
- Open transport mac os x mavericks serial#
- Open transport mac os x mavericks manual#
- Open transport mac os x mavericks password#
Go to the "Certificates" section, and use the UI to import each of the.
Open transport mac os x mavericks manual#
Open transport mac os x mavericks serial#
Give it some name like "My WPA2-Enterprise Network Login Profile" and type any random crap (maybe "Placeholder") as the placeholder serial number.

In the second column, hit the + button and "Add Placeholder" to create a new placeholder device profile.In the "Library" list on the left-most column, select "Devices".Use a web browser to go to the /profilemanager/ URL on your Mac OS X Server machine, and log on using a system administrator account.Create a placeholder "Device Profile" that defines a Wi-Fi network to join and the security type and credentials to use.Set up the "Profile Manager" service of Mac OS X Server if you haven't already.This could be a single self-signed server cert, or it could be a server cert plus zero or more intermediate CA certs, plus a root CA cert. Then find the relevant certificate(s) in the System keychain (via Keychain Access) and export them each as separate. Have your Mac log into the WPA2-Enterprise network once, and trust the certificate(s).3.0 (corresponds to Mac OS X 10.9 Mavericks).The apparent Apple official way requires access to a recent version of Mac OS X Server any of the versions that were sold for just $20 on the Mac App Store should do it: I'll post it here but hope that someone else can provide you with a much more sane way to do it. There seems to be an Apple official way to do it, but it's an extremely convoluted process.
Open transport mac os x mavericks password#
If not, is there any way of avoiding needing to enter the keychain password twice, as in OS X 10.8 and earlier? Is there any way of persuading OS X to read a WPA2 Enterprise wireless password from the system keychain, rather than from the login keychain? I have tried moving the WPA2 Enterprise password item from the login keychain to the system keychain, but it seems to ignore it. Now, wireless access at work requires me to enter the keychain password TWICE: once so that "eapolclient" can access the login keychain, and a second time so that Keychain Access can access the login keychain. This problem has been compounded since upgrading to OSX 10.9. The difference between the two seems to be that the home system is WPA2 Personal and the work one is WPA2 Enterprise.

However, at work, the wireless password is stored on the "login" keychain, and so requires me to enter the keychain password before it will connect. At home, my wireless works without needing to unlock the login keychain, since the password is stored on the "system" keychain, which has the same password as my user account. On the whole this works well, with one exception. To make it reasonably secure, I have a different password on my login keychain than on my user account, and have the keychain set to lock automatically after 5 minutes or on sleep. I am using OS X Keychain as my password manager.
