# ChromeOS

## Root Certificate

As a first step, you must deploy SCEPman's root certificate. Therefore, follow these steps:

1. Download the root CA certificate from your SCEPman website by clicking on the **Get CA Certificate** link.

<figure><img src="https://2535731700-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LoGejQeUQcw7lqnQ3WX%2Fuploads%2FUSSdLPzo78nIZ5T38WQS%2Fimage.png?alt=media&#x26;token=7da8cc67-d00e-4e1e-b5be-69c439c8abc7" alt=""><figcaption></figcaption></figure>

2. Now upload your SCEPmen root CA to your Google Workplace. In your Google **Admin console** (admin.google.com) navigate to **Menu** > **Devices** > **Networks** > **Certificates** > **ADD CERTIFICATE**

{% hint style="warning" %}
Be aware that the Google Admin console only accepts certificates in PEM format. You will need to convert SCEPman root CA (which is downloaded in DER by default) using *openssl* or by importing it in Windows and exporting it again in Base-64 format.
{% endhint %}

<figure><img src="https://2535731700-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LoGejQeUQcw7lqnQ3WX%2Fuploads%2FtcnmwZHCReIR6tiimrI8%2Fimage.png?alt=media&#x26;token=2c3a577d-f7a2-4ee2-856b-388ff185b736" alt=""><figcaption></figcaption></figure>

## Add a SCEP Profile

The SCEP profile defines the certificate that lets users access your WiFi. Assign the profile to specific users by adding it to an organisational unit. Set up multiple SCEP profiles to manage access by device type. The following configuration example&#x20;

1. In your Google **Admin console** (admin.google.com) navigate to **Menu** > **Devices** > **Network**
2. Click **Create SCEP Profile**.
3. Click **Add Secure SCEP Profile**.
4. Enter the configuration details for the profile.&#x20;

| Attribute            | Value (Device)      | Value (User)      |
| -------------------- | ------------------- | ----------------- |
| **Device platforms** | Chromebook (device) | Chromebook (user) |

<figure><img src="https://2535731700-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LoGejQeUQcw7lqnQ3WX%2Fuploads%2FiAwqjhjMygfRZmYAaK5M%2Fimage.png?alt=media&#x26;token=25a10837-b43f-42fe-a14a-813cfabe79e5" alt=""><figcaption></figcaption></figure>

| Attribute             |                                       |
| --------------------- | ------------------------------------- |
| **SCEP profile name** | Provide a name for your SCEP profile. |

<figure><img src="https://2535731700-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LoGejQeUQcw7lqnQ3WX%2Fuploads%2Fx7zWmbc8P1wU1cZHHb29%2Fimage.png?alt=media&#x26;token=1434eed7-9396-471b-95ad-7b8fbd80b8a9" alt=""><figcaption></figcaption></figure>

<table><thead><tr><th width="246">Attribute</th><th width="282">Value (Device)</th><th>Value (User)</th></tr></thead><tbody><tr><td><strong>Subject name format</strong></td><td><strong>Fully distinguished name</strong></td><td><strong>Fully distinguished name</strong></td></tr><tr><td></td><td><strong>Common name</strong>: ${DEVICE_SERIAL_NUMBER}</td><td><strong>Common name:</strong> ${USER_EMAIL}</td></tr><tr><td></td><td><strong>Company name</strong>: Your company name.</td><td><strong>Company name</strong>: Your company name.</td></tr><tr><td></td><td><strong>Organisation unit:</strong> Your organizational unit. This is optional.</td><td><strong>Organisation unit:</strong> Your organizational unit. This is optional.</td></tr><tr><td></td><td><strong>Locality</strong>: Your organisation unit's location. This is optional.</td><td><strong>Locality</strong>: Your organisation unit's location. This is optional.</td></tr><tr><td></td><td><strong>State</strong>: Your organisation unit's state. This is optional.</td><td><strong>State</strong>: Your organisation unit's state. This is optional.</td></tr><tr><td></td><td><strong>Country / region</strong>: Your organisation unit's country. This is optional.</td><td><strong>Country / region</strong>: Your organisation unit's country. This is optional.</td></tr><tr><td><strong>Subject alternative name</strong></td><td>Default: <strong>None</strong><br><br>This can be set to <strong>Custom</strong> when the SAN shall be used, e.g. as outer identity when authenticating to a WiFi using EAP-TLS.</td><td><p><strong>Custom</strong></p><p></p><p></p><p></p><p></p><p><strong>User Principal:</strong> ${USER_EMAIL_NAME}</p></td></tr><tr><td></td><td></td><td></td></tr></tbody></table>

<figure><img src="https://2535731700-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LoGejQeUQcw7lqnQ3WX%2Fuploads%2F5fbEgC2k7DFCRIwPoKgZ%2Fimage.png?alt=media&#x26;token=b8c29965-37be-4f8f-a05b-e48cee55de51" alt=""><figcaption></figcaption></figure>

| Attribute             | Value                                      |
| --------------------- | ------------------------------------------ |
| **Signing algorithm** | SHA256withRSA                              |
| **Key usage**         | Key encipherment, Signing                  |
| **Key size (bits)**   | 3072                                       |
| **Security**          | Strict (only supported by managed devices) |

<figure><img src="https://2535731700-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LoGejQeUQcw7lqnQ3WX%2Fuploads%2FSIjM9XKUUryt7mrwAeXD%2Fimage.png?alt=media&#x26;token=675f1557-305f-4d06-8038-0ff755c1b456" alt=""><figcaption></figcaption></figure>

<table><thead><tr><th width="246">Attribute</th><th>Value</th></tr></thead><tbody><tr><td><strong>SCEP server attributes</strong></td><td><strong>SCEP server URL</strong>: <a href="http://scepman.yourdomain.net/static">http://scepman.yourdomain.net/static</a></td></tr><tr><td></td><td><strong>Certificate validity period (years)</strong>: 1</td></tr><tr><td></td><td><strong>Renew within days</strong>: 42</td></tr><tr><td></td><td><strong>Extended key usage</strong>: Client authentication</td></tr><tr><td></td><td><strong>Challenge type</strong>: Static</td></tr><tr><td></td><td><strong>Challenge</strong>: Provide the challenge value you have configured when <a href="..#enable-google-workspace-integration">enabling the SCEPman Google Workspace</a> integration.</td></tr><tr><td></td><td><strong>Certificate Authority</strong>: Reference here the certificate profile containing your <a href="#root-certificate">SCEPman Root CA</a>.</td></tr><tr><td></td><td><strong>Network type this profile applies to</strong>: Wi-Fi</td></tr></tbody></table>

<figure><img src="https://2535731700-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LoGejQeUQcw7lqnQ3WX%2Fuploads%2Ff6mJecEjRIAwOWRrgqPn%2Fimage.png?alt=media&#x26;token=13c91876-7083-41a1-b453-b64a1296614d" alt=""><figcaption></figcaption></figure>

5. The SCEP profile is automatically distributed to users in the organisational unit.
6. To check for this certificate, in your Chromebook navigate to **chrome://certificate.manager** > **Your certificates.**

<figure><img src="https://2535731700-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LoGejQeUQcw7lqnQ3WX%2Fuploads%2FHZwz3tMJAesfSMhsC6OG%2Fimage.png?alt=media&#x26;token=ef302613-6949-4e85-b889-6dfbadbfa57d" alt=""><figcaption></figcaption></figure>
