Chromebook OS - EAP-TLS Configuration
Configure Chromebook devices for secure, certificate-based authentication to IronWifi WPA-Enterprise wireless networks using EAP-TLS. This passwordless authentication method leverages Chrome OS's native security features including TPM hardware protection.
Overview
EAP-TLS is a highly secure enterprise Wi-Fi authentication method that uses certificates instead of passwords. Chromebooks support EAP-TLS natively, making them ideal for certificate-based enterprise deployments.
Prerequisites
- Chrome OS 70 or later
- Client certificate installed on the device
- CA certificate for the RADIUS server
- Wireless network configured with WPA2-Enterprise
Certificate Installation
Manual Certificate Installation
- Open Settings > Security and Privacy
- Click Manage certificates
- To install CA certificate:
- Select Authorities tab
- Click Import
- Select your CA certificate file
- To install client certificate:
- Select Your certificates tab
- Click Import and bind
- Select your
.p12or.pfxfile - Enter the certificate password
Google Admin Console (Managed Devices)
For enterprise deployment:
- Sign in to admin.google.com
- Go to Devices > Networks > Certificates
- Click Add certificate
- Select certificate type:
- Server CA certificate for RADIUS server validation
- User certificate for client authentication
- Upload the certificate
- Select organizational units
- Click Save
Configuration Steps
Manual Configuration
- Click the time/battery area in the bottom right
- Click Settings > Network > Wi-Fi
- Click Add connection
- Configure:
- SSID: Your network name
- Security: EAP
- EAP method: EAP-TLS
- Server CA certificate: Select installed CA cert
- User certificate: Select your client certificate
- Identity: Your username (from certificate subject)
- Click Connect
Configuration Settings
| Setting | Value |
|---|---|
| Security | EAP |
| EAP method | EAP-TLS |
| Server CA certificate | Your RADIUS CA cert |
| Subject match | (optional) RADIUS server hostname |
| User certificate | Your client certificate |
| Identity | Username or email |
Google Admin Console Deployment
Create Network Configuration
- Go to admin.google.com
- Navigate to Devices > Networks > Wi-Fi
- Click Add Wi-Fi
- Configure:
- Name: Display name for the network
- SSID: Your wireless network SSID
- Security type: WPA2-Enterprise (802.1X)
- EAP method: EAP-TLS
- Server CA certificate: Select deployed cert
- Client certificate: Reference deployed client cert
Certificate References
Reference certificates using their names:
Server CA Certificate: IronWifi-CA
User Certificate: ${USER_CERT}
Automatic Identity
Use identity variables:
${LOGIN_ID}- User's Google account${CERT_SUBJECT_CN}- Certificate common name
SCEP Integration
For automatic certificate provisioning:
Configure SCEP in Google Admin
- Go to Devices > Networks > Certificates
- Click Add certificate > SCEP
- Configure SCEP server URL from IronWifi console
- Set certificate template parameters
- Apply to organizational units
IronWifi SCEP Setup
- In IronWifi console, go to Users > Connectors
- Create new SCEP Connector
- Copy the SCEP URL
- Configure certificate subject template
Troubleshooting
"No User Certificate Found"
- Verify certificate is installed in Your certificates
- Check the certificate has a private key
- Try re-importing the certificate
- Ensure certificate isn't expired
"Authentication Failed"
- Verify certificate subject matches IronWifi username
- Check certificate hasn't been revoked
- Ensure CA certificate is correctly installed
- Review IronWifi authentication logs
Certificate Not Appearing
- Check certificate format (
.p12,.pfxsupported) - Verify password is correct
- Certificate may need private key included
- Try importing via Chrome (chrome://settings/certificates)
Server Certificate Validation Error
- Install the correct CA certificate
- Verify Subject match setting
- Check server certificate hasn't expired
TPM-Based Certificates
Chrome OS can store certificates in the TPM (Trusted Platform Module):
- Provides hardware-based key protection
- Keys cannot be exported
- Required for some enterprise deployments
To use TPM:
- Select Import and bind when importing certificates
- Keys will be stored in hardware
Managed Guest Sessions
For shared Chromebooks using managed guest sessions:
- Configure network at device level (not user level)
- Use device certificates instead of user certificates
- Deploy via Admin Console organizational units
Related Topics
- Chromebook - EAP-PEAP - Password authentication
- SCEP with Intune - Certificate provisioning
- Google Workspace Integration - SSO setup