You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: intune/intune-service/configuration/wi-fi-settings-windows.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ keywords:
7
7
author: MandiOhlinger
8
8
ms.author: mandia
9
9
manager: dougeby
10
-
ms.date: 06/25/2024
10
+
ms.date: 05/15/2025
11
11
ms.topic: reference
12
12
ms.service: microsoft-intune
13
13
ms.subservice: configuration
@@ -147,7 +147,7 @@ Enterprise profiles use Extensible Authentication Protocol (EAP) to authenticate
147
147
-**EAP-TLS**: Also enter:
148
148
149
149
-**Certificate server names**: Enter one or more common names used in the certificates issued by your trusted certificate authority (CA). If you enter this information, you can bypass the dynamic trust dialog shown on user devices when they connect to this Wi-Fi network.
150
-
-**Root certificates for server validation**: Select one or more existing trusted root certificate profiles. When the client connects to the network, these certificates are used to establish a chain of trust with the server. If your authentication server uses a public certificate, then you don't need to include a root certificate.
150
+
-**Root certificates for server validation**: Select one or more existing trusted root certificate profiles. When the client connects to the network, these certificates are used to establish a chain of trust with the server. If your authentication server uses a public certificate that's already installed on your device, then you don't need to include a root certificate.
151
151
-**Authentication method**: Select the authentication method used by your device clients. Your options:
152
152
153
153
-**SCEP certificate**: Select the SCEP client certificate profile that is also deployed to the device. This certificate is the identity presented by the device to the server to authenticate the connection.
@@ -157,7 +157,7 @@ Enterprise profiles use Extensible Authentication Protocol (EAP) to authenticate
157
157
-**EAP-TTLS**: Also enter:
158
158
159
159
-**Certificate server names**: Enter one or more common names used in the certificates issued by your trusted certificate authority (CA). If you enter this information, you can bypass the dynamic trust dialog shown on user devices when they connect to this Wi-Fi network.
160
-
-**Root certificates for server validation**: Select one or more existing trusted root certificate profiles. When the client connects to the network, these certificates are used to establish a chain of trust with the server. If your authentication server uses a public certificate, then you don't need to include a root certificate.
160
+
-**Root certificates for server validation**: Select one or more existing trusted root certificate profiles. When the client connects to the network, these certificates are used to establish a chain of trust with the server. If your authentication server uses a public certificate that's already installed on your device, then you don't need to include a root certificate.
161
161
-**Authentication method**: Select the authentication method used by your device clients. Your options:
162
162
163
163
-**Username and Password**: Prompt the user for a user name and password to authenticate the connection. Also enter:
@@ -181,7 +181,7 @@ Enterprise profiles use Extensible Authentication Protocol (EAP) to authenticate
181
181
182
182
-**Certificate server names**: Enter one or more common names used in the certificates issued by your trusted certificate authority (CA). If you enter this information, you can bypass the dynamic trust dialog shown on user devices when they connect to this Wi-Fi network.
183
183
184
-
-**Root certificates for server validation**: Select one or more existing trusted root certificate profiles. When the client connects to the network, these certificates are used to establish a chain of trust with the server. If your authentication server uses a public certificate, then you don't need to include a root certificate.
184
+
-**Root certificates for server validation**: Select one or more existing trusted root certificate profiles. When the client connects to the network, these certificates are used to establish a chain of trust with the server. If your authentication server uses a public certificate that's already installed on your device, then you don't need to include a root certificate.
185
185
186
186
-**Perform server validation**: When set to **Yes**, in PEAP negotiation phase 1, devices validate the certificate, and verify the server. Select **No** to block or prevent this validation. When set to **Not configured**, Intune doesn't change or update this setting.
0 commit comments