LogoLogo
LogoLogo
  • Welcome
  • Details
  • Configuration
    • Getting Started
      • Generic Guide
      • Scenario-based Guides
        • Microsoft Cloud PKI
        • SCEPman PKI
    • Access Point Setup
      • RadSec
        • Aruba
        • FortiNet
        • Juniper Mist
        • Meraki
        • MikroTik
        • Ruckus
        • UniFi
      • RADIUS
        • ExtremeCloud IQ CoPilot
        • Meraki
        • Sophos UTM
        • UniFi
    • Server Certificate Renewal
  • Admin Portal
    • Home
    • Insights
      • Rule Engine
      • Logs
    • Users
    • Settings
      • Server Settings
      • Trusted Certificates
      • Proxy Settings
      • Permissions
      • User Settings
      • Rules
        • General Structure
        • WiFi
        • LAN
        • VPN
      • Log Exporter
        • Teams
        • Log Analytics
        • Generic Webhook
        • Examples
    • My Invited Users
  • Profile Deployment
    • Microsoft Intune
      • Server Trust
      • WiFi Profile
        • Windows
        • iOS/iPadOS & macOS
        • Android
      • Wired Profile
        • Windows
        • macOS
    • Jamf Pro
      • Server Trust
      • WiFi Profile
      • Wired Profile
    • Google Workspace
      • Server Trust
      • WiFi Profile
  • Other
    • Troubleshooting
    • FAQs
      • General
      • Log & Common Errors
      • MAC Authentication
      • Blast-RADIUS Vulnerability
      • OCSP Soft-fail Consequences
      • Security & Privacy
    • REST API
      • External Monitoring
    • Changelog
  • Licensing
    • Azure Marketplace
  • Support & Service Level
  • RADIUSaaS Website
Powered by GitBook
On this page

Was this helpful?

  1. Profile Deployment
  2. Microsoft Intune
  3. Wired Profile

macOS

Last updated 3 months ago

Was this helpful?

Configuration steps

  1. Log in to

  2. Navigate to Devices and subsequently Configuration profiles

  3. Then click Create > New policy

  4. As Platform select macOS

  5. Search the Profile type templates for Wired network and select it

  6. Click Create and provide a descriptive name and optional Description

  7. Choose your Network Interface

  8. As EAP type choose EAP - TLS

  9. Next, as Certificate server names add the

    • Subject Alternative Name (SAN)

    • and Common Name (CN)

    of your active RADIUS Those properties can be found by expanding the active server certificate and copying the relevant values. Please consider, that the common name is case-sensitive.

  1. For the Root certificates for server validation select the Trusted certificate profile you have previously created for the RADIUS Server Certificate.

  2. Finally, under Client Authentication select Certificates as Authentication method

Microsoft Intune
Server Certificate.
Showing wired network profile for macOS