Skip to main content
Back to Splashtop
Foxpass
Log inFree Trial
Contact UsLog inFree Trial

Extending Zero Trust to Wi‑Fi and VPN with Device Posture‑Based Access Control

5 min read
Updated
Get Started with Foxpass
Protect your Wi-Fi and networks with identity- and certificate-based authentication
Free Trial

Zero Trust policies are commonly enforced for cloud applications, where identity and device compliance checks happen before access is granted. But when it comes to Wi-Fi and VPN access, those same signals often are not part of the decision.  
 
That creates a gap. A device might fail compliance checks in an MDM like Microsoft Intune, because of an outdated OS or disabled encryption, but still successfully authenticate to the network through RADIUS.

Foxpass’s latest Cloud RADIUS enhancements help close that gap by incorporating device posture signals into network authentication decisions, allowing organizations to extend Zero Trust principles to Wi-Fi and VPN access.

The gap between device compliance and network access

Many organizations already evaluate device posture using Microsoft Intune compliance policies. These policies verify things like operating system versions, encryption status, and other security requirements before allowing access to corporate resources.

However, those posture signals do not always influence network access itself.

At the same time, Microsoft Entra Conditional Access is designed for cloud authentication flows and token issuance. It is not part of the authentication path for RADIUS-based services like Wi-Fi or VPN.

The result is a common disconnect:

  • Devices are evaluated for compliance by MDM

  • Users authenticate to the network through RADIUS

  • Device posture is often not considered when granting network access

This means that devices that fall out of compliance may still connect to corporate Wi-Fi or VPN unless additional controls are implemented

Introducing device posture-based access control in Foxpass

Foxpass now allows administrators to incorporate device posture alongside identity and certificate authentication when making network access decisions.

Device compliance continues to be evaluated by Microsoft Intune and surfaced through Microsoft Entra ID. Foxpass retrieves and caches these posture signals and uses them during RADIUS authentication to determine whether a device should be granted network access.

Based on configuration, administrators can:

  • Allow access only for compliant devices

  • Deny access for non-compliant devices

  • Place unmanaged or non-compliant devices into a quarantine network

This approach allows organizations to enforce a device posture requirement directly at the network layer while continuing to use their existing identity and device management systems.

Posture-aware access without full Network Access Control (NAC) complexity

Traditional NAC solutions often rely on endpoint agents, inline enforcement appliances, and continuous device interrogation across the network. While these systems can provide deep visibility and control, they can also introduce operational complexity and infrastructure overhead.

Foxpass takes a lighter-weight approach. Device posture continues to be evaluated by the organization’s existing MDM platform, and Foxpass applies those signals during the authentication process. Because enforcement happens during RADIUS authentication, organizations can implement posture-aware network access decisions without deploying additional agents, inline appliances, or a full NAC infrastructure.

For many teams, especially those operating in cloud-first or distributed environments, this provides a practical way to enforce device compliance at the network edge.

How posture enforcement works

Device posture-based access control in Foxpass is configurable and not enabled by default.

Posture signals become available once the integration with Intune and Entra ID is established, but administrators can choose how and when to enforce policies. Some organizations may begin observing posture signals before introducing enforcement, while others may immediately restrict access for devices that fail compliance checks.

Depending on policy requirements, administrators can:

  • Deny access entirely for non-compliant devices

  • Place those devices into a quarantine network for remediation

  • Continue monitoring posture signals before enabling enforcement

It is also important to understand where these decisions occur in the authentication flow.

Microsoft Intune evaluates device compliance. Microsoft Entra ID surfaces device state information. Foxpass uses those signals to inform the network's access decision during RADIUS authentication.

Because Wi-Fi and VPN authentication rely on RADIUS, these enforcement decisions occur outside the Microsoft Entra Conditional Access model that is used for cloud applications.

Bringing Zero Trust to the network edge

By incorporating device posture into network authentication decisions, Foxpass extends Zero Trust policies beyond cloud applications to the network itself. Each connection can be evaluated using multiple signals including identity, certificates, and device compliance before network access is granted.

For organizations already using Microsoft Intune and Entra ID, this provides a straightforward way to align Wi-Fi and VPN access policies with existing device compliance requirements.

Get Started with Foxpass Now!
Start your free trial to see how Foxpass can automate and secure your Wi-Fi network
Free Trial


Share This
RSS FeedSubscribe

Related Content

A group of students in a classroom using laptop computers.
Cloud RADIUS & Network Authentication

K-12 Cyber Accountability is Rising: Why Access Controls Matter

Learn More
Photo of a caterpillar on a branch
Cloud RADIUS & Network Authentication

How to Leverage OpenLDAP Effectively

A group of students in a computer lab at school on their computers.
Cloud RADIUS & Network Authentication

The Overlooked Importance of Wi-Fi Security in Schools

Students in a school classroom working on laptops.
Cloud RADIUS & Network Authentication

E-Rate Funding for K–12 Wi-Fi Security: Why Choose Foxpass

View All Blogs
  • Compliance
  • Privacy Policy
  • Terms of Use
Copyright © 2026 Splashtop Inc. All rights reserved. All $ prices are USD unless otherwise specified.