Skip to content

Commit 208a3c5

Browse files
committed
Added details - cleaned up stale data
1 parent 5528348 commit 208a3c5

1 file changed

Lines changed: 9 additions & 62 deletions

File tree

memdocs/intune/protect/certificates-imported-pfx-configure.md

Lines changed: 9 additions & 62 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ keywords:
55
author: brenduns
66
ms.author: brenduns
77
manager: dougeby
8-
ms.date: 02/28/2022
8+
ms.date: 05/11/2022
99
ms.topic: how-to
1010
ms.service: microsoft-intune
1111
ms.subservice: protect
@@ -82,65 +82,6 @@ When you use Intune to deploy an **imported PFX certificate** to a user, there a
8282

8383
- **Certificate Connector for Microsoft Intune**: When a device requests a PFX certificate that was imported to Intune, the encrypted password, the certificate, and the device's public key are sent to the connector. The connector decrypts the password using the on-premises private key, and then re-encrypts the password (and any plist profiles if using iOS) with the device key before sending the certificate back to Intune. Intune then delivers the certificate to the device and the device decrypts it with the device's private key and install the certificate.
8484

85-
<!-- Remainder is deprecated content, now covered by the install of the new certificate connector>
86-
87-
Before you begin, [review requirements for the connector](certificate-connectors.md) and ensure your environment and your Windows server is ready to support the connector.
88-
89-
1. Sign in to the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431).
90-
91-
2. Select **Tenant administration** > **Connectors and tokens** > **Certificate connectors** > **+ Add**.
92-
93-
3. Click *Download the certificate connector software* for the connector for PKCS #12, and save the file to a location you can access from the server where you're going to install the connector.
94-
95-
![Microsoft Intune Connector download](./media/certificates-imported-pfx-configure/download-connector.png)
96-
97-
4. After the download completes, sign in to the server and run the installer (PfxCertificateConnectorBootstrapper.exe).
98-
- When you accept the default installation location, the connector installs to `Program Files\Microsoft Intune\PFXCertificateConnector`.
99-
- The connector service runs under the local system account. If a proxy is required for internet access, confirm that the local service account can access the proxy settings on the server.
100-
101-
5. The PFX Certificate Connector for Microsoft Intune opens the **Enrollment** tab after installation. To enable the connection to Intune, **Sign In**, and enter an account with Azure global administrator or Intune administrator permissions.
102-
103-
> [!WARNING]
104-
> By default, in Windows Server **IE Enhanced Security Configuration** is set to **On** which can cause issues with the sign-in to Microsoft 365.
105-
106-
6. Close the window.
107-
108-
7. In the Microsoft Endpoint Manager admin center, go back to **Tenant administration** > **Connectors and tokens** > **Certificate connectors**. In a few moments, a green check mark appears and the connection status updates. The connector server can now communicate with Intune.
109-
110-
> [!NOTE]
111-
> The following changes must be made for GCC High and DoD tenants prior to using the PFX Certificate Connector.
112-
>
113-
> 1. Use a text editor to edit the two following *.config* files, which updates the service endpoints for the GCC High environment. Notice that these updates change the URIs from **.com** to **.us** suffixes. There are a total of three URI updates, two updates within the **PFXCertificateConnectorUI.exe.config** file, and one update in the **Microsoft.Intune.Connectors.PfxCreateLegacy.exe.config** file.
114-
> - File Name: <install_Path>\Microsoft Intune\PFXCertificateConnector\ConnectorUI\ PFXCertificateConnectorUI.exe.config
115-
>
116-
> Example: (%programfiles%\Microsoft Intune\PFXCertificateConnector\ConnectorUI\ PFXCertificateConnectorUI.exe.config)
117-
> ```
118-
> <appSettings>
119-
> <add key="SignInURL" value="https://portal.manage.microsoft.us/Home/ClientLogon" />
120-
> <add key="LocationServiceEndpoint" value="RestUserAuthLocationService/RestUserAuthLocationService/ServiceAddresses" />
121-
> <add key="AccountPortalURL" value="https://manage.microsoft.us" />
122-
> </appSettings>
123-
> ```
124-
>
125-
> - </appSettings>File Name: <install_Path>\Microsoft Intune\PFXCertificateConnector\ConnectorSvc\Microsoft.Intune.Connectors.PfxCreateLegacy.exe.config
126-
>
127-
> Example: (%programfiles%\ Microsoft Intune\PFXCertificateConnector\ConnectorSvc\Microsoft.Intune.Connectors.PfxCreateLegacy.exe.config)
128-
> ```
129-
> <appSettings>
130-
> <add key="BaseServiceAddress" value="https://manage.microsoft.us/" />
131-
> <add key="TimerFrequency" value="30000" />
132-
> <add key="PfxTimerFrequency" value="30000" />
133-
> <add key="PfxImportRecryptionFrequency" value="30000" />
134-
> <add key="CloudCAConnTimeoutInMilliseconds" value="30000" />
135-
> ```
136-
>
137-
> 2. On the server that hosts the connector, add or edit the following registry key to match teh following:
138-
> `HKLM\Software\Microsoft\MicrosoftIntune\PFXCertificateConnector\MbaseManagementAddress`
139-
> - If *MbaseManagementAddress* isn't present, add it as a child key below *PFXCertificateConnector*.
140-
> - Set the *String Value* for *MbaseManagementAddress* to `https://manage.microsoft.us`
141-
142-
-->
143-
14485
## Import PFX Certificates to Intune
14586

