrote
Certificate authentication to access enterprise Wi-Fi networks is extremely common. Products like ClearPass exist for this exact use case. The “password” for a WiFi network (pre shared key) is an encryption key, not an authentication or authorization method, and is only typically used on small-scale personal networks.
This is completely separate from VPN which allows remote secured access to internal company networks. Certificate authentication to the network provides authentication, authorization, and accounting, as well as robust encryption of the wireless link.
Viewing a single comment thread. View all comments