Posted on 04-05-2016 12:30 AM
I am trying to reply a certificate for WPA2 enterprise PEAP Wifi Authentication with forced login to wifi window, so that it connects to wifi before the user logs in.
Through profile manager and through jamf I have always had a mixed result with its implementation
basically the certificate wouldn't get the permissions needed for authentication, and as a result reject the connection upon login.
Has anyone else had this problem, and resolved it? in the past I have had to manually fix the permissions, cause I'm still new and haven't picked up some of the basic scripting knowledge, but seeing its keychain I figure there probably isn't much that can be scripted with keychain.
Posted on 04-08-2016 01:50 PM
@Malcolm Can't necessarily help with the PEAP issue, but is EAP-TLS an option for you?
If you have an internal CA it might be worth a look.
We're using a config profile with an AD Certificate payload "Machine" certificate template and the Network payload is referencing the AD Cert being obtained with the same config profile. Haven't had any issues yet, and the machine connects at the login window as soon as Wi-Fi is powered on.
Posted on 04-08-2016 05:11 PM
@Malcolm I just did this. what I ended up doing was to manually connect a machine, then go to the keychain and get those certs. since I'm still on 9.65 I had to change the extension from .cer to .der ( known bug but was fixed in later releases). I then uploaded them to the profile in the JSS and pushed it out. @merps I envy you, I have been trying for the past few months to get machine authentication to work
Larry
Posted on 04-09-2016 10:27 AM
After having copied our certificates to a local temporary directory, we've had success using the following to establish trust for our root certificate:
/usr/bin/security add-trusted-cert -d -r trustRoot -k /Library/Keychains/System.keychain /local/path/to/rootCertificate.cer
For our internal non-root certificates, we use the following:
/usr/bin/security add-trusted-cert -d -r trustAsRoot -k /Library/Keychains/System.keychain /local/path/to/nonRootCertificate.cer