<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Meraki - RADIUS (NPS) Auth - AAD Devices &amp; Certificates in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/meraki-radius-nps-auth-aad-devices-certificates/m-p/5508241#M303613</link>
    <description>&lt;P&gt;I actually had a blazing row with MS support cos they were like "oh you need to do this, this and this" but missing vital steps on actually HOW you do those things along the way. &lt;/P&gt;</description>
    <pubDate>Mon, 24 Aug 2020 13:31:29 GMT</pubDate>
    <dc:creator>Gmorrallee</dc:creator>
    <dc:date>2020-08-24T13:31:29Z</dc:date>
    <item>
      <title>Meraki - RADIUS (NPS) Auth - AAD Devices &amp; Certificates</title>
      <link>https://community.cisco.com/t5/wireless/meraki-radius-nps-auth-aad-devices-certificates/m-p/5508235#M303607</link>
      <description>&lt;P&gt;Hi all. &lt;/P&gt;&lt;P&gt;We've taken on a new client to roll out a bunch of Azure AD joined clients to the users. As part of this they will need to use their Meraki WiFi solution.&lt;BR /&gt;&lt;BR /&gt;The Meraki is currently configured to use Radius on a  Windows 2019 Server with NPS installed. There is an on premise AD which is synced down to Azure AD. The Radius server is currently configured to use the on premise Domain Users group for authentication. However to prevent personal devices being joined to the WiFi network using their AD creds the client wishes to use certficates to authenticate instead. &lt;BR /&gt;&lt;BR /&gt;We have an internal CA and the root certificate is installed on all clients via InTune. &lt;BR /&gt;&lt;BR /&gt;It seems the we potentially need to deploy PKCS certificates via InTune and leverage the InTune Certificate Connector to sit betweeen the CA and InTune. &lt;BR /&gt;&lt;BR /&gt;However the part of this I'm struggling with and can't seem to find any information on is the actual connection between the certificates deployed via InTune and the Certificate Connector and the Radius Server authentication. &lt;BR /&gt;&lt;BR /&gt;So basically we can get certificates to the clients but how does the Radius server know to authenticate them?&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Any thoughts?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 19 May 2020 12:00:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/meraki-radius-nps-auth-aad-devices-certificates/m-p/5508235#M303607</guid>
      <dc:creator>Gmorrallee</dc:creator>
      <dc:date>2020-05-19T12:00:48Z</dc:date>
    </item>
    <item>
      <title>Re: Meraki - RADIUS (NPS) Auth - AAD Devices &amp; Certificates</title>
      <link>https://community.cisco.com/t5/wireless/meraki-radius-nps-auth-aad-devices-certificates/m-p/5508236#M303608</link>
      <description>&lt;P&gt;I'm no expert on the matter but the basics things I know:&lt;BR /&gt;&lt;BR /&gt;1) Your clients will be configured through intune with the SSID to connect to using WPA2-Enterprise and EAP-TLS and the correct certificate to use.  Also if it's using machine or user auth or both depending on login screen or logged in.&lt;BR /&gt;&lt;BR /&gt;2) When the client connects the AP will transmit the radius attributes service-type:framed (for dot1x) and a called-station-id which contains SSID and AP MAC address.  The client will also transmit it wants to do EAP-TLS.&lt;BR /&gt;&lt;BR /&gt;3) The NPS server would have been configured with:&lt;BR /&gt;A list of IP's or radius clients (the AP's) or a subnet where the AP's live&lt;BR /&gt;The policy where it matches on service-type framed and called-station-id containing the SSID, and EAP-TLS as auth method.&lt;BR /&gt;The fields to look at in the certificate mostly common name and the attributes containing the AD group.&lt;BR /&gt;&lt;BR /&gt;4) NPS sends it's cert to the client which is signed by the same CA, so the client trusts the NPS server&lt;BR /&gt;5) The client sets up the TLS connection and sends it cert over it containing all necessary fields&lt;BR /&gt;6) NPS evaluates and sends access-accept with attributes or access-reject if something is wrong&lt;BR /&gt;&lt;BR /&gt;If I'm mistaken somewhere, please correct me &lt;SPAN class="lia-unicode-emoji" title=":winking_face:"&gt;&lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 19 May 2020 18:50:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/meraki-radius-nps-auth-aad-devices-certificates/m-p/5508236#M303608</guid>
