Skip to content

Commit

Permalink
Merge pull request #16582 from lenewsad/7824255_2411
Browse files Browse the repository at this point in the history
2411_7824255_macOScertkeychain
  • Loading branch information
lenewsad authored Nov 19, 2024
2 parents 717c5d2 + 3917488 commit 761c9d1
Show file tree
Hide file tree
Showing 5 changed files with 64 additions and 29 deletions.
18 changes: 14 additions & 4 deletions memdocs/intune/configuration/vpn-settings-macos.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ keywords:
author: MandiOhlinger
ms.author: mandia
manager: dougeby
ms.date: 04/15/2024
ms.date: 11/19/2024
ms.topic: reference
ms.service: microsoft-intune
ms.subservice: configuration
Expand Down Expand Up @@ -35,7 +35,8 @@ Depending on the settings you choose, not all values in the following list are c

This feature applies to:

- macOS
- macOS


## Before you begin

Expand All @@ -47,11 +48,20 @@ This feature applies to:

## Base VPN

**Connection name**: Enter a name for this connection. End users see this name when they browse their device for the list of available VPN connections.
- **Deployment channel**: Select how you want to deploy the profile. This setting also determines the keychain where the authentication certificates are stored, so it's important to select the proper channel. It's not possible to edit the deployment channel after you deploy the profile. To change it, you must create a new profile.

>[!NOTE]
> We recommend rechecking the deployment channel setting in existing profiles when the linked authentication certificates are up for renewal to ensure the intended channel is selected. If it isn't, create a new profile with the correct deployment channel.
You have two options:
- **User channel**: Always select the user deployment channel in profiles with user certificates. This option stores certificates in the user keychain.
- **Device channel**: Always select the device deployment channel in profiles with device certificates. This option stores certificates in the system keychain.

- **Connection name**: Enter a name for this connection. End users see this name when they browse their device for the list of available VPN connections.

- **VPN server address**: Enter the IP address or fully qualified domain name of the VPN server that devices connect to. For example, enter `192.168.1.1` or `vpn.contoso.com`.
- **Authentication method**: Choose how devices authenticate to the VPN server. Your options:
- **Certificates**: Under **Authentication certificate**, select a SCEP or PKCS certificate profile you previously created to authenticate the connection. For more information about certificate profiles, go to [How to configure certificates](../protect/certificates-configure.md).
- **Certificates**: Under **Authentication certificate**, select a SCEP or PKCS certificate profile you previously created to authenticate the connection. For more information about certificate profiles, go to [How to configure certificates](../protect/certificates-configure.md). Choose the certificates that align with your deployment channel selection. If you selected the user channel, your certificate options are limited to user certificate profiles. If you selected the device channel, you have both user and device certificate profiles to choose from. However, we recommend always selecting the certificate type that aligns with the selected channel. Storing user certificates in the system keychain increases security risks.
- **Username and password**: End users must enter a username and password to sign into the VPN server.

- **Connection type**: Select the VPN connection type from the following list of vendors:
Expand Down
18 changes: 13 additions & 5 deletions memdocs/intune/configuration/wi-fi-settings-macos.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ keywords:
author: MandiOhlinger
ms.author: mandia
manager: dougeby
ms.date: 06/25/2024
ms.date: 11/19/2024
ms.topic: reference
ms.service: microsoft-intune
ms.subservice: configuration
Expand Down Expand Up @@ -39,17 +39,17 @@ This feature applies to:

These Wi-Fi settings are separated in to two categories: Basic settings and Enterprise settings.

This article describes the settings you can configure.
This article describes the settings you can configure.

## Before you begin

- Create a [macOS Wi-Fi device configuration profile](wi-fi-settings-configure.md).

- These settings are available for all enrollment types. For more information on the enrollment types, go to [macOS enrollment](../enrollment/macos-enroll.md).
- These settings are available for all enrollment types. For more information on the enrollment types, go to [macOS enrollment](../enrollment/macos-enroll.md).

## Basic profiles

Basic or personal profiles use WPA/WPA2 to secure the Wi-Fi connection on devices. Typically, WPA/WPA2 is used on home networks or personal networks. You can also add a pre-shared key to authenticate the connection.
Basic or personal profiles use WPA/WPA2 to secure the Wi-Fi connection on devices. Typically, WPA/WPA2 is used on home networks or personal networks. You can also add a preshared key to authenticate the connection.

