Jamf Pro Integration
Deploy WPA-Enterprise WiFi configuration profiles and EAP-TLS certificates to managed Mac, iPhone, and iPad devices using Jamf Pro with SCEP enrollment.
Overview
The Jamf Pro integration enables:
- WiFi profile deployment to Mac, iPhone, iPad
- SCEP certificate enrollment for EAP-TLS
- Automatic provisioning for managed devices
- Configuration profiles for secure WiFi
Prerequisites
- IronWifi account with WPA-Enterprise configured
- Jamf Pro subscription
- Apple devices enrolled in Jamf
- IronWifi SCEP service enabled
Architecture
Apple Device → Jamf Pro → Configuration Profile → IronWifi RADIUS
↓
SCEP → IronWifi CA → Device Certificate
IronWifi SCEP Configuration
Enable SCEP
- Log in to IronWifi Console
- Go to Settings > SCEP
- Enable SCEP service
- Configure CA settings:
- Key Size: 2048-bit
- Validity: 365 days
- Subject: CN format
- Note your SCEP URL:
https://scep.ironwifi.com/your-org
Download Root Certificate
- In SCEP settings, download the Root CA certificate
- You'll upload this to Jamf Pro
Jamf Pro Configuration
Step 1: Upload Root CA Certificate
- In Jamf Pro, go to Configuration Profiles
- Create new profile for your scope
- Add Certificate payload
- Upload IronWifi root CA certificate
- Name it descriptively (e.g., "IronWifi Root CA")
Step 2: Create SCEP Profile
- In the same or separate configuration profile
- Add SCEP payload
SCEP Settings:
- URL:
https://scep.ironwifi.com/your-org/pkiclient.exe - Name: IronWifi Device Certificate
- Subject:
CN=$SERIALNUMBERorCN=$USERNAME - Subject Alternative Name Type: RFC 822 Name
- Subject Alternative Name Value:
$EMAIL - Challenge Type: Static (enter IronWifi challenge password)
- Key Size: 2048
- Use as digital signature: Yes
- Use for key encipherment: Yes
Step 3: Create WiFi Profile
- Add Wi-Fi payload to configuration profile
WiFi Settings:
- Service Set Identifier (SSID): Your secure network name
- Hidden Network: Check if SSID is hidden
- Auto Join: Enable
- Security Type: WPA2 Enterprise
- Protocols: TLS
- Identity Certificate: Select the SCEP payload
Trust Settings:
- Trusted Certificates: Select the root CA certificate payload
- Trusted Server Certificate Names: Your RADIUS server name
Step 4: Configure Scope
- Click Scope tab
- Add target devices or groups:
- All Managed Devices
- Specific departments
- Device groups
Profile Types
macOS Configuration
Additional Settings:
- System Extension: May need allowlist for 802.1X
- Login Window: Enable if pre-login WiFi needed
- User Mode: User or Computer authentication
iOS/iPadOS Configuration
Settings:
- Per-App VPN: Can combine with WiFi profile
- Managed Apps: Restrict WiFi to managed apps
- Disable MAC randomization: Recommended for tracking
Deployment Strategies
Automatic Enrollment
For DEP/ADE enrolled devices:
- Assign profile to PreStage Enrollment
- WiFi configures during setup
- Device ready with WiFi immediately
User-Initiated Enrollment
For BYOD scenarios:
- User enrolls via Jamf enrollment portal
- Profiles install automatically
- WiFi available after enrollment
Self Service
Make WiFi profile available in Self Service:
- Set profile to Self Service scope
- Users install when needed
- Good for optional networks
Certificate Management
Certificate Lifecycle
- Enrollment: SCEP issues certificate at profile install
- Renewal: Auto-renew before expiration
- Revocation: Revoke via IronWifi when device unenrolled
Renewal Settings
In SCEP payload:
- Allow export from keychain: No (recommended)
- Auto-renewal: Enable if available
Revocation
When device is wiped or unenrolled:
- Certificate removed from device
- Mark certificate revoked in IronWifi
- Revoked cert cannot authenticate
Troubleshooting
Certificate Not Installing
- Check SCEP URL is correct
- Verify challenge password
- Review Jamf Pro logs
- Check device communication with SCEP server
WiFi Not Connecting
- Verify certificate installed (Settings > General > Profiles)
- Check WiFi profile settings
- Review IronWifi authentication logs
- Test with manual connection
Profile Not Deploying
- Check scope configuration
- Verify device is in scope
- Force device check-in
- Review Jamf Pro management history
Monitoring
Jamf Pro
- Configuration profile status
- Device compliance
- Certificate deployment reports
IronWifi
- Authentication logs
- Certificate-based auth success rate
- Device connection history
Best Practices
- Test on pilot devices before broad deployment
- Use Smart Groups for targeted deployment
- Enable auto-renewal for certificates
- Monitor expiration dates
- Document configuration for IT team
- Consider failover WiFi for emergencies
Integration with Jamf Connect
If using Jamf Connect for identity:
- Use Jamf Connect credentials for WiFi
- SSO experience for end users
- Leverage existing identity infrastructure