The following article describes how to deploy a device certificate or a user certificate for Windows 10.
The following section will show you how you can deploy device certificates via Intune Certificate profile on Windows 10 (or later) devices.
First, we need to trust the public root certificate from SCEPman. Therefore, you have to download the CA certificate (from SCEPman) and deploy it via a trusted certificate profile in Microsoft Intune:
Download the CA certificate:
Then, create a profile in Microsoft Intune:
Enter a Name
As Platform select Windows 10 or later
As Profile type select Trusted certificate
Click Settings, select A valid .cer file
As Destination store select Computer certificate store - Root
Then, click OK
Finally, click Create
When you are finished with it, you can deploy this profile to your devices.
Now, you have to create a SCEP certificate profile to deploy the device certificates. Important for this step is the SCEP Server URL. This URL can be found in the Overview submenu of the app service of SCEPman:
Append the following to your URL: /certsrv/mscep/mscep.dll. Note this URL: https://scepman-xxx.azurewebsites.net/certsrv/mscep/mscep.dll ('xxx' is a placeholder)
Next, to finally deploy the device certificates, you have to create a SCEP certificate profile in Intune:
Navigate to Microsoft Intune
Click Device Configuration
Choose Profiles and click Create profile
Then, enter a Name
Select Windows 10 and later as Platform
Select SCEP certificate as Profile type
Click Settings
Configure the SCEP Certificate
There are some restrictions to the SCEP Certificate settings:
Important: You must add the '' as CN in Subject name format or in the User principal name (UPN) of the Subject alternative name field. This ensures that SCEPman can link certificates to device objects in AAD.
SCEPman automatically sets the Key usage to Digital signature and Key encipherment and overrides the settings configured here, unless the setting AppConfig:UseRequestedKeyUsages is set to true.
For SCEPman version before 1.5, the validity period is set to a fixed 6 month. For SCEPman 1.5 and above, SCEPman caps the certificate validity to the configured maximum in setting AppConfig:ValidityPeriodDays, but otherwise uses the validity configured in the request.
The setting Key Storage Provider (KSP) determines the storage location of the private key for the end-user certificates. Storage in the TPM is more secure than software storage, because the TPM provides an additional layer of security to prevent key theft. However, there is a bug in some older TPM firmware versions that invalidates some signatures created with a TPM-backed private key. In such cases, the certificate cannot be used for EAP authentication as it is common for Wi-Fi and VPN connections. Affected TPM firmware versions include:
STMicroelectronics: 71.12
Intel: 11.8.50.3399
If you use TPMs with these firmwares, either update your firmware to a newer version or select "Software KSP" as key storage provider.
Scroll down and enter the URL you have noted
Then, click Add
Next, click OK and finally click Create
When all is finished, you have the following two certificate configurations:
SCEPman - SCEP device certificate
SCEPman - Trusted root certificate
The following section will show you how you can deploy user certificates via Intune Certificate profile on Windows 10 (or later) devices.
First, we need to trust the public root certificate from SCEPman. Therefore, you have to download the CA certificate (from SCEPman) and deploy it via a trusted certificate profile in Microsoft Intune:
Download the CA certificate:
Then, create a profile in Microsoft Intune:
Enter a Name
As Platform select Windows 10 or later
As Profile type select Trusted certificate
Click Settings, select A valid .cer file
As Destination store select Computer certificate store - Root
Then, click OK
Finally, click Create
When you are done with it you can deploy this profile to your devices.
Now, you have to create a SCEP certificate profile to deploy the device certificates. Important for this step is the SCEP Server URL. This URL can be found in the Overview submenu of the app service of SCEPman:
Append the following to your URL: /certsrv/mscep/mscep.dll. Note this URL: https://scepman-xxx.azurewebsites.net/certsrv/mscep/mscep.dll ('xxx' is a placeholder)
Next, to finally deploy the device certificates you have to create a SCEP certificate profile in Intune:
Navigate to Microsoft Intune
Click Device Configuration
Choose Profile and click Create profile
Then, enter a Name
Select Windows 10 and later as Platform
Select SCEP certificate as Profile type
Click Settings
Configure the SCEP Certificate
There are some restrictions to the SCEP Certificate settings:
You must add the 'User principal name (UPN)' as Subject alternative name. This ensures that SCEPman can link certificates to user objects in AAD. The setting for 'Subject name format' is freely selectable.
SCEPman automatically sets the Key usage to Digital signature and Key encipherment and overrides the settings configured here, unless the setting AppConfig:UseRequestedKeyUsages is set to true.
For SCEPman version before 1.5, the validity period is set to a fixed 6 month. For SCEPman 1.5 and above, SCEPman caps the certificate validity to the configured maximum in setting AppConfig:ValidityPeriodDays, but otherwise uses the validity configured in the request.
The setting Key Storage Provider (KSP) determines the storage location of the private key for the end-user certificates. Storage in the TPM is more secure than software storage, because the TPM provides an additional layer of security to prevent key theft. However, there is a bug in some older TPM firmware versions that invalidates some signatures created with a TPM-backed private key. In such cases, the certificate cannot be used for EAP authentication as it is common for Wi-Fi and VPN connections. Affected TPM firmware versions include:
STMicroelectronics: 71.12
Intel: 11.8.50.3399
If you use TPMs with these firmwares, either update your firmware to a newer version or select "Software KSP" as key storage provider.
Scroll down and enter the URL you have noted
Then, click Add
Next click OK and finally click Create
When all its done, you have the following two certificate configurations:
SCEPman - SCEP user certificate
SCEPman - Trusted root certificate