Google Admin Console MDM Integration
Deploy WPA-Enterprise WiFi profiles and EAP-TLS certificates to managed Chrome OS, Android Enterprise, and iOS devices using Google Admin Console with certificate distribution.
Overview
The Google Admin Console MDM integration enables:
- WiFi profile deployment to Chrome OS and Android devices
- Certificate-based authentication (EAP-TLS)
- Centralized management through Google Workspace
- Automatic provisioning for enrolled devices
- Policy enforcement for secure connectivity
Supported Platforms
| Platform | WiFi Profiles | Certificates | Management Level |
|---|---|---|---|
| Chrome OS | ✓ Full support | ✓ SCEP/Manual | Enterprise enrollment |
| Android Enterprise | ✓ Full support | ✓ SCEP/Manual | Fully managed, Work profile |
| iOS/iPadOS | ✓ Limited | ✓ Manual | Basic MDM |
| Windows/macOS | ✗ Not supported | ✗ | Use alternative MDM |
Prerequisites
- IronWifi account with WPA-Enterprise configured
- Google Workspace Enterprise or Education edition
- Google Admin Console access (Super Admin)
- Devices enrolled in Google Admin management
- IronWifi SCEP service enabled (for certificate-based auth)
Architecture Overview
Managed Device → Google Admin Console → WiFi Policy → IronWifi RADIUS
↓
Certificate → IronWifi CA → Authentication
IronWifi SCEP Configuration
Step 1: Enable SCEP Service
- Log in to IronWifi Console
- Navigate to Account > PKI Infrastructure
- Enable SCEP service
- Configure certificate settings:
- Key Size: 2048-bit (minimum)
- Validity Period: 365 days
- Subject Format: CN=%USERNAME% or CN=%DEVICE_ID%
- Note your SCEP URL:
https://scep.ironwifi.com/your-org
Step 2: Download Root Certificate
- In PKI settings, download the Root CA certificate
- Save as
.pemor.derformat - You'll upload this to Google Admin Console
Step 3: Generate Challenge Password
- Create a SCEP challenge password
- Store securely for Google Admin configuration
- Can use same challenge for all enrollments or unique per device
Chrome OS Configuration
Step 1: Upload Root Certificate
- Open Google Admin Console (admin.google.com)
- Navigate to Devices > Networks > Certificates
- Click Add Certificate
- Upload IronWifi root CA certificate
- Set Name: IronWifi Root CA
- Set Type: Server CA
- Click Save
Step 2: Configure WiFi Network
- Go to Devices > Networks > Wi-Fi
- Click Add Wi-Fi
- Configure network settings:
Basic Settings:
- SSID: Your secure network name
- Security: WPA/WPA2 Enterprise (802.1X)
- Automatically connect: Enable
- EAP method: EAP-TLS or PEAP-MSCHAPv2
For EAP-TLS (Certificate-based):
- Server CA certificate: Select IronWifi Root CA
- Identity: Client certificate (configured below)
- Anonymize identity: Optional (use anonymous@ironwifi.com)
For PEAP-MSCHAPv2 (Username/Password):
- Server CA certificate: Select IronWifi Root CA
- Identity: %USERNAME%@your-domain.com
- Password: Use stored password or prompt
Step 3: Configure Client Certificate (EAP-TLS)
Option A: Manual Certificate Upload
- Generate certificates in IronWifi for each user
- Download certificate + private key
- In Admin Console > Devices > Networks > Certificates
- Click Add Certificate
- Upload user certificate
- Assign to organizational units or groups
Option B: SCEP Enrollment (Chrome OS 90+)
- In Admin Console > Devices > Networks > Certificates
- Click Add SCEP Profile
- Configure SCEP settings:
- SCEP URL:
https://scep.ironwifi.com/your-org/pkiclient.exe - Challenge password: From IronWifi
- Subject: CN=%DEVICE_SERIAL_NUMBER% or CN=%EMAIL%
- Key size: 2048
- Certificate validity: 365 days
- SCEP URL:
- Save profile
Step 4: Assign WiFi Policy
- Go to Devices > Chrome > Settings
- Select organizational unit or group
- Navigate to Device Settings > Network
- Under Wi-Fi networks, click Manage
- Add your configured WiFi network
- Set policy:
- Allow: Users can use this network
- Mandatory: Auto-connect to this network
- Click Save
Android Enterprise Configuration
Step 1: Configure WiFi Policy
- In Admin Console > Devices > Mobile & endpoints > Settings
- Select organizational unit
- Go to Wi-Fi
- Click Configure Wi-Fi
Network Configuration:
- SSID: Your network name
- Security type: Enterprise (802.1X)
- EAP method: TLS or PEAP
- Phase 2 authentication: MSCHAPv2 (for PEAP)
- CA certificate: Upload IronWifi root CA
- Anonymous identity: anonymous (optional)
- Domain: your-radius-server.com (optional)
Step 2: Certificate Distribution
For Fully Managed Devices:
- Go to Apps > Mobile apps
- Add certificate distribution app (if needed)
- Or use built-in certificate management:
- Navigate to Devices > Mobile & endpoints > Settings
- Select organizational unit
- Go to Security > Credentials
- Upload certificates
For Work Profile Devices:
- Certificates can be installed in work profile
- Configure WiFi policy for work profile
- Personal profile uses separate WiFi settings
Step 3: Deploy Configuration
- Ensure devices are enrolled in Android Enterprise
- Policies push automatically on next sync
- Monitor deployment status in Admin Console
Platform Versions
| Android Version | Management Type | WiFi Support |
|---|---|---|
| Android 5.0+ | Fully Managed | Full support |
| Android 5.1+ | Work Profile | Work profile only |
| Android 9.0+ | Dedicated Devices | Full support |
iOS Device Configuration
Google Admin Console provides basic MDM for iOS devices:
Step 1: Enroll iOS Devices
- Users install Google Device Policy app
- Follow enrollment process
- Accept MDM profile
Step 2: Configure WiFi
iOS WiFi management via Google Admin Console is limited. Consider using Apple Configurator or dedicated MDM solution for full iOS support.
