-
Notifications
You must be signed in to change notification settings - Fork 472
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Help end users connect to Wi-Fi with certificates from certificate authority (NDES, DigiCert, etc.) #13420
Comments
First pass at the workflow for this^ in Fleet:
|
Hey @Patagonia121, heads up, we didn't have the space to take this on in the current design sprint (4.48). It's a relatively large level of effort. Like #13418, let's move quickly and meet with @alexmitchelliii to discuss the plan for addressing this customer request. |
Moved an earlier version of the issue description here for safekeeping: UPDATE: This story is about making Fleet work w/ any certificate authorities (CAs) (ex. Digicert, Smallstep, AD CS, NDES, etc.). Stories for integrating Fleet w/ specific CAs are here:
(noahtalerman 2024-09-10) Goal
User journey
Changes
Product
Engineering
Product quality
Context
QARisk assessment
Manual testing steps
Testing notesConfirmation
|
I processed the wall of text a bit: Key Suggestions and Observations Structural Changes
IT Admin Requirements for Certificate Management
Challenges and Edge Cases
Supported Features and Integrations
Future Considerations
Final Notes
|
Moving these other
These are less relevant to design/building the request than the Gong snippets in the issue description. |
prospect-blondelet
: Gong snippet: https://us-65885.app.gong.io/call?id=834076390531746995&highlights=%5B%7B%22type%22%3A%22SHARE%22%2C%22from%22%3A1695%2C%22to%22%3A1847%7D%5Dprospect-blondelet
is ensuring automatic certificate renewal. See this Slack thread: https://fleetdm.slack.com/archives/C07AK6CUDFC/p1738262762662739customer-pingali
: Gong snippets:pingali
pulling up their current MDM solution to show us how this is configured (entire 30 min call but skip around to see different parts): https://us-65885.app.gong.io/call?id=5687455957318183995customer-cisneros
: Gong snippet: TODOcustomer-montague
: Gong snippet: TODOcustomer-pingali
: Gong snippet: TODOcustomer-reedtimmer
: Gong snippet: TODOcustomer-rocher
: Gong snippet: TODOcustomer-ufa
: Gong snippet: TODOSystem
orUser
for thePayloadScope
key in the configuration profile.ssh
ing into the AWS production environment) in common enterprise setups, IT admins need to be able to deliver a certificate to the device. Normally on macOS, admins do this with a config profile. In the profile (the OS setting) I deploy to my Macs, there is always a URL of the certificate authority (ex. Digicert, Smallstep, AD CS, NDES, etc.) In its simplest form, the device could talk directly to this CA URL to get whatever scraps it needs to build a certificate locally and store in the keychain. (The only problem is no one wants it to work that way.) People don't want to have devices talk directly to the CA. (why? because if your CA gets compromised, you're hosed. Customers ideally want only the Fleet server to be able to communicate with the CA, not every laptop at a random Starbucks.) In those cases, the IT admin instead gives Fleet the secrets and the CA URL needed to talk directly to the CA, and then, deploys a profile (.mobileconfig) --ideally managed by the integration and abstracted, like how we handle the "Disk encryption" in the UI, not something you're building yourself by hand. Then that .mobileconfig file with the data from the CA gets sent down to the device so that it can assemble the certifcate and stick it in the keychain. IT expects the certificate to be fully managed by the integration -- to be renewed automatically on the device before it expires (what if the device is off for over a year-- what edge cases will come up? How does this commonly look on windows?)@noahtalerman: Other MDM solutions report a list of certificates deployed and their status: revoked, inactive, expired
@nonpunctual Just want to point out that all organizations that I have seen with 802.1x do not start with anyone creating a wi-fi profile. This is possible, but, with enterprise wi-fi the device is negotiating a RADIUS server with 802.1x authorization & authentication. In all the Jamf instances I have seen what this is means is that the AD CS or SCEP proxy template is used to create a cert that is placed in the keychain so when the device tries to talk to the RADIUS server to get on the wi-fi, the cert is in place to authenticate & authorize the device. @noahtalerman
Please see: https://support.apple.com/guide/deployment/connect-to-8021x-networks-depabc994b84/web
User stories
The text was updated successfully, but these errors were encountered: