My question is, if this is the correct way to have now 3 Certificates installed on the Client?
Im also not sure yet, if under the EAP Settings Root CA the Intermediate CA or the Radius Root CA should be selected?
Choose the Root CA [sic]. This CA will be trusted to issue client certificates for authentication. [Emphasis mine]
What is the real benefit to have a intermediate CA in general?
Yes, it would appear so, at least on a Mac
It really should be changed to "Issuing CA".
It is usually best practice to keep the Root CA offline
I have Windows 10 Devices, no ADS Domain. Created on my Unifi AP / WPA Enterprise Networks and on FreeRadius the AP as Client with shared secret and as IP the AP as remote Client. Authentication with the created Users / Passwords in FreeRadius works fine. Now I try to get certificate-based authentication to work (EAP-TLS).
EAP is not available to choose, I selected now PEAP, or do i need to select something different?
Yes, still get asked for username and password. Even with the fully imported / trusted Certificate Chain
ok, thank you.
Would be nice to use OPNSense as fully CA for production in future …
Yes, I want to manage Users internally, but would like to use certificate-based authentication, and therefore the CA would be needed, right?
I would love to see the possibility under System – Trust – Authorities where you have the Option to set CA Offline / Online