WiFi EAP authentication and iOS device setup options?

Franta Hanzlík franta at hanzlici.cz
Sat Oct 4 07:31:45 UTC 2025


Hello Alan DeKok and Alan Buxey,

thanks for help - with "MDM"+".mobileconfig", finding information is easy!
But if I may, a few more questions:

On Fri, 3 Oct 2025 11:00:57 -0400
Alan DeKok <alan.dekok at inkbridge.io> wrote:

> On Oct 3, 2025, at 8:36 AM, Franta Hanzlík via Freeradius-Users <freeradius-users at lists.freeradius.org> wrote:
> > I finally managed to set up very basic EAP-PEAP and EAP-TTLS MSCHAP2 
> > authentication in a Freeradius + Mikrotik MT network (users and their 
> > passwords in cleartext in text file), with a Let's Encrypt certificate 
> > in the eap{tls-config tls-common {}} section).  
> 
>   That's good.
> 
> > Connecting from a Linux NTB and Android (v9 and v11) phone is without 
> > problems for both TTLS and PEAP, in the WiFi network settings I can 
> > choose a whole range of parameters (EAP method, phase 2 authentication
> > method, certificate selection, CRL usage, domain, identity and anonymous 
> > identity,...).  
> 
>   That works, but isn't quite as good as it could be, for reasons I'll
> outline below.
> 
>   i.e. you've done nothing wrong, but the Android / Linux workflow should
> be done better on their end.
> 
> > And now I tried connecting an iOS (v15) tablet - and this device only 
> > requires a username and password. Then it asks if the user trusts Let's 
> > Encrypt certificate (which it says is untrusted), and then it connects 
> > to the network without any problems.  
> 
>   Yup.
> 
> > Please excuse the possibly stupid questions, but I have no experience 
> > with Apple iOS devices at all - so I would like to ask for an explanation
> > - is this normal with iOS? :  
> 
>   Yes.
> 
> > - that you can't set basically any WiFi network parameters (after 
> > connecting, you can set automatic connection to the network, and 
> > randomization of the MAC address - but that's probably all)  
> 
>   You can, but you need to do that via a ".mobileconfig" file for iOS and OSX.
> 
> > - when I used a certificate generated by the resources in raddb/certs/ 
> > instead of the Lets Encrypt certificate, both Linux and Android clients 
> > connected to the network, but the iOS tablet ended up with the error aka
> > "Cannot connect to this network." - is that why?  
> 
>   No.

Do you mean that with a FR certificate generated using certs/Makefile, 
connecting an iOS device to a WiFi network should also work (probably 
after agreeing to an untrusted certificate)?
It's possible that I made a mistake somewhere.

>   It's because iOS has no idea where that certificate comes from.  It
> doesn't know about the certificate authority, and therefore doesn't trust
> the certificate.

I assumed that iOS contains some set of the most common CAs (like other 
major advanced OSes), and that it decides based on whether the NAS/FR 
certificate is signed by a CA known to it - therefore it accepted the 
Let's Encrypt certificate, and therefore rejected the connection with 
the self-generated certificate.

When a supplicant makes an anonymous TLS tunnel, verifying the certificate 
to be issued by a known legitimate CA for a known server (-> domain) is 
the only applicable security feature. Most likely there are such 
"professional" certificates containing EAP purpose and name /
 organization / domain of the NAS operator). But that is beyond my small 
needs for now...

>   If you use a .mobileconfig, you can put the CA certificate and the
> server certificate in there, and then iOS will import it and trust it.

This is probably a solution for larger corporate networks.
Not for when a friend comes to visit me with an iPad...


> > - why does marks the Let's Encrypt certificate as untrustworthy?  
> 
>   Because it's a _web_ certificate, and not an _eap_ certificate.  They
> are very different things.
> 
>   For various technical reasons, "certificate" almost always means "web
> certificate".  It's possible to have many different kinds of certs and
> CAs.  For example there should really be a separate CA for EAP.  Using
> the same CA for EAP as for the web arguably violates various CA/Browser
> forum rules.

Indeed, when I look at the "Key usage" tab in XCA (the GUI SW CA manager 
I use), there are also the items "EAP over PPP" and "EAP over LAN" - most 
likely suitable for these purposes (

>   So it "works", in that people can get online using a LetsEncrpyt cert.
> But there are likely to be various complaints about the certificates, and
> the process is not as seamless as it should be.
> 
>   These issues are 100% on the OS vendors, the WiFi standards bodies, the
> CA/Browser forum, etc.  It's just the way it is, and so far no one has
> been willing to fix them.  The result is that the EAP workflow is weird,
> and there isn't much that anyone can do about it.

Apple's approach seems reasonable, as the end user can connect without much 
technical knowledge. I was just surprised that it is very different from 
the configuration in Android/Linux/Windows.

> 
>   Alan DeKok.
-- 
Again, many thanks for Your excellent support!
Franta Hanzlík


More information about the Freeradius-Users mailing list