Hey mate, sure fire away with questions - but to get you going are you wanting to authenticate the machine or the user?
In my setup I have two separate networks and we are Hybrid-Azure
WiFi_Device = Internet only
- Purpose is so devices can authenticate with azure at a login screen if user credentials are not cached. This uses a Machine certificate
SCEP Device Cert: Assign to your computer group.
![SCEPDevice.png SCEPDevice.png](https://community.meraki.com/t5/image/serverpage/image-id/37596iFE94AC13B01B3B7C/image-size/large?v=v2&px=999)
WiFi_User = Internet + Corporate resources.
SCEP User Cert - Also assign to your device group (and apply filtering if you want to limit users).
![SCEPUser.png SCEPUser.png](https://community.meraki.com/t5/image/serverpage/image-id/37597i24E709D551688722/image-size/large?v=v2&px=999)
Make sure you are pushing out a trusted certificate profile for:
IDEN Trust (from your meraki ssid page)
Hydrant CA O1 (from your meraki ssid page) - not 100% sure you need this but i added it.
Your Root CA
Your Issuing CE.
All 4 will be needed in the WiFi profile to stop the annoying windows "is this wifi trusted/what you expect" message.
WiFi Profile: device and user are basically the same except the cert you choose so ill only post the one screenshot and note the variances.
![WIfiProfile.png WIfiProfile.png](https://community.meraki.com/t5/image/serverpage/image-id/37600iD71D67410600E604/image-size/large?v=v2&px=999)
PS. this also works for auto configuration of iphones WiFi/outlook365 email config without passwords.
PPs. sorry we sort of derailed a bit from the OP and turned this into a guide
PPPs. Before anyone cries boogeyman - we are enrolling certs to KSP because surface devices and possibly others have a bug with 4096 keys not working in TPM