mirror of
https://github.com/jollyjinx/AppleMobileConfigForEAPWiFi.git
synced 2025-05-09 23:07:20 +00:00
Update README.md
This commit is contained in:
parent
0ffbbcc382
commit
350e5e3eef
@ -27,7 +27,7 @@ Currently I have not found a way to get around the need to create certificate wh
|
|||||||
|
|
||||||
Be aware that this process has to be done every time your server certificate changes. Browsers have it that they no longer accept certificates that are valid more than a year, so I presume that restriction applies for our ssl certificate as well, so I'm generating them only for 365 days.
|
Be aware that this process has to be done every time your server certificate changes. Browsers have it that they no longer accept certificates that are valid more than a year, so I presume that restriction applies for our ssl certificate as well, so I'm generating them only for 365 days.
|
||||||
|
|
||||||
'''
|
```bash
|
||||||
#!/bin/bash
|
#!/bin/bash
|
||||||
#
|
#
|
||||||
#update this variables accordingly
|
#update this variables accordingly
|
||||||
@ -45,8 +45,7 @@ openssl req -subj "/C=${country}/O=${organisation}/CN=${certificatename}" -out m
|
|||||||
openssl x509 -req -days 365 -in myclient.csr -CA server.pem -CAkey server-key.pem -CAcreateserial -out myclient.crt -sha256
|
openssl x509 -req -days 365 -in myclient.csr -CA server.pem -CAkey server-key.pem -CAcreateserial -out myclient.crt -sha256
|
||||||
openssl pkcs12 -passout "pass:${password}" -export -in myclient.crt -inkey myclient.key -out ../"${certificatename} Certificate.pfx"
|
openssl pkcs12 -passout "pass:${password}" -export -in myclient.crt -inkey myclient.key -out ../"${certificatename} Certificate.pfx"
|
||||||
cp server.pem ../"Radius Server Certificate.crt"
|
cp server.pem ../"Radius Server Certificate.crt"
|
||||||
|
```
|
||||||
'''
|
|
||||||
|
|
||||||
### Step2 create a mobile provisioning profile
|
### Step2 create a mobile provisioning profile
|
||||||
|
|
||||||
@ -78,8 +77,8 @@ Now your are all set and can save the provisioning profile in Apple Configuratio
|
|||||||
|
|
||||||
The easiest way to install the certificate is to mail your certificate to yourself and open that certificate in Mail on an iPhone. You can then install it on the HomePod and verify that it worked inside the Home.app application:
|
The easiest way to install the certificate is to mail your certificate to yourself and open that certificate in Mail on an iPhone. You can then install it on the HomePod and verify that it worked inside the Home.app application:
|
||||||
|
|
||||||
<img src="images/HomeApp-Certificate-01.png" style="max-width: 50%; display: block; margin-left: auto; margin-right: auto;" />
|
<img src="images/HomeApp-Certificate-01.png" style="max-width: 20%; display: block; margin-left: auto; margin-right: auto;" />
|
||||||
<img src="images/HomeApp-Certificate-02.png" style="max-width: 50%; display: block; margin-left: auto; margin-right: auto;" />
|
<img src="images/HomeApp-Certificate-02.png" style="max-width: 20%; display: block; margin-left: auto; margin-right: auto;" />
|
||||||
|
|
||||||
|
|
||||||
Happy provisioning :-)
|
Happy provisioning :-)
|
||||||
|
Loading…
x
Reference in New Issue
Block a user