# Juniper Mist

## Prepare certificates

To establish a valid RadSec connection, your Access Points must trust the **RADIUS Server Certificate** and your RADIUS server must trust your **RadSec Client Certificate**. To achieve this,

1. Download the root certificate of the CA that has issued your active **RADIUS Server Certificate** as described [here](https://docs.radiusaas.com/admin-portal/settings/settings-server#download).
2. Create a **RadSec Client Certificate** for your Access Points. If you are using **SCEPman Certificate Master**, the process is described [here](https://docs.scepman.com/certificate-deployment/certificate-master/client-certificate-pkcs-12).&#x20;

{% hint style="warning" %}
Ensure to monitor the expiry of your **RadSec Client Certificate** and renew it in due time to prevent service interruptions.
{% endhint %}

3. Add the root certificate of the CA that has issued the **RadSec Client Certificate** to your RADIUS instance as described [here](https://docs.radiusaas.com/admin-portal/settings/trusted-roots#add) and select **RadSec** under **Use for**.\
   In case the **RadSec Client Certificate** has been issued by SCEPman and you already trust the SCEPman Root CA for client authentication, simply edit the trusted SCEPman Root CA certificate and select **Both** under **Use for**.&#x20;

## Mist configuration

{% hint style="info" %}
Below settings are the necessary settings to establish a functional RadSec connection with our service. Configure any other settings at your discretion.
{% endhint %}

1. Navigate to your Mist configuration plane.

2. To configure the relevant certificates, navigate to **Organization** **>** **Settings**.

   <figure><img src="https://content.gitbook.com/content/SWU1DQ4UGkqER7uGNUOm/blobs/wBOxKsiVe4TpyMjUSAmP/image.png" alt=""><figcaption></figcaption></figure>

3. Add the root certificate of the CA that has issued your **RADIUS Server Certificate** under **RadSec Certificate**.

   <figure><img src="https://content.gitbook.com/content/SWU1DQ4UGkqER7uGNUOm/blobs/rtEnTwy87cwq4rOHKREE/image.png" alt=""><figcaption></figcaption></figure>

4. Add your **RadSec Client Certificate** (created in step 2 under [Prepare Certificates](#prepare-certificates)) to **AP RadSec Certificate**.

   <figure><img src="https://content.gitbook.com/content/SWU1DQ4UGkqER7uGNUOm/blobs/r8FmXbpm3SoZtsO68tNV/image.png" alt=""><figcaption></figcaption></figure>

5. Go to **Site >** **WLANs**.

   <figure><img src="https://content.gitbook.com/content/SWU1DQ4UGkqER7uGNUOm/blobs/jub5W0VSNgszN2JPzqTj/image.png" alt=""><figcaption></figcaption></figure>

6. Create a new WLAN if you have not already created one for which you want to leverage RADIUS authentication against our service.

7. Select **Enterprise (802.1X)** as **Security Type**.

   <figure><img src="https://content.gitbook.com/content/SWU1DQ4UGkqER7uGNUOm/blobs/iHVm5F0LMJO0e4c8mDy1/image.png" alt=""><figcaption></figcaption></figure>

8. Under **RadSec**, select **Enabled** and set the **Server Name** to the **SAN** attribute of your **RADIUS Server Certificate**.

   <figure><img src="https://content.gitbook.com/content/SWU1DQ4UGkqER7uGNUOm/blobs/JvO1JCaAezEVFTMzT73z/image.png" alt=""><figcaption></figcaption></figure>

9. For **Server Addresses** use either the IP address or the DNS name of your [RadSec service endpoint](https://docs.radiusaas.com/admin-portal/settings/settings-server#properties).

   <figure><img src="https://content.gitbook.com/content/SWU1DQ4UGkqER7uGNUOm/blobs/Z5E3U27QXmd2iywAcL28/image.png" alt=""><figcaption></figcaption></figure>

### A complete walk-through

<figure><img src="https://content.gitbook.com/content/SWU1DQ4UGkqER7uGNUOm/blobs/NFa4Ojhq3NRMvyvmaqgU/Kapture%202023-02-23%20at%2016.01.24.gif" alt=""><figcaption></figcaption></figure>
