Add wired network settings for macOS devices in Microsoft Intune
Note
Intune may support more settings than the settings listed in this article. Not all settings are documented, and won't be documented. To see the settings you can configure, create a device configuration policy, and select Settings Catalog. For more information, go to Settings catalog.
You can create a profile with specific wired network settings, and then deploy this profile to your macOS devices. Microsoft Intune offers many features, including authenticating to your network, adding a Simple Certificate Enrollment Protocol (SCEP) certificate, and more.
This feature applies to:
- macOS
This article describes the settings you can configure.
Before you begin
These settings are available for all enrollment types. For more information on the enrollment types, go to macOS enrollment.
Wired Network
Network Interface: Select the network interfaces on the device the profile applies to, based on service-order priority. Your options:
- First active Ethernet (default)
- Second active Ethernet
- Third active Ethernet
- First Ethernet
- Second Ethernet
- Third Ethernet
- Any Ethernet
Options with "active" in the title use interfaces that are actively working on the device. If there are no active interfaces, the next interface in service-order priority is configured. By default, First active Ethernet is selected, which is also the default setting configured by macOS.
Deployment channel: Select how you want to deploy the profile. This setting also determines the keychain where the authentication certificates are stored, so it's important to select the proper channel. It's not possible to edit the deployment channel after you deploy the profile. To do so, you must create a new profile.
Note
We recommend rechecking the deployment channel setting in existing profiles when the linked authentication certificates are up for renewal to ensure the intended channel is selected. If it isn't, create a new profile with the correct deployment channel.
You have two options:
- User channel: Always select the user deployment channel in profiles with user certificates. This option stores certificates in the user keychain.
- Device channel: Always select the device deployment channel in profiles with device certificates. This option stores certificates in the system keychain.
EAP type: To authenticate secured wired connections, select the Extensible Authentication Protocol (EAP) type. Your options:
EAP-FAST: Enter the Protected Access Credential (PAC) Settings. This option uses protected access credentials to create an authenticated tunnel between the client and the authentication server. Your options:
- Do not use (PAC)
- Use (PAC): If an existing PAC file exists, use it.
- Use and Provision PAC: Create and add the PAC file to your devices.
- Use and Provision PAC Anonymously: Create and add the PAC file to your devices without authenticating to the server.
EAP-TLS: Also enter:
- Server Trust - Certificate server names: Enter one or more common names used in the certificates issued by your trusted certificate authority (CA). When you enter this information, you can bypass the dynamic trust window shown on user devices when they connect to this network.
- Root certificate for server validation: Select one or more existing trusted root certificate profiles. When the client connects to the network, these certificates are used to establish a chain of trust with the server. If your authentication server uses a public certificate, then you don't need to include a root certificate.
- Client Authentication - Certificates: Select an existing SCEP client certificate profile that is also deployed to the device. This certificate is the identity presented by the device to the server to authenticate the connection. Public Key Cryptography Standards (PKCS) certificates aren't supported.
- Identity privacy (outer identity): Enter the text sent in the response to an EAP identity request. This text can be any value, such as
anonymous
. During authentication, this anonymous identity is initially sent. Then, the real identification is sent in a secure tunnel.
EAP-TTLS: Also enter:
- Server Trust - Certificate server names: Enter one or more common names used in the certificates issued by your trusted certificate authority (CA). When you enter this information, you can bypass the dynamic trust window shown on user devices when they connect to this network.
- Root certificate for server validation: Select one or more existing trusted root certificate profiles. When the client connects to the network, these certificates are used to establish a chain of trust with the server. If your authentication server uses a public certificate, then you don't need to include a root certificate.
- Client Authentication: Select an Authentication method. Your options:
- Username and Password: Prompts the user for a user name and password to authenticate the connection. Also enter:
- Non-EAP method (inner identity): Select how you authenticate the connection. Be sure you choose the same protocol that is configured on your network. Your options:
- Unencrypted password (PAP)
- Challenge Handshake Authentication Protocol (CHAP)
- Microsoft CHAP (MS-CHAP)
- Microsoft CHAP Version 2 (MS-CHAP v2)
- Non-EAP method (inner identity): Select how you authenticate the connection. Be sure you choose the same protocol that is configured on your network. Your options:
- Certificates: Select an existing SCEP client certificate profile that is also deployed to the device. This certificate is the identity presented by the device to the server to authenticate the connection. PKCS certificates aren't supported. Choose the certificate that aligns with your deployment channel selection. If you selected the user channel, your certificate options are limited to user certificate profiles. If you selected the device channel, you have both user and device certificate profiles to choose from. However, we recommend always selecting the certificate type that aligns with the selected channel. Storing user certificates in the system keychain increases security risks.
- Identity privacy (outer identity): Enter the text sent in the response to an EAP identity request. This text can be any value, such as
anonymous
. During authentication, this anonymous identity is initially sent. Then, the real identification is sent in a secure tunnel.
- Username and Password: Prompts the user for a user name and password to authenticate the connection. Also enter:
LEAP
PEAP: Also enter:
- Server Trust - Certificate server names: Enter one or more common names used in the certificates issued by your trusted certificate authority (CA). When you enter this information, you can bypass the dynamic trust window shown on user devices when they connect to this network.
- Root certificate for server validation: Select one or more existing trusted root certificate profiles. When the client connects to the network, these certificates are used to establish a chain of trust with the server. If your authentication server uses a public certificate, then you don't need to include a root certificate.
- Client Authentication: Select an Authentication method. Your options:
- Username and Password: Prompts the user for a user name and password to authenticate the connection.
- Certificates: Select an existing SCEP client certificate profile that is also deployed to the device. This certificate is the identity presented by the device to the server to authenticate the connection. PKCS certificates aren't supported.
- Identity privacy (outer identity): Enter the text sent in the response to an EAP identity request. This text can be any value, such as
anonymous
. During authentication, this anonymous identity is initially sent. Then, the real identification is sent in a secure tunnel.
Related articles
- Be sure to assign this profile, and monitor its status.
- Learn more about the wired network settings for Windows devices.