Posted on 06-11-2015 07:04 PM
Hey Guys,
We are implementing Wifi auth (Device) with TLS through Aerohive.
Has anyone out there configured auto enrolment of your OSX devices to your Enterprise PKI (Windows Server 2008 R2), eg so they all get their own unique device certificate installed in the local keychain?
All our machines are domain bound currently.
Cheers,
Solved! Go to Solution.
Posted on 06-12-2015 03:18 AM
We're already running this setup with Cisco infrastructure. There should be no difference in obtaining the certificates with an Aerohive infrastructure. Follow these guides, they will lead you in the right way :)
https://www.afp548.com/2012/11/20/802-1x-eaptls-machine-auth-mtlion-adcerts/
https://support.apple.com/HT5357
Posted on 06-12-2015 03:18 AM
We're already running this setup with Cisco infrastructure. There should be no difference in obtaining the certificates with an Aerohive infrastructure. Follow these guides, they will lead you in the right way :)
https://www.afp548.com/2012/11/20/802-1x-eaptls-machine-auth-mtlion-adcerts/
https://support.apple.com/HT5357
Posted on 06-14-2015 02:22 PM
Thanks, ill take a look at them.
Posted on 06-29-2015 07:45 AM
Can either of you elaborate on "Install the issuing CA or other CA certificate on the client to ensure that it has a complete trust chain. This installation can also be done using a profile." from step 2 of the section 'Profile Manager payload deployment' in the Apple KB article @m.entholzner linked?
I'm not dealing with wi-fi auth, but instead trying to install and configure the Cisco jabber client for our new VOIP phone deployment. The OS is prompting users to trust the certificates for the jabber servers, which were issued by our internal Windows PKI. I was assuming I needed to install the root certificate as trusted on the clients (perhaps like this but the Apple article says the issuing CA cert will be ok. It also mentions that the issuing CA cert can be installed via profile, but doesn't provide any details.
Thanks!
Eric
Posted on 06-29-2015 08:48 AM
Yes, if you only put in the CA's cert, that should work since it will be explicitly trusted. I put in the root as well, to make sure bases are covered for the future.
The OS will recognize the root cert is a root cert and treat it as such.
Posted on 06-29-2015 08:59 AM
@alexjdale Thanks for chiming in. Just to verify, you mean only putting in the Issuing CA, right? What method did you use to install the cert? If you used the command line like the linked DerFlounder article, did you use the "trustAsRoot" flag then?
When I export the cert from my Issuing CA, do I need the private key? What format?
Thanks!
Eric
Posted on 06-29-2015 09:30 AM
You can manually install certs with the security command, but nowadays we just put them into configuration profiles and they are handled appropriately. You do not need the private keys for CA or root certs, nor do I expect you will be able to get your hands on them.
The links in the post marked as an answer have the information, we more or less follow that same process. I keep my root and CA certs in a separate profile from my machine certs, though.
Since you just need the cert, just don't add a network payload. You will probably want to make sure that all apps can access the AD cert though, that is a checkbox in the profile.
Posted on 06-29-2015 11:35 AM
@alexjdale This is working beautifully for me, thank you! For other's future reference, here's what I did:
Thanks again!
Eric