We are using a publically signed certificate. The iDevices complain about the captive portal. Before the user could tap trust certificate and now that is gone. The Guest is open with a captive portal no WPA2. Any ideas on how to get around this issue without going to a Guest SSID with WPA2, (upper management does not want this).
I know it is 2048-bit and is chained correctly. Not sure about the SHA2+
When I look at the details of the cert:
Version: V3
Signature algorithm: sha256RSA
Signature hash algorithm: sha256
Issuer GeoTrust DV SSL CA - G3
Public Key: RSA (2048)
It is valid until June 2018.
It's only happening on iDevices. I have a MAC running High Sierra and it is fine.
Yes, it is. The user gets the login screen. They are able to see the check box and if they want click on the terms and agreement link to view. Once they click on the link we have it redirect to the hospital's website which is also https. It is saying that not a valid cert when the redirection. Could it be the redirect? But the error is saying the captive portal page cert it does not like not the redirected website.
© Copyright 2024 Hewlett Packard Enterprise Development LPAll Rights Reserved.