macOS & iOS - EAP-TLS Configuration
Configure Apple devices for the most secure WiFi authentication method available - certificate-based EAP-TLS with IronWifi WPA-Enterprise networks. This passwordless authentication uses client and server certificates for mutual verification, ideal for enterprise environments with PKI infrastructure.
Overview
EAP-TLS is the most secure Wi-Fi authentication method available. It uses client and server certificates for mutual authentication, eliminating the need for passwords. Apple devices have excellent native support for EAP-TLS.
Prerequisites
- macOS 10.15+ or iOS 14+
- Client certificate installed on the device
- Wireless network configured with WPA2-Enterprise
- IronWifi SCEP connector (for automatic certificate provisioning)
Certificate Installation
Option 1: SCEP with Jamf Pro
For managed devices, use Jamf Pro to automatically provision certificates:
- Configure SCEP with Jamf Pro in IronWifi
- Create a SCEP payload in Jamf Pro
- Deploy the configuration profile to devices
- Certificates will be automatically installed
Option 2: Apple Configurator / MDM Profile
- Create a configuration profile with:
- Certificate payload: Include client certificate ()
.p12 - Wi-Fi payload: Configure EAP-TLS with the certificate
- Certificate payload: Include client certificate (
- Install the profile on the device
Option 3: Manual Installation (macOS)
- Obtain your client certificate (file)
.p12 - Double-click the certificate file
- Keychain Access will open - select login keychain
- Enter the certificate password
- Click OK
Option 4: Manual Installation (iOS)
- Email or download the certificate (file) to the device
.p12 - Tap the certificate file
- Go to Settings > General > VPN & Device Management
- Tap the downloaded profile
- Enter the certificate password
- Tap Install
Configuration Steps
macOS
- Click the Wi-Fi icon in the menu bar
- Select your enterprise network
- In the authentication dialog:
- Mode: EAP-TLS
- Identity: Select your client certificate
- If prompted, select Trust for the RADIUS server certificate
- Click Join
iOS
- Open Settings > Wi-Fi
- Tap your enterprise network
- The device will automatically detect EAP-TLS if a matching certificate is installed
- Select your client certificate when prompted
- Tap Trust for the RADIUS server certificate
- Tap Join
MDM Deployment
Jamf Pro
Create a Wi-Fi configuration profile:
- In Jamf Pro, go to Configuration Profiles
- Add a Wi-Fi payload:
- SSID: Your network name
- Security Type: WPA2 Enterprise
- Protocols: TLS
- Identity Certificate: Select SCEP or uploaded certificate
- Trust: Add trusted CA certificates
- Scope to target devices
- Deploy
Apple Business Manager
For zero-touch deployment:
- Assign devices to your MDM
- Deploy Wi-Fi and certificate profiles automatically
- Devices connect to the enterprise network on first setup
Certificate Requirements
Client Certificate
- Enhanced Key Usage: Client Authentication (1.3.6.1.5.5.7.3.2)
- Subject or SAN must contain user identifier
- Private key must be available
- Must be in or
.p12format for manual installation.pfx
Server Certificate (IronWifi RADIUS)
- Enhanced Key Usage: Server Authentication
- Must be signed by a trusted CA
- Subject must match server identity
Troubleshooting
Certificate Not Recognized
- Open Keychain Access (macOS) and verify the certificate is in the login keychain
- Check the certificate has a private key (expand the certificate entry)
- Verify the certificate hasn't expired
Authentication Fails
- Verify the certificate subject matches your IronWifi username
- Ensure the issuing CA is trusted by IronWifi
- Check IronWifi console for authentication logs
Trust Dialog Keeps Appearing
- Install the RADIUS server's CA certificate on the device
- On macOS: Add to System keychain and set to Always Trust
- On iOS: Go to Settings > General > About > Certificate Trust Settings and enable trust
Profile Installation Fails (iOS)
- Ensure the device is not in supervised mode blocking profiles
- Check for MDM restrictions
- Verify the certificate password is correct
Related Topics
- macOS & iOS - EAP-PEAP - Password-based authentication
- macOS & iOS - TTLS + PAP - TTLS authentication
- SCEP & PKI - Automatic certificate provisioning
- Jamf Pro Integration - MDM deployment