EAP-TTLS PEAP MCHAPv2

Reimer Karlsen-Masur, DFN-CERT karlsen-masur at dfn-cert.de
Wed May 2 09:40:59 CEST 2007


Hey.

Append all intermediate CA certificates onto the end of the file specified
with the "certificate_file" option in the eap.conf files eap->tls section.
This file usually hold your RADIUS server certificate and can additionally
hold the chain certificates as well.

Eshun Benjamin wrote:
> 
> I am using an enterprise certificate which has intermediate CA. The root
> CA is well known (verisign) and already on the MAC keychain access(3.3)
> by default. MAC recognises the certificate and its validity but
> complains of  "The server certificate  is  not trusted  because  there
> are no explicit trust  settings". If I click continue or always trust it
> works fine but I want to get rid of this prompt  without clicking
> continue or always trust to give it smooth and uninteractive log on.


-- 
Kind Regards

Reimer Karlsen-Masur

DFN-PKI FAQ: https://www.pki.dfn.de/faqpki
--
Dipl.-Inform. Reimer Karlsen-Masur (PKI Team), Phone +49 40 808077-615
DFN-CERT Services GmbH, https://www.dfn-cert.de, Phone +49 40 808077-555
Sitz / Register: Hamburg, AG Hamburg, HRB 88805, Ust-IdNr.: DE 232129737
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/x-pkcs7-signature
Size: 5853 bytes
Desc: S/MIME Cryptographic Signature
URL: <http://lists.freeradius.org/pipermail/freeradius-users/attachments/20070502/78a742c3/attachment.bin>


More information about the Freeradius-Users mailing list