{"id":542,"date":"2019-10-08T20:03:38","date_gmt":"2019-10-09T00:03:38","guid":{"rendered":"https:\/\/blog.mzimmerer.com\/?p=542"},"modified":"2019-10-08T20:04:03","modified_gmt":"2019-10-09T00:04:03","slug":"mac-apple-ios-devices-on-802-11x-with-nps","status":"publish","type":"post","link":"https:\/\/blog.mzimmerer.com\/?p=542","title":{"rendered":"Mac\/Apple iOS devices on 802.11x with NPS"},"content":{"rendered":"\n<p>I was having a conversation on reddit about setting up apple devices on certificate based 802.11x over a year ago and since then, I&#8217;ve received quite a few PM&#8217;s asking for details or instructions. I&#8217;ve been meaning to throw the internal instructions I wrote up into a sanitized blog post to start referring people to. Welp, this is it. Straight to the point and more like a how-to. This is assuming the NPS server is already up and running.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Windows Server NPS RADIUS certificate based authentication pre-reqs<\/h2>\n\n\n\n<p><strong>A Certificate Template for the Apple Devices has to be created.<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"686\" height=\"608\" src=\"https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/2019-10-08-18_38_23-Clipboard.png\" alt=\"\" class=\"wp-image-545\" srcset=\"https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/2019-10-08-18_38_23-Clipboard.png 686w, https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/2019-10-08-18_38_23-Clipboard-300x266.png 300w\" sizes=\"auto, (max-width: 686px) 100vw, 686px\" \/><\/figure>\n\n\n\n<p><strong>The most important setting here is that the Subject Name will be supplied in the request<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"814\" height=\"534\" src=\"https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/2019-10-08-18_39_26-Clipboard.png\" alt=\"\" class=\"wp-image-546\" srcset=\"https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/2019-10-08-18_39_26-Clipboard.png 814w, https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/2019-10-08-18_39_26-Clipboard-300x197.png 300w, https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/2019-10-08-18_39_26-Clipboard-768x504.png 768w\" sizes=\"auto, (max-width: 814px) 100vw, 814px\" \/><\/figure>\n\n\n\n<p><strong>When Apple Devices attempt to authenticate to 802.11x, they will use their Machine or Hostname but present it as an LDAP user. This is not something we can change. The setting above allows this action. In addition, that Machine or Hostname must be found in Active Directory. An OU can be created for these machines.<\/strong><\/p>\n\n\n\n<p><strong>In that OU, A USER Account must be created for each Apple Device and that user must be associated with the appropriate Certificate as well as have the same username as the devices hostname. This is detailed in the How-To instructions, but see example below.<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"762\" height=\"534\" src=\"https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/2019-10-08-18_41_22-Clipboard.png\" alt=\"\" class=\"wp-image-547\" srcset=\"https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/2019-10-08-18_41_22-Clipboard.png 762w, https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/2019-10-08-18_41_22-Clipboard-300x210.png 300w\" sizes=\"auto, (max-width: 762px) 100vw, 762px\" \/><\/figure>\n\n\n\n<p><strong>It&#8217;s a good idea to also create a Group Policy that prevents login from these accounts.<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How To<\/h2>\n\n\n\n<p><strong>To add an Apple Device to the wifi, first we need to\ncreate, sign, and export a Certificate.<\/strong><\/p>\n\n\n\n<p><strong>Run mmc.exe as Administrator on your workstation. Once\nopen, click File -&gt; Add Remove Snap-ins.<\/strong><\/p>\n\n\n\n<p><strong>Select Certificates from the list and specify Computer Account,<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"802\" height=\"598\" src=\"https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/2019-10-08-18_49_20-Clipboard.png\" alt=\"\" class=\"wp-image-548\" srcset=\"https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/2019-10-08-18_49_20-Clipboard.png 802w, https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/2019-10-08-18_49_20-Clipboard-300x224.png 300w, https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/2019-10-08-18_49_20-Clipboard-768x573.png 768w\" sizes=\"auto, (max-width: 802px) 100vw, 802px\" \/><\/figure>\n\n\n\n<p><strong>Click Next and select Local computer,<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"518\" height=\"218\" src=\"https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/2019-10-08-18_50_17-Clipboard.png\" alt=\"\" class=\"wp-image-549\" srcset=\"https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/2019-10-08-18_50_17-Clipboard.png 518w, https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/2019-10-08-18_50_17-Clipboard-300x126.png 300w\" sizes=\"auto, (max-width: 518px) 100vw, 518px\" \/><\/figure>\n\n\n\n<p><strong>Click Finish and then Click OK to close the Add or\nRemove Snap-ins Window.<\/strong><\/p>\n\n\n\n<p><strong>Expand Certificates (Local Computer), Then Personal.<\/strong><\/p>\n\n\n\n<p><strong>Right Click Certificates and select All Tasks and then Request New Certificate as seen below.