802.1x RADIUS cert renewal. (clearpass with JamfPro)

jules1987
New Contributor II

Hi everyone,

the first renewal of the radius cert is due in a month and I am not confident on how to do this without disconnecting all of our 250+ clients.

I believe I have perhaps made mistakes regarding best practices. However, I had no other choice since all certs and network payloads needed to be in one profile. The Jamf Profile used to deploy the 802.1x auth contains:

  • the RADIUS cert
  • the CA cert
  • the info about which cert template to use to issue a cert for any given machine
  • the wired and wireless network configuration settings with the certificates used to connect.

All certs are issued via the ADCS server to be able to renew automatically since MacOS and IOS would not be able to do this if done without it.

As far as I understood it, it had to be done this way, (all in one approach) to be able to select the cert to use for any given network connection that the conf-profile is controlling.

However, once I would re-redeploy this conf-profile, the clients would lose the connection before receiving the new config. Is it possible to deploy the renewed RADIUS certificate in a separate conf-profile? Then, however, I would not be able to select the cert in the WiFi and ethernet payload section... Any hints in the right direction are appreciated. If there is a better way to accomplish this.

 

with kind regards, Julian Niedzwetzki 

2 ACCEPTED SOLUTIONS

sdagley
Esteemed Contributor III

@jules1987 If you edit a previously deployed Configuration Profile and choose "Distribute to All" when saving it will simply update the profile on targeted devices, not do a remove then re-install.

View solution in original post

Three months ago, we updated our RADIUS certificate. During this process, we chose not to push the RADIUS certificate through Jamf because our WPA Enterprise setup uses Active Directory account credentials (rather than static accounts) for authentication.

With this setup, each user logs into Wi-Fi individually. After the RADIUS certificate change, Mac users encountered a pop-up upon connecting to Wi-Fi,
CPPM .png
prompting them to continue and enter their MacBook login password to reconnect to the internet. However, users connecting via LAN cable were unaffected and did not see any pop-up.
then after that you can schedule to delete the expired cppm cert manually in Keychain Access.

Note:
We inform via email what to do after changing the cert, so that users know the steps to take.
300+ User Mac
300+ User iPad

View solution in original post

15 REPLIES 15

sdagley
Esteemed Contributor III

@jules1987 If you edit a previously deployed Configuration Profile and choose "Distribute to All" when saving it will simply update the profile on targeted devices, not do a remove then re-install.

miniberry
New Contributor III

Thank you for this comment! Super helpful to clarify a question I've always worried about. Like editing a name in a config profile or removing something from the scope.

A related question: I have been trying to clean up some old wifi configuration profiles, but I was worried that editing and removing from scope would cause an issue with the newer wifi config profiles and cause them all to disconnect. 
For example, I have a few straggling devices in my old 2024 wifi profile which is scoped to "All Managed Clients". But they also have the 2025 wifi profile and have been happily connected. 
If I remove "All Managed Clients" from the 2024 profile, it should not disconnect them from wifi because they won't get confused between the profiles if one is removed, correct? 

sdagley
Esteemed Contributor III

@miniberry I would _hope_ that's the case, but I have never tried installing multiple Configuration Profiles with Wi-Fi configurations. You'll need to try un-scoping a test machine to observe the behavior.

miniberry
New Contributor III

Thank you! I will test and see.

jamiesmithJAX
Contributor

I put the new 802.1x cert into my existing profile ahead of when the networking team uploads the cert on their end and keep the existing cert in the profile as well.  Then when networking does their thing, the Macs will already have the new cert and they reconnect.  Just have to go back in a week or so and remove the expired cert from your profile

jules1987
New Contributor II

Thank all of you. Until now, I was under the impression that edited profiles would be remove-redeployed so I was thinking too complicated. I have been using JamfPro for over 8 years but somehow, I never understood this properly.

Three months ago, we updated our RADIUS certificate. During this process, we chose not to push the RADIUS certificate through Jamf because our WPA Enterprise setup uses Active Directory account credentials (rather than static accounts) for authentication.

With this setup, each user logs into Wi-Fi individually. After the RADIUS certificate change, Mac users encountered a pop-up upon connecting to Wi-Fi,
CPPM .png
prompting them to continue and enter their MacBook login password to reconnect to the internet. However, users connecting via LAN cable were unaffected and did not see any pop-up.
then after that you can schedule to delete the expired cppm cert manually in Keychain Access.

Note:
We inform via email what to do after changing the cert, so that users know the steps to take.
300+ User Mac
300+ User iPad

Thank you for your input. Yes, I have to do this as well, as most of our users are Gr.6 to Gr 12 students, and they are BYOD. So we have no control over them whatsoever. We will send an email to all of them, and the teachers. I figure a fair number of them will read and forget or not read the mail. But that's part of the business.

ferriterj1
New Contributor III

Sorry to reopen this, but did this end up working out for you? I'm currently running into the same issue where I'm going to need to update my Cisco ISE radius certs that are in my device WiFi configuration profiles for Macs and iPads and am looking for the best way to do so. 

@jules1987 did you end up just updating the profile and then deploying it back out to everyone to update it?

Hey, @ferriterj1  

yes it worked by just updating for me. I just added the new cert to the existing mobile device conf profile, and deployed it to all (rather than to newly assigned only) It effectively updated the profile with the new setting.

ferriterj1
New Contributor III

Thank you so much! It's not every day that you find someone to have the same issue and then an easy solution to it. This takes a load of my mind haha! 

miniberry
New Contributor III

To follow up on this, I'm curious. So did you upload the new wifi cert in the existing wifi profile that had the old cert, and then applied the profile to all, and they connected fine?

ferriterj1
New Contributor III

Yes, I went ahead and exported the cert from my Cisco ISE server and uploaded it to the profile. Since we had about three weeks before the old cert expired, I left the "about to expire" certs in the profile. Then, I saved the config and did the unthinkable of "apply to all". 

I wanted to get the new certs out to as many devices as possible before I had to switch Cisco ISE to the new certificate. But, they needed to stay connected so for now, so that's the reason for leaving the old certs.

I will say that 99.9% of devices stayed connected and the profile just updated. There were a couple of hiccups on a handful of devices, but since our device pool is around 7000, I'd take that any day!

When it came time to swap ISE to the new cert, I went ahead and removed the old certs from the profile and just did a "apply to newly assigned". I didn't want to press my luck with two "apply to all" even though I'm sure it would have worked fine. The old expired certs don't harm anything anyway.

 

Long story short, yes, upload your new radius certificate to your existing WiFi configuration profile and apply it to all devices when saving. No need to create a new configuration profile from my experience!

miniberry
New Contributor III

Oh.my.goodness! Thank you so much for the response! I think we may try this method and see if it works for us too. I have a much smaller environment (~700 Macs) but our process was different and this seems a lot more seamless.

miniberry
New Contributor III

I just came across this post and now I'm getting excited to hear there's possibly an easy solution! 🙌
Whenever we renew our wifi cert, we always went through a process of creating a new config profile for the new cert and doing a shuffle between the old to the new with different smart groups. So what I'm understanding is that we can just add the cert to the current profile and re-apply, and it will not disconnect all our users and cause them issues re-connecting? 
Does this work when it applies per device not per user?