How-To: Issue SCEP Certificates to Windows Devices with Intune

In this page we will guide you on how to create an Intune profile to issue X509 certificates either for devices or users using SCEP for Windows.

Introduction - How to Issue SCEP Certificates to Windows Devices with Intune

This guide shows how to issue X509 certificates to Windows devices with Microsoft Intune and SCEP. You will create:

  1. A Trusted Certificate profile to establish trust with your CA chain.
  2. A SCEP Certificate profile to request and install certificates for users or devices.

By the end, your Windows devices will be able to enroll and receive certificates from your EZCA SCEP CA.

Prerequisites for Issuing SCEP Certificates to Windows Devices

Before you begin, confirm the following prerequisites:

  1. You have created an Intune SCEP CA
  2. You have registered the Keytos Intune application in your Entra ID Tenant.
  3. You are an Intune administrator with permissions to create configuration profiles in Intune.

How to Issue SCEP Certificates to Windows Devices with Intune - Video Tutorial

Prefer a walkthrough? Watch the video below:

How to Issue SCEP Certificates to Windows Devices with Intune - Step by Step Guide

In this section, you will first create a Trusted Certificate profile to deploy CA certificates, then create a SCEP Certificate profile for certificate enrollment.

How to Download Your CA Certificates from EZCA

To issue certificates to your Windows devices using Intune, you first need to download the CA certificate from your EZCA portal and upload it to Intune as a trusted certificate. Follow these steps to download your CA certificate from EZCA:

  1. Navigate to your EZCA portal instance, such as portal.ezca.io.
  2. From the left-hand menu, select Certificate Authorities.
  3. Find the CA you created for Intune and click on the View Details button.
  4. For your CA’s region(s), click on the Download Certificate button to download the CA certificate.
  5. Repeat the previous step for each CA in your PKI chain. If you have a Root CA and an Intermediate CA, make sure to download both certificates.

How to Create an Intune Trusted Certificate Profile for Windows Devices

Before issuing certificates, devices must trust your issuing chain.

Follow these steps for Windows devices:

  1. Go to https://aka.ms/intuneportal

  2. Select: Devices > Windows > Configuration profiles.

    Intune Windows Configuration Profiles Menu
  3. Click the + Create profile button.

  4. Select your desired Windows Platform.

  5. Select Templates as the profile type.

  6. Select the Trusted Certificate template.

    Intune Create Windows Trusted Certificate Profile - Select Template
  7. Click Create.

  8. Enter the Name and Description for this Intune certificate profile and click Next.

    Create Windows Trusted Certificate in Intune
  9. Upload the CA Certificate you downloaded from EZCA.

  10. For the certificate store, select Computer certificate store - Root if this is a Root CA or Computer certificate store - Intermediate if this is a Subordinate/Issuing CA.

    Intune Create Windows Trusted Certificate Profile - Settings
  11. Set your desired Assignments and Applicability Rules for this profile and click Next.

  12. Review your profile settings and click Create.

  13. Repeat these steps for each CA certificate in your chain (Root CA, Intermediate CA(s), and Issuing CA as applicable, with the correct certificate store for each one).

  14. Done! Your managed Windows devices will now trust the CA you created in EZCA and any certificates issued from it.

How to Create an Intune SCEP Profile for Windows Device Certificates

You can issue either device certificates or user certificates, depending on your scenario:

  1. Use device certificates for machine identity and pre-logon authentication (for example, wired/wireless access before user sign-in).
  2. Use user certificates for user identity use cases (for example, email signing or VPN that prompts after sign-in).
  3. If needed, deploy both profile types.

Use the tabs below for the profile type you want to configure.

How to Create an Intune SCEP Profile For Device Certificates

The following steps will guide you on how to create an Intune SCEP profile to issue device certificates to your Windows devices.

  1. Go back to the Windows configuration profiles page and click the Create profile button.

  2. Select your Windows Platform.

  3. Select Templates as the profile type.

  4. Select the SCEP Certificate template.

    Intune Create Windows SCEP Certificate Profile - Select Template
  5. Click Create.

  6. Enter the Name for this Intune SCEP profile.

  7. For Certificate type, select Device.

  8. For Subject name format, enter CN={{AAD_Device_ID}} or CN={{DeviceId}} depending on your preference. Intune replaces these variables with the actual device ID at enrollment time.

    • {{AAD_Device_ID}} uses the Azure AD device ID (recommended in most cases).
    • {{DeviceId}} uses the Intune device ID.
  9. For Subject Alternate Name, select URI attribute and enter IntuneDeviceId://{{DeviceId}} as the value.

  10. If the Subject name format is not CN={{AAD_Device_ID}}, we recommend adding a second Subject Alternative Name with URI set to AzureDeviceId://{{AAD_Device_ID}}. This helps hybrid-joined devices include the required extension for KB5014754.