<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"592\" height=\"316\" src=\"https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/2019-10-08-18_50_51-Clipboard.png\" alt=\"\" class=\"wp-image-550\" srcset=\"https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/2019-10-08-18_50_51-Clipboard.png 592w, https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/2019-10-08-18_50_51-Clipboard-300x160.png 300w\" sizes=\"auto, (max-width: 592px) 100vw, 592px\" \/><\/figure>\n\n\n\n<p><strong>Click next to skip the &#8220;Before you Begin&#8221; window and ensure on the next page, Active Directory Enrollment Policy is selected as seen below and select Next.<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"596\" height=\"211\" src=\"https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/Untitled-picture.png\" alt=\"\" class=\"wp-image-552\" srcset=\"https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/Untitled-picture.png 596w, https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/Untitled-picture-300x106.png 300w\" sizes=\"auto, (max-width: 596px) 100vw, 596px\" \/><\/figure>\n\n\n\n<p><strong>The next page will allow you select which type of Certificate you would like to request. We want the Apple Device Wifi Certificate. Follow the Prompt and click the Blue Alert to Configure settings.<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"475\" src=\"https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/Untitled-picture-1.png\" alt=\"\" class=\"wp-image-553\" srcset=\"https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/Untitled-picture-1.png 640w, https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/Untitled-picture-1-300x223.png 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/figure>\n\n\n\n<p><strong>The only bit that needs configured is that we need to Add a &#8220;Common Name&#8221;. This should match the Machine or Hostname of the target Apple Device. <\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"528\" height=\"535\" src=\"https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/Untitled-picture-2.png\" alt=\"\" class=\"wp-image-554\" srcset=\"https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/Untitled-picture-2.png 528w, https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/Untitled-picture-2-296x300.png 296w\" sizes=\"auto, (max-width: 528px) 100vw, 528px\" \/><\/figure>\n\n\n\n<p><strong>If you&#8217;re unsure of the hostname, open a terminal on the Apple device. Note that the hostname is displayed. To verify, use the hostname command to display the full name. We do not need the TLD, only the first bit of the response.<\/strong><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>Once complete and Properties window is closed, the Alert should be gone. Click the Checkbox for the Apple Device Wifi Certificate and click Enroll.<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"636\" height=\"438\" src=\"https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/Untitled-picture-3.png\" alt=\"\" class=\"wp-image-555\" srcset=\"https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/Untitled-picture-3.png 636w, https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/Untitled-picture-3-300x207.png 300w\" sizes=\"auto, (max-width: 636px) 100vw, 636px\" \/><\/figure>\n\n\n\n<p><strong>The response should be STATUS: Enrollment Pending<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"595\" height=\"163\" src=\"https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/Untitled-picture-4.png\" alt=\"\" class=\"wp-image-556\" srcset=\"https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/Untitled-picture-4.png 595w, https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/Untitled-picture-4-300x82.png 300w\" sizes=\"auto, (max-width: 595px) 100vw, 595px\" \/><\/figure>\n\n\n\n<p><strong>Navigate to the Certificate Authority Snap-in via MMC, or RDP to the server directly to access it.<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"213\" src=\"https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/2019-10-08-18_58_03-Clipboard-1024x213.png\" alt=\"\" class=\"wp-image-557\" srcset=\"https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/2019-10-08-18_58_03-Clipboard-1024x213.png 1024w, https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/2019-10-08-18_58_03-Clipboard-300x62.png 300w, https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/2019-10-08-18_58_03-Clipboard-768x160.png 768w, https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/2019-10-08-18_58_03-Clipboard.png 1356w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><strong>You will see the Certificate request that you\nsubmitted from your workstation. The Request Common Name should again, match\nthe hostname of the target Device.<\/strong><\/p>\n\n\n\n<p><strong>Right click the request and select, All Tasks -> Issue.<\/strong><\/p>\n\n\n\n<p><strong>Back to the local MMC, right click the Certificates root and navigate to All Tasks -> Automatically Enroll and Retrieve Certificates<\/strong><\/p>\n\n\n\n<p><strong>(If the Certificate Auto-Enrollment GPO is not applied to your workstation this does not work!)