- Created by Karolin Hemmingsson (Unlicensed) , last modified by Ann Base (Deactivated) on Jun 04, 2021
You are viewing an old version of this page. View the current version.
Compare with Current View Page History
« Previous Version 2 Next »
This article describes a configuration example of the SCEP protocol with Azure Intune in Protocol Gateway.
Prerequisites
The following prerequisites apply:
- Protocol Gateway must be installed. See Install Protocol Gateway.
- Initial configuration of Protocol Gateway must be done. See Initial configuration of Protocol Gateway.
- Microsoft Intune must be set up according to https://docs.microsoft.com/en-us/mem/intune/fundamentals/setup-steps
- The SCEP RA certificate must be issued by the same CA that issues the device certificates. Create an RA certificate in PKCS#12 format containing the full CA chain with the following keyusages or extended keyusages:
- Digital Signature
- Key Encipherment
- TLS Server Authentication
Step-by-step instruction
Configure Intune for device certificate enrollment
To authorize communication between Protocol Gateway and Azure Intune you need to create a new registration app in your company Azure portal.
- Navigate to the Azure Portal at https://portal.azure.com/.
- Navigate to Azure Active Directory > App registrations and select New registration.
- Give the app registration a Name, which is the user-facing display name, for example Intune App.
- Set Supported account types to Accounts in any organizational directory (Any Azure AD directory - Multitenant) and personal Microsoft accounts (e.g. Skype, Xbox).
In Redirect URI, select Web and set the URI to the Protocol Gateway SCEP Intune endpoint:
Example: Protocol Gateway SCEP Intune endpointhttps://example.com/pgwy/scep/intune/pkiclient.exe
- Click on Register to finalize the app registration.
- You are directed to the App overview page. Copy the Application (client) id, this is your app id and needs to be configured in the Protocol Gateway SCEP properties later.
- Navigate to Certificates & secrets and create a Client secret. Copy the value before leaving the page, it can not be retrieved later. This value needs to be configured in the Protocol Gateway SCEP properties later.
Navigate to API permissions and Add a permission for Intune > scep_challenge_provider.
- Click on Grant admin consent for... and click Yes.
To allow Windows 10 devices to enroll using Intune, Microsoft Intune Mobility MDM (Mobile Device Management) must be enabled.
- Navigate to Azure Active Directory > Mobility (MDM and MAM) and select Microsoft Intune.
- Change MDM user scope to either All or limit the enrollment access to specific groups with the option Some.
- Make sure that MAM user scope is set to None. Mobile Application Management (MAM) must be inactive for Intune to work.
To establish the necessary certificate trust stores for the devices to successfully enroll with Intune, the following Trusted certificate profiles need to be configured:
Computers trusted root store - Root CA
Computers trusted intermediate store - Root CA
Computers trusted intermediate store - Intermediate CA
Follow this guide to configure each of the trusted certificate profiles:
- Navigate to the Azure Endpoint manager (https://endpoint.microsoft.com/).
- Navigate to Devices => Configuration Profiles, and select Create profile.
- Perform the following settings:
- Set Platform to Windows 10 or later.
- Set Profile type to templates.
- Select Template name to trusted certificate and click Create.
- Enter a profile name and optionally a description, then click Next.
- Upload the certificate that should be trusted, in DER format, and specify the 'Destination store'. Then click on next.
- For Root CA in trusted root store: upload the root CA certificate and set Destination store to Computer certificate store - Root.
- For Root CA in trusted intermediate store: upload the root CA certificate and set Destination store to Computer certificate store - Intermediate.
- For Intermediate CA in trusted intermediate store: upload the intermediate CA certificate and set Destination store to Computer certificate store - Intermediate.
- Configuring the access rights to this profile can be done either by applying it to all devices or by applying it to a selected group that the users requesting certificates via Intune will be a part of. Once the assignments have been configured click on next.
- If no device limitation is required, configuration of the accessibility rules can be skipped. Click on Next to proceed.
- Review your settings and verify that they are correct and then click on Create.
A SCEP Certificate Profile needs to be created for Intune to know how the end user certificate should be defined and which CA to deliver the CSR to.
- Navigate to the Azure Endpoint manager at https://endpoint.microsoft.com/.
- Navigate to Devices > Configuration Profiles and select Create profile.
- Perform the following settings:
- Set Platform to Windows 10 or later.
- Set Profile type to templates.
- Select Template name to SCEP certificate and click Create.
- Enter a Profile name and optionally a Description. Click Next.
- The configurations determine the content of the CSR that will be sent to Protocol Gateway and should be adapted per installation.
However, some settings are mandatory, for example the following:- Set Certificate type to Device.
- Set Key storage provider (KSP) to Enroll to Trusted Platform Module (TPM) KSP if present, otherwise Software KSP.
- Set Root Certificate to the Root CA Trusted Profile that was configured in the trusted root store.
- In Extended key usage, add Client Authentication via the Predefined values.
Set SCEP Server URLs to the Protocol Gateway Intune endpoint:
Example: Protocol Gateway SCEP Intune endpointhttps://example.com/pgwy/scep/intune
- Click on Next.
- Configure the access rights to the profile, either by applying it to all devices or by applying it to a selected group that the users requesting certificates via Intune will be a part of. Click on Next.
- If no device limitation is required, the configuration of the accessibility rules can be skipped. Click on Next.
- Verify the settings and click on Create.
Configure Protocol Gateway SCEP for Intune
To set the properties for the SCEP protocols:
- Open /cm-gateway/conf/SCEP.properties for editing.
- On Linux, this is found in /var/cm-gateway.
- On Windows, this is found in C:/ProgramData/Nexus/cm-gateway.
- Set the SCEP properties as follows:
- Enable the SCEP protocol by setting
start
totrue
. Set
default.ra.keyfile
to the Protocol Gateway RA token file anddefault.ra.password
to the related PIN.The certificate format linked to the token procedure should not handle verifications (that is, rfc5280 can be used).
- Enable the SCEP protocol by setting
In a
handler
, set the following Intune parameters, to be able to verify the incoming device CSRs:- Set
filter
andformat
according to the SCEP.properties example below. - Set
tenant
to the fully qualified domain name (FQDN) of the organization configured in Intune. - Set
azure_app_id
to the Application (client) id that was received in the Register app section above. - Set
azure_app_key
to the Client secret that was received in the Register app section above. Set
certificateAuthority
to the name of the issuing CA for the end user certificates.For more information on how to configure verifications of certificate requests in .properties files, see Certificate request verifications in Protocol Gateway.
- Set
- If needed, scramble sensitive parameters in the configuration file. See Scramble sensitive data in configuration files in Protocol Gateway.
- Save the file.
# SCEP parameters start = true default.tokenprocedure = SCEP Registration and Enroll Procedure default.ra.keyfile = protocol-gateway-ra.p12 default.ra.password = <Protocol Gateway RA PIN> # Intune parameters handler.x.filter = intune/pkiclient.exe handler.x.format = scep-intune handler.x.tenant = {azure-tenant} handler.x.azure_app_id = {app-id} handler.x.azure_app_key = {app-key} handler.x.certificateAuthority = {CA_name}
- Restart the Tomcat service.
Enroll Windows 10 device
See the following Microsoft guide on how to enroll Windows 10 devices: https://docs.microsoft.com/en-us/mem/intune/enrollment/quickstart-enroll-windows-device.
- No labels