      <dc:creator>joey.debra</dc:creator>
      <dc:date>2020-05-19T18:50:06Z</dc:date>
    </item>
    <item>
      <title>Re: Meraki - RADIUS (NPS) Auth - AAD Devices &amp; Certificates</title>
      <link>https://community.cisco.com/t5/wireless/meraki-radius-nps-auth-aad-devices-certificates/m-p/5508237#M303609</link>
      <description>&lt;P&gt;Be prepared for a lot of work.  Microsoft has made the configuration you describe really hard.&lt;/P&gt;&lt;P&gt;You'll need to configure Intune to issue certificates from the on-premise CA server using SCEP/NDES.  These certificates are authenticated against the user in AD (they have the username embedded in the certificate).&lt;/P&gt;&lt;P&gt;When the user connects to WiFi and presents their certificate RADIUS extracts out the username and then continues to process as normal.&lt;/P&gt;&lt;P&gt;This is a lot of work to deploy and get working.  I'm waiting for Trusted Access to add support for Windows 10 so I can forget this nightmare.&lt;/P&gt;&lt;P&gt;&lt;A href="https://documentation.meraki.com/zGeneral_Administration/Cross-Platform_Content/Trusted_Access_for_Secure_Wireless_Connectivity" target="_self" rel="nofollow noopener noreferrer"&gt;https://documentation.meraki.com/zGeneral_Administration/Cross-Platform_Content/Trusted_Access_for_Secure_Wireless_Connectivity&lt;/A&gt; &lt;/P&gt;&lt;P&gt;Actually, I think you could do this via Meraki Systems Manager (which you would have to buy).  You can only enrol a Windows 10 machine in one MDM at a time - and you have already enrolled in Intune - but I think if you used Intune to deploy the Meraki Systems Manager agent you could then use the Meraki Agent to deploy Meraki certificates onto the machines for authentication, all automated.  It would also configure the WiFi settings on the machine.&lt;/P&gt;&lt;P&gt;&lt;A href="https://documentation.meraki.com/zGeneral_Administration/Cross-Platform_Content/Configuring_EAP-TLS_Wireless_Authentication_with_Systems_Manager_Sentry_Wifi" target="_self" rel="nofollow noopener noreferrer"&gt;https://documentation.meraki.com/zGeneral_Administration/Cross-Platform_Content/Configuring_EAP-TLS_Wireless_Authentication_with_Systems_Manager_Sentry_Wifi&lt;/A&gt; &lt;/P&gt;&lt;P&gt;I'd be tempted by this approach because the Microsoft method is such a lot of work.&lt;/P&gt;</description>
      <pubDate>Wed, 20 May 2020 16:45:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/meraki-radius-nps-auth-aad-devices-certificates/m-p/5508237#M303609</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2020-05-20T16:45:05Z</dc:date>
    </item>
    <item>
      <title>Re: Meraki - RADIUS (NPS) Auth - AAD Devices &amp; Certificates</title>
      <link>https://community.cisco.com/t5/wireless/meraki-radius-nps-auth-aad-devices-certificates/m-p/5508238#M303610</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;To deploy user and device certificates you can deploy PKCS certificates. This is easy to do. What you need is to download the PKCS certificate connector. You can find it when you go to the intune portal and Device configuration | Certificate connectors. Click on Add and download the PKCS certificate connector.&lt;/P&gt;&lt;P&gt;Go to an on-prem server which is in the same domain as the internal CA server. Don't worry, connection with the certificate connector will be as save encrypted tunnel so no complex firewall settings or other things to worry about.&lt;/P&gt;&lt;P&gt;Install the certificate connector and only PKCS have to be installed. If SCEP is applicable you can choose for PKCS ans SCEP during the setup steps of the connector.&lt;/P&gt;&lt;P&gt;After installing start the connector. If starting the app later, run the connector as admin.&lt;/P&gt;&lt;P&gt;Make sure you have a Azure global admin with an Intune (EM+S) license activated. If not do so but it will take some time before this is active, at least 15 min.&lt;/P&gt;&lt;P&gt;In the certificate connector login with the Azure Global Admin, and you are finished. You can see in Intune a green check that the connector is up and running.&lt;/P&gt;&lt;P&gt;Next is to create a certificate connector which has the correct certificate requirements. For Intune I believe you have 2 requirements to make sure you can enroll the certificate and that is under Subject Name: Supply in the request, and at permissions, add the server which has the certificate connector installed the read and enroll certificate permissions. I think that is it but be sure to look online for advise when deploying the certificates with Intune.&lt;/P&gt;&lt;P&gt;I used this method for always on vpn configurations and WPA2 Enterprise PEAP Wifi Configurations based on user certificates.&lt;/P&gt;&lt;P&gt;Hopefully this helps.&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jul 2020 20:00:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/meraki-radius-nps-auth-aad-devices-certificates/m-p/5508238#M303610</guid>
      <dc:creator>RonaldB1</dc:creator>
      <dc:date>2020-07-06T20:00:03Z</dc:date>
    </item>
    <item>
      <title>Re: Meraki - RADIUS (NPS) Auth - AAD Devices &amp; Certificates</title>
      <link>https://community.cisco.com/t5/wireless/meraki-radius-nps-auth-aad-devices-certificates/m-p/5508239#M303611</link>
      <description>&lt;P&gt;Did you ever work this out? I can't believe such a simple part of the puzzle isnt really in any documentation anywhere- how do you configure Microsoft's NPS server to use these cloud SCEP certs for authentication? How do we add an external cert to the trusted lists within the NPS settings.    I dont really see any of these replies succinctly giving you this answer. &lt;/P&gt;</description>
      <pubDate>Mon, 24 Aug 2020 13:23:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/meraki-radius-nps-auth-aad-devices-certificates/m-p/5508239#M303611</guid>
      <dc:creator>Chabs</dc:creator>
      <dc:date>2020-08-24T13:23:21Z</dc:date>
    </item>
    <item>
      <title>Re: Meraki - RADIUS (NPS) Auth - AAD Devices &amp; Certificates</title>
      <link>https://community.cisco.com/t5/wireless/meraki-radius-nps-auth-aad-devices-certificates/m-p/5508240#M303612</link>
      <description>&lt;P&gt;Not yet - we seem to get loads of different parts of the puzzle but have not yet been able to complete it. &lt;BR /&gt;&lt;BR /&gt;We've been engaged with MS support for several months and still haven't got it resolved. We've got a field services engineer helping out now but between either or him cancelling we've still not got anywhere. &lt;BR /&gt;&lt;BR /&gt;Apparently it's seemingly impossible find any sort of documentation to explain this from the ground up and work through it step by step.... (i.e. what sort of certificate, what settings do we need in InTune, on the NPS box etc)&lt;BR /&gt;&lt;BR /&gt;Hopefully when we finally get our field service tech involved next week we might finally get there. &lt;/P&gt;</description>
      <pubDate>Mon, 24 Aug 2020 13:29:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/meraki-radius-nps-auth-aad-devices-certificates/m-p/5508240#M303612</guid>
      <dc:creator>Gmorrallee</dc:creator>
      <dc:date>2020-08-24T13:29:33Z</dc:date>
    </item>
    <item>
      <title>Re: Meraki - RADIUS (NPS) Auth - AAD Devices &amp; Certificates</title>
      <link>https://community.cisco.com/t5/wireless/meraki-radius-nps-auth-aad-devices-certificates/m-p/5508241#M303613</link>
