Configuring Zoom Device Management network profile
To simplify the process of creating and managing Zoom Rooms network configurations, administrators can use Zoom Device Management (ZDM) to remotely manage the network of their Zoom Room computers and controllers. Admins have the ability to create a network profile directly from their web portal by providing network configuration settings, including SSID, network security type, network credentials, proxy and other. The network profile is then assigned to any Zoom Room managed devices.
Requirements for configuring a ZDM network profile for Zoom Rooms
- Account owner or admin privileges
- Zoom Room license
- Windows 10 version 1809 or higher if using Windows for your Zoom Room computer
How to add a network profile for ZDM
To add a network profile to manage your Zoom Room with ZDM:
- Sign in to the Zoom web portal.
- In the navigation menu, click Device Management.
- Click System Config.
- Click Add Profile.
- Follow the steps in the next sections to configure your desired network profile type.
How to configure a WiFi network profile
Configure a Personal WiFi profile
After adding your profile as stated in the How to add a network profile section, you can choose to configure a personal WiFi profile:
In the Configure Network Profiles page, enter the following:
-
- Name (mandatory): Type the name of your network profile.
- Description (optional): Type a description of your network profile.
- Network Type (mandatory): Click the down arrow and select Wi-Fi.
- Service Set Identifier(SSID): Type the name of the Wi-Fi to connect to.
- Connectivity: Select Hidden network if your Wi-Fi is hidden and/or Auto-Join if you want your devices to automatically connect to your Wi-Fi network.
- Security Type: Click the down arrow and select the type of security encryption for your Wi-Fi. You can choose WEP, WPA/WPA2, WPA2 Personal, WPA3 Personal or Any(Personal).
- Encryption Type (Only available for Windows): Click the down arrow and select the type of data encryption for your Wi-Fi.
- Password: Type a password if your Wi-Fi requires one.
- Proxy Setup: Click the down arrow and select the type of proxy to set up if necessary, and follow the instructions in the How to configure Proxy for WiFi section.
- Click Save or Save & Add another to add another network profile.
Configure an Enterprise WiFi Profile
After adding your profile as stated in the How to add a network profile section, you can choose to configure an Enterprise WiFi profile:
In the Configure Network Profiles page, enter the following:
-
- Name (mandatory): Type the name of your network profile.
- Description (optional): Type a description of your network profile.
- Network Type (mandatory): Click the down arrow and select Wi-Fi.
- Service Set Identifier(SSID): Type the name of the Wi-Fi to connect to.
- Connectivity: Select Hidden network if your Wi-Fi is hidden and/or Auto-Join if you want your devices to automatically connect to your Wi-Fi network.
- Security Type: Click the down arrow and select the type of security encryption for your Wi-Fi. You can choose WPA/WPA2 Enterprise, WPA2 Enterprise, WPA3 Enterprise or Any(Enterprise).
- Encryption Type (only available for Windows): Click the down arrow and select the type of data encryption for your Wi-Fi.
- Use as Login Window Configuration: Select User logs in to authenticate to the network if you want to use Login Window Mode for 802.1X authentication on your Mac devices.
Note: Windows Zoom Room devices are not affected by this setting. - Enterprise Settings: Click Protocols and Trusted Server Certificates for your configuration of protocols, authentication and trust.
-
Proxy Setup: Click the down arrow and select the type of proxy to set up if necessary, and follow the instructions in the How to configure Proxy for WiFi.
- Click Save or Save & Add another to add another network profile.
Configure Proxy for Wi-Fi
You might need to set up a proxy to provide more security to your Wi-Fi network profile. This can be done manually or automatically.
Configure a Manual proxy
- Proxy Setup: click the arrow and select Manual.
- Proxy Server: Type in the Host name or IP address of your proxy server.
- Proxy User Name: Type in the username to connect to the proxy server.
- Proxy Password: Type in the password used to authenticate with the proxy server.
Configure an Auto proxy
- Proxy Setup: click the arrow and select Auto.
- Proxy URL: Type in the URL link to retrieve the proxy settings from.
- PAC Fallback: Select Allow direct connection if PAC is unreachable, if you want to ignore any Proxy Auto-Configuration (PAC) failures.
How to configure an Ethernet Profile
In the Configure Network Profiles page, enter the following:
-
- Name (mandatory): Type the name of your network profile.
- Description (optional): Type a description of your network profile.
- Network Type (only available for Windows devices): Click the down arrow and select Any Ethernet.
- Use as Login Window Configuration: Select User Logs in to authenticate to the network if you want to use Login Window Mode for 802.1X authentication on your Mac devices.
- Enterprise Settings: Click Protocols and Trusted Server Certificates for your configuration of protocols, authentication and trust.
- Click Save or Save & Add another to add another network profile.
Configure Protocols
Configure EAP-TLS protocol
To configure your tunnel authentication with EAP-TLS, do the following after selecting Protocols:
- Protocols: Select EAP-TLS.
- User Name: Type the username of your authenticator.
- (Optional) Identity Certificate: Click + Upload Certificate to provide the authenticator certificate.
- (Optional) TLS Minimum Version: Select the minimum version for your TLS.
- (Optional) TLS Maximum Version: Select the maximum version for your TLS.
Configure PEAP protocol
To configure your tunnel authentication with PEAP, do the following after selecting Protocols:
- (Optional) Under Use Directory Authentication, select Authenticate with the target computer’s directory credentials if you want to identify your user logins with their computer login credentials.
Note: Available for Windows and Mac devices only. Windows devices can only use this authentication method. - User Name: Type in the PEAP server admin username.
- Password: Type in the PEAP server admin password.
- (Optional) Identity Certificate: Click + Upload Certificate to provide the authenticator certificate.
- Outer Identity: Type anything you desire if you want to hide your user identity.
Note: Available only for macOS and iOS devices. - (Optional) TLS Minimum Version: Select the minimum version for your TLS.
- (Optional) TLS Maximum Version: Select the maximum version for your TLS.
Configure Trusted Server Certificates
- Under Trusted Server Certificates, click + Upload Certificate to upload the certificate for authentication.
- Under Trusted Server Certificates Names, click + Add to add the certificate name from the authentication server.
Note: You can click Delete to delete the certificate name if desired. - (Optional) Check Allow trust exceptions to trust a certificate that was not trusted before.
How to assign Zoom Room devices to your ZDM network profile
- Sign in to the Zoom web portal.
- In the navigation menu, click Device Management.
- Click System Config.
- Select the Network tab.
- Identify your network profile, then on the far right click the ellipse

- Click Assign Devices.
- In the Assign Devices pop-up windows, search and/or select your devices according to their enrollment status, then click Assign.