EAP-TTLS PEAP MCHAPv2
Reimer Karlsen-Masur, DFN-CERT
karlsen-masur at dfn-cert.de
Wed May 2 09:40:59 CEST 2007
Hey.
Append all intermediate CA certificates onto the end of the file specified
with the "certificate_file" option in the eap.conf files eap->tls section.
This file usually hold your RADIUS server certificate and can additionally
hold the chain certificates as well.
Eshun Benjamin wrote:
>
> I am using an enterprise certificate which has intermediate CA. The root
> CA is well known (verisign) and already on the MAC keychain access(3.3)
> by default. MAC recognises the certificate and its validity but
> complains of "The server certificate is not trusted because there
> are no explicit trust settings". If I click continue or always trust it
> works fine but I want to get rid of this prompt without clicking
> continue or always trust to give it smooth and uninteractive log on.
--
Kind Regards
Reimer Karlsen-Masur
DFN-PKI FAQ: https://www.pki.dfn.de/faqpki
--
Dipl.-Inform. Reimer Karlsen-Masur (PKI Team), Phone +49 40 808077-615
DFN-CERT Services GmbH, https://www.dfn-cert.de, Phone +49 40 808077-555
Sitz / Register: Hamburg, AG Hamburg, HRB 88805, Ust-IdNr.: DE 232129737
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/x-pkcs7-signature
Size: 5853 bytes
Desc: S/MIME Cryptographic Signature
URL: <http://lists.freeradius.org/pipermail/freeradius-users/attachments/20070502/78a742c3/attachment.bin>
More information about the Freeradius-Users
mailing list