      <description>&lt;P&gt;I actually had a blazing row with MS support cos they were like "oh you need to do this, this and this" but missing vital steps on actually HOW you do those things along the way. &lt;/P&gt;</description>
      <pubDate>Mon, 24 Aug 2020 13:31:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/meraki-radius-nps-auth-aad-devices-certificates/m-p/5508241#M303613</guid>
      <dc:creator>Gmorrallee</dc:creator>
      <dc:date>2020-08-24T13:31:29Z</dc:date>
    </item>
    <item>
      <title>Re: Meraki - RADIUS (NPS) Auth - AAD Devices &amp; Certificates</title>
      <link>https://community.cisco.com/t5/wireless/meraki-radius-nps-auth-aad-devices-certificates/m-p/5508242#M303614</link>
      <description>&lt;P&gt;Ugh dealing with Microsoft support, there goes weeks of going round in circles. &lt;/P&gt;&lt;P&gt;Sounds like our Infrastructure is exactly the same as yours. &lt;BR /&gt;I am thinking to just try importing the cloud SCEP cert (in our case SCEPMan cert) in to the Radius server Trusted Root Certificates. Then there seems to be an option to add additional certs in the Microsoft NPS settings. (currently its using the PKI cert assigned to the RADIUS server) &lt;/P&gt;&lt;P&gt;Playing with this risks breaking our current wifi and RADIUS servers though. &lt;/P&gt;&lt;P&gt;I'm currently talking to Glueck Kanja who have been very helpful - I'll let you know if we get anywhere. &lt;/P&gt;&lt;P&gt;Thanks again! &lt;/P&gt;</description>
      <pubDate>Mon, 24 Aug 2020 13:49:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/meraki-radius-nps-auth-aad-devices-certificates/m-p/5508242#M303614</guid>
      <dc:creator>Chabs</dc:creator>
      <dc:date>2020-08-24T13:49:21Z</dc:date>
    </item>
    <item>
      <title>Re: Meraki - RADIUS (NPS) Auth - AAD Devices &amp; Certificates</title>
      <link>https://community.cisco.com/t5/wireless/meraki-radius-nps-auth-aad-devices-certificates/m-p/5508243#M303615</link>
      <description>&lt;P&gt;I am trying to achieve the exact same thing in our organization. Thus far my efforts have not been fruitful. I will post an update if I happen to get it working.&lt;/P&gt;&lt;P&gt;The advice given here thus far has been a huge help.&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Mon, 31 Aug 2020 12:19:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/meraki-radius-nps-auth-aad-devices-certificates/m-p/5508243#M303615</guid>
      <dc:creator>kschutte</dc:creator>
      <dc:date>2020-08-31T12:19:03Z</dc:date>
    </item>
    <item>
      <title>Re: Meraki - RADIUS (NPS) Auth - AAD Devices &amp; Certificates</title>
      <link>https://community.cisco.com/t5/wireless/meraki-radius-nps-auth-aad-devices-certificates/m-p/5508244#M303616</link>
      <description>&lt;P&gt;I used the following to set this up.&lt;/P&gt;&lt;P&gt;I have AP-deployed, Intune-enrolled W10 devices, enrolling device/user certs from on-prem CA via SCEP and the NDES connector as part of ESP, as described in this article, using an Intune-deployed WIFI profile, connecting to Meraki wifi network, auth'ing against NPS using PEAP-TLS.&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.jeffgilb.com/ndes-for-intune/" target="_blank" rel="nofollow noopener noreferrer"&gt;https://www.jeffgilb.com/ndes-for-intune/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Only real issue for us is the lack of device-based certificate auth, simply because with AAD-joined devices there are no computer account objects in on-prem AD to add to an AD group used in an NPS condition.  So yes on full-AAD joined devices we have to use User certs, so available post-logon.  If you require device-based certs enabling pre-user-logon auth to the WiFi network, you will prob need to use hybrid AAD join, so you get the computer account on-prem which you can add to a group and use in NPS.&lt;/P&gt;&lt;P&gt;Looks like a lot of work, but it isn't really.  If you already have on-prem AD, on-prem enterprise CA, an Azure tenant, familiarity with AAD Applications/Enterprise Applications, it's not a big deal.  Took a couple of hours.  Good luck &lt;SPAN class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;&lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Sep 2020 15:01:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/meraki-radius-nps-auth-aad-devices-certificates/m-p/5508244#M303616</guid>
