Let's divide this into two separate cases; corporate and non-corporate assets.
For corporate assets,
1. Windows domain computers can be validated via machine auth, and then you also have user auth
2. Non-Windows devices can either be validated via certificate (preferred) or white-listing MAC address. User auth can be performed normally in additional if the device supports it.
For Personal assets,
If you have a lot of devices, the best way to manage is to use MDM. You can get users to register to your MDM before they allow network access. Your support team then have control over this is, for example, manually issuing registration code, or perform manual registration approval depending on MDM vendor. Once registered, the device can be registered user-based certificate which can be use to authenticate to network.