Skip to main content
Skip to main content

SCEP with Intune - IronWiFi PKI - Device Auth

The Simple Certificate Enrollment Protocol (SCEP) is a protocol that allows devices to easily enroll for a certificate by using a URL and a shared secret to communicate with a PKI.

This is a guide for setting up SCEP with IronWiFi's multi-tiered HSM based Certificate Authority and Microsoft Intune to provision Windows OS based devices, using device profile.

What You Need

  • owner_id - a unique identifier of your IronWiFi account that can be found in the URL when you're logged in (e.g.,
    abcdefg12345678
    or
    domain-abcd1234
    )
  • region - region where your data resides and authentication requests are processed (
    us-east1
    ,
    console
    ,
    asia-northeast1
    , etc.)
  • SCEP Server URL - build the URL in this format:
    https://REGION.ironwifi.com/api/OWNER_ID/certificates
  • IronWiFi Root CA Certificate - certificate of the IronWiFi Root Certificate Authority
  • IronWiFi SCEP CA Certificate - certificate of the IronWiFi SCEP Intermediate Certificate Authority signing the CSR requests
  • Trusted IronWiFi RADIUS Server Certificate - server certificate signed by a trusted CA
note

Your users must exist in the IronWiFi console or the SCEP connector's User Auto-Creation option must be enabled for this to work. We are mapping the device serial number to the username in console.

Step 1: Create SCEP Connector in IronWifi

Sign in to the IronWiFi Management Console and create a SCEP connector:

  1. Click on Users > Connectors > New Connector

IronWiFi SCEP Connector setup

IronWiFi SCEP Connector configuration

Step 2: Sign in to Intune

Sign in to the Microsoft Intune management console.

Step 3: Navigate to Configuration Profiles

Navigate to Devices > Windows > Configuration Profiles.

Step 4: Create Root CA Trusted Certificate Profile

Click Create > New Policy and choose:

  • Platform: Windows 10 and later
  • Profile type: Templates
  • Search for Trusted Certificate template

Intune create profile

Step 5: Configure Root CA Certificate

Add the certificate with the following configuration settings:

  • Name: IRONWIFI Root CA Certificate
  • Certificate file:
    iw-rsa-root-ca.cert.crt
    (downloaded from IronWiFi console)
  • Destination store: Computer certificate store - Root

Root CA certificate configuration

Step 6: Assign the Profile

Select correct Assignments and Applicability Rules.

warning

Make sure that you are using DEVICE based assignments for all profiles. If you mix them (e.g., assign certificates to users and SCEP profile to devices), the SCEP profile will not deploy and will be stuck in pending.

Profile assignments - device based

Step 7: Review and Create

Review and create the profile.

Step 8: Create SCEP Issuing CA Certificate Profile

Create another Configuration Profile for Trusted certificate with the following settings:

  • Name: IRONWIFI SCEP Issuing CA Certificate
  • Certificate file:
    iw-rsa-scep-ca.cert.crt
    (downloaded from IronWiFi console)
  • Destination store: Computer certificate store - Intermediate

SCEP Issuing CA configuration

Select correct Assignments and Applicability Rules and review and create the profile as before.

Step 9: Create Trusted RADIUS Certificate Profile

Create another Configuration Profile for Trusted certificate with the following settings:

  • Name: IRONWIFI Trusted Radius Certificate
  • Certificate file:
    ironwifi-radius-trusted.crt
    (downloaded from IronWiFi console)
  • Destination store: Computer certificate store - Root

Trusted RADIUS certificate configuration

Select correct Assignments and Applicability Rules and review and create the profile.

Step 10: Create SCEP Certificate Profile

Create a Configuration Profile, this time selecting SCEP certificate template.

SCEP certificate template

SCEP certificate template selection

Step 11: Configure SCEP Certificate Settings

Use the following configuration settings:

SettingValue
Certificate typeDevice
Subject name format
CN={{SerialNumber}},O=OWNER_ID,L=REGION
Certificate validity periodYears 1 (or your desired validity period)
Key storage provider (KSP)Enroll to Trusted Platform Module (TPM) if present, otherwise Software KSP
Key usageKey encipherment, Digital signature
Key size (bits)2048
Hash algorithmSHA-2
Root CertificateSelect IRONWIFI SCEP Issuing CA Certificate (created in Step 8)
Extended key usageSelect "Client Authentication" from the Predefined Values dropdown
Renewal threshold (%)20
SCEP Server URL
https://REGION.ironwifi.com/api/OWNER_ID/certificates

Replace

OWNER_ID
and
REGION
with your actual values.

SCEP certificate settings

SCEP certificate settings continued

Select correct Assignments and Applicability Rules and review and create the profile.

Step 12: Create WiFi Profile

Create a Configuration Profile, this time selecting Wi-Fi template. Select type Enterprise.

WiFi profile creation

Step 13: Configure WiFi Profile Settings

Use the following settings:

SettingValue
Wi-Fi nameYour SSID
Connection nameYour connection name
Connect automatically when in rangeYes
Connect to more preferred network if availableNo
Connect to this network, even when not broadcastingYes
Metered Connection LimitUnrestricted
Authentication ModeMachine
Single sign-on (SSO)Disable
EAP typeEAP-TLS
Certificate server names
radius.ironwifi.com
Root certificate for server validationIRONWIFI Trusted Radius Certificate (created in Step 9)
Client Authentication - Authentication methodSCEP certificate
Client certificate (Identity certificate)Select SCEP certificate profile (created in Step 10)
Company proxy settingsNone

WiFi profile settings

WiFi EAP-TLS settings

Step 14: Verify Deployment

After assigning all profiles, verify that they deploy successfully:

  1. Check Devices > Configuration profiles for deployment status
  2. Verify certificates are installed on test devices
  3. Confirm WiFi connection is established

Troubleshooting

SCEP Profile Stuck in Pending

  • Ensure all profiles use DEVICE based assignments (not user-based)
  • Verify the SCEP Server URL is correctly formatted
  • Check that the SCEP connector is active in IronWiFi console

Certificate Not Deploying

  • Verify the Root CA and SCEP CA certificates are deployed first
  • Check Intune device sync status
  • Review the SCEP connector logs in IronWiFi

WiFi Not Connecting

  • Verify all certificates (Root CA, SCEP CA, Trusted RADIUS, Device cert) are installed
  • Check RADIUS server receives authentication requests in IronWiFi logs
  • Confirm EAP-TLS settings match