Skip to main content
Question

802.1x AD login

  • October 31, 2016
  • 6 replies
  • 23 views

Forum|alt.badge.img+20

I have some iMacs that will need Wi-Fi AD login (no ethernet ports nearby). How do I go about this?

do i create a configuration profile --> network --> wi-fi

what other payloads will need to be configured ? will this just be 1 config profile?

6 replies

Forum|alt.badge.img+8

If you have a certificate based wifi network, then yes, you'd create a configuration profile. All you would need would be the specific certificates uploaded (you can pull them from Keychain Access) and the network payload to be configured for your SSID.


Forum|alt.badge.img+18
  • Contributor
  • October 31, 2016

The answer really will depend on your WiFi authentication setup.

We have system-level authentication, which means the system itself authenticates with wireless automatically on startup, so users just log in since the network is available. Our config profile includes the network setup and an AD certificate config for the system.

You can also set up a profile that uses the user's credentials to authenticate with wireless, if your network supports that.


Forum|alt.badge.img+20
  • Author
  • Contributor
  • October 31, 2016

I have it as level to apply profile as a computer level profile

what is that 'USE AS A LOGIN WINDOW CONFIGURATION' checkbox in the NETWORKS payload? do i Check that ?

do i check 'auto join' ?

so far i have the network payload with
- wifi
- ssid
- auto join ???
- wpa2 enterprise
- use as a login window authentication ??
- protocols = - trust =


Forum|alt.badge.img+8
  • Contributor
  • October 31, 2016

You'll need to insert your certs in the certificates tab

Then configure your network tab like this

That should give the users the ability to authenticate the computer to the wifi and then login.


Forum|alt.badge.img+20
  • Author
  • Contributor
  • October 31, 2016

@uaesembly what about the TRUST tab? anything get set in there ?

for the PROTOCOLS tab, only PEAP gets checked? no other values get entered such as username/password etc. ?


Forum|alt.badge.img+14
  • Honored Contributor
  • November 2, 2016

The protocols you use will depend on what the network is configure for. Ask your network admins