Hello everyone,
I've been working on getting 802.1x set up on our Macs using machine certificate authentication.
Currently, my configuration profile is set up such that all of the necessary domain certs are installed (CAs, and intermediate CAs) and trusted, an AD Certificate request is performed to get the machine certificate from the private CA, and a network payload is delivered specifying the SSID, WPA2 Enterprise as the authentication type, TLS as the protocol, and the machine AD Cert as the identity certificate.
If I leave the settings just like that and apply the configuration profile to a device, things work great for the most part. The user can connect to the wireless network by selecting it, specifying their device certificate for authentication, and confirming that they want to trust the certificate presented to them by the radius server.
This is the behavior that I would like to update. I don't trust the user to correctly identify and trust the certificate belonging to our radius server, and I don't want them sending their authentication attempt off to someone impersonating our SSID trying to MitM our network.
However, when I configure the trusted certificates setting on the configuration profile, things stop working. Under trusted certificates, I select our domain CA/intermediary certs, and I leave the allow trust exceptions box unchecked. This seems to be the exact thing that I want. But when deployed to a device, it is no longer able to connect, and the user is simply prompted over and over again to select their device certificate for authentication.
On a Microsoft forum I saw some people trying to achieve the same configuration I am saying that the only way they were able to get their policy to work is to leave all of the certificate trust settings blank, but I feel like that can't be right. Any thoughts on what may be going wrong here? It seems to me like the Mac for whatever reason is still not trusting the certificate presented to it by the radius server, even though it is issued by a CA in the trusted certificate settings, and a full chain of trust exists in the keychain.
Thanks for any help!
-Connor