Configuring Zoom Device Management network profile
As part of Zoom Device Management (ZDM), administrators can use Zoom Device Management to remotely manage the Zoom Room computers and controllers on their network, in order to simplify the process of creating and managing Zoom Room network configurations. By supplying network configuration settings, including SSID, network security type, network credentials, proxy, and others, administrators have the option of creating a network profile directly from their web portal. Any Zoom Room-managed devices are then assigned the network profile.
Prerequisites for configuring a ZDM network profile for Zoom Rooms
-
Ownership or administrative privileges on the account
-
License for Zoom Room
-
If you want to use Zoom Room on a Windows computer, you must use Windows 10 version 1809 or higher
How to add a network profile for ZDM
ZDM can manage Zoom Rooms with network profiles:
-
Zoom’s web portal can be accessed by signing in.
-
Navigate to the Device Management menu.
-
Select System Configuration.
-
Then click the Add Profile button.
-
Configure your desired network profile type by following the steps in the following sections.
How to configure a WiFi network profile
Configure a Personal WiFi profile
The following steps can be taken after you add your profile as described in the section How to add a network profile:
Enter the following information in Configure Network Profiles:
-
Name (mandatory): Your network profile name should be typed here.
-
Description (optional): Your network profile should be described in a few words.
-
Network Type (mandatory): Choose Wi-Fi from the drop-down menu.
-
Service Set Identifier(SSID): Connect to Wi-Fi by typing its name.
-
Connectivity: Your devices will automatically connect to your Wi-Fi network if you select Hidden network and Auto-Join.
-
Security Type: Your Wi-Fi security encryption can be selected by clicking the down arrow. A wide range of encryption methods is available, such as WEP, WPA/WPA2, WPA2 Personal, WPA3 Personal, and Any (Personal).
-
Encryption Type (Only available for Windows): Choose your Wi-Fi data encryption type by clicking the down arrow.
-
Password: If you need a password to use your Wi-Fi, type it in.
-
Proxy Setup: Follow the instructions in the How to configure Proxy for WiFi section to select the type of proxy to set up if necessary.
-
If you would like to add another network profile, select Save and Add another.
-
Configure an Enterprise WiFi Profile
In order to configure an Enterprise WiFi profile, you can follow these steps after adding your profile as mentioned in the section How to add a network profile:
During the configuration of the network profiles, enter the following information:
-
Name (mandatory): If you have a network profile, please type its name here.
-
Description (optional): Your network profile should be described in a few words.
-
Network Type (mandatory): Select Wi-Fi from the list of options by clicking the down arrow.
-
Service Set Identifier(SSID): To connect to a Wi-Fi network, type the name of the network.
-
Connectivity: When your Wi-Fi network is hidden, make sure you select Hidden network if you want your devices to connect to your Wi-Fi network automatically or Auto-Join if you want them to connect automatically.
-
Security Type: Choose the type of security encryption you would like to use for your Wi-Fi network by clicking the down arrow. A wide variety of WPA/WPA2 Enterprise, WPA2 Enterprise, WPA3 Enterprise and Any (Enterprise) encryption algorithms are available to you.
-
Encryption Type (only available for Windows): You can select your Wi-Fi encryption type by clicking on the down arrow as shown below.
-
Use as Login Window Configuration: If you wish to use Login Window Mode on your Mac devices in order to authenticate to your network using 802.1X authentication, select User logs in to authenticate to the network.
Note: This setting is not applicable to Zoom Room devices on Windows. -
Enterprise Settings: You can configure protocols, authentication, and trust by clicking the Protocols and Trusted Server Certificates option.
-
Proxy Setup: When you click on the down arrow, you will have the option of selecting the type of proxy that needs to be set up, and you will need to follow the instructions in the Wi-Fi proxy setting.
-
To add another network profile, you will need to click Save or Save and Add Another.
-
Configure Proxy for Wi-Fi
For your Wi-Fi network profile to be more secure, you might need to set up a proxy server in order to provide you with more security. A manual or automatic method can be used to accomplish this task.
