EAP-TLS certificate Wi-Fi with Intune + Aruba Central NAC — Windows, macOS and iOS/iPadOS step-by-step with screenshots
**EAP-TLS certificate-based Wi-Fi with Microsoft Intune + Aruba Central NAC — Windows, macOS and iOS/iPadOS**
I couldn't find much documentation covering all three platforms together, so I put together a full lab write-up with step-by-step screenshots.
**The setup:**
- Aruba Central NAC as the RADIUS/NAC engine (OAuth2-connected to Intune/Entra ID)
- SCEP certificates issued directly by Central NAC's built-in CA (no NDES/connector needed)
- Intune pushing 3 profiles per platform: Trusted Certificate + SCEP + Wi-Fi
- Automatic EAP-TLS connection to WPA2-Enterprise SSID once profiles are deployed
**Per-platform specifics:**
*Windows* — straightforward, same flow as the HPE TechNote. Validate with certmgr.msc.
*macOS* — requires APNs certificate first (one-time setup). SCEP profile uses Device Channel. Validate in Keychain Access (System + login keychains).
*iOS/iPadOS* — enrollment via Company Portal is very guided. **Important:** use Certificate type **User** with `CN={{UserPrincipalName}}` in the SCEP profile. Device type causes NAC authorization to fail (Deny All) because Central NAC can't resolve the device cert to an Entra ID user or group.
**Docs split into two GitHub repos:**
- Aruba Central NAC config (identity store, roles, policies, SSID): https://github.com/Luconik/hpe-aruba-guides/tree/main/central-nac-intune
- Intune profiles + enrollment per platform: https://github.com/Luconik/microsoft-intune/tree/main/eap-tls
Each README has EN + FR versions and full screenshots for every step.