Windows - EAP-TLS Configuration
Configure Windows devices for the most secure WiFi authentication method available - certificate-based EAP-TLS with IronWiFi WPA-Enterprise networks. This passwordless authentication uses client and server certificates for mutual verification, ideal for enterprise environments with PKI infrastructure.
Overview
EAP-TLS is the most secure WiFi authentication method available. It uses client and server certificates for mutual authentication, eliminating the need for passwords. This method is ideal for enterprise environments with Public Key Infrastructure (PKI).
Prerequisites
- Windows 10 or 11
- Client certificate installed on the device
- Wireless network configured with WPA2-Enterprise
- IronWiFi SCEP connector (for automatic certificate provisioning)
Certificate Installation
Option 1: SCEP with Microsoft Intune
For managed devices, use Microsoft Intune to automatically provision certificates:
- Configure SCEP with Intune in IronWiFi
- Deploy the certificate profile to devices via Intune
- Certificates will be automatically installed
Option 2: Manual Installation
- Obtain your client certificate (or
.pfxfile).p12 - Double-click the certificate file
- Select Current User or Local Machine
- Click Next and enter the certificate password
- Select Automatically select the certificate store
- Click Finish
Configuration Steps
Windows 10/11
- Open Settings > Network & Internet > WiFi
- Click Manage known networks > Add a new network
- Configure:
- Network name: Your SSID
- Security type: WPA2-Enterprise
- Click Save
- Click on the network and select Properties
- Under EAP method, select Microsoft: Smart Card or other certificate
Detailed Configuration
- Open Control Panel > Network and Sharing Center
- Click Set up a new connection or network
- Select Manually connect to a wireless network
- Enter network details:
- Network name: Your SSID
- Security type: WPA2-Enterprise
- Encryption type: AES
- Click Next, then Change connection settings
- Go to Security tab:
- Authentication method: Microsoft: Smart Card or other certificate
- Click Settings:
- Check Use a certificate on this computer
- Check Use simple certificate selection
- Check Verify the server's identity by validating the certificate
- Select appropriate Trusted Root Certification Authorities
- Click OK to save
Group Policy Deployment
Deploy EAP-TLS configuration enterprise-wide:
Configure:
- Authentication: WPA2-Enterprise
- EAP type: Microsoft: Smart Card or other certificate
- Enable Use a certificate on this computer
Certificate Requirements
For EAP-TLS to work properly, certificates must meet these requirements:
Client Certificate
- Enhanced Key Usage: Client Authentication (1.3.6.1.5.5.7.3.2)
- Subject or SAN must contain user identifier
- Private key must be available
Server Certificate (IronWiFi RADIUS)
- Enhanced Key Usage: Server Authentication
- Must be signed by a trusted CA
- Subject must match server identity
Troubleshooting
Certificate Not Found
- Open (Certificate Manager)
certmgr.msc - Navigate to Personal > Certificates
- Verify your certificate is listed
- Check the certificate has a private key (key icon)
Authentication Fails
- Verify the certificate hasn't expired
- Check the certificate subject matches your IronWiFi username
- Ensure the issuing CA is trusted by IronWiFi
Server Certificate Validation Error
- Install the RADIUS server's CA certificate
- Add the CA to the trusted root store
- Select the CA in the EAP-TLS settings
Related Topics
Same protocol on other devices
Other protocols on Windows
- Windows — EAP-PEAP — password-based auth
- Windows — TTLS + PAP — legacy RADIUS
Foundational reading
Was this page helpful?