- **Wi-Fi type**: Select **Basic**.
- **SSID**: This **service set identifier** (SSID) property is the real name of the wireless network that devices connect to. However, users only see the network name you configured when they choose the connection.
Expand All @@ -72,6 +72,14 @@ Basic or personal profiles use WPA/WPA2 to secure the Wi-Fi connection on device

Enterprise profiles use Extensible Authentication Protocol (EAP) to authenticate Wi-Fi connections. EAP is often used by enterprises, as you can use certificates to authenticate and secure connections, and configure more security options.

- **Deployment channel**: Select how you want to deploy the profile. This setting also determines the keychain where the authentication certificates are stored, so it's important to select the proper channel. It's not possible to edit the deployment channel after you deploy the profile. To do so, you must create a new profile.

>[!NOTE]
> We recommend rechecking the deployment channel setting in existing profiles when the linked authentication certificates are up for renewal to ensure the intended channel is selected. If it isn't, create a new profile with the correct deployment channel.
You have two options:
- **User channel**: Always select the user deployment channel in profiles with user certificates. This option stores certificates in the user keychain.
- **Device channel**: Always select the device deployment channel in profiles with device certificates. This option stores certificates in the system keychain.
- **Wi-Fi type**: Select **Enterprise**.
- **SSID**: Short for **service set identifier**. This property is the real name of the wireless network that devices connect to. However, users only see the network name you configured when they choose the connection.
- **Connect automatically**: Select **Enable** to automatically connect to this network when the device is in range. Select **Disable** to prevent devices from automatically connecting.
Expand All @@ -92,7 +100,7 @@ Enterprise profiles use Extensible Authentication Protocol (EAP) to authenticate
- **Certificate server names**: **Add** one or more common names used in the certificates issued by your trusted certificate authority (CA). When you enter this information, you can bypass the dynamic trust window displayed on user's devices when they connect to this Wi-Fi network.
- **Root certificate for server validation**: Select one or more existing trusted root certificate profiles. When the client connects to the network, these certificates are used to establish a chain of trust with the server. If your authentication server uses a public certificate, then you don't need to include a root certificate.

- **Certificates**: Select the SCEP or PKCS client certificate profile that is also deployed to the device. This certificate is the identity presented by the device to the server to authenticate the connection.
- **Certificates**: Select the SCEP or PKCS client certificate profile that is also deployed to the device. This certificate is the identity presented by the device to the server to authenticate the connection. Choose the certificates that align with your deployment channel selection. If you selected the user channel, your certificate options are limited to user certificate profiles. If you selected the device channel, you have both user and device certificate profiles to choose from. However, we recommend always selecting the certificate type that aligns with the selected channel. Storing user certificates in the system keychain increases security risks.

- **Identity privacy (outer identity)**: Enter the text sent in the response to an EAP identity request. This text can be any value, such as `anonymous`. During authentication, this anonymous identity is initially sent. Then, the real identification is sent in a secure tunnel.

Expand Down
17 changes: 13 additions & 4 deletions memdocs/intune/configuration/wired-network-settings-macos.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ keywords:
author: MandiOhlinger
ms.author: mandia
manager: dougeby
ms.date: 06/25/2024
ms.date: 11/19/2024
ms.topic: reference
ms.service: microsoft-intune
ms.subservice: configuration
Expand Down Expand Up @@ -39,13 +39,13 @@ This feature applies to:

- macOS

This article describes the settings you can configure.
This article describes the settings you can configure.

## Before you begin

- Create a [macOS wired network device configuration profile](wired-networks-configure.md).

- These settings are available for all enrollment types. For more information on the enrollment types, go to [macOS enrollment](../enrollment/macos-enroll.md).
- These settings are available for all enrollment types. For more information on the enrollment types, go to [macOS enrollment](../enrollment/macos-enroll.md).

## Wired Network

Expand All @@ -61,6 +61,15 @@ This article describes the settings you can configure.

Options with "active" in the title use interfaces that are actively working on the device. If there are no active interfaces, the next interface in service-order priority is configured. By default, **First active Ethernet** is selected, which is also the default setting configured by macOS.

- **Deployment channel**: Select how you want to deploy the profile. This setting also determines the keychain where the authentication certificates are stored, so it's important to select the proper channel. It's not possible to edit the deployment channel after you deploy the profile. To do so, you must create a new profile.

