Intune Certificate Management: Complete Guide
Learn how to configure and deploy certificates in Intune using SCEP, PKCS, and trusted root certificate profiles for VPN, Wi-Fi, email, and application authentication.
Certificates in Microsoft Intune provide secure authentication for users and devices to access corporate resources like VPN, Wi-Fi, and email without requiring usernames and passwords. Intune supports multiple certificate deployment methods to meet different organizational needs.
Understanding Certificates in Intune
Certificates in Intune enable authenticated access to corporate resources through VPN, Wi-Fi, and email profiles. When you use certificates for authentication, end users don't need to enter usernames and passwords, providing a seamless and secure access experience.
Certificate Types Supported
- SCEP (Simple Certificate Enrollment Protocol): Unique certificates for each device/user
- PKCS (Public Key Cryptography Standards): Device or user certificates
- PKCS Imported: Shared certificates for scenarios like S/MIME
- Trusted Root: Root CA certificates to establish trust
For an overview, see Use certificates for authentication in Microsoft Intune.
Prerequisites
Before deploying certificates:
- Certification Authority: Microsoft CA or third-party CA
- Infrastructure:
- For SCEP: Network Device Enrollment Service (NDES) server
- For PKCS: Certificate Connector for Intune
- Trusted Root Certificate: Export root CA certificate
- Permissions: Appropriate Intune and CA permissions
Trusted Root Certificate Profiles
Trusted root certificate profiles deploy the public key from your root or intermediate CA to devices, establishing trust back to your Certification Authority.
Creating a Trusted Root Certificate Profile
Step 1: Export Root CA Certificate
- Export the root CA certificate as a
.cerfile (DER-encoded) - Do not export the private key
- Export any intermediate CA certificates if needed
Step 2: Create Profile
- Sign in to the Microsoft Intune admin center
- Navigate to Devices > Manage devices > Configuration > Create
- Select platform (Windows, iOS/iPadOS, Android, macOS)
- Select Templates > Trusted certificate
- Select Create
Step 3: Configure Settings
- Name: Enter descriptive name
- Description: Optional description
- Trusted Root Certificate: Upload the
.cerfile - Certificate store:
- Root certificate store (Windows)
- User certificate store (Android)
Step 4: Assign and Deploy
- Assign to the same groups that will receive SCEP/PKCS profiles
- Deploy before SCEP/PKCS profiles
Important: Trusted root certificate profiles must be deployed before SCEP or PKCS certificate profiles.
For detailed guidance, see Trusted root certificate profiles for Microsoft Intune.
SCEP Certificate Profiles
SCEP (Simple Certificate Enrollment Protocol) provisions unique certificates for each device or user request.
Prerequisites for SCEP
- NDES Server: Network Device Enrollment Service configured
- Certificate Connector: Intune Certificate Connector installed
- Certificate Template: Configured on CA
- Trusted Root: Trusted root certificate profile deployed
Creating a SCEP Certificate Profile
Step 1: Access Certificate Profiles
- Navigate to Devices > Manage devices > Configuration > Create
- Select platform
- Select Templates > SCEP certificate
- Select Create
Step 2: Configure Basics
- Name: Enter descriptive name
- Description: Optional description
- Select Next
Step 3: Configure Certificate Properties
-
Certificate type:
- User: User certificate
- Device: Device certificate
-
Subject name format:
- Common Name (CN)
- Fully Distinguished Name (DN)
- Custom
-
Subject alternative name: Configure SAN if needed
-
Certificate validity period: Set validity period
-
Key storage provider (KSP): Choose KSP for key storage
Step 4: Configure Certificate Authority
- Certificate authority: Select your CA
- Certificate authority name: CA server name
- Certificate template name: Template name on CA
- Extended key usage: Configure EKU (Client Authentication, etc.)
Step 5: Configure Trusted Root
- Trusted Root Certificate: Select trusted root certificate profile
- Root Certificate: Verify root certificate
Step 6: Assign and Deploy
- Assign to user or device groups
- Deploy after trusted root certificate profile
For detailed guidance, see Create and assign SCEP certificate profiles in Intune.
PKCS Certificate Profiles
PKCS certificate profiles deploy device or user certificates using the Intune Certificate Connector.
