Configuring Zoom Device Management network profile

This post was most recently updated on July 28th, 2022

With Zoom Device Management (ZDM), administrators can be able to remotely manage the network configuration of their Zoom Room computers and controllers, simplifying the process of creating and managing Zoom Rooms network configurations. Administrators are able to create a network configuration profile directly from their web portal by providing network configuration settings, such as SSIDs, network security types, network credentials, proxy settings, etc., by providing an array of network configuration settings. All Zoom Room managed devices are then assigned the network profile that has been created.

Prerequisites for configuring a ZDM network profile for Zoom Rooms

  • Ownership or admin privileges on an account
  • License for Zoom Room
  • It is recommended that you use Windows 10 version 1809 or higher on your Zoom Room computer if you are using Windows

How to add a network profile for ZDM

In order to manage your Zoom Room with ZDM, you will need to create a network profile:

  1. Log in to the Zoom web portal by entering your email address and password.
  2. Click Device Management from the navigation menu at the top of the screen.
  3. To configure your system, click the System Configuration button.
  4. To add a profile, click the Add Profile button.
  5. In order to configure your desired network profile type, please follow the steps outlined in the following sections.

How to configure a WiFi network profile

Configure a Personal WiFi profile

In the How to add a network profile section of this article, we explain how to add a network profile and how to add a personal WiFi profile.

Enter the following information in the Configure Network Profiles page:

  1. Name (mandatory): Give your profile a name by typing it in the box below.
  2. Description (optional): Provide a brief description of your network profile in the space provided.
  3. Network Type (mandatory): If you click on the down arrow, you will be able to select Wi-Fi.
  4. Service Set Identifier(SSID): You will need to type the name of the Wi-Fi network you want to connect to.
  5. Connectivity:Depending on whether your Wi-Fi network is hidden or if you wish to let devices automatically connect to your Wi-Fi network upon connecting, you can select Hidden network and/or Auto-Join from the menu.
  6. Security Type: You can choose which type of encryption your Wi-Fi will use by clicking the down arrow to the left of it. It is possible for you to choose between WEP, WPA/WPA2, WPA2 Personal, WPA3 Personal, or Any(Personal).
  7. Encryption Type You can select your Wi-Fi data encryption type by clicking the down arrow (Only available for Windows) and selecting the level of encryption you wish to use.
  8. set up a password at the individual meeting, go to the settings tab and enable it. This setting will give you an option to set your Password: If your Wi-Fi requires a password, you will need to type it in.
  9. Proxy Setup: As you can see in the How to configure Proxy for WiFi section, you can click on the down arrow to select the type of proxy that you would like to set up if necessary.
  10. It is possible to add another network profile by clicking Save or Save and Add another.

Configure an Enterprise WiFi Profile

It is possible to configure an Enterprise WiFi profile once you have added your profile as described in the How to add a network profile section:

Enter the following information in the Configure Network Profiles page:

  1. Name (mandatory): The name of your network profile should be typed in the field provided.
  2. Description (optional): Give a brief description of your network profile in the text box below.
  3. Network Type (mandatory): Select Wi-Fi by clicking on the down arrow at the top of the screen.
  4. Service Set Identifier(SSID): You will need to type the name of the Wi-Fi network that you want to connect to.
  5. Connectivity: If your Wi-Fi is hidden, select Hidden network and/or Auto-Join if you want your devices to automatically connect to the network in case yours is hidden.
  6. Security Type: Choose the type of encryption that you would like your Wi-Fi network to use using the down arrow. It is possible to select WPA/WPA2 Enterprise, WPA2 Enterprise, WPA3 Enterprise or Any(Enterprise).
  7. Encryption Type (only available for Windows):The type of data encryption for your Wi-Fi can be selected by clicking the down arrow next to the type of encryption.
  8. Use as Login Window Configuration: In order to use Login Window Mode for 802.1X authentication on your Mac devices, you will need to select User logs in to authenticate to the network if you want to use Login Window Mode.
  9. Note: This setting will not affect Zoom Room devices that are running on Windows operating systems.
  10. Enterprise Settings:To configure protocols, authentication and trust, click Protocols and Trusted Server Certificates on the left side of the screen.
  11. Proxy Setup: The step-by-step instructions for configuring a proxy for WIFI can be found in the How to Set up a Proxy for WiFi section. You just need to click the down arrow and choose what type of proxy you want to set up.

