siteadmin:freeradius_certificate_tls_authentication
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| siteadmin:freeradius_certificate_tls_authentication [2021/05/07 07:55] – admin | siteadmin:freeradius_certificate_tls_authentication [2021/05/07 08:11] (current) – [Apple MacOS configuration] admin | ||
|---|---|---|---|
| Line 29: | Line 29: | ||
| The ca_file is actually used to authenticate the clients in the same way as above. When the client sends the certificate the server uses the Root CA to prove that the client is derived from the PKI. | The ca_file is actually used to authenticate the clients in the same way as above. When the client sends the certificate the server uses the Root CA to prove that the client is derived from the PKI. | ||
| + | |||
| + | =====eapol_test configuration===== | ||
| + | |||
| + | Using eapol_test is the easiest and most reliable way to test EAP-TLS | ||
| + | |||
| + | < | ||
| + | network={ | ||
| + | ssid=" | ||
| + | key_mgmt=WPA-EAP | ||
| + | eap=TLS | ||
| + | identity="< | ||
| + | ca_cert="< | ||
| + | client_cert="< | ||
| + | private_key="< | ||
| + | eapol_flags=3 | ||
| + | } | ||
| + | </ | ||
| + | |||
| + | =====Apple MacOS configuration===== | ||
| + | |||
| + | ProfileCreator and the CAT aren't good enough to generate suitable mobileconfig files. ProfileCreator doesn' | ||
| + | |||
| + | The only way appears to be to use Apple Configurator 2. | ||
| + | |||
| + | Create a profile that contains the client certificate, | ||
| + | |||
| + | {{: | ||
| + | |||
| + | {{: | ||
siteadmin/freeradius_certificate_tls_authentication.1620374149.txt.gz · Last modified: 2021/05/07 07:55 by admin
