Modern enterprises depend on secure wireless connectivity, and WPA2-Enterprise with EAP-TLS authentication is one of the most robust methods for ensuring network security without relying on user credentials.

When combined with Microsoft Intune Wi-Fi configuration, this process becomes seamless for end users and enables zero-touch Wi-Fi onboarding.
Table of Contents
A simplified overview of how WPA2 EAP-TLS WiFi profile from Intune Works
At its core, EAP-TLS uses mutual certificate-based authentication between the device and the RADIUS server. Here’s the simplified workflow:
- Intune deploys profiles: Wi-Fi configuration, trusted root certificate, and SCEP/PKCS certificate profiles.
- Device applies settings and attempts to connect to the SSID.
- Access Point forwards the request to the RADIUS server.
- Server presents its certificate, which the device validates using its trusted CA.
- Device presents its client certificate (issued via SCEP/PKCS) to the RADIUS server.
- Mutual TLS handshake completes, granting network access.

Key Components
1. Intune (Cloud Service)
- Role: Deploys configuration profiles to managed Android devices.
- Profiles Delivered:
- Wi-Fi Profile: Contains SSID, EAP-TLS settings, and domain name.
- Trusted Root Certificate Profile: Ensures the device trusts the RADIUS server certificate.
- SCEP/PKCS Certificate Profile: Issues a client certificate for device authentication.
2. Device
- Role: Receives profiles from Intune and applies them.
- Certificates Installed:
- Trusted Root CA: Used to validate the RADIUS server certificate during TLS handshake.
- Client Certificate: Used for mutual authentication with the RADIUS server.
3. Access Point & RADIUS Server
- Role: Acts as the authentication point for WPA2-Enterprise.
- Certificate Requirements:
- Server Certificate: Signed by the enterprise CA and trusted by the device.
- Validation: Confirms the client certificate is valid and issued by a trusted CA.
Certificate Roles
- Trusted Root CA:
- Installed on the device to validate the RADIUS server certificate.
- Client Certificate:
- Installed via SCEP/PKCS profile.
- Contains Client Authentication EKU for EAP-TLS.
- Server Certificate:
- Presented by the RADIUS server during handshake.
- Must match the domain specified in the Wi-Fi profile.
Profile Deployment order from Intune
Provided that the necessary configurations are already in place, when a device gets enrolled in Intune, Intune pushes the required profiles in scope for the device/user to the device.
For a cert-based Wi-Fi configuration, the profile deployment occurs in the order as shown below.

It’s important to note that this deployment order matters!
Why does order matter? The device must trust the server before presenting its own certificate.
Breaking down the WPA2 EAP-TLS connection flow
- Device Initiates Connection:
- The device detects the SSID and applies the Intune Wi-Fi profile settings.
- It selects EAP-TLS as the authentication method.
- Server Validation:
- The RADIUS server sends its certificate to the device.
- The device validates this certificate against its trusted CA store or certificate profile (configured via MDM or OS settings). This ensures the device is talking to a legitimate authentication server.
- If the domain name and certificate chain match, the handshake continues.
- Client Certificate Presentation:
- After validating the server, the device presents its SCEP/PKCS certificate to the RADIUS server.
- This certificate includes the Client Authentication EKU and is signed by the enterprise CA.
- The RADIUS server validates the certificate presented by the device against its configured trusted CA and checks if it matches the expected identity.
- Mutual TLS Handshake:
- Both sides establish a secure TLS tunnel.
- No username/password is required because authentication relies on the certificate.
- Network Access Granted:
- Once the TLS session is established, the device is authorized for network access based on RADIUS policies.

✅ Key Points
- Server certificate validation happens first (device checks RADIUS).
- Client certificate validation happens next (RADIUS checks device).
- Both sides must trust the issuing CA of the other party’s certificate for the handshake to succeed.
✅ Key Requirements
- Intune Wi-Fi profile configured for EAP-TLS.
- SCEP/PKCS certificate profile deployed to device.
- Trusted Root CA installed on device.
- RADIUS server configured for EAP-TLS and trusts enterprise CA.
User Experience
The process is seamless for the end user:
- No manual entry of credentials.
- The device automatically connects when in range if the profile is set to auto-connect. [learn.microsoft.com]
The Big Picture: Complete IT Landscape Visual Workflow of WPA2 EAP-TLS connection in context of Intune
Here is a visual workflow sequence explaining the end-to-end WPA2-Enterprise EAP-TLS certificate-based Wi-Fi onboarding process in an enterprise environment using:
- Microsoft Intune for profile deployment
- NDES and Issuing CA for certificate issuance
- Access Point and RADIUS Server for authentication

Why This Matters
Implementing certificate-based Wi-Fi authentication with Microsoft Intune and WPA2 EAP-TLS ensures:
- Strong security for enterprise networks.
- Elimination of password-based vulnerabilities.
- Simplified onboarding with zero-touch Wi-Fi provisioning.