LogoLogo
LogoLogo
  • Welcome
  • Details
  • Configuration
    • Getting Started
      • Generic Guide
      • Scenario-based Guides
        • Microsoft Cloud PKI
        • SCEPman PKI
    • Access Point Setup
      • RadSec
        • Aruba
        • FortiNet
        • Juniper Mist
        • Meraki
        • MikroTik
        • Ruckus
        • UniFi
      • RADIUS
        • ExtremeCloud IQ CoPilot
        • Meraki
        • Sophos UTM
        • UniFi
    • Server Certificate Renewal
  • Admin Portal
    • Home
    • Insights
      • Rule Engine
      • Logs
    • Users
    • Settings
      • Server Settings
      • Trusted Certificates
      • Proxy Settings
      • Permissions
      • User Settings
      • Rules
        • General Structure
        • WiFi
        • LAN
        • VPN
      • Log Exporter
        • Teams
        • Log Analytics
        • Generic Webhook
        • Examples
    • My Invited Users
  • Profile Deployment
    • Microsoft Intune
      • Server Trust
      • WiFi Profile
        • Windows
        • iOS/iPadOS & macOS
        • Android
      • Wired Profile
        • Windows
        • macOS
    • Jamf Pro
      • Server Trust
      • WiFi Profile
      • Wired Profile
    • Google Workspace
      • Server Trust
      • WiFi Profile
  • Other
    • Troubleshooting
    • FAQs
      • General
      • Log & Common Errors
      • MAC Authentication
      • Blast-RADIUS Vulnerability
      • OCSP Soft-fail Consequences
      • Security & Privacy
    • REST API
      • External Monitoring
    • Changelog
  • Licensing
    • Azure Marketplace
  • Support & Service Level
  • RADIUSaaS Website
Powered by GitBook
On this page

Was this helpful?

  1. Profile Deployment
  2. Jamf Pro

Wired Profile

Last updated 3 months ago

Was this helpful?

To configure a Wired network profile in Jamf, please follow these instructions: configure all other options as per your requirements.

  1. Log in to your Jamf Pro instance

  2. Choose your correct deployment scope (Computers, Devices or Users). In this example, we have chosen a macOS device (Computers).

  3. Navigate to the existing Configuration Profile from the previous step ().

  4. As Network Interface select the relevant ethernet, e.g. First Active Ethernet

  5. Under Network Security Settings and Protocols select TLS

  1. Navigate to Network Security Settings > Trust

  2. Under Trusted Certificates all certificates you have configured as Certificate payloads, will appear here. Check them all.

  3. Next, under Trusted Server Certificate Names add the

    • Subject Alternative Name (SAN)

  1. Unselect Allow Trust Exceptions

  2. Configure all other options as per your requirements.

  3. Click Save

  4. Under Scope assign the profile to the relevant audience

As Identity Certificate select the client authentication certificate you have configured in your SCEP payload of this Configuration Profile before. In case you are using SCEPman as CA, please select the SCEP Proxy you have previously set up during the of SCEPman.

and Common Name (CN) of your active RADIUS . Those properties can be found by expanding the active server certificate and copying the relevant values. Please consider, that the common name is case-sensitive.

configuration
Trusted Root
Server Certificate