Skip to content

Commit d6764fd

Browse files
committed
doc: nrf70: enterprise: Point to the upstream docs
Upstream already has the proper instructions, so, remove duplication and point to the upstream docs. Signed-off-by: Chaitanya Tata <[email protected]>
1 parent 1e37cd2 commit d6764fd

File tree

1 file changed

+1
-45
lines changed

1 file changed

+1
-45
lines changed

doc/nrf/app_dev/device_guides/nrf70/wifi_advanced_security_modes.rst

Lines changed: 1 addition & 45 deletions
Original file line numberDiff line numberDiff line change
@@ -18,52 +18,8 @@ The nRF70 Series devices support the following Wi-Fi enterprise security mode, `
1818
This mode uses the Extensible Authentication Protocol (EAP) with Transport Layer Security (TLS) for authentication.
1919
The client and the authentication server exchange certificates to authenticate each other.
2020

21+
See `Zephyr Wi-Fi management`_ for more information on how to configure and use the Wi-Fi enterprise security mode.
2122

22-
Enterprise testing: X.509 certificate headers generation
23-
========================================================
24-
25-
Wi-Fi enterprise security requires use of X.509 certificates.
26-
Test certificates in PEM format are available at :zephyr_file:`samples/net/wifi/test_certs/` repository.
27-
During the build process, the certificates are converted to a C header file that is included in the Wi-Fi shell module or the :ref:`Wi-Fi credentials <lib_wifi_credentials>` library.
28-
29-
To use custom certificates, use the following commands:
30-
31-
.. code-block:: bash
32-
33-
$ cp client.pem samples/net/wifi/test_certs/
34-
$ cp client-key.pem samples/net/wifi/test_certs/
35-
$ cp ca.pem samples/net/wifi/test_certs/
36-
$ cp client.pem samples/net/wifi/test_certs/client2.pem
37-
$ cp client-key.pem samples/net/wifi/test_certs/client-key2.pem
38-
$ cp ca.pem samples/net/wifi/test_certs/ca2.pem
39-
40-
$ west build -p -b <board> samples/net/wifi -- -DEXTRA_CONF_FILE=overlay-enterprise.conf
41-
42-
.. note::
43-
The EAP phase2 certificates (suffixed with 2) are unused in ``WPA2-EAP-TLS`` but are mandatory for building the sample application.
44-
The phase1 certificates are copied as phase2 certificates to avoid build errors as a temporary workaround.
45-
46-
To establish a Wi-Fi connection, use the following command:
47-
48-
.. code-block:: console
49-
50-
uart:~$ wifi connect -s <SSID> -k 7 -a anon -K <key passphrase>
51-
52-
.. code-block:: console
53-
54-
uart:~$ wifi_cred add -s <SSID> -k 7 -a anon -K <key passphrase>
55-
56-
57-
.. note::
58-
59-
The Wi-Fi credentials only support 16characters for the anonymous identity and the key passphrase.
60-
61-
The server certificate is also provided in the same directory for testing purposes.
62-
You can use any AAA server for testing purposes, such as FreeRADIUS or hostapd.
63-
64-
.. note::
65-
66-
The certificates are for testing purposes only and should not be used for production.
6723

6824
.. _ug_nrf70_developing_wifi_psa_support:
6925

0 commit comments

Comments
 (0)