From d87d07d8e8c4448aceda5af4bd4841a4f624808f Mon Sep 17 00:00:00 2001
From: Noah Talerman <47070608+noahtalerman@users.noreply.github.com>
Date: Wed, 10 Dec 2025 07:08:59 -0800
Subject: [PATCH] Connect end users to Wi-Fi/VPN: Example Windows profile
(#36993)
Based on learnings w/ `pingali`:
https://docs.google.com/document/d/11sFA_IbgwH4OHv8QBTiRRSx-9cP-CcbdPe5ZQkGeDKg/edit?tab=t.0
---
...nnect-end-user-to-wifi-with-certificate.md | 68 ++++++++++---------
1 file changed, 35 insertions(+), 33 deletions(-)
diff --git a/articles/connect-end-user-to-wifi-with-certificate.md b/articles/connect-end-user-to-wifi-with-certificate.md
index c99eb6108e..356d7ec668 100644
--- a/articles/connect-end-user-to-wifi-with-certificate.md
+++ b/articles/connect-end-user-to-wifi-with-certificate.md
@@ -71,9 +71,9 @@ When Fleet delivers the profile to your hosts, Fleet will replace the variables.
Password
- $FLEET_VAR_DIGICERT_PASSWORD_CA_NAME
+ $FLEET_VAR_DIGICERT_PASSWORD_
PayloadContent
- $FLEET_VAR_DIGICERT_DATA_CA_NAME
+ $FLEET_VAR_DIGICERT_DATA_
PayloadDisplayName
CertificatePKCS12
PayloadIdentifier
@@ -248,7 +248,7 @@ When the profile is delivered to your hosts, Fleet will replace the variables. I
PayloadContent
Challenge
- $FLEET_VAR_SMALLSTEP_SCEP_CHALLENGE_CA_NAME
+ $FLEET_VAR_SMALLSTEP_SCEP_CHALLENGE_
Key Type
RSA
Key Usage
@@ -271,7 +271,7 @@ When the profile is delivered to your hosts, Fleet will replace the variables. I
URL
- $FLEET_VAR_SMALLSTEP_SCEP_PROXY_URL_CA_NAME
+ $FLEET_VAR_SMALLSTEP_SCEP_PROXY_URL_
PayloadDisplayName
WIFI SCEP
@@ -431,7 +431,7 @@ When the profile is delivered to your hosts, Fleet will replace the variables. I
PayloadContent
Challenge
- $FLEET_VAR_CUSTOM_SCEP_CHALLENGE_CA_NAME
+ $FLEET_VAR_CUSTOM_SCEP_CHALLENGE_
Key Type
RSA
Key Usage
@@ -454,7 +454,7 @@ When the profile is delivered to your hosts, Fleet will replace the variables. I
URL
- $FLEET_VAR_CUSTOM_SCEP_PROXY_URL_CA_NAME
+ $FLEET_VAR_CUSTOM_SCEP_PROXY_URL_
PayloadDisplayName
WIFI SCEP
@@ -486,12 +486,12 @@ When the profile is delivered to your hosts, Fleet will replace the variables. I
Windows configuration profile
-To get the CAThumbprint of your SCEP server, see the [advanced section](#how-to-get-the-cathumbprint-for-windows-scep-profiles) below.
+All options in the example profile are required. To get the [CAThumbprint of your SCEP server] follow [these steps](#how-to-get-the-cathumbprint-for-windows-scep-profiles).
-Any options listed under [Device/SCEP](https://learn.microsoft.com/en-us/windows/client-management/mdm/clientcertificateinstall-csp), can be configured with the SCEP profile.
+You can add any other options listed under Device/SCEP in the [Microsoft documentation](https://learn.microsoft.com/en-us/windows/client-management/mdm/clientcertificateinstall-csp).
