LogoLogo
LogoLogo
  • Welcome
  • Details
  • Configuration
    • Getting Started
      • Generic Guide
      • Scenario-based Guides
        • Microsoft Cloud PKI
        • SCEPman PKI
    • Access Point Setup
      • RadSec
        • Aruba
        • FortiNet
        • Juniper Mist
        • Meraki
        • MikroTik
        • Ruckus
        • UniFi
      • RADIUS
        • ExtremeCloud IQ CoPilot
        • Meraki
        • Sophos UTM
        • UniFi
    • Server Certificate Renewal
  • Admin Portal
    • Home
    • Insights
      • Rule Engine
      • Logs
    • Users
    • Settings
      • Server Settings
      • Trusted Certificates
      • Proxy Settings
      • Permissions
      • User Settings
      • Rules
        • General Structure
        • WiFi
        • LAN
        • VPN
      • Log Exporter
        • Teams
        • Log Analytics
        • Generic Webhook
        • Examples
    • My Invited Users
  • Profile Deployment
    • Microsoft Intune
      • Server Trust
      • WiFi Profile
        • Windows
        • iOS/iPadOS & macOS
        • Android
      • Wired Profile
        • Windows
        • macOS
    • Jamf Pro
      • Server Trust
      • WiFi Profile
      • Wired Profile
    • Google Workspace
      • Server Trust
      • WiFi Profile
  • Other
    • Troubleshooting
    • FAQs
      • General
      • Log & Common Errors
      • MAC Authentication
      • Blast-RADIUS Vulnerability
      • OCSP Soft-fail Consequences
      • Security & Privacy
    • REST API
      • External Monitoring
    • Changelog
  • Licensing
    • Azure Marketplace
  • Support & Service Level
  • RADIUSaaS Website
Powered by GitBook
On this page
  • Configuration steps
  • Common configuration issues

Was this helpful?

  1. Profile Deployment
  2. Microsoft Intune
  3. WiFi Profile

iOS/iPadOS & macOS

This guide is applicable for both scenarios: using user- or device-type certificates for WiFi authentication.

Last updated 3 months ago

Was this helpful?

Configuration steps

  1. Log in to

  2. Navigate to Devices and subsequently Configuration profiles

  3. Then click Create > New policy

  4. As Platform select iOS/iPadOS or macOS

  5. Search the Profile type templates for Wi-Fi and select it

  6. As Profile type select Wi-Fi

  7. Click Create and provide a descriptive name and optional Description

  8. As Wi-Fi type select Enterprise

  9. Enter your SSID. The Network name can assume the same name.

  10. Select the applicable Security type (iOS/iPadOS only)

  11. Then for EAP type choose EAP - TLS

  12. Next, as Certificate server names add the

    • Subject Alternative Name (SAN)

    • and Common Name (CN)

    of your active RADIUS Those properties can be found by expanding the active server certificate and copying the relevant values. Please consider, that the common name is case-sensitive.

  13. For the Root certificates for server validation select the Trusted certificate profile you have previously created for the RADIUS Server Certificate.

  14. Under Client Authentication select Certificates as Authentication method

  15. Finally, under Certificates select the SCEP profile you would like to use for authentication.

All other settings can be configured according to your own needs and preferences.

Common configuration issues

See .

Microsoft Intune
Server Certificate.
Troubleshooting
Showing iOS/iPad Wi-Fi Profile