      <dc:creator>cockneymanc</dc:creator>
      <dc:date>2020-09-02T15:01:32Z</dc:date>
    </item>
    <item>
      <title>Re: Meraki - RADIUS (NPS) Auth - AAD Devices &amp; Certificates</title>
      <link>https://community.cisco.com/t5/wireless/meraki-radius-nps-auth-aad-devices-certificates/m-p/5508245#M303617</link>
      <description>&lt;P&gt;Unfortunately your post is pointless!  Everyone already knows how to get user certs to work on inTune devices.&lt;/P&gt;&lt;P&gt;The whole point of the issue is trying to have Intune only devices connect with device certs - so connected before user logins. We obviously don't want to join these in a hybrid manner on prem, we're rolling off on prem, these devices are NON DOMAIN JOINED/non hybrid joined. Not in Active Directory, only AAD. Thank you though! &lt;/P&gt;</description>
      <pubDate>Wed, 02 Sep 2020 23:44:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/meraki-radius-nps-auth-aad-devices-certificates/m-p/5508245#M303617</guid>
      <dc:creator>Chabs</dc:creator>
      <dc:date>2020-09-02T23:44:22Z</dc:date>
    </item>
    <item>
      <title>Re: Meraki - RADIUS (NPS) Auth - AAD Devices &amp; Certificates</title>
      <link>https://community.cisco.com/t5/wireless/meraki-radius-nps-auth-aad-devices-certificates/m-p/5508246#M303618</link>
      <description>&lt;P&gt;Sorry for my pointless post.&lt;/P&gt;&lt;P&gt;More pointless than PhilipDAth's (great) post:&lt;/P&gt;&lt;P&gt;&lt;FONT color="#0000FF"&gt;&lt;EM&gt;"You'll need to configure Intune to issue certificates from the on-premise CA server using SCEP/NDES.  These certificates are authenticated against the user in AD (they have the username embedded in the certificate)...&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#0000FF"&gt;&lt;EM&gt;...When the user connects to WiFi and presents their certificate RADIUS extracts out the username and then continues to process as normal."&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;(User certs)&lt;/P&gt;&lt;P&gt;More pointless than RonaldBs (very useful) post:&lt;/P&gt;&lt;P&gt;&lt;FONT color="#0000FF"&gt;&lt;EM&gt;"I used this method for always on vpn configurations and WPA2 Enterprise PEAP Wifi Configurations based on user certificates."&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;(User certs)&lt;/P&gt;&lt;P&gt;OP makes no reference to only using device certs.  Are user certs not a valid approach to his desire to prevent his staff connecting personal devices to his Meraki Wifi?&lt;/P&gt;&lt;P&gt;OP says in various replies:&lt;/P&gt;&lt;P&gt;&lt;FONT color="#0000FF"&gt;&lt;EM&gt;"Apparently it's seemingly impossible find any sort of documentation to explain this from the ground up and work through it step by step.... (i.e. what sort of certificate, what settings do we need in InTune, on the NPS box etc)"&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;and:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#0000FF"&gt;&lt;EM&gt;"I actually had a blazing row with MS support cos they were like "oh you need to do this, this and this" but missing vital steps on actually HOW you do those things along the way."&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Chabs says:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#0000FF"&gt;&lt;EM&gt;"Did you ever work this out? I can't believe such a simple part of the puzzle isnt really in any documentation anywhere- how do you configure Microsoft's NPS server to use these cloud SCEP certs for authentication?"&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;No mention of device certs anywhere?  My psychic powers are letting me down again (i have a similar problem with the wife.......)