Eduroam Windows 8 Manual Instructions

How to connect a Windows 8 computer to the Eduroam service

The wireless service enables members of the University to connect to the University network and the Internet using their own computers and devices at various locations around the University and Halls of residence. This guide contains instructions to connect a computer to the eduroam wireless service.

Install Certificate First

You should first install the Swansea University certificate. You can get it here: Swansea University Certificate - DER (Binary format)
Click on the certificate link and Install the certificate.

You need to be connected to the SwanseaUni-setup network to get the certificate.

Step 1 - Configure Eduroam

The first thing you need to do is configure the Eduroam connection. To do this follow these steps:
1. Right Click on the wireless icon in the task bar in the bottom right hand corner of the desktop.
2. Once you right click on it a small window will appear showing the avalable options.

3. Now click on the link 'Open Network and Sharing Center':
4. Now the Network and Sharing Centre has appeared, select the 'Set up new connection or network' link.

5. Now click on 'Manually connect to a wireless network', as seen below:

6. You now need to enter information for the connection.

7. For the 'Network Name' enter 'eduroam'.
8. For the 'Security Type' select 'WPA2 Enterprise'.
9. For the 'Encryption Type' select 'AES'.
10. Now click next

11. Now click 'Change Connection Settings'.

12. A new window will appear. Ensure that the option 'Connect to a more preferred network if available' is unticked.
13. Now click on the 'Security' tab.
14. Ensure that the 'network authentication method' is set to 'Microsoft: Protected EAP (PEAP)'.
15. Ensure that the 'Remember user credentials' tick box is ticked.

16. Now click on the 'Settings' button.
17. Ensure the 'Validate server certificate' option is ticked
18. Ensure the 'Connect to these servers:' option is ticked
19. In the text box under 'Connect to these servers:' enter the following:;;
20. Ensure that the 'Swansea University Certificate Authority' certifacte is ticked
21. Ensure that the option 'Do not prompt user to authorize new servers or trusted certification authorities' is ticked
22. Untick the 'Enable Identity Privacy' tick box if ticked.

23. Now click the 'Configure' button.
24. Untick then option 'Automatically use my Windows logon name and password'.
25. Now click 'OK'.
26. Click 'OK' again.
27. Click 'OK' for the thrid time.
28. Now click on 'Close'
29. Now close the 'Manage Wireless Networks' window.
30. Now click the 'Wireless Icon' in the task bar in the bottom right of the screen.

31. Select 'eduroam' and then click the 'Connect' button.

33. You will now be presented with a 'Network Authentication' window.
34. Enter your email address ( and email password. Click 'OK'.

35. You are now Connected to eduroam.

Step 2 - Configuring your Browser

If you want to browse the web to reach any web sites outside the University you must configure your browser to use the web proxy.

Internet Explorer 5 or higher

1. Click Start, Settings, Control Panel and double-click Internet Options.
2. Choose the Connections tab.
3. Click the LAN Settings button.
4. Ticks the Automatically detect settings option. Untick any others that are ticked.
5. Choose OK and then in the Internet Options panel choose OK again to finish.


1. Run Firefox.
2. From the Tools drop down menu select Options...
3. In the Options panel click the 'Advanced' icon/tab.
4. Select the 'Network' tab.
5. Click the 'Settings...' button.
6. Tick the Auto-Detect Proxy Settings for this network button.
7. Choose OK and then in the Options panel choose OK again to finish
8. Close and restart the browser.

Step 3 - Disconnect

In order to disconnect from Eduroam you need to:

1. Click the Wireless Icon on the task bar in teh bottom right of the screen.
2. You should now see the Network Connections window appear.
3. Select 'eduroam' from the list of wireless networks.
4. Click the 'Disconnect' button.
5. You are now disconnected.

Install security updates

Any computer connected to the University network and the Internet is a target for unauthorised users who can try to access your system. Intruders could watch all your actions on the computer, cause damage by deleting files or changing your data, or steal valuable information such as passwords or credit adaptor numbers. Alternatively intruders may not be interested in your data and instead want control of your computer so they can use it to launch attacks to disrupt other systems. Some attacks known as worms spread automatically from one vulnerable system to another. Don't think 'an attacker would never be interested in me': an automated worm can infect and disrupt millions of computers.

There are three main ways in which an attack on your computer could be successful:

* New vulnerabilities (holes) are always being discovered in computer software. These holes can be exploited to gain access. Software vendors fix the holes by producing patches or new versions, but it is up to you to obtain and install these fixes.
* You could be enticed to run a trojan or virus. A trojan looks like something else to encourage you to click on it but its real purpose is to open up a back door on your computer. Viruses spread by infecting other legitimate computer programs. Trojans and viruses are often spread through email attachments, file-sharing and messaging, and may appear to come from someone you know who is also infected.
* Some software has settings (sometimes the default settings) that allow other users to access your computer unless you change the settings to be more secure. For example, file-sharing built-in to Windows can allow other users to view, modify or add files on your hard disk, which is an obvious risk unless turned off or configured carefully.

To ensure your computer is not vulnerable to attack you need to:

* Install software patches and new versions to fix known holes.
* Follow advice to change software settings to be more secure, or not run known insecure software at all.
* Don't run unknown files and unsolicited attachments to avoid trojans or viruses.
* Run up-to-date anti-virus software.
* Keep backup copies on disk, CD or a network server of important data.