Skip to content

Commit 19cdbba

Browse files
committed
Additoinal details about the certificate renewal process
1 parent 2862025 commit 19cdbba

1 file changed

Lines changed: 35 additions & 12 deletions

File tree

memdocs/intune/protect/derived-credentials.md

Lines changed: 35 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
---
22
# required metadata
33

4-
title: Use derived credentials for mobile devices in Microsoft Intune
4+
title: Use derived credentials for mobile devices with Microsoft Intune
55
description: Use derived credentials on mobile devices as an authentication method for Intune VPN, email, Wi-Fi profiles, applications, and S/MIME and encryption. Derived credentials are an implementation of the NIST guidelines for Special Publication 800-157.
66
keywords:
77
author: brenduns
88
ms.author: brenduns
99
manager: dougeby
10-
ms.date: 09/08/2021
10+
ms.date: 12/03/2021
1111
ms.topic: how-to
1212
ms.service: microsoft-intune
1313
ms.subservice: protect
@@ -28,9 +28,13 @@ ms.custom: intune-azure
2828
ms.collection: M365-identity-device-management
2929
---
3030

31-
# Use derived credentials in Microsoft Intune
31+
# Use derived credentials with Microsoft Intune
3232

33-
*This article applies to iOS/iPadOS, Android Enterprise fully managed devices that run version 7.0 and above, and devices that run Windows*
33+
*This article applies to:*
34+
35+
- *Android Enterprise fully managed devices that run version 7.0 and above*
36+
- *iOS/iPadOS*
37+
- *Windows 10/11*
3438

3539
In an environment where smart cards are required for authentication or encryption and signing, you can use Intune to provision mobile devices with a certificate that's derived from a user's smart card. That certificate is called a *derived credential*. Intune [supports several derived credential issuers](#supported-issuers), though you can use only a single issuer per tenant at a time.
3640

@@ -87,7 +91,7 @@ For important details about using the different issuers, review guidance for tha
8791
8892
### Required apps
8993

90-
Plan to deploy the relevant user facing app to devices that will enroll for a derived credential. Device users use the app to start the credential enrollment process.
94+
Plan to deploy the relevant user-facing app to devices that will enroll for a derived credential. Device users use the app to start the credential enrollment process.
9195

9296
- iOS devices use the Company Portal app. See [Add iOS store apps to Microsoft Intune](../apps/store-apps-ios.md).
9397
- Android Enterprise Fully Managed and Corporate-Owned work profile devices use the Intune App. See [Add Android store apps to Microsoft Intune](../apps/store-apps-android.md).
@@ -121,7 +125,7 @@ Similarly, some derived credential request workflows require the use of the devi
121125
122126
### 2) Review the end-user workflow for your chosen issuer
123127

124-
Following are key considerations for each supported partner. Become familiar with this information so you can ensure your Intune policies and configurations don't block users and devices from successfully completing enrollment for a derived credential from that issuer.
128+
The following are key considerations for each supported partner. Become familiar with this information so you can ensure your Intune policies and configurations don't block users and devices from successfully completing enrollment for a derived credential from that issuer.
125129

126130
#### DISA Purebred
127131

@@ -134,11 +138,18 @@ Review the platform-specific user workflow for the devices you'll use with deriv
134138

135139
- Users need access to a computer or KIOSK where they can use their smart card to authenticate to the issuer.
136140
- iOS and iPadOS devices that will enroll for a derived credential must install the Intune Company Portal app. Android Fully Managed and Corporate-Owned Work Profile devices must install and use the Intune app.
137-
- Use Intune to [deploy the DISA Purebred app](#deploy-the-disa-purebred-app) to devices that will enroll for a derived credential. This app must be deployed through Intune so that it's managed, and can then work with the Intune Company Portal app or Intune App, which device users use to complete the derived credential request.
141+
- Use Intune to [deploy the DISA Purebred app](#deploy-the-disa-purebred-app) to devices that will enroll for a derived credential. This app must be deployed through Intune so that it's managed and can then work with the Intune Company Portal app or Intune App, which device users use to complete the derived credential request.
138142
- To retrieve a derived credential from the Purebred app, the device must have access to the on-premises network. Access might be through corporate Wi-Fi or VPN.
139143
- Device users must work with a live agent during the enrollment process. During enrollment, time-limited one-time passcodes are provided to the user as they continue through the enrollment process.
140144
- When changes are made to a policy that uses derived credentials, such as creation of a new Wi-Fi profile, iOS and iPadOS users are notified to open the Company Portal app.
141145
- Users are notified to open the applicable app when they need to renew their derived credential.
146+
147+
The renewal process happens like this:
148+
- The derived credential issuer needs to issue new or updated certificates before the previous certificates are 80% of the way through their validity period.
149+
- The device checks in during the renewal period (the last 20% of the validity period).
150+
- Microsoft Endpoint Manager notifies the user through email or an app notification to launch the Company Portal.
151+
- The user launches the Company Portal and taps the derived credential notification, and then the derived credential certificates are copied to the device
152+
142153

