LogoLogo
LogoLogo
  • Welcome
  • Details
  • Configuration
    • Getting Started
      • Generic Guide
      • Scenario-based Guides
        • Microsoft Cloud PKI
        • SCEPman PKI
    • Access Point Setup
      • RadSec
        • Aruba
        • FortiNet
        • Juniper Mist
        • Meraki
        • MikroTik
        • Ruckus
        • UniFi
      • RADIUS
        • ExtremeCloud IQ CoPilot
        • Meraki
        • Sophos UTM
        • UniFi
    • Server Certificate Renewal
  • Admin Portal
    • Home
    • Insights
      • Rule Engine
      • Logs
    • Users
    • Settings
      • Server Settings
      • Trusted Certificates
      • Proxy Settings
      • Permissions
      • User Settings
      • Rules
        • General Structure
        • WiFi
        • LAN
        • VPN
      • Log Exporter
        • Teams
        • Log Analytics
        • Generic Webhook
        • Examples
    • My Invited Users
  • Profile Deployment
    • Microsoft Intune
      • Server Trust
      • WiFi Profile
        • Windows
        • iOS/iPadOS & macOS
        • Android
      • Wired Profile
        • Windows
        • macOS
    • Jamf Pro
      • Server Trust
      • WiFi Profile
      • Wired Profile
    • Google Workspace
      • Server Trust
      • WiFi Profile
  • Other
    • Troubleshooting
    • FAQs
      • General
      • Log & Common Errors
      • MAC Authentication
      • Blast-RADIUS Vulnerability
      • OCSP Soft-fail Consequences
      • Security & Privacy
    • REST API
      • External Monitoring
    • Changelog
  • Licensing
    • Azure Marketplace
  • Support & Service Level
  • RADIUSaaS Website
Powered by GitBook
On this page

Was this helpful?

  1. Profile Deployment
  2. Jamf Pro

WiFi Profile

Last updated 3 months ago

Was this helpful?

We strongly recommend to not use any spaces or special characters in your SSID.

To configure a WiFi profile in Jamf, please follow these instructions:

  1. Log in to your Jamf Pro instance

  2. Choose your correct deployment scope (Computers, Devices or Users). In this example, we have chosen a macOS device (Computers).

  3. Navigate to the existing Configuration Profile from the previous step ()

  4. Add a Network payload

  5. As Network Interface select Wi-Fi

  6. Provide your Service Set Identifier (SSID)

  7. As Security Type select Any (Enterprise)

  1. Under Network Security Settings and Protocols select TLS

  1. Navigate to Network Security Settings > Trust

  2. Under Trusted Certificates all certificates you have configured as Certificate payloads, will appear here. Check them all.

  3. Next, under Trusted Server Certificate Names add the

    • Subject Alternative Name (SAN)

Note that the Common Name is case-sensitive.

Please make sure there are no spaces or hidden characters at the beginning or end of the Trusted Server Certificate Names input field in the JAMF interface.

  1. Unselect Allow Trust Exceptions

  2. Configure all other options as per your requirements.

  3. Click Save

  4. Under Scope assign the profile to the relevant audience

As Identity Certificate select the client authentication certificate you have configured in your SCEP payload of this Configuration Profile before. In case you are using SCEPman as CA, please select the SCEP Proxy you have previously set up during the of SCEPman.

and Common Name (CN) of your active RADIUS Those properties can be found by expanding the active server certificate and copying the relevant values.

configuration
Trusted Root
Server Certificate.