Basic WiFi Configuration:
- In Admin Console > Devices > Mobile & endpoints
- Limited WiFi policies available for iOS
- May require manual configuration on devices
Alternative Approaches:
- Use Apple Configurator for WiFi profiles
- Deploy via Apple Business Manager with dedicated MDM
- Consider Jamf Pro or similar for comprehensive iOS management
Certificate Management
Certificate Lifecycle
Enrollment:
- Device receives WiFi policy from Admin Console
- SCEP enrollment initiates (if configured)
- Certificate issued by IronWifi CA
- Stored in device secure storage
Renewal:
- Chrome OS: Automatic renewal before expiration
- Android: Manual renewal or re-enrollment may be needed
- Monitor expiration dates in IronWifi console
Revocation:
- When device is unenrolled or wiped
- Revoke certificate in IronWifi console
- Prevents further authentication
Certificate Deployment Methods
1. SCEP (Recommended for Chrome OS)
- Automatic enrollment
- Scalable for large deployments
- Built-in renewal support
2. Manual Distribution
- Upload certificates individually
- Good for small deployments
- More management overhead
3. PKCS#12 Files
- Bundle certificate + private key
- Distribute via file management
- Requires secure distribution channel
User Authentication Options
Option 1: Certificate-Only (EAP-TLS)
Best for:
- High security environments
- Devices without user login
- Shared devices
Configuration:
- Deploy device certificates
- No password required
- Device-based authentication
Option 2: Username + Password (PEAP-MSCHAPv2)
Best for:
- User-specific authentication
- Integration with Google Workspace
- Easier troubleshooting
Configuration:
- Enable Google Workspace sync in IronWifi
- Use Google credentials for WiFi
- Password authentication
Option 3: Certificate + Username (PEAP-TLS)
Best for:
- Enhanced security
- User and device verification
- Audit requirements
Configuration:
- Deploy certificates
- Require username entry
- Dual-factor authentication
Google Workspace Integration
Sync Users from Google Workspace
- In IronWifi Console > Connectors
- Add Google Workspace connector
- Authorize with Google admin account
- Configure sync settings:
- Organizational units to sync
- User attributes to import
- Group mappings
- Run initial sync
User Provisioning
Automatic provisioning:
- User logs into Chrome OS with Google account
- WiFi policy applies automatically
- Certificate enrollment happens transparently
- User authenticated via RADIUS
Group-Based Policies
- Create groups in Google Admin Console
- Apply different WiFi policies per group:
- Students: Basic access
- Staff: Full access
- Guests: Captive portal
Organizational Unit Strategy
OU Structure Example
Your Organization
├── Chrome OS Devices
│ ├── Students
│ ├── Faculty
│ └── Staff
├── Android Devices
│ ├── Fully Managed
│ └── Work Profile
└── iOS Devices
└── BYOD
Policy Inheritance
- Policies inherit from parent OUs
- Override at child OU level as needed
- Test policies on pilot OU first
Deployment Strategies
1. Phased Rollout
Phase 1: Pilot
- Deploy to IT team (10-20 devices)
- Test all scenarios
- Gather feedback
Phase 2: Department
- Roll out to one department
- Monitor for issues
- Refine policies
Phase 3: Organization-wide
- Deploy to all OUs
- Provide user support
- Monitor compliance
2. Zero-Touch Enrollment
For Chrome OS:
- Purchase devices through approved reseller
- Assign to organizational unit during purchase
- Device configures automatically on first boot
- User signs in with Google account
- WiFi profile applied immediately
3. Self-Service Enrollment
For BYOD scenarios:
- User installs Google Device Policy app
- Enrolls device with work email
- Accepts management profile
- WiFi profile deploys automatically
Monitoring and Reporting
Google Admin Console Reports
Device Status:
- Go to Reports > Device reports
- View enrolled devices
- Check policy compliance
- Monitor WiFi connectivity status
Network Usage:
- View connected devices
- Track WiFi usage
- Identify connection issues
IronWifi Monitoring
Authentication Logs:
- Monitor successful authentications
- Track failed attempts
- View by device, user, location
- Generate compliance reports
Certificate Status:
- View issued certificates
- Check expiration dates
- Monitor renewal status
- Identify revoked certificates
Troubleshooting
Chrome OS Issues
WiFi Not Connecting:
- Check device is in correct OU
- Verify WiFi policy applied (chrome://policy)
- Review certificate installation
- Check RADIUS server reachability
- Review IronWifi authentication logs
Certificate Not Installing:
- Verify SCEP URL is correct
- Check challenge password
- Review device logs (chrome://network)