Configure a Manual proxy
-
Proxy Setup: Select Manual from the drop-down menu by clicking the arrow.
-
Proxy Server: Enter the IP address or host name of your proxy server or your host name if you don’t know it already.
-
Proxy User Name: Connecting to the proxy server requires the username to be entered.
-
Proxy Password: If you are using a proxy server to authenticate, enter the password you use to authenticate.
Configure an Auto proxy
-
Proxy Setup: Select the Auto option by clicking the arrow next to it.
-
Proxy URL: In the URL field, type the link to the URL where you want to retrieve proxy settings.
-
PAC Fallback: If you want to ignore Proxy Auto-Configuration (PAC) failures in the event that the proxy is not reachable, then you need to select Allow direct connection if PAC is not reachable.
How to configure an Ethernet Profile
On the page Configure Network Profiles, you will be asked to enter the following information:
-
Name (mandatory): If you have a network profile, please type its name here.
-
Description (optional): If you would like to describe your profile on a social network, please type it below.
-
Network Type (only available for Windows devices): Choose Any Ethernet from the drop-down menu that appears.
-
Use as Login Window Configuration: When you are using Mac devices that support 802.1X authentication on your Mac, you need to select User Login in order to authenticate to the network.
-
Enterprise Settings: You can configure protocols, authentication, and trust by clicking the Protocols and Trusted Server Certificates option.
-
It is possible to add another network profile by clicking on Save or Save & Add another.
-
Configure Protocols
Configure EAP-TLS protocol
As an option, you can setup EAP-TLS tunnel authentication after selecting Protocols in the left pane of the dialog box:
-
Protocols: Make sure that EAP-TLS is selected.
-
User Name: Your authenticator’s username must be typed in the space provided.
-
(Optional) Identity Certificate: The authenticator certificate can be uploaded by clicking the + Upload Certificate button.
-
(Optional) TLS Minimum Version: Your TLS version should be set to the minimum required.
-
(Optional) TLS Maximum Version: Ensure that your TLS version is set to the maximum version.
Configure PEAP protocol
Following the selection of protocols, you will need to do the following in order to configure tunnel authentication with PEAP:
-
If you wish to identify your user logins using their computer login credentials, then you can select Authenticate with the target computer’s directory credentials under Use Directory Authentication.
Note: This application is only available for PCs and Macs running Windows or Mac OS X. It is the only authentication method that can be used on Windows devices. -
User Name: Enter the username and password for the PEAP server administrator.
-
Password: You will need to enter the admin password for the PEAP server.
-
(Optional) Identity Certificate: The authenticator certificate can be uploaded by clicking the + Upload Certificate button.
-
Outer Identity: If you wish to hide your identity as a user, then you may type anything you desire.
Note: The app is only available for Mac OS X and iOS devices. -
(Optional) TLS Minimum Version: Your TLS version should be set to the minimum required.
-
(Optional) TLS Maximum Version: Ensure that your TLS version is set to the maximum version.
Configure Trusted Server Certificates
-
To upload a certificate for authentication, click the + Upload Certificate button under Trusted Server Certificates.
-
The name of the certificate from the authentication server can then be added to the Trusted Server Certificate Names section by clicking + Add.
Note: The certificate name can be deleted if you wish by clicking the Delete button. -
There is an option to allow trust exceptions to be allowed so that a certificate that was not trusted previously can now be trusted.
How to assign Zoom Room devices to your ZDM network profile
-
Zoom’s web portal can be accessed by signing in.
-
Click on Device Management from the navigation menu at the top of the screen.
-
In the System Configuration window, click the Configure button.
-
Click on the Network tab on the left side of the screen.
-
On the far right side of your network profile, click the ellipsis to identify your network profile
-
To assign devices, click the Assign Devices button.
-
Click Assign in the Assign Devices pop-up window and, depending on their enrollment status, search and/or select the devices you wish to assign, before clicking the Assign button.