When you join the UCCS-Wireless or eduroam network for the first time, depending on your operating system or device type you may be asked to accept and trust a server security certificate.
When you are prompted to trust the server security certificate, you should verify its details before trusting it. Make sure the issuer and at least one of the fingerprints match the information outlined below. If the displayed certificate information on your device doesn't match the information above, DO NOT trust the certificate.
The security certificate helps you know that you are connecting to legitimate UCCS OIT wireless access points, and not rogues or impostors. Our wireless server security certificates are issued by COMODO, and it has a very specific fingerprint associated with it. Most devices allow you to preview the security certificate before accepting so that you know you are connecting to a legitimate UCCS OIT wireless access point. The certificate displayed on your device - the certificate you are being asked to trust before your connection is finalized - should have an issuer and a fingerprint that matches the information below.
Wireless authentication server (VM) name: ClearPass
Wireless authentication server hostname: cppm.uccs.edu
Certificate in PEM format: cppm.pem
Certificate in CER format: cppm.crt
Below are the fingerprints an end user can use to validate the certificate when connecting to UCCS_Wireless or eduroam:
Root CA and Intermediate CAs used to sign the certificate for UCCS's wireless environments can be download below:
Root Comodo RSA CA: comodorsacertificationauthority.crt
Intermediate Comodo RSA Organization Validation Secure Server CA: comodorsaorganizationvalidationsecureserverca.crt