

- #MAC KEYCHAIN ACCESS ROOTS INSTALL#
- #MAC KEYCHAIN ACCESS ROOTS FULL#
- #MAC KEYCHAIN ACCESS ROOTS MAC#

If you don't have anything to create mobile profiles, you can request and issue the certs manually (see the Technet blog link above), but IMO it's well worth the $20 to do this all automatically.ġ.3 The client Macs will need to be bound to AD and able to reach the subordinate CA server while the profile is appliedĢ. You cannot go from top to bottom in Profile Manager!ġ.2 I used macOS Server to create this profile, but there are several different ways to create this. mobileconfig work, you have to do things in the order below. Right click - NewĢ.1.1 Type of network access server: UnspecifiedĢ.2.2 NAS Port type: Wireless: IEEE 802.11ģ.1 Add - Microsoft: Smart Card or other certificateģ.2 Select the EAP type you just added - click Editģ.2.1 Choose the certificate that represents your root CAĬreate a. (Installation of this feature not covered in this guide)Ģ. Subordinate CA - Certification Authority MMC - Server name - Certificate templatesĤ.1 Right click - new - Certificate template to issueĬreate NPS Policy to support EAP-TLS 1. In this case, it is "MacClientCertificate" without spaces. Take note of the Template name - you will need this later. Double click the template you just created (Mac Client Certificate, if you used the example). Click the Request Handling tab, and select Allow private key to be exported.Ģ.3 In the Subject Name tab, make sure this says "Build from this Active Directory information"Ģ.4 In the security tab, make sure that Domain Computers can read and enrollģ.
#MAC KEYCHAIN ACCESS ROOTS MAC#
In the Properties of New Template dialog box, on the General tab, enter a template name to generate the Mac client certificates, such as Mac Client Certificate.Ģ.2. Right click "Workstation Authentication" template - Duplicate templateĢ.1. Load the "Certificate templates" MMC on the subordinate CAĢ.
#MAC KEYCHAIN ACCESS ROOTS INSTALL#
On the subordinate CA open the Certification Authority MMCġ0.1 Right click server name - all tasks - install CA Certificateġ0.2 Right click - all tasks - start serviceĬonfigure Certificate Template 1.
#MAC KEYCHAIN ACCESS ROOTS FULL#
On the root CA, in the Certification Authority MMC snap-in, right click the server name - All tasks - submit new requestĩ.2 In the Pending Requests folder, right click - all tasks - issue.ĩ.3 In the Issued Certificates folder - open the newly issued cert and export it with full pathġ0. Copy the subordinate CA's request file from step 2.5.1 to the root CA.ĩ. Install the root CA cert - right click certificate from step 1.6.2 of this section and choose "Install certificate"ħ.1 Place the certificate in "Trusted Root Certification Authorities"Ĩ. Select "Certification Authority" and "Certification Authority Web Enrollment"ĥ.1 Store the certificate request locally. On a DIFFERENT server, do the following:Ĥ. Place this somewhere you'll be able to get to it when you set up the subordinate CA.Ĭreate enterprise subordinate CA 1. Right click the RootCA certificate - all tasks - export as. Add "Certification Authority" and "Certificates" for local computer accountħ.1 In Certification Authority, right click on "Revoked Certificates" - All tasks - publishħ.2 In Certificates, open Personal - Certificates. In Server 2012, once this completes, click the little flag in Server Manager and complete the configuration process for the CA.ħ. See screenshots in article linked above for more specific information.Ħ. Select "Active Directory Certificate Services"ĥ.

I did this step on the serer that was already running NPS.ģ. Some troubleshooting information I found useful here:īuild standalone root CA 1.mobileconfig to install on your Mac devices The steps below are cobbled together from the following places: If I had to make a guess, it sounds like you don't have the two-level CA set up correctly - you should need two certificates in your payload. I actually wrote down the whole process once I figured it out all of the instructions that I could find out there were for really old versions of OSX, or just weren't well fleshed out. I think I might be able to help! We actually went through a TON of work trying to get clients on our wireless network with WPA2-ENT, using machine (certificate) authentication.
