The reMarkable devices can connect to the wireless network eduroam. But when the connection is based on a certificate infrastructure, the mechanisms is not exposed on the GUI connection manager. This guide shows the necessary steps to set-up the connection manually. Tested with the reMarkable Paper Pro.

Prerequisites

Similar to the guide Configure iwd to connect to eduroam, this relies on a profile from easyroam.

The developer mode needs to be activated on the reMarkable device in order to use a secure shell to access the Linux system. Follow the documentation and the support.

Steps

To connect to eduroam, create a personal profile from your institutional login, extract the certificates and the key and store them on the device.

Profile Generation

Get the profile from easyroam by selecting "Linux. Manual setup for Linux devices". When creating the profile, you are asked to provide a name, the following steps assume this to be remarkable_profile. You will then get a PKCS12 file called remarkable_profile.p12.

Extract Data

The documentation shows a script to extract and store the data. This requires root privileges to store the data in /etc/. In our current step, we are only interested to extract the data, for this the following commands are sufficient:

openssl pkcs12 -in remarkable_profile.p12 -legacy -nokeys -nodes \
  -passin pass: -clcerts -out client_cert.pem
openssl pkcs12 -in remarkable_profile.p12 -legacy -nokeys -nodes \
  -passin pass: -cacerts -out ca_cert.pem
openssl pkcs12 -in remarkable_profile.p12 -legacy -nocerts \
  -passin pass: -passout pass:pkcs12 -out client_key.pem

Those commands create three files, client_cert.pem, ca_cert.pem and client_key.pem. An empty password is used to access the data, and the key file client_key.pem is protected with the password pkcs12.

Tested with OpenSSL 3.6.1 27 Jan 2026 (Library: OpenSSL 3.6.1 27 Jan 2026).

openssl on macOS works as well, but without the -legacy option.

Configure reMarkable

Connect the reMarkable via USB to the host computer.

Make the filesystem writable and create a folder for our files:

ssh root@10.11.99.1 mount -o remount,rw /
ssh root@10.11.99.1 mkdir /home/root/certs

Move the files from the previous step to the device:

scp client_cert.pem ca_cert.pem client_key.pem \
  root@10.11.99.1:/home/root/certs/

Append the following configuration to the file /home/root/.config/remarkable/wifi_networks.conf. Substitute the identity with the CN field from openssl x509 -noout -in client_cert.pem -subject.

network={
	ssid="eduroam"
	proto=RSN
	key_mgmt=WPA-EAP
	pairwise=CCMP
	group=CCMP
	eap=TLS
	identity="xxxxxxxxxxxxxxxxxxx@easyroam-pca.hm.edu"
	ca_cert="/home/root/certs/ca_cert.pem"
	client_cert="/home/root/certs/client_cert.pem"
	private_key="/home/root/certs/client_key.pem"
	private_key_passwd="pkcs12"
	altsubject_match="DNS:easyroam.eduroam.de"
	priority=1
	id_str="0"
}

The device should now be able to connect to eduroam.

This guide is based on remarkableEduroam.md. The community site reMarkable Guide has also a lot of helpful information.