How-To: Create a SCEP CA with EZCA Cloud PKI

This page will walk you through how to create a cloud SCEP CA to issue SSL Certificates for your Intune managed devices.

Prerequisites for Creating a SCEP CA in Azure

  1. You have registered the Keytos Entra ID applications
  2. You have created an EZCA subscription
  3. If you plan to use Intune, you have registered the Intune application

How To Create a SCEP CA in EZCA Cloud PKI - Video Tutorial

Want to follow along with our video tutorial? Check out our video tutorial below where we walk you through how to create a SCEP CA in EZCA:


Note that in this video we are creating a Root CA that will be the Issuing SCEP CA. If you want to build a multi-tier CA hierarchy, refer to our PKI hierarchy best practices and Root CA guide.

How to Create a SCEP CA in EZCA Cloud PKI - Step by Step Guide

Follow these steps to create your SCEP CA in EZCA Cloud PKI:

  1. Navigate to the EZCA portal (If you have your private instance, or you are in our EU Version go to that specific portal)

  2. Login with an account that is registered as a PKI Administrator in EZCA.

  3. From the left-hand menu, navigate to Certificate Authorities.

    EZCA Cloud PKI portal dashboard with Certificate Authorities menu item highlighted in left navigation
  4. Click on Create CA to begin creating a new CA.

    EZCA Cloud PKI My CAs list page with Create CA button highlighted

Step 1: How to Select the CA Type for Your SCEP CA

In the first page, you will choose which type of CA you want to create. For a SCEP CA, you can select either Root CA or Subordinate/Issuing CA depending on your needs.

  1. Select the CA Type that you want to create (Root CA or Subordinate/Issuing CA).

    EZCA Cloud PKI Create CA wizard showing Root CA and Subordinate CA type selection options
  2. Click Next

Step 2: How to Configure Your CA Information

In the next page you will enter the information for your CA such as the Common Name, Organization, Country Code, and other details.

  1. Enter Common Name: This is the name of the CA how it will appear in the certificate.

  2. (optional) Enter the CA Friendly Name, which is the name that will appear in the EZCA portal, by default we will use the Common Name

  3. (optional) Enter the Organization, which is an optional certificate field that usually has the company name.

  4. (optional) Enter the Organization Unit, which is an optional certificate field that usually contains the unit that runs this CA (i.e. IT or HR).

  5. (optional) Enter the Country Code, which is an optional certificate field that identifies the country where this CA is located.

  6. Click Next.

    EZCA Cloud PKI Create CA wizard Add Issuer Information form with Common Name and organization fields

Step 3: How to Set Your Cryptographic Requirements

The cryptographic settings will determine the type of keys that your CA will use to sign certificates and CRLs. We recommend using the default values for best security and compatibility, but you can change these values if you have specific requirements.

  1. Unless you have specific compliance or security requirements, leave the default cryptographic values for best security and compatibility.

  2. Click Next.

    EZCA Cloud PKI Create CA wizard showing RSA and ECDSA cryptographic key size selection options

Step 4: Set the Lifetime & Revocation

  1. Select your CA Validity Period for the CA itself. If you’re unsure what to set, refer to our validity period best practices.

  2. Enter a Notification Email. This email address (as well as the PKI Administrators) will get all the notifications for the lifecycle of the CA.

  3. Leave the Lifecycle Action as Email. This will send an email to the PKI Administrators and the Notification Email when the CA is about to expire.

  4. Select the Percentage Lifetime of the certificate when you want EZCA to start taking Lifecycle actions.

    EZCA Cloud PKI Create CA wizard showing CA validity period, notification email, and lifecycle action settings
  5. By default, EZCA will automatically publish the Certificate Revocation List (CRL) for this CA. Unless you have specific requirements, we recommend keeping this enabled to ensure that your devices can check for revoked certificates.

