Posted on 11-07-2019 12:50 PM
All of our school district owned iPads and Macs are joined to a secure WiFi network called VCSdistrict. We also have a WiFi network called VCSguest that needs no authentication to join. Personal devices are joined to VCSguest.
Is there any way to prevent users (staff and students) from taking a district owned iPad or Mac and joining VCSguest? We want to make sure that district owned devices remain on the secure VCSdistrict network
Posted on 11-07-2019 12:52 PM
If I'm not mistaken, you can do this in Configuration Profiles, where you can only allow connection to recognized Wi Fi networks.
Posted on 11-07-2019 12:53 PM
What section of config profiles?
Posted on 11-07-2019 12:59 PM
Looks like a Configuration Profile with a Network payload containing the correct Wi Fi network information, with Auto Join enabled, should do this.
Posted on 11-07-2019 01:12 PM
I think that will automatically have the iPad or Mac join the correct WiFi network, I do not think it will prevent the user from joining a different WiFi network
Posted on 11-07-2019 01:27 PM
You could use JAMF to pull a report for all School-owned airport MAC addresses and then have your networking team blacklist them from getting an IP on the "Guest" network, if that's something they're willing to do.
Posted on 11-07-2019 01:30 PM
That sounds like it would work but also sounds like a huge amount of work. I was hoping that there was some way within Jamf to do this
Posted on 11-07-2019 01:33 PM
Here's what I was looking for.
https://www.jamf.com/jamf-nation/feature-requests/4961/lock-ipad-to-ssid
This was, at least previously, possible.
Posted on 11-07-2019 01:39 PM
This will work with one big caveat that makes it a non-starter for us. I do want users to be able to join other wifi networks when the iPad or Mac is off campus. I just want the ability to restrict them from joining one particular wifi network when on campus
Posted on 11-07-2019 01:41 PM
Found it... so it's for-sure you'll be able to do this on iOS.
Posted on 11-07-2019 01:42 PM
If I uncheck this option and an iPad or Mac is taken off campus to a coffee shop with a wide open wifi network, I am thinking it will not be able to join it. Is that correct? That would be a problem
Posted on 11-07-2019 01:43 PM
Right. You might need a different solution, then. Sorry!
Posted on 11-07-2019 01:46 PM
One thing you can try. Deploy a profile with the SSID of the guest network, but with the WRONG password (in this case, ANY password).
Posted on 11-07-2019 01:51 PM
If I have already deployed a WiFi profile that works in joining the device to the proper secure wifi network, will the new wifi profile I push out just keep attempting to join my VCSguest wifi network over and over when of course it cannot since I have provided the incorrect password?
Posted on 11-07-2019 01:54 PM
I left out an important detail, uncheck the "auto join" with that guest network profile.
Posted on 11-07-2019 01:57 PM
You can have multiple profiles for multiple SSID payloads. In fact you should keep them separated for simplicity and troubleshooting.
Posted on 11-07-2019 04:16 PM
Have you considered getting the networks team (if you have such a thing) to look at it from the other side.
Why not have the WiFi network refuse (or divert to an information page) connections from a list of owned devices, you could probably generate the list (or have it pulled automatically) from JAMF if it didn't exist.
This would mean you didn't need to lock the devices down so people could still use them at home etc...