<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"732\" height=\"328\" src=\"https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/2019-10-08-18_59_46-Clipboard.png\" alt=\"\" class=\"wp-image-558\" srcset=\"https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/2019-10-08-18_59_46-Clipboard.png 732w, https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/2019-10-08-18_59_46-Clipboard-300x134.png 300w\" sizes=\"auto, (max-width: 732px) 100vw, 732px\" \/><\/figure>\n\n\n\n<p><strong>The Wizard will reflect how many Certificates are pending approval, ensure any or all are selected and click Enroll. The result should show Succeeded at the end of the Wizard<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"622\" height=\"439\" src=\"https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/Untitled-picture-5.png\" alt=\"\" class=\"wp-image-559\" srcset=\"https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/Untitled-picture-5.png 622w, https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/Untitled-picture-5-300x212.png 300w\" sizes=\"auto, (max-width: 622px) 100vw, 622px\" \/><\/figure>\n\n\n\n<p><strong>Note I had some test Certificates that I had denied. You should see no denials.<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"470\" src=\"https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/2019-10-08-19_01_38-Clipboard.png\" alt=\"\" class=\"wp-image-560\" srcset=\"https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/2019-10-08-19_01_38-Clipboard.png 640w, https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/2019-10-08-19_01_38-Clipboard-300x220.png 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/figure>\n\n\n\n<p><strong>With this complete we should now see the certificate in your Personal Certificate folder as seen below\u2026<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"754\" height=\"282\" src=\"https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/2019-10-08-19_02_33-Clipboard.png\" alt=\"\" class=\"wp-image-561\" srcset=\"https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/2019-10-08-19_02_33-Clipboard.png 754w, https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/2019-10-08-19_02_33-Clipboard-300x112.png 300w\" sizes=\"auto, (max-width: 754px) 100vw, 754px\" \/><\/figure>\n\n\n\n<p><strong>The Next step is to export the certificate. Right\nClick it, select All Tasks -&gt; Export\u2026<\/strong><\/p>\n\n\n\n<p><strong>The wizard will open.<\/strong><\/p>\n\n\n\n<p><strong>Do this twice. Once with exporting the private key, once without.<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"545\" height=\"526\" src=\"https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/Untitled-picture-6.png\" alt=\"\" class=\"wp-image-562\" srcset=\"https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/Untitled-picture-6.png 545w, https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/Untitled-picture-6-300x290.png 300w\" sizes=\"auto, (max-width: 545px) 100vw, 545px\" \/><\/figure>\n\n\n\n<p><strong>When exporting without the key, the format will be DER\nencoded binary or .CER<\/strong><\/p>\n\n\n\n<p><strong>When with the key, it should reflect what is below.<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"527\" height=\"491\" src=\"https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/Untitled-picture-7.png\" alt=\"\" class=\"wp-image-563\" srcset=\"https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/Untitled-picture-7.png 527w, https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/Untitled-picture-7-300x280.png 300w\" sizes=\"auto, (max-width: 527px) 100vw, 527px\" \/><\/figure>\n\n\n\n<p><strong>You must password protect the key. This password will be needed later when configuring the device!<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"533\" height=\"523\" src=\"https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/Untitled-picture-8.png\" alt=\"\" class=\"wp-image-564\" srcset=\"https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/Untitled-picture-8.png 533w, https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/Untitled-picture-8-300x294.png 300w\" sizes=\"auto, (max-width: 533px) 100vw, 533px\" \/><\/figure>\n\n\n\n<p><strong>When you save it, make sure you specify which has the Private Key included and which doesn&#8217;t.<\/strong><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>Before taking these Certificates to the target device,\nwe need to create and entry in AD and map the new certificate to that entry.<\/strong><\/p>\n\n\n\n<p><strong>Open Active Directory and navigate to the OU you created.<\/strong><\/p>\n\n\n\n<p><strong>Create a new USER within this OU.<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"468\" src=\"https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/2019-10-08-19_06_50-Clipboard-1024x468.png\" alt=\"\" class=\"wp-image-566\" srcset=\"https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/2019-10-08-19_06_50-Clipboard-1024x468.png 1024w, https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/2019-10-08-19_06_50-Clipboard-300x137.png 300w, https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/2019-10-08-19_06_50-Clipboard-768x351.png 768w, https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/2019-10-08-19_06_50-Clipboard.png 1050w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><strong>The user logon name must match the Apple Device Hostname.