Skip to Content.
Sympa Menu

cat-users - Re: [[cat-users]] CAT pour Windows 10 NOK

cat-users AT lists.geant.org

Subject: The mailing list for users of the eduroam Configuration Assistant Tool (CAT)

List archive

Re: [[cat-users]] CAT pour Windows 10 NOK


Chronological Thread 
  • From: Marcolino PIRES <marcolino.pires AT ac-paris.fr>
  • To: Tomasz Wolniewicz <twoln AT umk.pl>
  • Cc: cat-users AT lists.geant.org
  • Subject: Re: [[cat-users]] CAT pour Windows 10 NOK
  • Date: Tue, 13 Feb 2024 09:18:36 +0100

Hi.

I have executed the installer with -DEBUG=4 parameter.
I got the CAT.log file in attachment.

I have a look at it. I try to execute C:\Users\mpires\AppData\Local\Temp\wlan_test.exe and I got a message saying that this program was blocked by my administrator.

Best regards

Le 12/02/2024 à 20:47, Tomasz Wolniewicz a écrit :

I have tested your profile installer with a user without any admin privileges and it went just fine.

You could try to run the installer in a command window with an option -DEBUG=4. The installer will then create a log file with additional info. I will also leave undeleted XML profiles, including the one with the user password, so you might test it with some fake user data.

Cheers

Tomasz


W dniu 12.02.2024 o 11:54, Marcolino PIRES pisze:

OK.

I expect for your feedback.

Le 12/02/2024 à 11:52, Tomasz Wolniewicz a écrit :

Windows installers normally run without admin privileges except for the case when a wired network profile is supposed to be installed as well (but this is something that institution administrators set very rarely).

The installers have been used very many times and users do not have such problems. I will test your installer later, even without a valid account it is possible to veriy the installation results.

Yours

Tomasz Wolniewicz


W dniu 12.02.2024 o 11:45, Marcolino PIRES (via cat-users Mailing List) pisze:

Hello everyone.

The CAT installer is very practical.
I'm encountering a recent difficulty that I can't resolve because I'm not a Microsoft expert.

When I use CAT for Windows 10, if I am not a local administrator of my machine, the installer runs without errors but does not create any entries in known Wifi networks.

When I use CAT for Windows 10, as local administrator of my machine, the installer also runs without problems and the connection to the eduroam Wifi is established automatically. Two entries are created in the known Wifi networks "eduroam(R) via partner" and "eduroam(R)".

Why does this installer not work correctly when the user is not in the local Administrators group ?

Thanks for you help.

Best regards

--
Marcolino PIRES
Chef de service
RSSI • Responsable de la sécurité des systèmes d'information
DSI • Direction des systèmes d'information
Rectorat de l'académie de Paris
Site Visalto • 12 boulevard d'Indochine 75019 Paris
Bureau : 3053 | Téléphone : 01 44 62 45 73 | Mobile : 06 33 45 58 65
www.ac-paris.fr | | | | www.sorbonne.fr | |
-- 
Tomasz Wolniewicz
--
Marcolino PIRES
Chef de service
RSSI • Responsable de la sécurité des systèmes d'information
DSI • Direction des systèmes d'information
Rectorat de l'académie de Paris
Site Visalto • 12 boulevard d'Indochine 75019 Paris
Bureau : 3053 | Téléphone : 01 44 62 45 73 | Mobile : 06 33 45 58 65
www.ac-paris.fr | | | | www.sorbonne.fr | |
-- 
Tomasz Wolniewicz
--
Marcolino PIRES
Chef de service
RSSI • Responsable de la sécurité des systèmes d'information
DSI • Direction des systèmes d'information
Rectorat de l'académie de Paris
Site Visalto • 12 boulevard d'Indochine 75019 Paris
Bureau : 3053 | Téléphone : 01 44 62 45 73 | Mobile : 06 33 45 58 65
www.ac-paris.fr | | | | www.sorbonne.fr | |
Platform:x64
Detected Windows 10:8:19045
Checking for wireless interfaces
Exec: C:\Users\mpires\AppData\Local\Temp\wlan_test.exe
wlan_test.exe returned error
Wireless check OK
testing for EAP: 88
EAP test returned: 
Symantec test returned: 0
Entering WiredConfirm with wireless_result=error; wired=0
locating certificate  SHA=d1eb23a46d17d68fd92564c2f1f1601764d8e349 Level=root
Testing machine store root
Execute: certutil -store root d1eb23a46d17d68fd92564c2f1f1601764d8e349
certutil returned -2146893807
Testing machine store authroot
Execute: certutil -store authroot d1eb23a46d17d68fd92564c2f1f1601764d8e349
certutil returned 0
Found AUTHROOT
locating certificate  SHA=d89e3bd43d5d909b47a18977aa9d5ce36cee184c Level=ca
Testing machine store root
Execute: certutil -store root d89e3bd43d5d909b47a18977aa9d5ce36cee184c
certutil returned -2146893807
Testing machine store authroot
Execute: certutil -store authroot d89e3bd43d5d909b47a18977aa9d5ce36cee184c
certutil returned -2146893807
Testing machine store ca
Execute: certutil -store ca d89e3bd43d5d909b47a18977aa9d5ce36cee184c
certutil returned -2146893807
Testing user store root
Execute: certutil -store -user root d89e3bd43d5d909b47a18977aa9d5ce36cee184c
certutil returned -2146893807
Testing user store root
Execute: certutil -store -user authroot d89e3bd43d5d909b47a18977aa9d5ce36cee184c
certutil returned -2146893807
Testing user store ca
Execute: certutil -store -user ca d89e3bd43d5d909b47a18977aa9d5ce36cee184c
certutil returned 0
Found USER CA
locating certificate  SHA=c2826e266d7405d34ef89762636ae4b36e86cb5e Level=ca
Testing machine store root
Execute: certutil -store root c2826e266d7405d34ef89762636ae4b36e86cb5e
certutil returned -2146893807
Testing machine store authroot
Execute: certutil -store authroot c2826e266d7405d34ef89762636ae4b36e86cb5e
certutil returned -2146893807
Testing machine store ca
Execute: certutil -store ca c2826e266d7405d34ef89762636ae4b36e86cb5e
certutil returned -2146893807
Testing user store root
Execute: certutil -store -user root c2826e266d7405d34ef89762636ae4b36e86cb5e
certutil returned -2146893807
Testing user store root
Execute: certutil -store -user authroot c2826e266d7405d34ef89762636ae4b36e86cb5e
certutil returned -2146893807
Testing user store ca
Execute: certutil -store -user ca c2826e266d7405d34ef89762636ae4b36e86cb5e
certutil returned 0
Found USER CA
Installing wireless credentials 0
writing C:\Users\mpires\Downloads\inst_cat.cmd

Attachment: smime.p7s
Description: Signature cryptographique S/MIME




Archive powered by MHonArc 2.6.24.

Top of Page