143154
For information getting and configuring the DISA Purebred app, see [Deploy the DISA Purebred app](#deploy-the-disa-purebred-app) later in this article.
144155

@@ -159,6 +170,12 @@ Review the platform-specific user workflow for the devices you'll use with deriv
159170
- **iOS and iPadOS** - Users are notified to open the Company Portal app.
160171
- **Android Enterprise** *Corporate-Owned Work Profile* or *Fully managed devices* - The Company Portal app doesn't need to open.
161172
- Users are notified to open the applicable app when they need to renew their derived credential.
173+
174+
The renewal process happens like this:
175+
- The derived credential issuer needs to issue new or updated certificates before the previous certificates are 80% of the way through their validity period.
176+
- The device checks in during the renewal period (the last 20% of the validity period).
177+
- Microsoft Endpoint Manager notifies the user through email or an app notification to launch the Company Portal.
178+
- The user launches the Company Portal and taps the derived credential notification, and then the derived credential certificates are copied to the device
162179

163180
#### Intercede
164181

@@ -177,6 +194,12 @@ Review the platform-specific user workflow for the devices you'll use with deriv
177194
- **iOS and iPadOS** - Users are notified to open the Company Portal app.
178195
- **Android Enterprise** *Corporate-Owned Work Profile* or *Fully managed devices* - The Company Portal app doesn't need to open.
179196
- Users are notified to open the applicable app when they need to renew their derived credential.
197+
198+
The renewal process happens like this:
199+
- The derived credential issuer needs to issue new or updated certificates before the previous certificates are 80% of the way through their validity period.
200+
- The device checks in during the renewal period (the last 20% of the validity period).
201+
- Microsoft Endpoint Manager notifies the user through email or an app notification to launch the Company Portal.
202+
- The user launches the Company Portal and taps the derived credential notification, and then the derived credential certificates are copied to the device
180203

181204
### 3) Deploy a trusted root certificate to devices
182205

@@ -195,7 +218,7 @@ Create new policies or edit existing policies to use derived credentials. Derive
195218
- App authentication
196219
- Wi-Fi
197220
- VPN
198-
- email (iOS only)
221+
- Email (iOS only)
199222
- S/MIME signing and encryption, including Outlook (iOS only)
200223

201224
Avoid requiring use of a derived credential to access a process that you'll use as part of the process to get the derived credential, as that can prevent users from completing the request.
@@ -237,7 +260,7 @@ After you save the configuration, you can make changes to all fields except for
237260

238261
To use **DISA Purebred** as your derived credential issuer for Intune, you must get the DISA Purebred app and then use Intune to deploy the app to devices. Then users request the derived credential from DISA Purebred by using the Company Portal App on their iOS/iPadOS device, or the Intune app on their Android devices.
239262

240-
In addition to the deploying the DISA Purebred app with Intune, the device must have access to the on-premises network. To provide this access, consider using a VPN or corporate Wi-Fi.
263+
In addition to deploying the DISA Purebred app with Intune, the device must have access to the on-premises network. To provide this access, consider using a VPN or corporate Wi-Fi.
241264

242265
**Complete the following tasks**:
243266

@@ -311,13 +334,13 @@ For Windows, users don't work through a smartcard registration process to obtain
311334

312335
1. **Install the app from the Derived Credential providers on the Windows device**.
313336

314-
When you install the Windows app from a derived credential provider on a Windows device, the derived certificate is added to that devices Windows certificate store. After the certificate is added to the device, it becomes available for use a derived credential authentication method.
337+
When you install the Windows app from a derived credential provider on a Windows device, the derived certificate is added to that device's Windows certificate store. After the certificate is added to the device, it becomes available for use a derived credential authentication method.
315338

316339
After you get the app from your chosen provider, the app can be deployed to Users, or directly installed by the user of the device.
317340

318341
2. **Configure Wi-Fi and VPN profiles to use derived credentials as the authentication method**.
319342

320-
When configuring a Windows profile for Wi-Fi or VPN, select **Derived credential** for the *Authentication Method*. With this configuration, the profile uses the certificate that installs on the device when the providers app was installed.
343+
When configuring a Windows profile for Wi-Fi or VPN, select **Derived credential** for the *Authentication Method*. With this configuration, the profile uses the certificate that installs on the device when the provider's app was installed.
321344

322345
## Renew a derived credential
323346

@@ -329,7 +352,7 @@ After a device receives a new derived credential, policies that use derived cred
329352

330353
## Change the derived credential issuer
331354

332-
At the tenant level, you can change your credential issuer, although only one issuer is supported for a tenant at a time.
355+
At the tenant level, you can change your credential issuer, although only one issuer is supported by a tenant at a time.
333356

334357
After you change the issuer, users are prompted to get a new derived credential from the new issuer. They must do so before they can use a derived credential for authentication.
335358

0 commit comments

Comments
 (0)