Ubiquiti UniFi - OpenRoaming Configuration
Configure OpenRoaming on UniFi access points with IronWifi RADIUS authentication and Hotspot 2.0. This guide covers RADIUS profile creation, WPA2/WPA3 Enterprise security, roaming consortium OI configuration, NAI realm setup, and deployment through the UniFi Network Application.
Prerequisites
In UniFi:
- UniFi access points with Hotspot 2.0 support
- UniFi Network Controller 7.0 or later (for full OpenRoaming support)
- Administrator access
In IronWifi Console (complete these first):
- Create a Network and note the RADIUS details
- Enable OpenRoaming on the network
- Configure roaming type (Settled or Settlement-free)
Quick Start
- Create RADIUS profile in UniFi with IronWifi server details
- Create WPA2-Enterprise WiFi network
- Enable Hotspot 2.0 with these Roaming Consortium OIs:
5A03BA0000(WBA Settled)5A03BA0200(WBA Settlement-free)004096(Cisco)
- Configure NAI realm:
ironwifi.com - Apply changes and test
UniFi Controller Configuration
Step 1: Create RADIUS Profile
- Open UniFi Network Application
- Go to Settings > Profiles > RADIUS
- Create new profile:
- Name: IronWifi-OpenRoaming
- Server IP: IronWifi RADIUS address
- Port: 1812
- Secret: Your RADIUS secret
- Enable Accounting
Step 2: Create Wireless Network
- Go to Settings > WiFi
- Click Create New
- Configure:
- Name: OpenRoaming (or your preferred SSID)
- Security: WPA2/WPA3 Enterprise
- RADIUS Profile: IronWifi-OpenRoaming
Step 3: Configure Hotspot 2.0
- In WiFi network settings, enable Hotspot 2.0
- Configure:
Network Settings:
- Access Network Type: Free Public Network
- Internet Access: Enabled
Operator Settings:
- Operator Name: Your organization
- Domain:
ironwifi.net
Roaming Consortium (Critical for OpenRoaming): Add these OIs:
5A03BA0000 (WBA Settled)
5A03BA0200 (WBA Settlement-free)
004096 (Cisco)
NAI Realm: Add realms for OpenRoaming identity providers:
Realm: ironwifi.com
EAP Methods: EAP-TTLS, EAP-TLS
Realm: openroaming.net
EAP Methods: EAP-TTLS, EAP-TLS
Realm: google.com
EAP Methods: EAP-TTLS, EAP-TLS
- Save configuration
Step 4: Deploy Configuration
- Review settings
- Click Apply Changes
- Wait for APs to provision
Advanced: RadSec Configuration
For encrypted RADIUS (recommended for production):
Enable RadSec in IronWifi
- Go to Networks > your network
- Enable RadSec
- Download certificate bundle
UniFi RadSec (requires custom configuration)
UniFi doesn't natively support RadSec. Options:
- Use RADIUS proxy with RadSec support
- Configure via SSH/config files (advanced)
- Use standard RADIUS with secure network
Testing OpenRoaming
Test with Mobile Device
- iOS: Install OpenRoaming profile or use Apple ID
- Android: Enable Passpoint, sign in with Google account
- Device should auto-discover and connect
Verify in UniFi
- Go to Clients
- Find connected OpenRoaming client
- Check authentication method shows 802.1X/EAP
Verify in IronWifi
- Check Authentication Logs
- Look for successful authentications
- Verify realm matches OpenRoaming identity
Configuration via API
import requests
base_url = "https://unifi-controller:8443"
api_key = "your-api-key"
# Configure Hotspot 2.0 with OpenRoaming
wifi_config = {
"name": "OpenRoaming",
"security": "wpaeap",
"radius_profile_id": "radius_profile_id",
"hotspot2conf": {
"enabled": True,
"internet": True,
"access_network_type": 2,
"domain_names": ["ironwifi.net", "openroaming.net"],
"roaming_consortium_list": [
"5A03BA0000",
"5A03BA0200",
"004096"
],
"nai_realm_list": [
{
"realm": "ironwifi.com",
"eap_methods": [{"method": 21}, {"method": 13}]
},
{
"realm": "openroaming.net",
"eap_methods": [{"method": 21}, {"method": 13}]
}
],
"operator_names": [{"lang": "eng", "name": "IronWifi"}]
}
}
Troubleshooting
Devices Don't Auto-Connect
- Verify Hotspot 2.0 is enabled
- Check roaming consortium OIs are correct
- Ensure client has valid OpenRoaming credentials
- Test with known-good OpenRoaming device
Authentication Failures
- Check RADIUS connectivity
- Verify IronWifi authentication logs
- Ensure NAI realm is configured
- Check user credentials or identity provider
"No Networks Found" on Client
- Verify AP is broadcasting Hotspot 2.0
- Check 802.11u beacons with WiFi analyzer
- Ensure client Passpoint is enabled
- Move closer to access point
Intermittent Connections
- Check for multiple SSIDs on same channel
- Verify RADIUS timeout settings
- Review AP logs for errors
- Check for firmware updates
Best Practices
- Use dedicated SSID for OpenRoaming
- Keep firmware updated on all APs
- Monitor authentication logs regularly
- Test with multiple devices (iOS, Android)
- Configure both settled and settlement-free OIs
OpenRoaming Benefits
With OpenRoaming configured:
- Users with Google, Apple, Microsoft accounts connect automatically
- Guests don't need to register or enter passwords
- Enterprise users roam to your network seamlessly
- All connections are WPA2/WPA3 Enterprise secured