Skip to content

Wi-Fi configuration (Android Enterprise device policy)

With the Wi-Fi configuration you specify settings for connecting to Wi-Fi networks.

Restriction

If your Wi-Fi network uses Extensible Authentication Protocol (EAP) authentication (EAP/PEAP, EAP/TLS, or EAP/TTLS), it must not be hidden. That is, the network must be broadcasting its SSID.

Setting Description
SSID The ID of the Wi-Fi network.
Security type

The security type of the Wi-Fi connection:

  • None
  • WEP
  • WPA/WPA2 PSK
  • EAP/PEAP
  • EAP/TLS
  • EAP/TTLS

When you select WEP, you can’t assign the policy to devices with Android 12 and later.

Phase 2 authorization

The authentication method for phase 2 of the EAP negotiation:

  • None
  • PAP
  • CHAP
  • MSCHAP
  • MSCHAPv2

This setting is only available for EAP/PEAP and EAP/TTLS connections.

Identity

The user identity.

This setting is only available for EAP connections.

Anonymous identity

The pseudonym identity sent unencrypted in phase 1 of the EAP negotiation.

This setting is only available for EAP connections.

Password The password for the Wi-Fi network.
Identity certificate

The identity certificate for the connection to the Wi-Fi network.

The list includes all certificates from Client certificate configurations of the current policy.

This setting is only available for EAP connections.

Trusted certificate

The root CA for the certificate of the EAP server.

The list includes all certificates from Root certificate configurations of the current policy.

This setting is only available for EAP connections.

Domain suffix match

This setting validates the EAP server’s certificate by its DNS name.

The value you enter must match a dNSName element of the certificate’s subjectAltName extension. Values are compared one domain part at a time, starting from the top-level domain.

You can enter multiple values separated by semicolons. The certificate is valid if at least one value matches.

You can’t use wildcards.

Example: example.com matches server.example.com but not server-example.com.

This setting is only available for EAP connections.

Subject alternative name match

This setting validates the EAP server’s certificate by its Subject Alternative Name (SAN).

The value you enter must match a substring of the certificate’s subjectAltName extension.

You can enter multiple values separated by semicolons. The certificate is valid if at least one value matches.

Example: DNS:server.example.com;EMAIL:server@example.com matches a certificate’s SubjectAltName extension with a dNSName element of *.server.example.com or an Email element of server@example.com.

This setting is only available for EAP connections.

Subject alternative name match is an advanced setting. We recommend you use the Domain suffix match setting instead of this setting, where possible.