These diagrams break down the eduroam authentication process for three common use cases for K12 users. There are three sets of diagrams below - a simplified overview, a more detailed network level, and a deeper look at how each step engages with the next at a protocol level. Each diagram set includes three scenarios showing a K12 student using eduroam to connect - first at a public eduroam hotspot (in this case a library), secondly at their own school, and lastly at a school other than their own. 

Overview diagrams

The following diagrams provide an overview of how the authentication process works over three common use cases for K12 users. These are simplified diagrams intended for audiences that are newer to eduroam or whose duties don't include deeper technical responsibilities. 

K12 user at a hotspot

K12 user connecting at their own school

K12 user visiting another school


Network level diagrams

These diagrams provide more detail of the same three common use cases, this time detailing the authentication flow at the network architecture level. These are intended for audiences who have some familiarity with wireless environments and basic network design and need to better understand how the eduroam service interacts with their organization's network infrastructure. 

K12 user at a hotspot



K12 user connecting at their own school

K12 user visiting another school


Protocol level diagrams

These diagrams provide a deeper dive of the three use cases, this time showing the authentication process from a protocol level and giving step by step explanations of how each component interacts with the others. It is intended for more technical audiences who may be responsible for ensuring their organization is able to communicate with all upstream and downstream components. 

K12 user at a hotspot


K12 user connecting at their own school


K12 user visiting another school


  • No labels