  6. If you are not changing any CRL details, click Next and proceed to the Step 5.

    EZCA Cloud PKI Create CA wizard showing CRL distribution enabled and Next button highlighted

(optional) How to Configure CA Certificate Revocation List Advanced Settings

If you have specific requirements for your CRL, you can click the expand button on Advanced Settings and change the CRL validity period, overlap period, and CRL distribution points. If you are not sure about these values, we recommend keeping the default values.

Click here to learn more about CRL Advanced Settings
  1. Under Advanced Settings, click the expand button

    EZCA Cloud PKI Create CA wizard CRL advanced settings with validity period and overlap period fields
  2. Enter the desired CRL Validity Period in days

  3. Enter the desired CRL Overlap Period in hours

  4. (optional) Enter the CRL endpoint where you will publish your CRLs

(optional) How To Enable Online Certificate Status Protocol (OCSP) For Your CA

Inside the CA Revocation advanced settings, you can enable OCSP for this CA. OCSP is only recommended if you have specific requirements for OCSP.

Click here to learn more about OCSP
  1. If you want to enable OCSP, select the Enable OCSP option.

    EZCA Cloud PKI Create CA wizard CRL advanced settings with Enable OCSP option selected
  2. Enabling the OCSP will create an OCSP endpoint for this CA in the same region you select for your OCSP (this is included with the price of your CA). If you require extra scalability you can create multiple OCSPs for your certificate authority in different regions. Note: Each extra OCSP will be charged as an extra Certificate Authority.

    EZCA Cloud PKI Create CA wizard CRL advanced settings with OCSP endpoint region selection and warning about extra costs for multiple OCSP endpoints
  3. Once you have setup your certificate revocation, click Next.

    EZCA Cloud PKI Create CA wizard CRL distribution enabled and Next button highlighted

Step 5: How to Set a Certificate Issuance Policy

A certificate issuance policy allows you to set specific requirements for the certificates that will be issued from this CA. For a SCEP CA, you will need to select the “SCEP Template” as the issuance policy.

  1. Change the Issuing Certificate Type to SCEP Template

  2. Set the Maximum Certificate Validity Period for the certificates issued from this CA. This value will be the maximum validity period that any certificate issued from this CA can have, if a certificate request comes in with a longer validity period, EZCA will automatically adjust it to match this value.

    EZCA Cloud PKI Create CA wizard showing SCEP Template selection and certificate lifetime settings
  3. Depending on your MDM, you might have to enable SCEP Dynamic Challenge and/or SCEP Static Challenge in addition to Intune SCEP.

    • If you are only using Microsoft Intune, you can leave both disabled.
    • If you are using Jamf or ManageEngine Plus, you will need to enable the SCEP Static Challenge. After creating the CA, you can go to the CA’s Issuance Requirements and retrieve the static challenge URL and value to input in your MDM.
    • For all other MDMs, refer to your MDM documentation to see if they require Dynamic SCEP, Static SCEP, or if they support both. If they support both, we recommend using Dynamic SCEP for better security. Once enabled, you can retrieve the Dynamic Challenge URL and challenge from the CA’s Issuance Requirements to input in your MDM.
    EZCA Cloud PKI Create CA wizard showing SCEP Dynamic Challenge and SCEP Static Challenge options
  4. Once you have enabled the SCEP types you need, click Next.

You can always come back to your CA and enable or disable the SCEP types as needed.

Step 6: How to Select a CA Location

The final step is to choose which region(s) you want to create your CA in. We recommend creating your CA in the same region as your MDM if possible for better performance, but you can create your CA in any region regardless of where your MDM is located.

  1. Select the Certificate Authority location where you want your CA to be created.

  2. If needed you can click Add Secondary Location to add an additional location to your CA. Please note that each additional location will be charged as an additional CA.

  3. Click Create to create your CA.

    EZCA Cloud PKI Create CA wizard geo-redundancy location selection step with Create button highlighted

How to Chain a Subordinate/Issuing CA to a Root CA

If you created a Subordinate/Issuing CA you must chain your new SCEP CA to a Root CA. You can either chain to an existing EZCA Root CA or you can chain to your own offline Root CA. Follow the steps below for each option.

