To use this configuration your RADIUS Server need a certificate which was issued by a CA and you have to reference the CA certificate in your WiFi profile. If you are not sure what type of certificate your server is using, contact us.
Before creating the Wi-Fi profile, create a Trusted root certificate profile as described here. Change your Platform accordingly.
The following list and screenshot show you all necessary configurations:
  1. 1.
    Log in to your Azure portal
  2. 2.
    Navigate to Microsoft Intune and click Device and subsequently Configuration profiles
  3. 3.
    Then click Create profile
  4. 4.
    As Platform select your Android device type
  5. 5.
    Search the Profile type templates for Wi-Fi and select it
  6. 6.
    Click Create and provide a descriptive name and optional Description
  7. 7.
    As Wi-Fi type select Enterprise
  8. 8.
    Enter your SSID
  9. 9.
    As EAP type choose EAP - TLS
  10. 10.
    Next, as Radius server name add the DNS name from your active RADIUS Server Certificate. This can be found by expanding the active Server Certificate and copying the SAN value.
  11. 11.
    For the Root certificates for server validation select the Trusted certificate profile you have previously created for the RADIUS Server Certificate.
  12. 12.
    Under Client Authentication select Certificates as Authentication method
  13. 13.
    Finally, under Certificates select the SCEP profile you would like to use for authentication.
All other settings can be configured according to your own needs and preferences.
Some Android kiosk devices require a value for Identity privacy (outer identity). Please consider this when you are having issues authenticating against the WiFi network with such devices.
Export as PDF
Copy link
Edit on GitHub