How-To: Enable WiFi Certificate Authentication in Intune
Prerequisites
- The Keytos Entra ID applications are registered in your tenant
- You have signed up for an EZRADIUS Plan
- You are a Subscription Owner or Network Administrator
- You are an Intune Administrator
- You have created Intune Trusted Certificates and SCEP profiles to issue certificates to your devices.
This guide assumes that you have already set up your Trusted Certificates and SCEP Profiles for your PKI in your Intune portal. If you have not done so, please follow the guide on how to create Intune Trusted Certificates and SCEP profiles, or watch this 5 minute video where you proceed.
How to Enable WiFi Certificate Authentication in Intune - Video Version
How to Enable WiFi Certificate Authentication in Intune
The following steps will guide you through the process of creating a WiFi Profile in Intune that uses EAP-TLS Certificate Authentication via SCEP-issued certificates with EZRADIUS. At a high level, you will need to:
- Distribute your RADIUS server CA certificate(s) to your devices via Intune.
- Create a WiFi Profile in Intune that uses EAP-TLS with SCEP-issued certificates for authentication.
How to Distribute Your RADIUS Server CA Certificates in Intune
For your devices to establish a secure connection to the RADIUS server, you need to distribute the RADIUS server’s CA certificate to your devices.
Download Your RADIUS Server CA Certificates
The first step is to download the CA certificate(s) to your local machine. Depending on how you set up your server certificate in EZRADIUS, the steps may vary slightly.
If you used the EZRADIUS auto-generated certificate for your RADIUS server, you’ll just have a single CA certificate to download. Follow these steps:
-
Log in to your EZRADIUS portal.
-
Navigate to Policies.
-
Select the policy you are using for Entra ID Password Authentication.
-
Scroll down to the Server Certificate section.
-
Click on the Download CA Certificate button to download the certificate to your local machine. It will have a filename similar to
RootCA.cer.
If you used the EZRADIUS EZCA to issue your RADIUS server certificate, you’ll need to download the the CA certificate for your EZCA CA, plus the Root CA certificate, if applicable. Follow these steps:
-
Log in to your EZCA portal.
-
Navigate to Certificate Authorities.
-
Select the CA that issued your RADIUS server certificate.
-
Click on the View Details button.
-
Click on the Download Certificate button to download the CA certificate to your local machine. It will have a filename similar to
<CA-NAME>.cer. -
If your EZCA CA is an intermediate CA, make sure to also download the Root CA certificate by repeating the above steps for the Root CA.
Refer to your PKI documentation to download the CA certificate(s) that issued your RADIUS server certificate. Ensure you have the root CA and any intermediate CA certificates if applicable.
Push the CA Certificates to Your Devices via Intune
Now that you have the CA certificate(s) downloaded, the next step is to push them to your devices’ Trusted Store using Intune.
-
Now, go to your Intune portal: https://aka.ms/Intune
-
Click on Devices.

-
Select the OS/platform you want to configure. In this case we will select Windows, but the setup is similar for other OS platforms.
-
Click on Configuration Profiles.

-
Click on the + Create button at the top of the list, then + New Policy.

-
Under “Create a profile”, select:
- Platform: Windows 10 and later
- Profile type: Templates
- Template name: Trusted certificate
-
Fill out the profile Basics:
- Name: Friendly name for your organization
- Description: Description for your organization

-
Click on Next.
-
Fill in the Configuration settings:
- Certificate file: Select the CA certificate you downloaded earlier from EZRADIUS (
RootCA.cer). - Destination store: Select the appropriate store based on the type of CA certificate:
- Computer certificate store - Root (if a root CA certificate)
- Computer certificate store - Intermediate (if an intermediate CA certificate).