- Test SCEP endpoint manually
- Ensure Chrome OS version supports SCEP
Policy Not Applying:
- Force device policy refresh
- Check OU assignment
- Verify policy inheritance
- Review policy conflicts
- Try device unenroll/re-enroll
Android Enterprise Issues
WiFi Configuration Not Deploying:
- Verify device enrollment status
- Check organizational unit settings
- Force policy sync on device
- Review management mode (fully managed vs work profile)
- Check Android version compatibility
Certificate Installation Failed:
- Verify certificate format (PEM/DER)
- Check certificate validity dates
- Ensure private key is included (if applicable)
- Review device storage limitations
- Check admin permissions on device
Work Profile Issues:
- Verify work profile is active
- Check if WiFi is work-enabled
- Review profile certificate access
- Try recreating work profile
iOS Issues
Limited Management:
- iOS management via Google Admin is basic
- Complex WiFi setups may not be supported
- Consider alternative MDM for iOS-heavy environments
Profile Installation:
- Ensure Google Device Policy app installed
- Check MDM profile acceptance
- Manual WiFi configuration may be needed
- Review profile conflicts
Security Best Practices
1. Certificate Security
- Use 2048-bit or higher key size
- Set appropriate certificate validity (365 days)
- Enable certificate revocation checking
- Monitor expiration dates proactively
- Rotate CA certificates periodically
2. Network Security
- Use WPA2 or WPA3-Enterprise
- Enable 802.1X authentication
- Configure server certificate validation
- Use unique RADIUS shared secrets per location
- Implement RADIUS accounting
3. Access Control
- Apply least privilege principle
- Use organizational units for segmentation
- Implement VLAN assignment per group
- Configure bandwidth limits where needed
- Monitor for unauthorized access
4. Audit and Compliance
- Enable authentication logging
- Review access logs regularly
- Generate compliance reports
- Track device enrollment/unenrollment
- Maintain configuration documentation
5. Admin Console Security
- Enable 2-factor authentication for admins
- Use least privileged admin roles
- Review admin activity logs
- Implement admin session timeouts
- Backup policies regularly
Education-Specific Features
Google Workspace for Education
Student Management:
- Separate OUs for students and staff
- Different WiFi policies per grade level
- Content filtering integration
- Usage time restrictions
Chrome Education Upgrade:
- Required for advanced device management
- Enables detailed policy control
- Provides usage analytics
- Supports classroom management apps
Classroom Integration
Chromebook Management:
- Assign Chromebooks to students
- Auto-configure WiFi on device assignment
- Reset device between school terms
- Track device location and usage
Enterprise-Specific Features
Android Enterprise
BYOD (Work Profile):
- Separate work and personal data
- WiFi policy applies to work apps only
- User privacy maintained
- Corporate data protected
Corporate Owned:
- Full device management
- WiFi applies system-wide
- Enhanced security policies
- Complete MDM control
Chrome OS for Business
Kiosk Mode:
- Lock device to specific apps
- Auto-configure WiFi
- Prevent user changes
- Ideal for single-purpose devices
Managed Guest Sessions:
- Temporary user accounts
- Auto-connect to WiFi
- No data persistence
- Good for shared workspaces
Cost Considerations
Google Workspace Editions
| Edition | Device Management | Cost |
|---|---|---|
| Business Starter | Limited | Lower |
| Business Standard | Basic | Medium |
| Business Plus | Advanced | Higher |
| Enterprise | Full MDM | Highest |
| Education | Chrome Education Upgrade | Varies |
IronWifi Requirements
- SCEP service may require add-on subscription
- Consider certificate volume for pricing
- API access included in standard plans
- Custom CA certificates may have additional cost
Migration Strategies
From Manual Configuration
- Document current WiFi settings
- Create matching policies in Admin Console
- Deploy to test group
- Gradually migrate users
- Remove manual configurations
From Another MDM
- Export device inventory
- Enroll devices in Google Admin
- Deploy WiFi policies in parallel
- Switch users during maintenance window
- Decommission old MDM
New Deployment
- Plan organizational structure
- Create policies before device enrollment
- Configure zero-touch where possible
- Prepare support documentation
- Train support staff
Support Resources
- Google Workspace Admin Help
- Chrome OS Device Management
- Android Enterprise Setup
- Google Workspace Admin Community
- IronWifi Support: support@ironwifi.com