Wi-Fi Settings, Wireless Client, Eap-Ttls - Barco CX-50 Gen2 Installation Manual

Hide thumbs Also See for CX-50 Gen2:
Table of Contents

Advertisement

CX-50 Gen2 Configurator
.crt
.pb7 (Base64 encoded DER)
File should at least contain the root CA certificate for your domain.
4.
Save Changes
Using Auto enrollment
The Simple Certificate Enrolment Protocol (SCEP) is a protocol which enables issuing and revoking of
certificates in a scalable way. SCEP support is included to allow a quicker and smoother integration of the
ClickShare Base Unit and Buttons into the corporate network.
Up until Base Unit firmware version 02.11.01 the SCEP implementation was specifically targeted at the
Network Device enrollment Service (NDES) which is part of Windows Server. From Base Unit firmware
version 02.12.00 and later we support both NDES and standard SCEP.
NDES requires the following parameters:
SCEP Server: This is the IP or hostname of the Windows Server in your network running the NDES service.
Only http is allowed. E.g.: http://myserver or http://10.192.5.1
SCEP username: This is a user in your Active Directory which has the required permission to access the
NDES service and request the challenge password. To be sure of this, the user should be part of the CA
Administrators group (in case of a stand-alone CA) or have enrol permissions on the configured certificate
templates.
SCEP Password: The corresponding password for the SCEP username that you are using to authenticate on
service.
Common Name: The identity you want to link to the certificate.
Image 6–22 Wi-Fi Settings, Wireless Client, EAP-TLS, NDES
SCEP requires the following parameters:
SCEP Server: This is the IP or hostname of Server the server running the SCEP service with the port and
suffix appended. Only http is allowed. E.g.: http://myserver:8080/scep or http://10.192.5.1/test
SCEP Challenge: The corresponding SCEP challenge password.
Common Name: The identity you want to link to the certificate.
Image 6–23 Wi-Fi Settings, Wireless Client, EAP-TLS, SCEP

6.14 Wi-Fi settings, Wireless Client, EAP-TTLS

About EAP-TTLS
EAP-TTLS (Tunneled Transport Layer Security) is an EAP implementation by Juniper networks. It is designed
to provide authentication that is as strong as EAP-TLS, but it does not require each user to be issued a
certificate. Instead, only the authentication servers are issued certificates. User authentication is performed by
86
R5900120 /01
CX-50 Gen2

Advertisement

Chapters

Table of Contents
loading

Table of Contents