```xml
-
+
-
./Device/Vendor/MSFT/ClientCertificateInstall/SCEP/$FLEET_VAR_SCEP_WINDOWS_CERTIFICATE_ID
@@ -500,8 +500,8 @@ Any options listed under [Device/SCEP](https://learn.microsoft.com/en-us/windows
node
-
-
+
+
-
./Device/Vendor/MSFT/ClientCertificateInstall/SCEP/$FLEET_VAR_SCEP_WINDOWS_CERTIFICATE_ID/Install/KeyUsage
@@ -511,8 +511,8 @@ Any options listed under [Device/SCEP](https://learn.microsoft.com/en-us/windows
160
-
-
+
+
-
./Device/Vendor/MSFT/ClientCertificateInstall/SCEP/$FLEET_VAR_SCEP_WINDOWS_CERTIFICATE_ID/Install/KeyLength
@@ -522,8 +522,8 @@ Any options listed under [Device/SCEP](https://learn.microsoft.com/en-us/windows
1024
-
-
+
+
-
./Device/Vendor/MSFT/ClientCertificateInstall/SCEP/$FLEET_VAR_SCEP_WINDOWS_CERTIFICATE_ID/Install/HashAlgorithm
@@ -533,8 +533,8 @@ Any options listed under [Device/SCEP](https://learn.microsoft.com/en-us/windows
SHA-1
-
-
+
+
-
./Device/Vendor/MSFT/ClientCertificateInstall/SCEP/$FLEET_VAR_SCEP_WINDOWS_CERTIFICATE_ID/Install/SubjectName
@@ -542,10 +542,10 @@ Any options listed under [Device/SCEP](https://learn.microsoft.com/en-us/windows
chr
- CN=$FLEET_VAR_SCEP_WINDOWS_CERTIFICATE_ID
+ CN=$FLEET_VAR_HOST_HARDWARE_SERIAL WIFI
-
-
+
+
-
./Device/Vendor/MSFT/ClientCertificateInstall/SCEP/$FLEET_VAR_SCEP_WINDOWS_CERTIFICATE_ID/Install/EKUMapping
@@ -555,8 +555,8 @@ Any options listed under [Device/SCEP](https://learn.microsoft.com/en-us/windows
1.3.6.1.5.5.7.3.2
-
-
+
+
-
./Device/Vendor/MSFT/ClientCertificateInstall/SCEP/$FLEET_VAR_SCEP_WINDOWS_CERTIFICATE_ID/Install/ServerURL
@@ -564,10 +564,10 @@ Any options listed under [Device/SCEP](https://learn.microsoft.com/en-us/windows
chr
- $FLEET_VAR_CUSTOM_SCEP_PROXY_URL_CA_NAME
+ $FLEET_VAR_CUSTOM_SCEP_PROXY_URL_
-
-
+
+
-
./Device/Vendor/MSFT/ClientCertificateInstall/SCEP/$FLEET_VAR_SCEP_WINDOWS_CERTIFICATE_ID/Install/Challenge
@@ -575,10 +575,10 @@ Any options listed under [Device/SCEP](https://learn.microsoft.com/en-us/windows
chr
- $FLEET_VAR_CUSTOM_SCEP_CHALLENGE_CA_NAME
+ $FLEET_VAR_CUSTOM_SCEP_CHALLENGE_
-
-
+
+
-
./Device/Vendor/MSFT/ClientCertificateInstall/SCEP/$FLEET_VAR_SCEP_WINDOWS_CERTIFICATE_ID/Install/CAThumbprint
@@ -586,9 +586,9 @@ Any options listed under [Device/SCEP](https://learn.microsoft.com/en-us/windows
chr
- 2133EC6A3CFB8418837BB395188D1A62CA2B96A6
+
-
+
-
@@ -807,11 +807,13 @@ Custom SCEP proxy:
### How to get the CAThumbprint for Windows SCEP profiles
+An example CAThumprint looks like this: `2133EC6A3CFB8418837BB395188D1A62CA2B96A6`
+
Steps to get CAThumbrint from your SCEP server:
-1. Use GetCACert operation to download certificate. For example, open in browser: https://scep-server-url/scep?operation=GetCACert
-2. Run the following command to get the SHA1 Thumbprint
- 1. **Terminal (MacOS)** -> `openssl x509 -inform DER -in /path/to/downloaded-cert.cer -noout -fingerprint -sha1 | sed 's/sha1 Fingerprint=//; s/://g`
+1. In your browser, open the following URL to download a certificate: https:///scep?operation=GetCACert
+2. Run the following command to get the SHA1 Thumbprint:
+ 1. **Terminal (macOS)** -> `openssl x509 -inform DER -in /path/to/downloaded-cert.cer -noout -fingerprint -sha1 | sed 's/sha1 Fingerprint=//; s/://g`
2. **PowerShell (Windows)** -> `$cert = Get-PfxCertificate -FilePath "Z:\scep (1).cer";$cert.Thumbprint`
3. It will return the SHA1 Thumbprint without colons and text. Copy this.
4. Use the copied value for `./Device/Vendor/MSFT/ClientCertificateInstall/SCEP/$FLEET_VAR_SCEP_WINDOWS_CERTIFICATE_ID/Install/CAThumbprint` option.