Pre-shared key Wi-Fi is a liability in a corporate environment. One person shares the password, it gets texted to a contractor, screenshotted by a visitor, or just memorised by an ex-employee - and now anyone with that string can join your network. 802.1X solves this by authenticating the device (or the user) against a RADIUS server using a certificate, instead of a shared secret. There's no password to leak.
With 802.1X deployed via Intune, managed devices authenticate to the corporate SSID automatically using a SCEP-provisioned certificate - no user interaction, no password. Unmanaged devices can't connect at all.
How 802.1X Works
🧠 ConceptsThe 802.1X authentication flow involves three components:
- Supplicant - the Windows device (your Intune-managed laptop)
- Authenticator - the wireless access point or switch
- Authentication Server - a RADIUS server (NPS on Windows Server, or a cloud RADIUS like Cisco ISE, Aruba ClearPass, or Foxpass)
When a device tries to connect to the 802.1X SSID, the AP challenges it. The device presents its certificate to the RADIUS server via EAP-TLS. The RADIUS server checks the certificate against a trusted CA, and if valid, tells the AP to let the device connect. The device never sees a password prompt - it just connects.
Prerequisites
📋 Before You StartBefore creating the Intune profiles, you need the following in place:
- RADIUS server - either Windows Server NPS, or a cloud RADIUS service. The RADIUS server must be reachable from your APs over UDP 1812/1813.
- A Certificate Authority (CA) - either an on-premises Windows CA (ADCS) or a cloud-based CA. Intune's SCEP connector needs to talk to the CA to issue device certificates.
- Intune SCEP connector - if using on-premises ADCS, the Microsoft Intune Certificate Connector must be installed on a server that can reach your CA.
- Trusted root CA certificate (.cer) - the root certificate of your CA, which you'll push to devices so they trust the RADIUS server cert.
- RADIUS server certificate - the RADIUS server (NPS) needs its own certificate issued by the same CA.
Step 1 - Deploy Trusted Root Certificate
🔐 CertificatesDevices need to trust your CA before they'll accept a certificate issued by it. Push the root CA certificate to all targeted devices first - the Wi-Fi profile won't work if devices don't trust the cert chain.
- Platform: Windows 10 and later
- Profile type: Trusted certificate
Name this profile something like CORP-WiFi-TrustedRoot and assign it to the same device group you'll use for the Wi-Fi profile. It must deploy successfully before the Wi-Fi profile will authenticate correctly.
Step 2 - Create SCEP Certificate Profile
📜 SCEPThe SCEP profile tells Intune to request a unique client certificate from your CA for each device. This is the certificate the device presents to your RADIUS server to authenticate.
- Platform: Windows 10 and later
- Profile type: SCEP certificate
Step 3 - Create the Wi-Fi Profile
📶 Wi-Fi ProfileWith certificates in place, create the Wi-Fi profile that references them:
- Platform: Windows 10 and later
- Profile type: Wi-Fi
Step 4 - Assign and Verify
✅ DeploymentAssign all three profiles (Trusted Root, SCEP, Wi-Fi) to the same device group. Intune handles the dependency order automatically if you've linked the profiles correctly (SCEP → Trusted Root, Wi-Fi → SCEP), but deploy them together.
After a policy sync, verify the connection on a test device:
-
1Confirm the certificate was issuedOpen certlm.msc on the device → Personal → Certificates. You should see a certificate with the CN matching your SCEP subject name format, issued by your CA.
-
2Check the Wi-Fi profile appliedGo to Settings → Network & Internet → Wi-Fi. The corporate SSID should appear in the list. If it's configured correctly it should connect automatically when in range.
-
3Check RADIUS / NPS event logsOn your NPS server, open Event Viewer → Custom Views → Server Roles → Network Policy and Access Services. A successful EAP-TLS authentication shows as Event ID 6272. Failures show as 6273 with a reason code.
-
4Verify in Intune device configuration statusIn Intune, go to the Wi-Fi profile → Device and user check-in status. All three profiles should show Succeeded against the test device.