LogoLogo
LogoLogo
  • Welcome
  • Details
  • Configuration
    • Getting Started
      • Generic Guide
      • Scenario-based Guides
        • Microsoft Cloud PKI
        • SCEPman PKI
    • Access Point Setup
      • RadSec
        • Aruba
        • FortiNet
        • Juniper Mist
        • Meraki
        • MikroTik
        • Ruckus
        • UniFi
      • RADIUS
        • ExtremeCloud IQ CoPilot
        • Meraki
        • Sophos UTM
        • UniFi
    • Server Certificate Renewal
  • Admin Portal
    • Home
    • Insights
      • Rule Engine
      • Logs
    • Users
    • Settings
      • Server Settings
      • Trusted Certificates
      • Proxy Settings
      • Permissions
      • User Settings
      • Rules
        • General Structure
        • WiFi
        • LAN
        • VPN
      • Log Exporter
        • Teams
        • Log Analytics
        • Generic Webhook
        • Examples
    • My Invited Users
  • Profile Deployment
    • Microsoft Intune
      • Server Trust
      • WiFi Profile
        • Windows
        • iOS/iPadOS & macOS
        • Android
      • Wired Profile
        • Windows
        • macOS
    • Jamf Pro
      • Server Trust
      • WiFi Profile
      • Wired Profile
    • Google Workspace
      • Server Trust
      • WiFi Profile
  • Other
    • Troubleshooting
    • FAQs
      • General
      • Log & Common Errors
      • MAC Authentication
      • Blast-RADIUS Vulnerability
      • OCSP Soft-fail Consequences
      • Security & Privacy
    • REST API
      • External Monitoring
    • Changelog
  • Licensing
    • Azure Marketplace
  • Support & Service Level
  • RADIUSaaS Website
Powered by GitBook
On this page

Was this helpful?

  1. Profile Deployment
  2. Microsoft Intune
  3. Wired Profile

Windows

Last updated 4 months ago

Was this helpful?

Configurations steps

  1. Log in to

  2. Navigate to Devices and subsequently Configuration profiles

  3. Then click Create > New policy

  4. As Platform select Windows 10 and later

  5. Search the Profile type templates for Wired network and select it

  6. Click Create and provide a descriptive name and optional Description

  7. fill out the Configuration settings as it suits your environment

  8. Configure the Authentication Method to User if you want to use user-type certificates for authentication or Machine if you would like to use device-type certificates for authentication.

  9. Under 802.1X make sure, that Do not enforce is selected. This way your network adapter will continue to work in environments (e.g. home office), where 802.1X is not available.

  10. For EAP Type choose EAP-TLS

  11. Next, as Certificate server names add the

    • Subject Alternative Name (SAN)

    • and Common Name (CN)

    of your active RADIUS Those properties can be found by expanding the active server certificate and copying the relevant values. Please consider, that the common name is case-sensitive.

  12. For the Root certificates for server validation select the Trusted certificate profile you have previously created for the RADIUS Server Certificate.

  13. Under Client Authentication select SCEP certificate as Authentication method

  14. Finally, Client certificate for client authentication (Identity certificate) select the SCEP profile you would like to use for authentication.

All other settings can be configured according to your own needs and preferences.

Microsoft Intune
Server Certificate.
Showing wired profile