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;So i was trying to be helpful by providing a link to a blog by an Azure senior PFE containing step-by-step instructions on how to set this up, that i know to work as i used it myself when first setting this up.  Yes, it is user-based certs.&lt;/P&gt;&lt;P&gt;RE: device certs, as i think you already know, you are unlikely to get native NPS doing cert auth for non-domain-joined devices.  It is from an era where this requirement was inconceivable and the on-prem domain is the security boundary etc.  I'm sure every guide you have googled starts with 'Create an AD account and....' or 'From a domain-joined machine...'.  Having Meraki auth against a 3rd party RADIUS solution may do the job though, or something like PhilipDAth's nifty idea with Systems Manager agent.&lt;/P&gt;&lt;P&gt;Microsoft's new Always-On VPN (replacing Direct Access) will do machine-based vpn tunnel initialisation, pre-logon, but - unsurprisingly - requires hybrid join so the computer object exists on-prem, for the cert auth to work.  So i think this is also suggestive of the idea you can't do device-based cert auth on a non-hybrid device, using only Microsoft stack.&lt;/P&gt;&lt;P&gt;Good luck with it.  It will be interesting to see what solutions appear.  No doubt an AAD service will appear at some point to provide this sort of facility and 'bridge the gap'.  AAD/Intune/MDM is still in it's infancy really.&lt;/P&gt;&lt;P&gt;CM&lt;/P&gt;</description>
      <pubDate>Thu, 03 Sep 2020 09:21:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/meraki-radius-nps-auth-aad-devices-certificates/m-p/5508246#M303618</guid>
      <dc:creator>cockneymanc</dc:creator>
      <dc:date>2020-09-03T09:21:36Z</dc:date>
    </item>
    <item>
      <title>Re: Meraki - RADIUS (NPS) Auth - AAD Devices &amp; Certificates</title>
      <link>https://community.cisco.com/t5/wireless/meraki-radius-nps-auth-aad-devices-certificates/m-p/5508247#M303619</link>
      <description>&lt;P&gt;Thank you, gosh yes ignore my strong wording in hindsight. Thanks for your well thought out responses!&lt;/P&gt;</description>
      <pubDate>Thu, 03 Sep 2020 11:41:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/meraki-radius-nps-auth-aad-devices-certificates/m-p/5508247#M303619</guid>
      <dc:creator>Chabs</dc:creator>
      <dc:date>2020-09-03T11:41:41Z</dc:date>
    </item>
    <item>
      <title>Re: Meraki - RADIUS (NPS) Auth - AAD Devices &amp; Certificates</title>
      <link>https://community.cisco.com/t5/wireless/meraki-radius-nps-auth-aad-devices-certificates/m-p/5508248#M303620</link>
      <description>&lt;P&gt;All good my friend.  We're all on the same team with this stuff &lt;SPAN class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;&lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Sep 2020 11:52:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/meraki-radius-nps-auth-aad-devices-certificates/m-p/5508248#M303620</guid>
      <dc:creator>cockneymanc</dc:creator>
      <dc:date>2020-09-03T11:52:31Z</dc:date>
    </item>
    <item>
      <title>Re: Meraki - RADIUS (NPS) Auth - AAD Devices &amp; Certificates</title>
      <link>https://community.cisco.com/t5/wireless/meraki-radius-nps-auth-aad-devices-certificates/m-p/5508249#M303621</link>
      <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;Deploying a device certificate from an internal CA is not very difficult as I mentioned in my last post. But using NPS as a Radius server with device certificates is. This is because the NPS server checks the device from the certificate.&lt;/P&gt;&lt;P&gt;. But with Azure AD joined device the NPS server will not find the device in Active Directory and because of this it will not except the connection like cockneymanc mentioned. &lt;/P&gt;&lt;P&gt;I have read in other posts about creating the devices in Active Directory as an object (so not Hybrid joined) just to be able to check the device. I can't remember the exact steps but it was for me to much manual tasks which I didn't like doing.