WiFi Advanced Payload

WiFi Advanced Payload

Description

This payload can be used to configure a device to connect to a wireless access point with advanced authentication options.



If your organization uses more than one wireless access point, it can be beneficial to include more that one access point payload in a profile, e.g. Profile called "Global access points" which includes both public and enterprise access points payload in the same profile.

Depending on what type of access point you will configure, you should add a general Wifi access point and then jump to the configuration section that matches your setup for the access point:



If the User or Device certificate used here is issued from other certificates, then the entire Chain of Trust must be included in the profile by adding the issuer certificates as Certificate payloads. 

Configurations

DISPLAY NAME

VALUES / RESTRICTIONS

DESCRIPTION

EXAMPLE

DISPLAY NAME

VALUES / RESTRICTIONS

DESCRIPTION

EXAMPLE

Network Name (SSID)



Identification (SSID) of the wireless network to connect to (Case sensitive).

CompanyWifi

Hidden Network

True
False (Default)

Enable if the target network is not open or broadcasting.

False

Auto Join

True
False (Default)

Automatically join this wireless network

True

Security Type

Values: "None" (Default) [None],"WEP" [WEP],"Any-Personal" [Any],
"WPA/WPA2 (Personal)" [WPA],
"WPA/WPA2 (Enterprise)" [WPA],
 Yes both "WPA/WPA2 (Personal)" and "WPA/WPA2 (Enterprise)" is ending as "WPA"

Wireless network encryption to use when connecting

WPA/WPA2 (Enterprise)

Proxy Type

Values: "None" (Default), " Manual", " Automatic"

Configures proxy settings to be used with this network.













NETWORK SECURITY SETTINGS





User Name

"WPA/WPA2 (Enterprise)" only

Username for connecting to the network.

WifiUser

Accepted EAP Types



Authentication protocols supported on the target network.



User Password

"WPA/WPA2 (Enterprise)" only

User password. If not provided, the user may be prompted during login.



Inner Authentication

PAP
CHAP
MSCHAP
MSCHAPv2 (Default)

Specifies the inner authentication used by the TTLS module. Possible values are PAP, CHAP, MSCHAP, MSCHAPv2, and EA.

MSCHAPv2

Outer Identity



Externally visible identification (for use with TTLS, PEAP, and EAS-FAST).

This allows the user to hide his or her identity. The user's actual name appears only inside the encrypted tunnel. For example, it could be set to "anonymous" or "anon", or "anon@mycompany.net".

It can increase security because an attacker can't see the authenticating user's name in the clear.













CERTIFICATE





Certificate Name



Name or description of the certificate credential.

johndoe@company.com

Password



The passphrase used to secure the credentials.

CertPassword

Add Certificate



Certificate or Identity Data.
X.509 certificate (.cer, .p12, etc) for inclusion on device.



Use SCEP payload instead of Certificate



Use a SCEP payload from this profile

Certificate











ONLY FOR IOS OR macOS





One Time Password

True
False (Default)

If true, the user will be prompted for a password each time they connect to the network. Defaults to false.

True

Trusted Server Certificate Names



This is the list of server certificate common names that will be accepted. You can use wildcards to specify the name, such as wpa.*.example.com. If a server presents a certificate that isn't in this list, it won't be trusted.

Used alone or in combination with attached certificates, the property allows someone to carefully craft which certificates to trust for the given network, and avoids dynamically trusted certificates.

Multiple entries must be split by a semicolon "";""

fake@company.com

Allow trust exceptions

True (Default)
False

Allows/disallows a dynamic trust decision by the user. The dynamic trust is the certificate dialogue that appears when a certificate isn't trusted. If this is false, the authentication fails if the certificate isn't already trusted. See attached certificates and ""Trusted Server Certificate Names"".

The default value of this property is true unless either Certificate is attached or ""Trusted Server Certificate Names"" is supplied, in which case the default value is false.

True

TLS Certificate Is Required



If true, allows for two-factor authentication for EAP-TTLS, PEAP, or EAP-FAST. If false, allows for zero-factor authentication for EAP-TLS. The default is true for EAP-TLS, and false for other EAP types.



Use PAC

True
False (Default)

Use Protected Access Credential (PAC)

False

Provision PAC

True
False (Default)

Used only if EAPFASTUsePAC is true. If set to true, allows PAC provisioning. Defaults to false. This value must be set to true for EAP-FAST PAC usage to succeed because there is no other way to provide a PAC.

False

Provision PAC anonymously

True
False (Default)

If true provisions the device anonymously. Note that there are known man-in-the-middle attacks for anonymous provisioning. Defaults to false.

False

EAP SIM Number Of RANDs



A number of expected RANDs for EAPSIM. Valid values are 2 and 3. Defaults to 3.