Dec 27, 2015 Understanding WPA/WPA2 Pre-Shared-Key Cracking. The few weaknesses inherent within the authentication handshake process for WPA/WPA2 PSKs have been known for a long time. This blog post does not serve anything that is new or has not been previously seen in the wild or conference talks and actually references other sites (such as RFCs.
-->Pre-shared keys (PSK) are typically used to authenticate users in WiFi networks, or wireless LANs. With Intune, you can create a WiFi profile using a pre-shared key. To create the profile, use the Custom device profiles feature within Intune. This article also includes some examples of how to create an EAP-based Wi-Fi profile.
This feature supports:
Important
Sign in to the Microsoft Endpoint Manager admin center.
Select Devices > Configuration profiles > Create profile.
Enter the following properties:
In Settings, select Add. Enter a new OMA-URI setting with the following properties:
Name: Enter a name for the OMA-URI setting.
Description: Enter a description for the OMA-URI setting. This setting is optional, but recommended.
OMA-URI: Enter one of the following options:
./Vendor/MSFT/WiFi/Profile/SSID/Settings
./Vendor/MSFT/WiFi/Profile/SSID/WlanXml
Note
Be sure to include the dot character at the beginning.
SSID is the SSID for which you're creating the policy. For example, if the Wi-Fi is named Hotspot-1
, enter ./Vendor/MSFT/WiFi/Profile/Hotspot-1/Settings
.
Data Type: Select String.
Value: Paste your XML code. See the examples in this article. Update each value to match your network settings. The comments section of the code includes some pointers.
When you're done, select OK > Create to save your changes.
Your profile is shown in the profiles list. Next, assign this profile to your user groups. This policy can only be assigned to user groups.
The next time each device checks in, the policy is applied, and a Wi-Fi profile is created on the device. The device can then connect to the network automatically.
The following example includes the XML code for an Android or Windows Wi-Fi profile. The example is provided to show proper format and provide more details. It's only an example, and isn't intended as a recommended configuration for your environment.
<protected>false</protected>
must be set to false. When true, it could cause the device to expect an encrypted password, and then try to decrypt it; which may result in a failed connection.
<hex>53534944</hex>
should be set to the hexadecimal value of <name><SSID of wifi profile></name>
. Windows 10 devices may return a false x87D1FDE8 Remediation failed
error, but the device still contains the profile.
XML has special characters, such as the &
(ampersand). Using special characters may prevent the XML from working as expected.
The following example includes the XML code for an EAP-based Wi-Fi profile: The example is provided to show proper format and provide more details. It's only an example, and isn't intended as a recommended configuration for your environment.
You can also create an XML file from an existing Wi-Fi connection. On a Windows computer, use the following steps:
Create a local folder for the exported W-Fi- profiles, such as c:WiFi.
Open up a command prompt as an administrator (right-click cmd
> Run as administrator).
Run netsh wlan show profiles
. The names of all the profiles are listed.
Run netsh wlan export profile name='YourProfileName' folder=c:Wifi
. This command creates a file named Wi-Fi-YourProfileName.xml
in c:Wifi.
If you're exporting a Wi-Fi profile that includes a pre-shared key, add key=clear
to the command:
netsh wlan export profile name='YourProfileName' key=clear folder=c:Wifi
key=clear
exports the key in plain text, which is required to successfully use the profile.
After you have the XML file, copy and paste the XML syntax into OMA-URI settings > Data type. Create a custom profile (in this article) lists the steps.
Tip
ProgramDataMicrosoftWlansvcProfilesInterfaces{guid}
also includes all the profiles in XML format.
Before you deploy a Wi-Fi profile with PSK, confirm that the device can connect to the endpoint directly.
When rotating keys (passwords or passphrases), expect downtime and plan your deployments. Consider pushing new Wi-Fi profiles during non-working hours. Also, warn users that connectivity may be affected.
For a smooth transition, be sure the end user's device has an alternate connection to the Internet. For example, the end user can switch back to Guest WiFi (or some other WiFi network) or have cellular connectivity to communicate with Intune. The extra connection allows the user to receive policy updates when the corporate WiFi Profile is updated on the device.
Be sure to assign the profile, and monitor its status.