Jump to content

Mobile Jon

Members
  • Posts

    4
  • Joined

  • Last visited

3 Followers

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. I wanted to post something here because in some verticals like retail, some people are just moving to Android 11 now (I know of a very large retailer where this is the case). Starting in Android 11, Google is starting to validate the RADIUS certificate chain for devices using EAP-TLS (Cert-Based Auth for WiFi). One of the more common things over the years going back to the SEG days is people do not know how to build certificates correctly. Often, we just get the certificate from the security team and move on, but you end up having to rip apart the PFX to build the chain correctly. I'll throw this here just for others: Re-create the PFX: ##Extract the Key## openssl pkcs12 -in test.pfx -nocerts -out test.key ##Extract the CER## openssl pkcs12 -in test.pfx -clcerts -nokeys -out test.cer ##Decrypt the Private Key## openssl rsa -in test.key -out test-decrypted.key After you do that, you open up the test.cer in Notepad++ preferably and paste in the text of your intermediate certs followed by your root certificates and save it. Once that is done, you re-create your PFX: ##Create a PFX## openssl pkcs12 -export -out test.pfx -inkey test-decrypted.key -in test.cer -certfile cert-chain.pem For the Android issue, you don't need to re-create the PFX. You just need to upload that test.cer. In additional leverage the KB article for reference below to push down the SDK settings to your Android Intelligent Hub to ensure WiFi supports a full client certificate chain. KB Article for reference: AAGNT-195041 - Certificates incorrectly installed for WPA2 Enterprise WiFi for Android 11+ (89264) (omnissa.com)
  2. One thing to note, that I didn't love when I first started building this out a long time ago. When you register a FIDO2 key credential from WS1 Access, it does not hide it if you try to go looking for it e.g. with a tool like this: yubikey-manager (yubico.com) Other implementations of FIDO2 (like Ping.. makes me sad I mention them in a positive light), do hide the relationships on biometric devices.
  3. For what it is worth, you can absolutely create an authentication loop in Okta. I did this to myself when I first was building the integration. Inevitably, it depends on how you want to tie the two of them together. I personally still prefer to use User Agent redirection because I don't like OIC's new solution for Mobile SSO.
×
×
  • Create New...