>[!NOTE]
> We recommend rechecking the deployment channel setting in existing profiles when the linked authentication certificates are up for renewal to ensure the intended channel is selected. If it isn't, create a new profile with the correct deployment channel.
You have two options:
- **User channel**: Always select the user deployment channel in profiles with user certificates. This option stores certificates in the user keychain.
- **Device channel**: Always select the device deployment channel in profiles with device certificates. This option stores certificates in the system keychain.

- **EAP type**: To authenticate secured wired connections, select the Extensible Authentication Protocol (EAP) type. Your options:

- **EAP-FAST**: Enter the **Protected Access Credential (PAC) Settings**. This option uses protected access credentials to create an authenticated tunnel between the client and the authentication server. Your options:
Expand All @@ -87,7 +96,7 @@ This article describes the settings you can configure.
- **Challenge Handshake Authentication Protocol (CHAP)**
- **Microsoft CHAP (MS-CHAP)**
- **Microsoft CHAP Version 2 (MS-CHAP v2)**
- **Certificates**: Select an existing SCEP client certificate profile that is also deployed to the device. This certificate is the identity presented by the device to the server to authenticate the connection. PKCS certificates aren't supported.
- **Certificates**: Select an existing SCEP client certificate profile that is also deployed to the device. This certificate is the identity presented by the device to the server to authenticate the connection. PKCS certificates aren't supported. Choose the certificate that aligns with your deployment channel selection. If you selected the user channel, your certificate options are limited to user certificate profiles. If you selected the device channel, you have both user and device certificate profiles to choose from. However, we recommend always selecting the certificate type that aligns with the selected channel. Storing user certificates in the system keychain increases security risks.
- **Identity privacy (outer identity)**: Enter the text sent in the response to an EAP identity request. This text can be any value, such as `anonymous`. During authentication, this anonymous identity is initially sent. Then, the real identification is sent in a secure tunnel.

- **LEAP**
Expand Down
25 changes: 13 additions & 12 deletions memdocs/intune/protect/certificates-pfx-configure.md
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@ keywords:
author: lenewsad
ms.author: lanewsad
manager: dougeby
ms.date: 10/01/2024
ms.date: 11/19/2024
ms.topic: how-to
ms.service: microsoft-intune
ms.subservice: protect
Expand All @@ -16,7 +16,7 @@ ms.localizationpriority: high
#ROBOTS:
#audience:

ms.reviewer: lacranda
ms.reviewer: sheetg
ms.suite: ems
search.appverid: MET150
#ms.tgt_pltfrm:
Expand Down Expand Up @@ -303,17 +303,18 @@ For guidance, see [Install and configure the Certificate Connector for Microsoft

