Server Trust
Last updated
Last updated
This is only required if you are using a RADIUS server certificate that was issued by a CA that your clients do not already trust. For example, this is not needed if you are bringing your own server certificate issued by SCEPman.
When downloading the Server certificate, use only the green-marked certificate. This will download the root CA certificate of the issuing CA.
Log in to your Jamf Pro instance.
Choose your correct deployment scope (Computers, Devices or Users). In this example, we have chosen a macOS device (Computers).
Navigate to an existing Configuration Profile or create a new one and give the profile a meaningful name, e.g. "Corp-WiFi-802.1X".
Add a Certificate payload
Provide a meaningful Certificate Name, e.g. "RADIUSaaS Server Root CA"
Under Select Certificate Option select Upload
Upload the *.cer file containing the certificate you have downloaded in Part 1. A password is not required, since it is only the public key part that is contained in the file and that needs to be uploaded.
Select Allow all apps access
Unselect Allow export from keychain
Click Save
Under Scope assign the profile to the relevant audience