- Certificate file: Select the CA certificate you downloaded earlier from EZRADIUS (
-
Click on Next.
-
Select the users, groups or devices you want to deploy this profile to.
-
Click on Next.
-
Add any Applicability Rules if needed, then click on Next.
-
Click on Create to finish creating the profile.
-
Repeat the above steps if you have both a root CA and an intermediate CA certificate to deploy.
How to Create a WiFi Profile in Intune for Certificate Authentication
Download Your Radius Server Certificate
When setting up an Intune WiFi profile for Entra ID Password Authentication, you will need details from your RADIUS server certificate. You can find these details in your EZRADIUS portal.
-
Log in to your EZRADIUS portal.
-
Navigate to Policies.
-
Select the policy you are using for Entra ID Password Authentication.
-
Scroll down to the Server Certificate section.
-
Click Download Certificate to download the RADIUS server certificate to your local machine. It will have a filename similar to
Server.cer. -
Open the downloaded certificate on your local machine. Note the following details which you will need later.
- The Subject Common Name (CN)
- The Subject Alternative Name (SAN)
Create a WiFi Profile in Intune
-
Go to your Intune portal: https://aka.ms/Intune
-
Click on Devices

-
Select the OS/platform you want to configure. In this case we will select Windows, but the setup is similar for other OS platforms.
-
Click on Configuration Profiles.

-
Click on the + Create button at the top of the list.

-
Select Windows 10 and later as the platform.
-
Select Templates as the profile type.
-
Select Wi-Fi as the template.

-
Click on Create at the bottom of the page.
-
Fill in the Name and Description fields with something meaningful for your organization.
-
Click on Next.

-
Enter the following required Configuration settings. Any field not mentioned below can be left as default or set to your organization’s preference:
- Wi-Fi type: Enterprise
- Wi-Fi name (SSID): Your Wi-Fi Network SSID (Case Sensitive)
- Connection name: Friendly name for your users
- Authentication mode: Select the mode based on whether your SCEP certificate is issued to the User or the Device.
- Remember credentials: Set to No (Not needed for certificate authentication).
- Authentication period: 30 seconds is a recommended value we’ve seen work well for most environments.
- Authentication retry delay: 1 second is a recommended value we’ve seen work well for most environments.
- Maximum authentication failures: 10 is a recommended value we’ve seen work well for most environments.
- Single sign-on (SSO): Disable
-
If your network controller supports Fast Roaming, fill out the Fast Roaming settings section with the following settings:
- Enable pairwise master key (PMK) caching: Yes
- Max PMK time stored in cache: We recommend setting this to the maximum (1440 minutes) to improve user experience.
- Max number of PMKs in cache: We recommend setting this to the maximum (255) to improve user experience.
- Enable pre-authentication: Yes
- Max pre-authentication attempts: 10 is a recommended value we’ve seen work well for most environments.
-
Fill out the Server Trust section with the following settings:
- EAP type: EAP-TLS
- Certificate server names: Enter the CN and SAN values from your RADIUS server certificate that you noted earlier. Remove
CN=,DNS Name=, andIP Address=prefixes when entering the values. - Root Certificates for server validation: Click on “+ Select one or more certificate profiles” and select the CA certificate profile(s) you created earlier to distribute your RADIUS server CA certificate(s).

-
Fill out the Client Authentication section with the following settings:
- Authentication Method: SCEP Certificate
- Client certificate for client authentication: Select the SCEP profile you use to issue certificates to your devices.

-
Click on Next.
-
Select the users, groups or devices you want to deploy this profile to and click Next.

-
Add any applicability rules if needed, then click on Next.
-
Review your settings and click on Create.

-
Done! Your WiFi profile is now created and will be pushed to your devices. Once the profile is applied, users will be able to connect to the WiFi network using their SCEP-issued certificates.
How to Test the WiFi Certificate Authentication Setup
Now that you have created and deployed the WiFi profile, it’s important to test the setup to ensure everything is functioning correctly. Follow these steps to test your WiFi profile with Certificate Authentication:
-
Begin on a device that is targeted by the Intune WiFi profile you created.
-
Force a sync with Intune to ensure the latest profiles are applied. You can do this by going to Settings > Accounts > Access work or school, selecting your work account, and clicking on Sync.
-
Once the sync is complete, check that the WiFi profile has been applied by going to Settings > Network & Internet > Wi-Fi > Manage known networks. You should see the SSID you configured in the list.
-
If you use User-based certificate authentication, attempt to connect to the WiFi network. You should be connected without being prompted for a username or password. If you use Device-based certificates, the device should connect automatically without user interaction. You may need to restart the device to trigger the connection.
-
If you are unable to connect, refer to our troubleshooting guide.
🔎 Troubleshooting Guide