Hi everyone :)
I'm currently testing Jamf ADCS within my environment.
Our Mac's are NOT bound to AD and I would like to use ADCS for certbased Wifi connections.
Btw: I'm using a Microsoft PKI/CA environment which we used to have for a while now and which I also use for our Windows Clients.
So the ADCS is working as expected and I've created a "Certificate"-Payload profile.
SAN = UPN = "$USERNAME"
Wifi Authentication also works fine - Just awesome.
I've now created another local user on my machine and named it like the CEO of my company. My Mac did now receive a certificate in the name of my CEO. With this Certificate I'm not only able to login against Wifi (Which works) but also into a few other systems which allow cert authentication.
We do use NPS for Wifi authentication and there does not seem to be any way except using the Username/UPN within the SAN in order to authenticate against the NPS?!
(Since the Macs aren't bound to the AD of course).
From my current point of view, this is definitely not how it should work and I really do hope, that I'm missing something here on my side.
Another very critical thing for me: I'm able to export the certificates with the Private key and I also don't see any way to block this. Except of course if the Mac's are bound to AD.
Please help :D
Thanks in advance ;)