Prerequisites for PKCS
- Certificate Connector: Intune Certificate Connector installed
- Certificate Template: Configured on CA
- Trusted Root: Trusted root certificate profile deployed
Creating a PKCS Certificate Profile
Step 1: Access Certificate Profiles
- Navigate to Devices > Manage devices > Configuration > Create
- Select platform
- Select Templates > PKCS certificate
- Select Create
Step 2: Configure Certificate Properties
- Certificate type: User or Device
- Certificate authority: Select CA
- Certificate template name: Template name
- Subject name format: Configure subject name
- Validity period: Set validity period
Step 3: Configure Key Storage
- Key storage provider: Choose KSP
- Key size: Configure key size
- Hash algorithm: Select hash algorithm
Step 4: Assign and Deploy
- Assign to user or device groups
- Deploy after trusted root certificate profile
For detailed guidance, see Create and assign PKCS certificate profiles in Intune.
Certificate Usage Scenarios
VPN Authentication
Configuration:
- Deploy trusted root certificate profile
- Deploy SCEP or PKCS certificate profile
- Create VPN profile referencing certificate
- Assign to device or user groups
Certificate Requirements:
- Certificate type: User or Device
- Extended Key Usage: Client Authentication
- Subject: User UPN or Device name
Wi-Fi Authentication
Configuration:
- Deploy trusted root certificate profile
- Deploy SCEP or PKCS certificate profile
- Create Wi-Fi profile referencing certificate
- Assign to device groups
Certificate Requirements:
- Certificate type: Device
- Extended Key Usage: Client Authentication
- Subject: Device name
Email Signing and Encryption (S/MIME)
Configuration:
- Deploy trusted root certificate profile
- Deploy PKCS imported certificate profile
- Configure email profile
- Assign to user groups
Certificate Requirements:
- Use PKCS imported certificates
- Extended Key Usage: Email Protection
- Deploy same certificate to multiple users
For usage details, see Intune supported certificates and usage.
Best Practices
1. Deploy Trusted Root First
- Always deploy trusted root certificate profiles first
- Ensure root certificate is installed before SCEP/PKCS
- Test root certificate installation
2. Use Appropriate Certificate Type
- Use User certificates for user-specific scenarios
- Use Device certificates for device-specific scenarios
- Use PKCS imported for shared certificates (S/MIME)
3. Configure Proper Validity Periods
- Set appropriate certificate validity periods
- Plan for certificate renewal
- Monitor certificate expiration
- Configure renewal before expiration
4. Test Certificate Deployment
- Test with pilot groups first
- Verify certificate installation
- Test certificate usage (VPN, Wi-Fi, etc.)
- Validate certificate renewal
5. Monitor Certificate Status
- Review certificate deployment status
- Monitor certificate expiration
- Address deployment failures
- Track certificate usage
Troubleshooting
Common Issues
-
Certificates Not Deploying
- Verify trusted root certificate is deployed
- Check Certificate Connector status
- Review certificate profile assignments
- Verify device enrollment
-
Certificate Installation Fails
- Check certificate template configuration
- Verify CA connectivity
- Review Certificate Connector logs
- Check device requirements
-
Certificates Not Working
- Verify certificate is installed correctly
- Check certificate validity
- Review certificate properties
- Test certificate manually
For troubleshooting guidance, see Troubleshooting the deployment of SCEP certificates profile to devices in Intune.
Additional Resources
- Use certificates for authentication in Microsoft Intune
- Trusted root certificate profiles for Microsoft Intune
- Create and assign SCEP certificate profiles in Intune
- Create and assign PKCS certificate profiles in Intune
Conclusion
Certificate management in Intune provides secure authentication for VPN, Wi-Fi, and email access. By following these best practices:
✅ Deploy trusted root certificates first
✅ Use appropriate certificate types for scenarios
✅ Configure proper validity periods
✅ Test certificate deployment thoroughly
✅ Monitor certificate status regularly
You can establish a robust certificate-based authentication framework that provides seamless and secure access to organizational resources.
Remember: Certificates require proper infrastructure setup (NDES for SCEP, Certificate Connector for PKCS). Always test certificate deployment in a pilot environment before broad deployment.