NDU and the DoD rely heavily on the use of certificates to secure communications, reflecting the use of public key cryptography by the vast majority of commercial companies (Google, Apple, Amazon) to secure their websites and apps. However, unlike the cryptography used by commercial companies, the DoD's certificate infrastructure is not yet trusted by default in modern-day operating systems.
NDU has created an NDU DoD Certificate Authority Configuration Profile for end-users that installs the DoD's Root Certificate Authority (CA) and Intermediate CAs onto your Apple device. It will also by default automatically trust these certificates when accessing DoD sites, and when to NDU's wireless network (MacOS only).
NDU highly recommends that users take advantage of this custom configuration profile. While not yet required for accessing NDU's learning environment, users who attempt to access NDU's wireless network or DoD websites without installing the certificates will have to manually override warnings that their certificate is untrusted on a site-by-site basis.
Apple and iOS device users can remove NDU's configuration profiles manually at any time (see instructions below), or allow the profile to expire and remove itself automatically 365 days from the date of installation. *NOTE: If you are are using an NDU-issued Macintosh, you do not need to install this profile, as your machine already has this profile installed.
ONCE YOU ARE ABLE TO LOG IN TO YOUR NDU O365 ACCOUNT ON YOUR APPLE DEVICE, follow the instructions at https://ndu.sharepoint.com/sites/o365users/SitePages/NDU-DoD-Root-Certificate-Configuration-Profile.aspx