Skip to content

Commit 3c3999c

Browse files
Merge pull request #17930 from MicrosoftDocs/main
[AutoPublish] main to live - 05/15 22:31 PDT | 05/16 11:01 IST
2 parents ca45ae4 + b577354 commit 3c3999c

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

intune/intune-service/configuration/wi-fi-settings-windows.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ keywords:
77
author: MandiOhlinger
88
ms.author: mandia
99
manager: dougeby
10-
ms.date: 06/25/2024
10+
ms.date: 05/15/2025
1111
ms.topic: reference
1212
ms.service: microsoft-intune
1313
ms.subservice: configuration
@@ -147,7 +147,7 @@ Enterprise profiles use Extensible Authentication Protocol (EAP) to authenticate
147147
- **EAP-TLS**: Also enter:
148148

149149
- **Certificate server names**: Enter one or more common names used in the certificates issued by your trusted certificate authority (CA). If you enter this information, you can bypass the dynamic trust dialog shown on user devices when they connect to this Wi-Fi network.
150-
- **Root certificates for server validation**: Select one or more existing trusted root certificate profiles. When the client connects to the network, these certificates are used to establish a chain of trust with the server. If your authentication server uses a public certificate, then you don't need to include a root certificate.
150+
- **Root certificates for server validation**: Select one or more existing trusted root certificate profiles. When the client connects to the network, these certificates are used to establish a chain of trust with the server. If your authentication server uses a public certificate that's already installed on your device, then you don't need to include a root certificate.
151151
- **Authentication method**: Select the authentication method used by your device clients. Your options:
152152

153153
- **SCEP certificate**: Select the SCEP client certificate profile that is also deployed to the device. This certificate is the identity presented by the device to the server to authenticate the connection.
@@ -157,7 +157,7 @@ Enterprise profiles use Extensible Authentication Protocol (EAP) to authenticate
157157
- **EAP-TTLS**: Also enter:
158158

159159
- **Certificate server names**: Enter one or more common names used in the certificates issued by your trusted certificate authority (CA). If you enter this information, you can bypass the dynamic trust dialog shown on user devices when they connect to this Wi-Fi network.
160-
- **Root certificates for server validation**: Select one or more existing trusted root certificate profiles. When the client connects to the network, these certificates are used to establish a chain of trust with the server. If your authentication server uses a public certificate, then you don't need to include a root certificate.
160+
- **Root certificates for server validation**: Select one or more existing trusted root certificate profiles. When the client connects to the network, these certificates are used to establish a chain of trust with the server. If your authentication server uses a public certificate that's already installed on your device, then you don't need to include a root certificate.
161161
- **Authentication method**: Select the authentication method used by your device clients. Your options:
162162

163163
- **Username and Password**: Prompt the user for a user name and password to authenticate the connection. Also enter:
@@ -181,7 +181,7 @@ Enterprise profiles use Extensible Authentication Protocol (EAP) to authenticate
181181

182182
- **Certificate server names**: Enter one or more common names used in the certificates issued by your trusted certificate authority (CA). If you enter this information, you can bypass the dynamic trust dialog shown on user devices when they connect to this Wi-Fi network.
183183

184-
- **Root certificates for server validation**: Select one or more existing trusted root certificate profiles. When the client connects to the network, these certificates are used to establish a chain of trust with the server. If your authentication server uses a public certificate, then you don't need to include a root certificate.
184+
- **Root certificates for server validation**: Select one or more existing trusted root certificate profiles. When the client connects to the network, these certificates are used to establish a chain of trust with the server. If your authentication server uses a public certificate that's already installed on your device, then you don't need to include a root certificate.
185185

186186
- **Perform server validation**: When set to **Yes**, in PEAP negotiation phase 1, devices validate the certificate, and verify the server. Select **No** to block or prevent this validation. When set to **Not configured**, Intune doesn't change or update this setting.
187187

0 commit comments

Comments
 (0)