intune wifi sso prelogon user credentials

Abdelhafid 96 Reputation points
2020-10-24T14:30:57.627+00:00

Hey Everyone,

We are looking into looking deploying a wifi config profile through Intune for our shared devices. The option to use SSO prologon caught our attention. (https://learn.microsoft.com/nl-nl/mem/intune/configuration/wi-fi-settings-windows).

We prefer the the connection to the 802.1x wifi network to use the user credentials and to connect before users logon to the device.

When testing this feature on an Azure AD and Intune enrolled device, no connection to the wifi network was established.

In the device wlan-autoconfig logs I noticed the following error :

The operational criteria were not met.
The machine was not joined to a domain.

It seems an on-premises domain memberhip is required.

Is there a way to get this to work without joining an on-premises AD?

We've looked into a Hybrid-join and NDES\certificate based authentication but we prefer to use user credentials based authentication fo audit purposes.

Thanks!

Microsoft Intune Configuration
Microsoft Intune Configuration
Microsoft Intune: A Microsoft cloud-based management solution that offers mobile device management, mobile application management, and PC management capabilities.Configuration: The process of arranging or setting up computer systems, hardware, or software.
1,715 questions
Microsoft Intune
Microsoft Intune
A Microsoft cloud-based management solution that offers mobile device management, mobile application management, and PC management capabilities.
4,320 questions
0 comments No comments
{count} votes

Accepted answer
  1. Abdelhafid 96 Reputation points
    2020-10-27T11:50:09.947+00:00

    It seems a on-premises domain membership is required. I'm hoping Microsoft makes SSO using shared logon and 802.1x available soon since it helps in deploying mobile devices with minimum on-premises requirements.

    0 comments No comments

2 additional answers

Sort by: Most helpful
  1. CiciWu-MSFT 1,201 Reputation points
    2020-10-26T07:57:06.477+00:00

    I have done a lot of research but haven’t found any other way to get it work without joining an on-premises AD. It seems to be because that the SSO prelogon needs the certificate, which is necessary for device to domain joined.

    0 comments No comments

  2. AMDMan64 1 Reputation point
    2022-02-17T16:24:48.687+00:00

    Technically it is possible to make it work with Device / User authentication, but you would need 2 SSIDs. It's somewhat messy, however.

    I ended up using a Guest network with auth-bypass for the login screen and then wrote scheduled tasks that use WLAN filters to hide/unhide the Guest SSID on login.
    Once the user is logged in, the task triggers to block the Guest network and unhide the our 802.1x network for user login. The same task runs on shutdown or logoff as well.

    The profile has the following information in it (you can just manually add the Wi-Fi network and then put in the user auth information) The singleSignOn piece is important, however:

             <cacheUserData>true</cacheUserData>
             <authMode>user</authMode>
             <singleSignOn>
                 <type>postLogon</type>
                 <maxDelay>10</maxDelay>
                 <allowAdditionalDialogs>true</allowAdditionalDialogs>
                 <userBasedVirtualLan>false</userBasedVirtualLan>
             </singleSignOn>
             <EAPConfig><EapHostConfig xmlns="http://www.microsoft.com/provisioning/EapHostConfig"><EapMethod>
    

    This method works, but it occasionally messes up due to systems getting powered off incorrectly or just general flakiness - but we have it deployed on about 250 student laptops.

    The question is - has anyone tried to give official feedback to Microsoft about this? We need the ability to specify 802.1x credentials for the device level and user level. I always hated on Chromebooks for not correctly supporting this and now Google has it and Microsoft doesn't.

    0 comments No comments