Skip to main content

Documentation Index

Fetch the complete documentation index at: https://wiki.netgraph-connect.com/llms.txt

Use this file to discover all available pages before exploring further.

The EntryPoint RADIUS service for 802.1X (EAP-TLS) with a device certificate ensures that only authorised devices can access your network by validating certificates issued to each device by your PKI. Authorisation lives in the certificate itself — no per-user account, no backend identity store lookup. The device’s certificate carries a Certificate Group Identifier that the EntryPoint Group matches against. This guide walks the entire setup, end to end: Microsoft Cloud PKI, Intune SCEP and trusted certificate profiles, the Wi-Fi profile, the EntryPoint Context, RADIUS network integration and the device certificate Group.
Modifications to the Microsoft environment should be performed by personnel with appropriate technical expertise to ensure a correct configuration and to mitigate the risk of unintended operational impacts.

1. Create a Microsoft Cloud PKI (Root + Issuing CA)

To issue client certificates to managed devices, your environment needs both a Root Certificate Authority (trust anchor) and an Issuing Certificate Authority (which actually signs device certificates). If you already operate a PKI — on-premises or cloud-based — you can reuse it. The example below shows Microsoft Cloud PKI. In the Microsoft Intune admin center, open Tenant administration → Cloud PKI.
Microsoft Intune admin center Cloud PKI section

Example: Root CA

Follow Microsoft’s official guide to create the Root CA. When finished, click Download certificate — you’ll need the Root CA cert later when configuring EntryPoint.
Cloud PKI Root CA detail page in Microsoft Intune admin center

Example: Issuing CA

The Issuing CA signs certificates for Intune-managed devices. Microsoft Cloud PKI automatically provides a SCEP service that acts as a certificate registration authority — it requests certificates from the Issuing CA on behalf of Intune-managed devices using a SCEP profile. Follow Microsoft’s guide to create the Issuing CA. When finished:
  • Click Download certificate — you’ll need it later.
  • Copy both the CRL distribution point URI and the SCEP URI — they’re needed in the EntryPoint configuration.
Cloud PKI Issuing CA detail page showing SCEP URI and CRL distribution point values

2. Create a SCEP certificate profile — device (Windows)

The SCEP certificate profile tells Intune to enroll a device certificate which the device later presents to EntryPoint during EAP-TLS authentication. In the Microsoft Intune admin center, navigate to Devices → By Platform → Windows → Manage devices → Configuration. Click Create and configure a new SCEP certificate profile.
Microsoft Intune admin center Configuration section under Devices > By Platform > Windows
Use the SCEP URI copied in the previous step. Configure the subject as follows:
  • Subject Name Format: CN={{AAD_Device_ID}}#tls-device#<Certificate Group Identifier>
The #tls-device# token tells EntryPoint to use the <Certificate Group Identifier> value to find the EntryPoint Group that the certificate is mapped to. You’ll define the same identifier on the Group in step 9.
Example SCEP certificate profile in Intune with Subject Name Format using CN, AAD_Device_ID and a Certificate Group Identifier

3. Create a Trusted certificate profile — RADIUS Server Certificate (Windows)

The Trusted certificate profile tells Windows to trust the certificate EntryPoint presents during the TLS handshake. In the Microsoft Intune admin center, navigate to Devices → By Platform → Windows → Manage devices → Configuration. Click Create and configure a new Trusted certificate profile.
Microsoft Intune admin center Configuration section ready to create a new profile
If you don’t yet have your own RADIUS server certificate, you can use the default certificate that ships with the EntryPoint Entra ID Context — return to this step once it’s in place.
Example Trusted certificate profile in Intune for the RADIUS Server certificate

4. Create a Trusted certificate profile — Root CA Certificate (Windows)

A second Trusted certificate profile distributes the Root CA certificate (downloaded in step 1) to managed Windows devices. In the Microsoft Intune admin center, navigate to Devices → By Platform → Windows → Manage devices → Configuration. Click Create and configure a new Trusted certificate profile.
Microsoft Intune admin center Configuration section ready to create a Trusted certificate profile
Upload the Root CA certificate downloaded in step 1.
Example Trusted certificate profile in Intune with the Root CA certificate uploaded

5. Create a Wi-Fi profile (Windows)

The Wi-Fi profile pushes the SSID configuration to managed Windows devices, telling them to authenticate against EntryPoint using EAP-TLS. In the Microsoft Intune admin center, navigate to Devices → By Platform → Windows → Manage devices → Configuration. Click Create and configure a new Wi-Fi profile.
Microsoft Intune admin center Configuration section ready to create a Wi-Fi profile
The example below shows an “Acme Enterprise WiFi” profile — substitute your own SSID and adjust the trust settings to your deployment.
Example Wi-Fi profile in Intune named Acme Enterprise WiFi with EAP-TLS authentication

6. Create an EntryPoint Context

Sign in to the admin dashboard and create a new EntryPoint RADIUSaaS Context.

Switch to EntryPoint RADIUSaaS

In the Services menu, switch to EntryPoint – RADIUSaaS.
Services menu in the admin dashboard with EntryPoint RADIUSaaS selected

Create a new Context

Under Context, click Create. Choose the EntryPoint 2.0 (Dot1x PEAP, Entra) Context type, give your network a name, and click Create Context.
Create Context dialog with the EntryPoint 2.0 (Dot1x PEAP, Entra) type selected

Enable EAP-TLS with Device certificate

In Context Configuration → Client Authentication Methods, enable EAP-TLS and select Device certificate. Click Update Authentication Methods.
Client Authentication Methods configuration with EAP-TLS enabled and Device certificate selected
Device certificates don’t require a backend identity store — the certificate is the identity. Skip the Backend Identity Store configuration.

