Select the OS you want to configure. In this case we will select Windows, but the setup is similar for other OS.
Click on Configuration Profiles.
Click on the “Create” Button at the top of the list.
Select “Windows 10 and later” as the platform.
Select “Templates” as the profile type.
Select “Wi-Fi” as the template.
Click on “Create” at the bottom of the page.
Fill in the “Name” and “Description” fields.
Click on “Next”.
Select “Enterprise” as the Wi-FI type.
Fill in the SSID of your Wi-Fi network (Case sensitive).
Enter the connection name (This is a friendly name for your users).
Select your connection preferences (if you want it to automatically connect when in range, etc.).
Select the authentication mode as user.
Select if you want want to cache the user credentials.
Set the authentication period (how long before the authentication fails) to 60 seconds.
Set the authentication retry delay to how many seconds you want to wait before retrying the authentication.
Set the number of maximum authentication attempts.
Set Single Sign-On to “Disable”.
Leave “Enable pairwise master key (PMK) caching” set as “No”.
Set the EAP type to “EAP-TTLS”.
For “Server Trust” we have to enter the values of the certificate, these are:
The IP addresses of your RADIUS instance (All of them even if you are only using one)
The CN of the certificate (which you can get from your EZRADIUS Policy and while you are there download the Root Certificate for Server validation, we will need it for the next step).
Then for “Root Certificates for Server validation” You have to use the certificate Authority (if it is a 2 tier PKI, I recommend uploading both CAs here since some OS do the validation differently) that created your RADIUS Server certificate. If you used the EZRADIUS Automatically generated certificate you can download it from your EZRADIUS Authentication Policy and Upload it as a trusted CA in Intune. This is how your policy should look like:
Set “Username and Password” as the Authentication Method.
Set Unencrypted Password (PAP) as the Inner Authentication Method (Don’t worry the password is encrypted by the EAP-TTLS tunnel, it is not sent unencrypted over the air).
Click on “Next”.
Select the users, groups or devices you want to deploy this profile to.