<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"436\" height=\"380\" src=\"https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/2019-10-08-19_07_32-Clipboard.png\" alt=\"\" class=\"wp-image-567\" srcset=\"https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/2019-10-08-19_07_32-Clipboard.png 436w, https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/2019-10-08-19_07_32-Clipboard-300x261.png 300w\" sizes=\"auto, (max-width: 436px) 100vw, 436px\" \/><\/figure>\n\n\n\n<p><strong>Generate a SECURE PASSWORD. There is no need to record\nthis information, in fact it should be disposed of.<\/strong><\/p>\n\n\n\n<p><strong>Set options as seen below.<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"440\" height=\"378\" src=\"https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/2019-10-08-19_56_32-Clipboard.png\" alt=\"\" class=\"wp-image-568\" srcset=\"https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/2019-10-08-19_56_32-Clipboard.png 440w, https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/2019-10-08-19_56_32-Clipboard-300x258.png 300w\" sizes=\"auto, (max-width: 440px) 100vw, 440px\" \/><\/figure>\n\n\n\n<p><strong>Proceed to finish the wizard.<\/strong><\/p>\n\n\n\n<p><strong>Select View and Advanced Features within AD\u2026<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"482\" height=\"304\" src=\"https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/2019-10-08-19_58_33-Clipboard.png\" alt=\"\" class=\"wp-image-569\" srcset=\"https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/2019-10-08-19_58_33-Clipboard.png 482w, https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/2019-10-08-19_58_33-Clipboard-300x189.png 300w\" sizes=\"auto, (max-width: 482px) 100vw, 482px\" \/><\/figure>\n\n\n\n<p><strong>Returning to the OU with the new user, Right Click the\nuser and select Name Mappings.<\/strong><\/p>\n\n\n\n<p><strong>Click Add and select the appropriate Certificate WITH\nOUT the Private Key.<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"972\" height=\"496\" src=\"https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/2019-10-08-19_59_44-Clipboard.png\" alt=\"\" class=\"wp-image-570\" srcset=\"https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/2019-10-08-19_59_44-Clipboard.png 972w, https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/2019-10-08-19_59_44-Clipboard-300x153.png 300w, https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/2019-10-08-19_59_44-Clipboard-768x392.png 768w\" sizes=\"auto, (max-width: 972px) 100vw, 972px\" \/><\/figure>\n\n\n\n<p><strong>Selecting the certificate and clicking OK will result in the following<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"428\" height=\"340\" src=\"https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/2019-10-08-20_01_00-Clipboard.png\" alt=\"\" class=\"wp-image-571\" srcset=\"https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/2019-10-08-20_01_00-Clipboard.png 428w, https:\/\/blog.mzimmerer.com\/wp-content\/uploads\/2019\/10\/2019-10-08-20_01_00-Clipboard-300x238.png 300w\" sizes=\"auto, (max-width: 428px) 100vw, 428px\" \/><\/figure>\n\n\n\n<p><strong>Click OK to proceed, then Apply and OK to complete the\ntask.<\/strong><\/p>\n\n\n\n<p><strong>Lastly, the new user should be added to a Security Group that prevents login or other network access.<\/strong><\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Wrap up<\/h2>\n\n\n\n<p>That&#8217;s about it. The last step is installing the certificate with the key to the client machine and configuring the network there. I&#8217;m not going to bother touching on that, I feel there&#8217;s plenty of resources on the web for installing an 802.11x cert on a mac once it&#8217;s created.<\/p>\n\n\n\n<p>I hope this helps, goodluck.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I was having a conversation on reddit about setting up apple devices on certificate based 802.11x over a year ago and since then, I&#8217;ve received quite a few PM&#8217;s asking for details or instructions. I&#8217;ve been meaning to throw the internal instructions I wrote up into a sanitized blog post&#8230;<\/p>\n<div class=\"more-link-wrapper\"><a class=\"more-link\" href=\"https:\/\/blog.mzimmerer.com\/?p=542\">Continue reading<span class=\"screen-reader-text\">Mac\/Apple iOS devices on 802.11x with NPS<\/span><\/a><\/div>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2,6,1],"tags":[],"class_list":["post-542","post","type-post","status-publish","format-standard","hentry","category-misc","category-networking","category-uncategorized","entry"],"_links":{"self":[{"href":"https:\/\/blog.mzimmerer.com\/index.php?rest_route=\/wp\/v2\/posts\/542","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.mzimmerer.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.mzimmerer.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.mzimmerer.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.mzimmerer.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=542"}],"version-history":[{"count":3,"href":"https:\/\/blog.mzimmerer.com\/index.php?rest_route=\/wp\/v2\/posts\/542\/revisions"}],"predecessor-version":[{"id":572,"href":"https:\/\/blog.mzimmerer.com\/index.php?rest_route=\/wp\/v2\/posts\/542\/revisions\/572"}],"wp:attachment":[{"href":"https:\/\/blog.mzimmerer.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=542"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.mzimmerer.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=542"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.mzimmerer.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=542"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}