Wireless validating identity certificate problem
From a security standpoint the best option is setup a captive portal.
Students can use their BYOD devices to connect and reach the portal, pass their user authentication credentials to the portal and the portal can then talk to the RADIUS server.
We are perfectly willing to buy a certificate from Verisign, Thwarte, etc if it will help but have tried our Comodo wildcard SSL certificate which hasn't fixed it.
These machines belong to the end users so we can't easily control settings with group policy or registry hacks.
In order to enable the client to connect we have to add the network manually and un-check the "Validate server certificate" as shown in the screenshot below.
If you do go this route, make sure you document for CYA purposes.
This is a classic bring-your-own-device network, think university halls of residence.
The user will be logged in locally when they click connect.
The disadvantages of the first two options is that it opens your 802.1X scheme up to Mi TM attacks.
I could conceivably build my own RADIUS server and intercept your user's AD credentials.