&lt;/P&gt;&lt;P&gt;At one customer I deployed device certificates for Wifi which works great, but they don't use NPS. I saw that they are connecting to a Linux server which does the authentication check. I have no idea what this was but it works. If it is secure? I don't know. It probable just checks if the certificate is valid with a working certificate chain and CRL. But that is all guessing. If anyone is interested I can ask the customer to explain what has been setup to just have an idea if someone would like to go for this approach. &lt;/P&gt;&lt;P&gt;This means: &lt;/P&gt;&lt;P&gt;- Azure AD joined devices.&lt;/P&gt;&lt;P&gt;- Certificate Authority in on-prem AD&lt;/P&gt;&lt;P&gt;- Intune Certificate Connector for deploying certificates to Azure AD joined devices.&lt;/P&gt;&lt;P&gt;- Device Certificates en Root certificate deployed with Intune on the devices&lt;/P&gt;&lt;P&gt;- PEAP smartcard/certificate based authentication Wifi profile with device authentication. Wifi profile deployed with Intune.&lt;/P&gt;&lt;P&gt;- Some kind of Linux server as the RADIUS server (so no NPS here)&lt;/P&gt;</description>
      <pubDate>Thu, 03 Sep 2020 21:03:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/meraki-radius-nps-auth-aad-devices-certificates/m-p/5508249#M303621</guid>
      <dc:creator>RonaldB1</dc:creator>
      <dc:date>2020-09-03T21:03:57Z</dc:date>
    </item>
    <item>
      <title>Re: Meraki - RADIUS (NPS) Auth - AAD Devices &amp; Certificates</title>
      <link>https://community.cisco.com/t5/wireless/meraki-radius-nps-auth-aad-devices-certificates/m-p/5508250#M303622</link>
      <description>&lt;P&gt;Thanks &lt;A href="https://community.meraki.com/t5/user/viewprofilepage/user-id/45890"&gt;@RonaldB1&lt;/A&gt; for all your help with this.&lt;/P&gt;&lt;P&gt;I'm fairly new to certificate auth methods, so im learning on the job.&lt;/P&gt;&lt;P&gt;I have set up and deployed NDES with the Intune connector by following the article you posted.&lt;/P&gt;&lt;P&gt;Cert enrollment works and a cert is issued from my on-prem CA to the Azure AD Device.&lt;/P&gt;&lt;P&gt;I will test the user cert auth on my internal NPS later this week via Meraki wi-fi radius auth.&lt;/P&gt;&lt;P&gt;If its not too much trouble to ask your client what Linux Radius solution there where running, it would be much appreciated and very interesting.&lt;/P&gt;&lt;P&gt;On that note, has anyone tried using a cloud based 3rd party radius service that integrates into Azure AD, like this one from SecureW2 (&lt;A href="https://www.cloudradius.com/radius-authentication-with-azure-ad" target="_blank" rel="nofollow noopener noreferrer"&gt;https://www.cloudradius.com/radius-authentication-with-azure-ad&lt;/A&gt;) ?&lt;/P&gt;</description>
      <pubDate>Tue, 08 Sep 2020 10:51:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/meraki-radius-nps-auth-aad-devices-certificates/m-p/5508250#M303622</guid>
      <dc:creator>kschutte</dc:creator>
      <dc:date>2020-09-08T10:51:05Z</dc:date>
    </item>
    <item>
      <title>Re: Meraki - RADIUS (NPS) Auth - AAD Devices &amp; Certificates</title>
      <link>https://community.cisco.com/t5/wireless/meraki-radius-nps-auth-aad-devices-certificates/m-p/5508251#M303623</link>
      <description>&lt;P&gt;The cloud-based RADIUS service looks good &lt;A href="https://community.meraki.com/t5/user/viewprofilepage/user-id/36123"&gt;@kschutte&lt;/A&gt; .  Another one I have seen but not tried is:&lt;/P&gt;&lt;P&gt;&lt;A href="https://wiflex.eu/" target="_self" rel="nofollow noopener noreferrer"&gt;https://wiflex.eu/&lt;/A&gt; &lt;/P&gt;</description>
      <pubDate>Tue, 08 Sep 2020 20:35:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/meraki-radius-nps-auth-aad-devices-certificates/m-p/5508251#M303623</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2020-09-08T20:35:16Z</dc:date>
