One of the most common questions we get in our free PKI assessments is if they need to create Root CA for their SCEP CA or if they should create the SCEP CA as the Root CA. PKI Best practices recommend a two tier PKI where you have your offline Root CA and then your online issuing CAs that each issued a different type of certificate (this is to prevent impersonation by someone issuing a certificate for a different purpose). This allows you to push the Root to all your devices and don’t have to manually trust each individual CA. However, if you are cost constrained and you are not issuing certificates for different purposes in the future (remember CAs last up to 10 years), you can create a single tier PKI where your SCEP CA is your Root CA.
How To Create Intune SCEP CA - Video Version
In this video we are creating a Root CA that is going to be the issuing CA, this was to make it easier for organizations that are getting started as well as to avoid certain issues that might be caused do to certain networking devices not being able to build a CA chain and requiring a single CA hierarchy, To follow PKI hierarchy best practices we recommend Creating a Root CA or chaining to your existing root CA.
How to Create Azure CA for Intune
navigate to the EZCA portal (If you have your private instance, or you are in our EU Version go to that specific portal)
Login with an account that is registered as a PKI Administrator in EZCA.
Navigate to Certificate Authorities.
Click on the “Create CA”
Select the CA Tier that you are going to use.
In this documentation we are creating a Root CA that is going to be the issuing CA, this was to make it easier for organizations that are getting started as well as to avoid certain issues that might be caused do to certain networking devices not being able to build a CA chain and requiring a single CA hierarchy, To follow PKI hierarchy best practices we recommend Creating a Root CA or chaining to your existing root CA. If you are chaining to a Root CA, please select Subordinate CA.
Click Next
Entering SCEP CA Information
Enter Common Name: This is the name of the CA how it will appear in the certificate.
(Optional) Enter CA Friendly Name This is the name that will appear in the EZCA portal, by default we will use the Common Name
(Optional) Enter the Organization The Organization field is an optional certificate field that usually has the company name.
(Optional) Enter the Organization Unit The Organization Unit field is an optional certificate field that usually contains the unit that runs this CA (For example: IT or HR).
(Optional) Enter the Country Code The Country Code field is an optional certificate field that identifies the country where this CA is located.
Click Next.
Cryptographic Requirements
Unless you have specific compliance or security requirements, leave the default cryptographic values for best security and compatibility.
Intune SCEP (and most MDMs) only support RSA keys for the issuing certificate authority.
Enter a Notification Email this email address (as well as the PKI Administrators) will get all the notifications for the lifecycle of the CA.
Leave the lifecycle Action as Email, this will send an email to the PKI Administrators and the Notification Email when the CA is about to expire. Allowing you to renew it, and push it to your MDM and devices.
Select the percentage of lifetime of the certificate when you want EZCA to start taking Lifecycle actions.
Setup CA Certificate Revocation List
Select if you want this CA should issue a CRL (Highly recommended)
If you are not changing any CRL details, click Next.
CA Certificate Revocation List Advance Settings (Optional)
Changes to this section are only recommended for PKI experts with specific requirements.
Click the expand button
Enter the desired CRL Validity Period in days
Enter the desired CRL Overlap Period in hours
(Optional) Enter the CRL endpoint where you will publish your CRLs
Custom CRL endpoints are supported by EZCA by adding the CRL endpoint as the CRL endpoint in the certificate. However, your PKI admins are responsible from getting the CRL from EZCA and posting it in that specific endpoint.
How To Enable OCSP (Online Certificate Status Protocol) For Your CA
Inside the CA Revocation advanced settings, you can enable OCSP for this CA. OCSP is only recommended if you have specific requirements for OCSP. While OCSP allows quicker revocation it increases the CA the cryptographic load and can limit the scalability of the CA (Basic CA allows 1 cryptographic activity per second, Premium CA 20 cryptographic activities per second, Isolated CA 160 cryptographic activities per second). Learn more about OCSP vs CRL
If you want to enable OCSP, select the “Enable OCSP” option.
Enabling the OCSP will create an OCSP endpoint for this CA in the same region you select for your OCSP (this is included with the price of your CA). If you require extra scalability you can create multiple OCSPs for your certificate authority in different regions. Note: Each extra OCSP will be charged as an extra Certificate Authority.
Once you have setup your certificate revocation, click Next.
Click Next.
Certificate Issuance Policy
Change the Issuing Certificate Type to “SCEP Template”
Set the certificate lifetime for the certificate that will be issued.
This value will override any value that you set in your MDM.
Depending on your MDM, you might have to enable SCEP Dynamic Enrollment. If you are using Intune, you can leave this disabled.
a) This will create create a SCEP user name and a SCEP password that you will need to enter in your MDM, your MDM will then use those credentials to contact EZCA and request a new challenge for each certificate.
Another simpler option is having your MDM use a static SCEP challenge, this challenge encrypted and passed to EZCA to validate that the request came from a managed device.
a) This will create a SCEP challenge that you will need to enter in your MDM, your MDM will then use that challenge to contact EZCA and request a new certificate. This challenge will be available after you create the CA by going to your CA and clicking “View Issuance Requirements”
Once you have enabled the SCEP features needed (you can always go to your CA’s Issuance Requirements and update these values), click Next.
Select Location
Select the location where you want your CA to be created.
If needed you can add secondary locations to your CA. Please note that each additional location will be charged as an additional CA.
Click Create
Chain to Root CA (Option 1)
If you created a Subordinate/Issuing CA you must chain this certificate to a root CA. Follow these instructions to chain to an offline CA. Or the following steps to chain to an EZCA Root CA.
If your desired Root CA is an EZCA CA, Select it from the dropdown and click create CA.
Repeat this step for each location.
Chaining to Offline Root CA (Option 2)
If you prefer to chain your CA to an offline Root CA, follow these steps.
Once the CA is requested, a Certificate Signing Request (CSR) will be created for each location.
Click the “Save CSR” Button.
Once the CSR is download, follow your internal guidance to transfer that CSR to your offline Root CA.
Open your “Certificate Authority” in Windows.
Right click the CA.
Select All Tasks -> Submit new Request.
Select the downloaded CSR.
Click on pending requests.
Right click on the newly created request.
Select All Tasks -> Issue.
Click on Issued Certificates.
Double click on the newly created certificate.
Click on Details.
Click on the “Copy ti File…” Button.
Click next
Select the “Base-64 encoded X.509 (.CER) option.
Click next.
Select where you want to save the newly created certificate.
Click next.
Click Finish.
This should create a .cer file in the location you selected.
Follow you PKI team’s guidance on transferring the certificate file out of the offline CA into an internet connected computer.
Once you have the certificate in an internet connected computer, go to https://portal.ezca.io/
Login with an account that is registered as a PKI Admin in EZCA.
Navigate to Certificate Authorities.
Click View details of the CA you want to import the certificate for.
Scroll down to the location you want to import, and click the “Upload CA Certificate” button.
Select the newly created certificate file.
Click on the “Save Certificate” button
Repeat these steps for each location.
Your CA is ready to be used!
Download Certificate
Once the CA is created download the CA certificate.