  12. To add another network profile, click the Save or Save & Add another button.

Configure Proxy for Wi-Fi

If you would like to increase the security of your Wi-Fi network profile, you might have to set up a proxy server. There are two ways in which this can be done: manually or automatically.

Configure a Manual proxy

  • Proxy Setup:Then click the arrow and select the Manual option.
  • Proxy Server: Please enter the hostname or IP address of the proxy server that you wish to use.
  • Proxy User Name:To connect to the proxy server, you need to enter the username and password.
  • Proxy Password: In order to authenticate with the proxy server, you must enter the password you used to sign up.

Configure an Auto proxy

  • Proxy Setup:
  • Select Auto from the drop-down menu by clicking on the arrow.
  • Proxy URL:
  • To retrieve the proxy settings, type the URL link that you want to use to retrieve the proxy settings.
  • PAC Fallback:
  • If you wish to ignore any Proxy Auto-Configuration (PAC) failures, select Allow direct connection if PAC is unreachable, if the PAC is unreachable.

How to configure an Ethernet Profile

Enter the following information in the Configure Network Profiles page:

  1. Name (mandatory): Enter the name of the network profile that you would like to use.
  2. Description (optional): The description of your network profile should be as detailed as possible.
  3. Network Type (only available for Windows devices): By clicking the down arrow, you will be able to select Any Ethernet as the network type.
  4. Use as Login Window Configuration: For your Mac devices, you can use the Login Window Mode for 802.1X authentication if you want to use the Login Window Mode to authenticate to the network if you want to use User Login to authenticate.
  5. Enterprise Settings: To configure protocols, authentication, and trusted server certificates, click Protocols and Trusted Server Certificates on the left side of the page.
  6. It is possible to add another network profile by clicking on Save & Add another or Save & Save & Add another.

Configure Protocols

Configure EAP-TLS protocol

After selecting Protocols, you can configure EAP-TLS tunnel authentication by following the steps below:

  • Protocols: The EAP-TLS protocol should be selected.
  • User Name: Please enter the username of your authenticator here.
  • (Optional) Identity Certificate: You can upload the authenticator certificate by clicking on the + Upload Certificate button.
  • (Optional) TLS Minimum Version: For your TLS, you will need to select the minimum version.
  • (Optional) TLS Maximum Version: Your TLS version should be set to the maximum version.

Configure PEAP protocol

As soon as you have selected Protocols, you can configure your tunnel authentication with PEAP by following these steps:

  • (Optional) If you wish to identify your users‘ logins with their computer login credentials, you can select Authenticate with the target computer’s directory credentials under Use Directory Authentication.
    Note: It is available only for devices running Windows and Mac operating systems. This authentication method can only be used on Windows devices.
  • User Name: Enter the username and password for the PEAP server administrator.
  • Password: Please enter the admin password for the PEAP server.
  • (Optional) Identity Certificate: In order to upload the certificate of the authenticator, click the + Upload Certificate button.
  • Outer Identity: If you wish to hide your user identity, you can type anything you wish.
  • Note: It is only available on Mac OS X and iOS devices at this time.
  • (Optional) TLS Minimum Version:
  • It is important to select the minimum version of TLS for your system.
  • (Optional) TLS Maximum Version:
  • Make sure that your TLS is set to the maximum version.

Configure Trusted Server Certificates

  1. Under Trusted Server Certificates, you will find a + Upload Certificate button that you can use to upload the certificate for authentication.
  2. The Trusted Server Certificates Names can be added to the Trusted Server Certificates Names list by clicking +Add if you want to add the name of the certificate from the authentication server.
    Note: It is possible to delete the name of the certificate by clicking the Delete button if you wish to do so.
  3. There is an option that can be enabled so that trust exceptions can be applied to certificates that are not trusted before but have now been trusted through the use of trust exceptions.

How to assign Zoom Room devices to your ZDM network profile

  1. Log into the Zoom web portal by using your Zoom username and password.
  2. Click Device Management from the navigation menu at the top of the page.
  3. To configure your system, click System Configuration.
  4. Navigate to the Network tab by clicking on it.
  5. Then you will need to identify your network profile, then you will need to click on the ellipsis on the far right
  6. Click on the Assign Devices button.
  7. Select and/or search for your devices from the Assign Devices pop-up window, depending on their enrollment status, then click on Assign to assign them.