|Setting | Platform | Details |
|------------|------------|------------|
|**Renewal threshold (%)** |<ul><li>All |Recommended is 20% |
|**Certificate validity period** |<ul><li>All |If you didn't change the certificate template, this option might be set to one year. <br><br> Use a validity period of five days or up to 24 months. When the validity period is less than five days, there's a high likelihood of the certificate entering a near-expiry or expired state, which can cause the MDM agent on devices to reject the certificate before it’s installed. |
|**Key storage provider (KSP)** |<ul><li>Windows 10/11 |For Windows, select where to store the keys on the device. |
|**Certification authority** |<ul><li>All |Displays the internal fully qualified domain name (FQDN) of your Enterprise CA. |
|**Certification authority name** |<ul><li>All |Lists the name of your Enterprise CA, such as "Contoso Certification Authority." |
|**Certificate template name** |<ul><li>All |Lists the name of your certificate template. |
|**Certificate type** |<ul><li>Android Enterprise (*Corporate-Owned and Personally-Owned Work Profile*)</li><li>iOS</li><li>macOS</li><li>Windows 10/11 |Select a type: <ul><li> **User** certificates can contain both user and device attributes in the subject and subject alternative name (SAN) of the certificate. </li><li>**Device** certificates can only contain device attributes in the subject and SAN of the certificate. Use Device for scenarios such as user-less devices, like kiosks or other shared devices. <br><br> This selection affects the Subject name format. |
|**Subject name format** |<ul><li>All |For details on how to configure the subject name format, see [Subject name format](#subject-name-format) later in this article. <br><br>For the following platforms, the Subject name format is determined by the certificate type: <ul><li>Android Enterprise (*Work Profile*)</li><li>iOS</li><li>macOS</li><li>Windows 10/11 </li></ul> <p> |
|**Subject alternative name** |<ul><li>All |For *Attribute*, select **User principal name (UPN)** unless otherwise required, configure a corresponding *Value*, and then select **Add**. <br><br> You can use variables or static text for the SAN of both certificate types. Use of a variable isn't required.<br><br>For more information, see [Subject name format](#subject-name-format) later in this article.|
|**Deployment channel**|macOS|Select how you want to deploy the profile. This setting also determines the keychain where the linked certificates are stored, so it's important to select the proper channel. <br><br/>Always select the user deployment channel in profiles with user certificates. The user channel stores certificates in the user keychain. Always select the device deployment channel in profiles with device certificates. The device channel stores certificates in the system keychain. <br><br/> It's not possible to edit the deployment channel after you deploy the profile. You must create a new profile to select a different channel.
|**Renewal threshold (%)** |All |Recommended is 20% |
|**Certificate validity period** |All |If you didn't change the certificate template, this option might be set to one year. <br><br> Use a validity period of five days or up to 24 months. When the validity period is less than five days, there's a high likelihood of the certificate entering a near-expiry or expired state, which can cause the MDM agent on devices to reject the certificate before it’s installed. |
|**Key storage provider (KSP)** |Windows 10/11 |For Windows, select where to store the keys on the device. |
|**Certification authority** |All |Displays the internal fully qualified domain name (FQDN) of your Enterprise CA. |
|**Certification authority name** |All |Lists the name of your Enterprise CA, such as "Contoso Certification Authority." |
|**Certificate template name** |All |Lists the name of your certificate template. |
|**Certificate type** |<ul><li>Android Enterprise (*Corporate-Owned and Personally-Owned Work Profile*)</li><li>iOS</li><li>macOS</li><li>Windows 10/11 |Select a type: <ul><li> **User** certificates can contain both user and device attributes in the subject and subject alternative name (SAN) of the certificate. </li><li>**Device** certificates can only contain device attributes in the subject and SAN of the certificate. Use Device for scenarios such as user-less devices, like kiosks or other shared devices. <br><br> This selection affects the Subject name format. <br><br/>For macOS, if this profile is configured to use the device deployment channel, you can select **User** or **Device**. If the profile is configured to use the user deployment channel, you can select only **User**. |
|**Subject name format** |All |For details on how to configure the subject name format, see [Subject name format](#subject-name-format) later in this article. <br><br>For the following platforms, the Subject name format is determined by the certificate type: <ul><li>Android Enterprise (*Work Profile*)</li><li>iOS</li><li>macOS</li><li>Windows 10/11 </li></ul> <p> |
|**Subject alternative name** |All |For *Attribute*, select **User principal name (UPN)** unless otherwise required, configure a corresponding *Value*, and then select **Add**. <br><br> You can use variables or static text for the SAN of both certificate types. Use of a variable isn't required.<br><br>For more information, see [Subject name format](#subject-name-format) later in this article.|
|**Extended key usage** |<ul><li> Android device administrator </li><li>Android Enterprise (*Device Owner*, *Corporate-Owned and Personally-Owned Work Profile*) </li><li>Windows 10/11 |Certificates usually require *Client Authentication* so that the user or device can authenticate to a server. |
|**Allow all apps access to private key** |<ul><li>macOS |Set to **Enable** to give apps that are configured for the associated mac device access to the PKCS certificate's private key. <br><br> For more information on this setting, see *AllowAllAppsAccess* the Certificate Payload section of [Configuration Profile Reference](https://developer.apple.com/business/documentation/Configuration-Profile-Reference.pdf) in the Apple developer documentation. |
|**Allow all apps access to private key** |macOS |Set to **Enable** to give apps that are configured for the associated mac device access to the PKCS certificate's private key. <br><br> For more information on this setting, see *AllowAllAppsAccess* the Certificate Payload section of [Configuration Profile Reference](https://developer.apple.com/business/documentation/Configuration-Profile-Reference.pdf) in the Apple developer documentation. |
|**Root Certificate** |<ul><li>Android device administrator </li><li>Android Enterprise (*Device Owner*, *Corporate-Owned and Personally-Owned Work Profile*) |Select a root CA certificate profile that was previously assigned. |

8. This step applies only to **Android Enterprise** devices profiles for **Fully Managed, Dedicated, and Corporate-Owned work Profile**.
Expand Down
Loading

0 comments on commit 761c9d1

Please sign in to comment.