Connecting to Grizznet-Secure

Note: The preferred method for connecting to Grizznet-Secure is now found here.

General Information

  • User ID: Your email address (e.g. [email protected] )

  • Password: Your ADMNET Active Directory (aka Windows) password

Helpful Hints

  • We recommend that you "forget" or remove the grizznet wireless network from your device(s) to prevent you from inadvertently connecting to that network.

  • If you get an error message stating something similar to "Invalid Credentials", then you most likely entered in the wrong password. You may need to reset your password to ensure that you are using the correct one.
  • If you are a student, then you very likely have never set your ADMNET password. In this case, you should go to https://netid.oakland.edu to change your NetID, Google and ADMNET passwords to the same password.

  • For further information on ADMNET passwords, please go to ADMNET Password Help

    • Faculty and Staff are required to change their ADMNET password every 6 months.
    • Students are not currently required to change their ADMNET password.
  • Depending upon your device, you may need to delete and re-add the GRIZZNET-SECURE wireless network whenever you change your password.

  • You have to "Trust", "Don't Validate" or "Accept" the *.oakland.edu certificate because the certificate is not installed on your device(s). This does not mean that the network is insecure.

iOS

  1. Open Settings
  2. Tap Wi-Fi
  3. Select Grizznet-Secure
  4. Enter your email address (e.g. [email protected] )

  5. Enter your ADMNET password
  6. Tap Join
  7. Tap Trust to accept the *.oakland.edu certificate

Android

  1. Open Settings
  2. Tap Connections
  3. Tap Wi-Fi
  4. Select Grizznet-Secure
  5. Tap Trust to accept the *.oakland.edu certificate
    • Note: For some versions of Android OS, select “Don’t Validate” from the CA certificate menu
  6. Enter your email address (e.g. [email protected] )

  7. Enter your ADMNET password
  8. Tap Connect

Settings should match the below:

  • EAP Method: PEAP
  • Phase 2 Authentication: MSCHAPv2
  • Domain: Oakland.edu
  • Username/Identity: NetID username
    • Note: if domain is not an option, the username should be in the format [email protected]

  • Password: NetID Password
  • Randomized MAC: Disabled
    • Note: This is not required, but preferred by OU, as it assists in troubleshooting connections.

Windows

  1. Click the Wireless icon in the system tray (lower right corner of the screen)
  2. Select Grizznet-Secure
  3. Click Connect
  4. Enter your email address (e.g. [email protected] )

  5. Enter your ADMNET password
  6. Click OK
    • Note: If a Windows Security Alert box appears, click Connect

MacOS

  1. Click the Wireless Icon on the Menu Bar
  2. Select ‘Grizznet-Secure’
  3. Enter your email address (e.g. [email protected] )

  4. Enter your ADMNET password
  5. Click Join
  6. At the “Verify Certificate” window, click Continue to accept the *.oakland.edu certificate
    • Note: If a message apepars stating “You are making changes to your Certificate Trust Settings” , enter your Mac login username and password.

Linux (Tested with Ubuntu 18.04 LTS and 20.04.4 LTS)

  1. Click ‘Activities’
  2. Type ‘Wi-Fi’ in the search box.
  3. Select ‘Wi-Fi’ Select ‘Grizznet-Secure’ from ‘Visible Networks’
  4. In the ‘Security’ tab fill in the following values
    • Security: WPA & WPA2 Enterprise

    • Authentication: Protected EAP (PEAP)
    • Anonymous Identity: <Leave Blank>

    • Domain: <Leave Blank>

    • CA Certificate: /etc/ssl/certs/ca-certificates.crt
    • PEAP version: Automatic
    • Inner Authentication: MSCHAPv2
    • Username: email address (e.g. [email protected] )

    • Password: Enter your ADMNET password
  5. Click ‘Connect’

General Settings for Other Devices

For other devices that support WPA2-Enterprise, please use the below information:

  • Username: Email address (e.g. [email protected] )

  • Password: Your ADMNET password
  • Security: WPA2 Enterprise
  • Authentication: Protected EAP (PEAP)
  • PEAP version: Automatic
  • Inner Authentication: MSCHAPv2
  • Anonymous Identity: <Leave Blank>

  • Domain: <Leave Blank>

  • CA Certificate: /etc/ssl/certs/ca-certificates.crt