This Library Item is available for Apple and Windows devices
Create a Wi-Fi Profile Library Item
To add this Library Item to your Iru Endpoint Library, follow the steps outlined in the Library Overview article.General Settings
- Apple
- Windows
Configure auto join
If you want devices to automatically join this network when it is available, select Auto join network. If you do not select Auto join network, devices will know how to connect to the network, but the user will have to choose to do so.
Set hidden network (if needed)
If the network is hidden—i.e., it does not broadcast its SSID—select Hidden network. Hidden networks are not standards-compliant and are not recommended.
Available for iOS 14+ and later versions.
Authentication
- Apple
- Windows
None
Use the None authentication type when no password is necessary to join the network. If a network with the specified SSID is available and does not require authentication, the device will attempt to join it.- No password is required.
- Devices automatically connect if the SSID is available.
Pre-Shared Key (PSK)
PSK authentication is commonly used in home and small business environments. Anyone who has the network’s shared password can join it.Select security type
Choose from: WEP, WPA Personal, WPA2 Personal, WPA3 Personal, or Any Personal. Any Personal will work with any of the methods above, and it is useful when some locations use WPA2, and others use WPA3.
Enterprise (802.1X EAP)
Enterprise authentication uses 802.1X to provide more secure authentication options when connecting to Wi-Fi networks. Enterprise authentication types include:- Dynamic WEP
- WPA Enterprise
- WPA2 Enterprise
- WPA3 Enterprise
- Identity certificates (SCEP or PKCS #12)
- Trusted server certificates
- User authentication (username/password, smartcard, or certificates)
Certificate options are only available if you select one of the WPA Enterprise options in the Authentication type dropdown.
Select authentication type
For Authentication type, choose Dynamic WEP, WPA Enterprise, WPA2 Enterprise, or WPA3 Enterprise.
Configure login window settings (macOS)
On macOS, if you wish to authenticate to the network as the user that logs in at the login window, select Use as a Login Window configuration. Otherwise, the configuration is considered a System configuration, and Mac systems will be able to authenticate to the network when a user has not logged in. You can also use this option in conjunction with EAP-TLS so a certificate identity is used to authenticate the system before login, but then login window credentials are used to authenticate the user.
Select EAP types
Select the Accepted EAP Types your network supports. You may select more than one and will need to set all the settings necessary for the selected EAP types. For more information on configuring specific EAP types, refer to Configure Enterprise Wi-Fi authentication protocols.
Using this configuration requires integration with a directory service. See this Apple support article for more information.
Configure an Identity Certificate
You can configure an identity certificate using SCEP or by uploading a PKCS #12 file. For instructions on configuring identity certificates, see our Using Identity Certificates for 802.1X Authentication support article.Proxy
Proxy settings are available for Apple devices only
Configure PAC fallback (optional)
If you want devices to attempt to connect directly to destinations when the PAC file is not available, select Proxy PAC fallback allowed.
Fast Lane Marking
Fast Lane marking is available for Apple devices only
Fast Lane is not supported by all networks or devices and is primarily available on Apple devices.
Add applications to allow list
Fast Lane applies to network traffic from specific apps. Click Add application to add apps to the allow list.
Search apps by name
To add apps from your Iru Library, enter the app’s name under Search by name. Select the apps you want to allow to use Fast Lane.
Configure Bundle ID details
Provide the App Name and Bundle ID and click Add. You can add multiple Bundle IDs.
Certificate Trust Settings
Specifying trusted certificates in the Wi-Fi Library Item is not recommended. If certificates are renewed or changed, you will need to redeploy the entire Wi-Fi profile, potentially causing devices to disconnect from the Wi-Fi network. Instead, install the trusted certificate chain for your RADIUS server(s) using a separate Certificates Library item. Then specify the name of those certificates in the Wi-Fi Library item under Specify server certificate names. See Apple Platform Deployment for more information. Most enterprise Wi-Fi environments require that devices trust the 802.1X authentication server(s), typically a Remote Access Dial-In User Server (RADIUS). The Certificate trust settings allow you to configure which certificates presented by the server devices will trust. If a device does not trust the authentication server(s), the user will be prompted to trust it.Specify trusted certificates (optional)
Select Specify trusted certificates if you want to provide certificates for the configured devices to trust. Then upload the certificates in .cer or .crt format.