14687
You use [Microsoft Graph](/graph) to import your users PFX certificates into Intune. The helper [PFXImport PowerShell Project at GitHub](https://github.com/microsoft/Intune-Resource-Access/tree/develop/src/PFXImportPowershell) provides you with cmdlets to do the operations with ease.
@@ -159,7 +100,7 @@ To make use of the PowerShell cmdlets, you build the project yourself using Visu
159100

160101
3. On the top, change from **Debug** to **Release**.
161102

162-
4. Go to **Build** and select **Build PFXImportPS**. In a few moments, you'll see the **Build succeeded** confirmation appear at the bottom left of Visual Studio.
103+
4. Go to **Build** and select **Build PFXImportPS**. In a few moments, you'll see the **Build succeeded** confirmation at the bottom left of Visual Studio.
163104

164105
![Visual Studio Build option](./media/certificates-imported-pfx-configure/vs-build-release.png)
165106

@@ -314,9 +255,15 @@ If you use the DigiCert PKI Platform service, you can use the DigiCert **Import
314255
315256
To learn more about the DigiCert Import tool, including how to obtain the tool, see https://knowledge.digicert.com/tutorials/microsoft-intune.html in the DigiCert knowledge base.
316257
258+
## EverTrust
259+
260+
If you use EverTrust as your PKI solution, standalone or combined to an existing PKI, you can configure EverTrust Horizon to import PFX certificates to Intune. After you complete the integration, you won’t need to follow the instructions in the section [Import PFX Certificates to Intune](#import-pfx-certificates-to-intune) that's detailed earlier in this article.
261+
262+
To learn more about EverTrust’s integration with Intune, see https://evertrust.fr/horizon/integrations/intune/.
263+
317264
### KeyTalk
318265
319-
If you use the KeyTalk service, you can configure their service to import PFX certificates to Intune. After you complete integration, you won’t need to follow the instructions in the section [Import PFX Certificates to Intune](#import-pfx-certificates-to-intune) to Intune that's detailed earlier in this article.
266+
If you use the KeyTalk service, you can configure their service to import PFX certificates to Intune. After you complete the integration, you won’t need to follow the instructions in the section [Import PFX Certificates to Intune](#import-pfx-certificates-to-intune) to Intune that's detailed earlier in this article.
320267
321268
To learn more about KeyTalk’s integration with Intune, see https://keytalk.com/support in the KeyTalk knowledge base.
322269

0 commit comments

Comments
 (0)