  11. For Certificate Validity Period, enter the same period you used for your EZCA SCEP CA certificate validity period.

  12. For Key Storage Provider (KSP), we recommend Enroll to Trusted Platform Module (TPM) KSP, otherwise fail. However, if you want to support PCs without a TPM and are ok with the risk of software based keys, feel free to use one of the other options.

  13. For Key Usage, select both Digital Signature and Key Encipherment.

  14. For Key Size, select 2048.

  15. For Hash Algorithm, select SHA-2.

  16. In the Root Certificate field, click + Root Certificate and select the issuing CA you created in the Create Trusted Certificate Profile section.

  17. For Extended Key Usage select Client Authentication (1.3.6.1.5.5.7.3.2).

  18. Feel free to leave the Renewal Percentage at 20% or increase it to a value you feel comfortable with. This is the lifetime remaining before Intune attempts to renew the certificate. For example, if you set it to 20% and your certificate validity period is 1 year, Intune will attempt to renew the certificate when it has 2.4 months remaining before expiration.

  19. Review your settings, it should look something like this:

    Intune Create Windows SCEP Device Certificate Profile - Settings
  20. The last step is to get the SCEP Server URLs from EZCA. For this we will go back to your EZCA Portal, click on Certificate Authorities and select the View Requirements button for your Intune CA.

    EZCA Cloud PKI View All CAs
  21. Copy the Intune SCEP URL for your CA.

    Get the Intune CA SCEP URL from EZCA
  22. Go back to your Intune Portal tab, and paste the URL in the SCEP Server URLs section.

    Add SCEP Server URL to Intune Windows Device
  23. Click Next.

  24. Select your Assignments and Applicability Rules for this profile and click Next.

  25. Review your profile settings and click Create.

  26. Done! Your managed Windows devices will now start receiving device certificates issued from your EZCA SCEP CA based on the assignment and applicability rules you set.

How to Create an Intune SCEP Profile For User Certificates

The following steps will guide you on how to create an Intune SCEP profile to issue user certificates to your Windows devices.

  1. Go back to the Windows configuration profiles page and click the Create profile button.

  2. Select your Windows Platform.

  3. Select Templates as the profile type.

  4. Select the SCEP Certificate template.

    Intune Create Windows SCEP Certificate Profile - Select Template
  5. Click Create.

  6. Enter the Name for this Intune SCEP profile.

  7. For Certificate type, select User.

  8. For Subject name format we will leave CN={{UserName}},E={{EmailAddress}} as the default value. This will use the user’s UPN as the CN and their email address as the E in the subject. You can customize this if you want to use a different format or include other attributes, but this is a common format for user certificates.

  9. In the Subject Alternate Name we will select the User Principal Name (UPN) attribute and enter {{UserPrincipalName}} as the value. This will add the user’s UPN as a SAN in the certificate which is required for some use cases such as email signing.

  10. For Certificate Validity Period, enter the same validity period you entered in EZCA.

  11. For Key Storage Provider (KSP), we recommend either Enroll to Trusted Platform Module (TPM) KSP, otherwise fail or Enroll to Software based KSP depending on your use case. If you need to support PCs without TPM and accept software-based keys, choose another option.

  12. For Key Usage, select both Digital Signature and Key Encipherment.

  13. For Key Size, select 2048.

  14. For Hash Algorithm, select SHA-2.

  15. In the Root Certificate field, click + Root Certificate and select the CA you created in the Create Trusted Certificate Profile section.

  16. For Extended Key Usage, select Client Authentication (1.3.6.1.5.5.7.3.2).

  17. Feel free to leave the Renewal Percentage at 20% or increase it to a value you feel comfortable with. This is the lifetime remaining before Intune attempts to renew the certificate. For example, if you set it to 20% and your certificate validity period is 1 year, Intune will attempt to renew the certificate when it has 2.4 months remaining before expiration.

  18. Review your settings, it should look something like this:

    Create Windows SCEP User Certificate Profile in Intune
  19. The last step is to get the SCEP Server URL from EZCA. For this we will go back to your EZCA Portal, click on Certificate Authorities and select View Requirements for your Intune CA.

    EZCA Cloud PKI View All CAs
  20. Copy the Intune SCEP URL.

    Get the Intune CA SCEP URL from EZCA
  21. Go back to your Intune Portal tab, and paste the URL in the SCEP Server URLs section.

    Add SCEP Server URL to Intune Windows Device
  22. Click Next.

  23. Set your desired Assignments and Applicability Rules for this profile and click Next.

  24. Review your profile settings and click Create.

  25. Done! Your managed Windows devices will now start receiving device certificates issued from your EZCA SCEP CA based on the assignment and applicability rules you set.