How To Create SCEP PKI in Azure
- Registering the application in your tenant
- Create EZCA Resource In Azure
- If you are connecting it to Intune, you also need to register Intune Application in Azure Tenant
Do I Need a Root CA?
One of the most common questions we get in our free PKI assessments is if they need to create Root CA for their SCEP CA or if they should create the SCEP CA as the Root CA. PKI Best practices recommend a two tier PKI where you have your offline Root CA and then your online issuing CAs that each issued a different type of certificate (this is to prevent impersonation by someone issuing a certificate for a different purpose). This allows you to push the Root to all your devices and don’t have to manually trust each individual CA. However, if you are cost constrained and you are not issuing certificates for different purposes in the future (remember CAs last up to 10 years), you can create a single tier PKI where your SCEP CA is your Root CA.
How To Create Intune SCEP CA - Video Version
In this video we are creating a Root CA that is going to be the issuing CA, this was to make it easier for organizations that are getting started as well as to avoid certain issues that might be caused do to certain networking devices not being able to build a CA chain and requiring a single CA hierarchy, To follow PKI hierarchy best practices we recommend Creating a Root CA or chaining to your existing root CA.
How to Create Azure CA for Intune
- navigate to the EZCA portal (If you have your private instance, or you are in our EU Version go to that specific portal)
- Login with an account that is registered as a PKI Administrator in EZCA.
- Navigate to Certificate Authorities.
- Click on the “Create CA”
- Select the CA Tier that you are going to use.
In this documentation we are creating a Root CA that is going to be the issuing CA, this was to make it easier for organizations that are getting started as well as to avoid certain issues that might be caused do to certain networking devices not being able to build a CA chain and requiring a single CA hierarchy, To follow PKI hierarchy best practices we recommend Creating a Root CA or chaining to your existing root CA. If you are chaining to a Root CA, please select Subordinate CA.
- Click Next
Entering SCEP CA Information
- Enter Common Name: This is the name of the CA how it will appear in the certificate.
- (Optional) Enter CA Friendly Name This is the name that will appear in the EZCA portal, by default we will use the Common Name
- (Optional) Enter the Organization The Organization field is an optional certificate field that usually has the company name.
- (Optional) Enter the Organization Unit The Organization Unit field is an optional certificate field that usually contains the unit that runs this CA (For example: IT or HR).
- (Optional) Enter the Country Code The Country Code field is an optional certificate field that identifies the country where this CA is located.
- Click Next.
- Unless you have specific compliance or security requirements, leave the default cryptographic values for best security and compatibility.
Intune SCEP (and most MDMs) only support RSA keys for the issuing certificate authority.
Set the SCEP CA Certificate Validity Period
- Select your Validity Period Learn more about Validity Period best practices
- Enter a Notification Email this email address (as well as the PKI Administrators) will get all the notifications for the lifecycle of the CA.
- Leave the lifecycle Action as Email, this will send an email to the PKI Administrators and the Notification Email when the CA is about to expire. Allowing you to renew it, and push it to your MDM and devices.
- Select the percentage of lifetime of the certificate when you want EZCA to start taking Lifecycle actions.
Setup CA Certificate Revocation List
- Select if you want this CA should issue a CRL (Highly recommended)
- If you are not changing any CRL details, click Next.
CA Certificate Revocation List Advance Settings (Optional)
Changes to this section are only recommended for PKI experts with specific requirements.
- Click the expand button
- Enter the desired CRL Validity Period in days
- Enter the desired CRL Overlap Period in hours
- (Optional) Enter the CRL endpoint where you will publish your CRLs
Custom CRL endpoints are supported by EZCA by adding the CRL endpoint as the CRL endpoint in the certificate. However, your PKI admins are responsible from getting the CRL from EZCA and posting it in that specific endpoint.
How To Enable OCSP (Online Certificate Status Protocol) For Your CA
Inside the CA Revocation advanced settings, you can enable OCSP for this CA. OCSP is only recommended if you have specific requirements for OCSP. While OCSP allows quicker revocation it increases the CA the cryptographic load and can limit the scalability of the CA (Basic CA allows 1 cryptographic activity per second, Premium CA 20 cryptographic activities per second, Isolated CA 160 cryptographic activities per second). Learn more about OCSP vs CRL
- If you want to enable OCSP, select the “Enable OCSP” option.
- Enabling the OCSP will create an OCSP endpoint for this CA in the same region you select for your OCSP (this is included with the price of your CA). If you require extra scalability you can create multiple OCSPs for your certificate authority in different regions. Note: Each extra OCSP will be charged as an extra Certificate Authority.
- Once you have setup your certificate revocation, click Next.
- Click Next.
Certificate Issuance Policy
- Change the Issuing Certificate Type to “SCEP Template”
- Set the certificate lifetime for the certificate that will be issued.
This value will override any value that you set in your MDM.
- Depending on your MDM, you might have to enable SCEP Dynamic Enrollment. If you are using Intune, you can leave this disabled.
a) This will create create a SCEP user name and a SCEP password that you will need to enter in your MDM, your MDM will then use those credentials to contact EZCA and request a new challenge for each certificate.
- Another simpler option is having your MDM use a static SCEP challenge, this challenge encrypted and passed to EZCA to validate that the request came from a managed device.
a) This will create a SCEP challenge that you will need to enter in your MDM, your MDM will then use that challenge to contact EZCA and request a new certificate. This challenge will be available after you create the CA by going to your CA and clicking “View Issuance Requirements”
- Once you have enabled the SCEP features needed (you can always go to your CA’s Issuance Requirements and update these values), click Next.
- Select the location where you want your CA to be created.
- If needed you can add secondary locations to your CA. Please note that each additional location will be charged as an additional CA.
- Click Create
Chain to Root CA
If you created a Subordinate/Issuing CA you must chain this certificate to a root CA. Follow these instructions to chain to an offline CA. Or the following steps to chain to an EZCA Root CA.
- If your desired Root CA is an EZCA CA, Select it from the dropdown and click create CA.
- Repeat this step for each location.
- Once the CA is created download the CA certificate.
- Now you are ready to connect your MDM to EZCA and start issuing SCEP certificates
If you created a Subordinate/Issuing CA, you will also need the certificate from the Root CA.