For any of the sections below, include “wpa_scan_ssid”: “1” when connecting to an access point that does not broadcast its SSID.

WEP

{
   "method": "DHCP",
   "name": "wlan0",
   "wpa_key_mgmt": "WEP",
   "wireless_essid": "<wireless_ssid>",
   "wireless_key": "<wireless_key>"
}

WPA-PSK

{
  "method": "DHCP",
  "name": "wlan0",
  "wpa_key_mgmt": "WPA-PSK",
  "wpa_psk": "<password>",
  "wpa_ssid": "<wireless_ssid>"
}

WPA2 Enterprise (PEAP)

For WPA2 Enterprise, if a private CA certificate is required for authentication, include the following line. Note that all lines except the last have a training comma:
“wpa_ca_cert”: “/opt/pathview/certs/wpa/

{
  "method": "DHCP",
  "name": "wlan0",
  "wpa_ap_scan": "1",
  "wpa_driver": "wext",
  "wpa_eap": "PEAP",
  "wpa_group": "CCMP",
  "wpa_pairwise": "CCMP",
  "wpa_identity": "<username>",
  "wpa_password": "<password>",
  "wpa_key_mgmt": "WPA-EAP",
  "wpa_phase2": "auth=MSCHAPV2",
  "wpa_proto": "RSN",
  "wpa_ssid": "<wireless_ssid>"
}

WPA2 Enterprise (TLS)

{
  "method": "DHCP",
  "name": "wlan0",
  "wpa_ap_scan": "1",
  "wpa_driver": "wext",
  "wpa_eap": "TLS",
  "wpa_group": "CCMP",
  "wpa_pairwise": "CCMP",
  "wpa_identity": "<username>",
  "wpa_key_mgmt": "WPA-EAP",
  "wpa_phase2": "auth=MSCHAPV2",
  "wpa_proto": "RSN",
  "wpa_ssid": "<wireless_ssid>",
  "wpa_ca_cert": "/opt/pathview/certs/wpa/<ca_cert_file>",
  "wpa_client_cert": "/opt/pathview/certs/wpa/<client_cert_file>",
  "wpa_private_key": "/opt/pathview/certs/wpa/<client_priv_key_file>",
  "wpa_private_key_passwd": "<wpa_private_key_passwd>"
}