7. Configure 802.1x Authentication (EAP-TLS)

This step establishes trust between the EntryPoint Context and Microsoft Cloud PKI so the Context validates client certificates issued by Intune.

Open Context configuration

Sign in to the admin dashboard, locate the Context created in step 6 and click Context configuration.
Context list with the Context configuration button highlighted

Configure the SSID

Open 802.1x Authentication. On the SSID tab, enter your SSID name and click Update Dot1x SSID name to save.
SSID tab under 802.1x Authentication with SSID name input and Update Dot1x SSID name button

Open the EAP-TLS tab

Switch to the EAP-TLS tab to add the trusted CAs.
EAP-TLS tab under 802.1x Authentication

Upload the Root and Issuing CA certificates

Upload the Root and Issuing CA certificates downloaded in step 1.
Only PEM-format certificates are supported. Convert DER format using:
  • macOS / Linux: openssl x509 -inform der -in <name>.cer -out <name>.pem
  • Windows: certutil.exe -encode <name>.cer <name>.pem
Click Add Trusted CA → Change Certificate and paste the certificate in PEM format. Repeat for both the Root CA and the Issuing CA.
Trusted CA upload dialog with a Change Certificate field accepting PEM-format input
Trusted CA list after both Root and Issuing CA have been added

Configure the CRL distribution point

Paste in the CRL distribution point URI copied from step 1 and click Update Cert Revocation URL to save.
Cert Revocation URL field with the CRL distribution point URI

8. Configure Network Integration

Network Integration connects your WLAN infrastructure to EntryPoint via three components:
  • RADIUS Client Secret — shared secret for the RADIUS protocol between your WLAN controller and EntryPoint.
  • RADIUS Server Certificate — presented by EntryPoint during the TLS handshake. You can supply your own or use the built-in.
  • RadSec — optional. RADIUS over TLS for encrypted transport between the RADIUS client and EntryPoint, protecting against eavesdropping and man-in-the-middle attacks.

Open Context configuration

Sign in to the admin dashboard, locate the Context and click Context configuration.
Context list with Context configuration button highlighted
Open Network Integration → Basic Settings. The panel shows the RADIUS Hostname, Authentication Port, Accounting Port and RadSec Port you’ll configure on your WLAN controller.
Network Integration Basic Settings panel showing RADIUS Hostname and ports

Set the RADIUS Client Secret

Enter your RADIUS Client Secret and save.
RADIUS Client Secret input field

Upload a RADIUS Server Certificate

Open RADIUS Service → Server Certificate. Click Change certificate for both Certificate and Private Key and paste in your RADIUS Server Certificate and key in PEM format.
Convert formats with openssl or certutil:
  • DER → PEM (Linux/macOS): openssl x509 -inform der -in <name>.cer -out <name>.pem
  • DER → PEM (Windows): certutil.exe -encode <name>.cer <name>.pem
  • PEM → DER (Linux/macOS): openssl x509 -outform der -in <name>.pem -out <name>.crt
  • PEM → DER (Windows): certutil.exe -decode <name>.pem <name>.crt
If you don’t have your own certificate, use the built-in default that ships with the Context.
RADIUS Server Certificate upload UI with Certificate and Private Key fields

Enable RadSec (optional)

Enable RadSec and upload your infrastructure certificate. If you haven’t obtained the RADIUS Server Certificate yet, download it from EntryPoint via Download Server Certificate and configure RadSec on your WLAN infrastructure accordingly.
RadSec configuration panel

9. Create the Device Certificate Group

The device certificate Group is what the certificate’s Certificate Group Identifier matches against. Every device issued a certificate with the matching identifier ends up in this EntryPoint Group, inheriting its Attribute Profile.

Open the Context and add a Group

Sign in, open the Context and click Add Group on the left.
Context page with the Add Group action highlighted

Create a 802.1X-TLS with Device Certificate Group

In the drop-down menu, select 802.1X-TLS with Device Certificate. Name the Group and click Create TLS Device Certificate Group.
Add Group dialog with the 802.1X-TLS with Device Certificate type selected and a Group name input

Group created

The Group — Consultants with cert in this example — appears in the Context’s Group list.
Group list with the newly created Consultants with cert device certificate Group

Group Settings — set the Certificate Group Identifier

On the Group Settings tab you can:
  • Attach pre-configured Group Attribute Profiles.
  • Set the Certificate Group Identifier — the string the SCEP profile writes into the certificate’s Subject Alternative Name (the <Certificate Group Identifier> token from step 2). Devices whose certificate carries this identifier are placed in this EntryPoint Group.
  • Rename the Group.
  • Remove the Group via Remove Group.
Group Settings tab with Group Attribute Profiles, Certificate Group Identifier, Group Name and Remove Group controls

Setup with Microsoft Entra ID

The user-certificate variant with full Entra group mapping and Graph API integration.

EAP-TLS with Entra overview

The concepts behind certificate-based 802.1X with EntryPoint.

Device certificates and Intune

Device-cert specifics and Device Compliance Check.

Trusted certificates

Uploading the CA chain the Context validates against.