Chromebook OS - EAP-PEAP Configuration
Configure Chromebook devices to connect to IronWifi WPA-Enterprise wireless networks using EAP-PEAP authentication. This guide covers both manual configuration for individual devices and centralized deployment through Google Workspace Admin Console.
Overview
EAP-PEAP provides secure wireless authentication using username and password credentials. Chrome OS fully supports EAP-PEAP for enterprise Wi-Fi connections.
Prerequisites
- Chrome OS 70 or later
- Valid IronWifi user credentials
- Wireless network configured with WPA2-Enterprise
Configuration Steps
Manual Configuration
- Click the time/battery area in the bottom right corner
- Click the Settings gear icon
- Select Network > Wi-Fi
- Click Add connection (or select your network)
- Configure:
- SSID: Your network name
- Security: EAP
- EAP method: PEAP
- EAP Phase 2 authentication: MSCHAPv2
- Server CA certificate: Default or select installed cert
- Identity: Your username (usually email address)
- Password: Your password
- Click Connect
Network Settings Detail
| Setting | Value |
|---|---|
| Security | EAP |
| EAP method | PEAP |
| Phase 2 authentication | MSCHAPv2 |
| Server CA certificate | Default / Do not check / Installed cert |
| Subject match | (optional) Server hostname |
| Identity | Your username |
| Password | Your password |
Certificate Configuration
Using Default Certificates
Chrome OS includes common CA certificates. Select Default for Server CA certificate if your RADIUS server uses a publicly trusted certificate.
Installing Custom CA Certificate
If using a private CA:
- Open Settings > Security and Privacy
- Click Manage certificates
- Select Authorities tab
- Click Import
- Select your CA certificate file
- Check Trust this certificate for identifying websites
- Click OK
Then in Wi-Fi settings, select your installed certificate.
Google Admin Console Deployment
For managed Chromebooks, deploy via Google Admin Console:
Create Wi-Fi Network
- Sign in to admin.google.com
- Go to Devices > Networks > Wi-Fi
- Click Add Wi-Fi
- Configure:
- Name: Network display name
- SSID: Your network SSID
- Security type: WPA2-Enterprise (802.1X)
- EAP method: PEAP
- Inner protocol: MSCHAPv2
- Identity:
${LOGIN_ID}(uses user's Google account)
Apply to Organizational Unit
- Select Organizational units to apply the policy
- Click Save
- Networks will automatically configure on managed devices
Certificate Deployment
To deploy CA certificates:
- Go to Devices > Networks > Certificates
- Click Add certificate
- Upload your CA certificate
- Select organizational units
- Reference the certificate in your Wi-Fi configuration
Identity Variables
Google Admin Console supports these variables for automatic identity:
| Variable | Description |
|---|---|
${LOGIN_ID} | User's Google account email |
${LOGIN_EMAIL} | Same as LOGIN_ID |
${DEVICE_SERIAL_NUMBER} | Device serial number |
${DEVICE_ASSET_ID} | Asset ID if configured |
Troubleshooting
"Connection Failed" Error
- Verify username and password
- Check the network is within range
- Ensure account is active in IronWifi
- Try forgetting and re-adding the network
Certificate Errors
If certificate validation fails:
- Try setting Server CA certificate to Do not check (testing only)
- Install the correct CA certificate
- Verify the server hostname matches the certificate
Auto-Connect Not Working
- Check that Automatically connect is enabled
- Verify the network is in range
- Review if credentials have expired
Managed Network Override
If a managed network isn't working:
- Contact your Google Workspace admin
- Check policy in chrome://policy
- Review network configuration in Admin Console
Guest Mode Limitations
In Guest mode:
- Enterprise networks may not be available
- Installed certificates are not accessible
- Use signed-in user session for EAP networks
Kiosk Mode
For Chromebooks in kiosk mode:
- Configure network in Admin Console
- Use device-level network policies
- Test connectivity before deploying
Related Topics
- Chromebook - EAP-TLS - Certificate authentication
- Windows - EAP-PEAP - Windows configuration
- Google Workspace Integration - SSO setup