Enterprise networks using EAP-PEAP, EAP-TTLS, and EAP-TLS that use a private CA to sign the server certificate are now able to specify the CA for verifying the RADIUS server. Additionally, networks that use a public CA to sign the server certificate can now explicitly specify the CA for verifying the RADIUS server.
Note: The customer must provide the root certificate, but if you get an error you may need to specify the full chain including the root certificate.
How does it work?
With this update, you can now upload a CA certificate to a network. Under the wireless or wired network settings, navigate to Enterprise > Certificate. This option is available for EAP-PEAP, EAP-TTLS, and EAP-TLS.
The User Experience Insight platform will accept files in the following formats .pem, .crt, .cer, .der,.p7c, or .p7b and convert to .pem and store this certificate in Vault.
β

