# Windows

## Configuration steps

1. Log in to [Microsoft Intune](https://intune.microsoft.com/)
2. Navigate to **Devices** and subsequently **Configuration profiles**
3. Then click **Create > New policy**
4. As **Platform** select **Windows 10 and later**
5. Search the **Profile type** templates for **Wi-Fi** and select it
6. Click **Create** and provide a descriptive name and optional **Description**
7. As **Wi-Fi type** select **Enterprise**
8. Enter your **SSID**. The **Connection Name** can assume the same name.
9. Configure the **Authentication Method** to **User** if you want to use user-type certificates for authentication or **Machine** if you would like to use device-type certificates for authentication.
10. Then for **EAP type** choose **EAP - TLS**
11. Next, as **Certificate server names** add the **Subject Alternative Name (SAN)** of your *active* RADIUS [**Server Certificate**](https://docs.radiusaas.com/admin-portal/settings/settings-server#server-certificates). This property can be found by expanding the active server certificate and copying the relevant value.

<figure><img src="https://1222554226-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FSWU1DQ4UGkqER7uGNUOm%2Fuploads%2FWjCvT0AdgrbSCI1xV6Cb%2F2026-03-24_11h46_26.png?alt=media&#x26;token=d7253d1c-28c9-4907-9d4b-c050763490bc" alt=""><figcaption></figcaption></figure>

{% hint style="warning" %}
The Subject Alternative Name (SAN) is **case-insensitive** when used for hostname verification.
{% endhint %}

12. For the **Root certificates for server validation** select the Trusted certificate profile you have previously created for the RADIUS Server Certificate.
13. Under **Client Authentication** select **SCEP certificate as** **Authentication method**&#x20;
14. Finally for **Client certificate for client authentication (Identity certificate),** select the SCEP profile you would like to use for authentication.

    All other settings can be configured according to your own needs and preferences.

<figure><img src="https://1222554226-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FSWU1DQ4UGkqER7uGNUOm%2Fuploads%2FiT1T9N8KVs6lbNoK4fV7%2F2024-05-13_15h20_31.png?alt=media&#x26;token=7c7b78b2-52eb-4f31-b44c-47c58a102bcc" alt=""><figcaption><p>Showing Wi-Fi profile configuration 1/2</p></figcaption></figure>

<figure><img src="https://1222554226-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FSWU1DQ4UGkqER7uGNUOm%2Fuploads%2FWz6hpqW8NlcSIMhZDAIP%2Fimage.png?alt=media&#x26;token=2d704c20-63ff-496d-b7e3-f16b47b610f7" alt=""><figcaption></figcaption></figure>

### Fast roaming

{% hint style="info" %}
These are **optional** settings.
{% endhint %}

For a (usually) better experience when roaming between access points, we recommend enabling the following **Fast roaming settings** in the WiFi profile:

| **Enable pairwise master key (PMK) caching** | Yes | Defines whether Pairwise Master Key (PMK) caching is to be used by this profile to connect to a WLAN. |
| -------------------------------------------- | --- | ----------------------------------------------------------------------------------------------------- |
| **Maximum time a PMK is stored in cach**     | 720 | Defines the length of time, in minutes, that a Pairwise Master Key (PMK) cache will be kept.          |
| **Maximum number of PMK's stored in cache**  | 128 | Defines the number of entries in the Pairwise Master Key (PMK) cache on the client.                   |
| **Enable pre-authentication**                | Yes | Defines whether pre-authentication will be used by the client                                         |
| **Maximum pre-authentication attempts**      | 3   | Defines the number of pre-authentication attempts to try on neighboring access points (AP)            |

For further details on Pairwise Master Key caching, please refer to its specification in [IEEE 802.11i](https://standards.ieee.org/getieee802/download/802.11i-2004.pdf).

**Important**: The reliability and effectiveness of this feature may also depend on the specific implementation by the WAP vendor. In the same cases, customers with PMK caching enabled, have reported frequent access-point toggling although the device's location was static.

## Common configuration issues

See [Troubleshooting](https://docs.radiusaas.com/other/troubleshooting#intune-configuration-issues).