    </item>
    <item>
      <title>Re: Meraki - RADIUS (NPS) Auth - AAD Devices &amp; Certificates</title>
      <link>https://community.cisco.com/t5/wireless/meraki-radius-nps-auth-aad-devices-certificates/m-p/5508252#M303624</link>
      <description>&lt;P&gt;Hello &lt;A href="https://community.meraki.com/t5/user/viewprofilepage/user-id/36123"&gt;@kschutte&lt;/A&gt; ,&lt;/P&gt;&lt;P&gt;I asked the customer and it seems that they are using an Aruba Wifi system which comes with 2 Clearpass servers. The Clearpass servers do the authentication which do not require the device to be available in the domain controller to check the device name which the certificate has been requested for.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Sep 2020 09:07:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/meraki-radius-nps-auth-aad-devices-certificates/m-p/5508252#M303624</guid>
      <dc:creator>RonaldB1</dc:creator>
      <dc:date>2020-09-09T09:07:36Z</dc:date>
    </item>
    <item>
      <title>Re: Meraki - RADIUS (NPS) Auth - AAD Devices &amp; Certificates</title>
      <link>https://community.cisco.com/t5/wireless/meraki-radius-nps-auth-aad-devices-certificates/m-p/5508253#M303625</link>
      <description>&lt;P&gt;Hi &lt;A href="https://community.meraki.com/t5/user/viewprofilepage/user-id/45890"&gt;@RonaldB1&lt;/A&gt;,&lt;/P&gt;&lt;P&gt;Thanks for finding out. I presume it only works for Aruba.&lt;/P&gt;&lt;P&gt;I have seen one user implemented user based cert auth using FreeRadius: &lt;A href="https://stackoverflow.com/questions/40747952/freeradius-authentication-through-azure-active-directory" target="_blank" rel="noopener nofollow noreferrer"&gt;https://stackoverflow.com/questions/40747952/freeradius-authentication-through-azure-active-directory&lt;/A&gt;&lt;/P&gt;&lt;P&gt;I wonder if the same can be done for device cert auth...&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.meraki.com/t5/user/viewprofilepage/user-id/340"&gt;@Philip D'Ath&lt;/A&gt;Thanks for the link, it looks promising. I'm going to try to get it working on NPS with user cert auth before I give up and pay for a cloud based service.&lt;/P&gt;&lt;P&gt;AFAIK, the only difference between user cert auth and device cert auth is that the wi-fi will only connect once the user has logged into the device. I can live with that until we find a working device cert auth method for Azure AD Joined devices.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Sep 2020 09:39:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/meraki-radius-nps-auth-aad-devices-certificates/m-p/5508253#M303625</guid>
      <dc:creator>kschutte</dc:creator>
      <dc:date>2020-09-09T09:39:14Z</dc:date>
    </item>
    <item>
      <title>Re: Meraki - RADIUS (NPS) Auth - AAD Devices &amp; Certificates</title>
      <link>https://community.cisco.com/t5/wireless/meraki-radius-nps-auth-aad-devices-certificates/m-p/5508254#M303626</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;So my test today did not go as expected.&lt;/P&gt;&lt;P&gt;Seems my Intune Wi-Fi profile is not configured correctly.&lt;/P&gt;&lt;P&gt;Anybody have any experience in how to configure the profile for it to work on Meraki?&lt;/P&gt;&lt;P&gt;I currently get an error saying "cant connect because you need a certificate to sign in"&lt;/P&gt;&lt;P&gt;This is what I currently have:&lt;/P&gt;&lt;P&gt;&lt;SPAN class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Berlin_IT_Guy_0-1599742092045.png" style="width: 400px;"&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="image.png"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/269574i3F52FE6C49BCA8BA/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Sep 2020 12:48:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/meraki-radius-nps-auth-aad-devices-certificates/m-p/5508254#M303626</guid>
      <dc:creator>kschutte</dc:creator>
      <dc:date>2020-09-10T12:48:23Z</dc:date>
    </item>
  </channel>
</rss>