If you created a Root CA, you can skip down to How to Download Your CA Certificate.

How to Chain Your SCEP CA to an EZCA Root CA

If your desired Root CA is an EZCA Root CA, you can easily chain your new SCEP CA to that Root CA from the EZCA portal. Follow these steps:

  1. From the Select Root CA dropdown, select the Root CA you want to chain to. This dropdown will only show Root CAs.

    EZCA Cloud PKI Intermediate CA page showing Root CA selected from dropdown with Create CA button highlighted
  2. Click Create CA to finish creating your Subordinate/Issuing CA chained to the selected Root CA.

  3. Repeat this step for each location.

How to Chain Your SCEP CA to an Offline or On-Premises Root CA

If your desired Root CA is an offline or on-premises Root CA, you will need to manually submit the CSR to your Root CA, get the signed certificate, and then upload it back to EZCA. Follow these steps:

  1. Copy or click Save CSR under the CA’s CSR.

    EZCA Cloud PKI Intermediate CA Has Been Requested page showing CSR and Chain to EZCA CA dropdown
  2. Once the CSR is downloaded, follow your internal guidance to transfer that CSR to your offline Root CA.

  3. Open your Certificate Authority in Windows.

    Windows ADCS Root CA
  4. From the left-hand menu, right click the CA.

  5. Select All Tasks > Submit new request.

    Windows ADCS Submit New Certificate Request menu option
  6. Select the downloaded CSR.

    Windows ADCS open file dialog to submit new certificate request
  7. From the left-hand menu, click on Pending Requests.

    Windows ADCS Pending Certificate Requests menu option
  8. Right click on the newly created request.

  9. Select All Tasks > Issue.

  10. Click on Issued Certificates.

    Windows ADCS Issued Certificates menu option
  11. Double click on the newly created certificate.

    Export Certificate From Windows ADCS
  12. Click on Details.

    View Certificate Details in Windows
  13. Click on the Copy to File… Button.

    Copy Windows Certificate to File
  14. Click Next.

  15. Select the Base-64 encoded X.509 (.CER) option.

    Export Certificate as Base 64
  16. Click Next.

  17. Select where you want to save the newly created certificate.

    Save the Exported Certificate
  18. Click Next.

  19. Click Finish.

    Finish the certificate exportation in windows
  20. A new .cer file will be created in the location you selected.

    View certificate in windows
  21. Follow your PKI team’s guidance on transferring the certificate file out of the offline CA into an internet connected computer.

  22. Once you have the certificate in an internet connected computer, go to https://portal.ezca.io/

  23. Login with an account that is registered as a PKI Admin in EZCA.

  24. Navigate to Certificate Authorities.

    CA Menu
  25. Click View Details of the CA you want to import the certificate for.

    View your pending CA
  26. Scroll down to the location you want to import, and click the Upload CA Certificate button.

    Import CA Certificate for Cloud PKI
  27. Select the newly created certificate file.

    Select the created certificate
  28. Click on the Save Certificate button

    Finish your Subordinate CA creation
  29. Repeat these steps for each location.

  30. Your CA is ready to be used!

How to Download Your CA Certificate

Now that your CA has been created, you can download the CA certificate to upload it to your MDM or to manually trust it on your devices. Follow these steps to download your CA certificate:

  1. Under the CA’s View Details page, scroll down to the location you want to download the certificate for and click on the Download Certificate button.

    Download CA Cert
  2. Now you are ready to connect your MDM to EZCA and start issuing SCEP certificates

Next Steps - How to Issue SCEP Certificates with Your New SCEP CA

Now that you have your SCEP CA created, you can connect it to your MDM and start issuing certificates to your devices.

🚀 Connect Your MDM and Issue SCEP Certificates