Skip to content

Commit 2807bc8

Browse files
authored
Merge pull request #7688 from Brenduns/quick-fix
Edits for GitHub issue 1803
2 parents 04db335 + ec5731e commit 2807bc8

1 file changed

Lines changed: 6 additions & 35 deletions

File tree

memdocs/intune/protect/certificates-pfx-configure.md

Lines changed: 6 additions & 35 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ keywords:
55
author: brenduns
66
ms.author: brenduns
77
manager: dougeby
8-
ms.date: 05/03/2022
8+
ms.date: 05/26/2022
99
ms.topic: how-to
1010
ms.service: microsoft-intune
1111
ms.subservice: protect
@@ -128,37 +128,6 @@ To authenticate a device with VPN, WiFi, or other resources, a device needs a ro
128128

129129
For guidance, see [Install and configure the Certificate Connector for Microsoft Intune](certificate-connector-install.md).
130130

131-
<!-- Remainder is deprecated content, now covered by the install of the new certificate connector>
132-
133-
Before you begin, [review requirements for the connector](certificate-connectors.md) and ensure your environment and your Windows server is ready to support the connector.
134-
135-
1. Sign in to the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431).
136-
137-
2. Select **Tenant administration** > **Connectors and tokens** > **Certificate connectors** > **+ Add**.
138-
139-
3. Select *Download the certificate connector software* for the connector for PKCS #12, and save the file to a location you can access from the server where you're going to install the connector.
140-
141-
:::image type="content source="./media/certificates-pfx-configure/download-connector.png" alt-text="Microsoft Intune Connector download.":::
142-
143-
4. After the download completes, sign in to the server and run the installer (PfxCertificateConnectorBootstrapper.exe).
144-
- When you accept the default installation location, the connector installs to `Program Files\Microsoft Intune\PFXCertificateConnector`.
145-
- The connector service runs under the local system account. If a proxy is required for internet access, confirm that the local service account can access the proxy settings on the server.
146-
147-
5. The PFX Certificate Connector for Microsoft Intune opens the **Enrollment** tab after installation. To enable the connection to Intune, **Sign In**, and enter an account with Azure global administrator or Intune administrator permissions. This account must have a license for Intune.
148-
149-
> [!WARNING]
150-
> By default, in Windows Server **IE Enhanced Security Configuration** is set to **On** which can cause issues with the sign-in to Office 365.
151-
152-
6. Select the **CA Account** tab, and then enter credentials for an account that has the Issue and Manage Certificates permission on your issuing Certificate Authority. These credentials will be used to perform certificate issuance and certificate revocation on the Certificate Authority. (Prior to the PFX certificate connector version 6.2008.60.612, these credentials were used only for certificate revocation.)
153-
154-
**Apply** your changes.
155-
156-
7. Close the window.
157-
158-
8. In the Microsoft Endpoint Manager admin center, go back to **Tenant administration** > **Connectors and tokens** > **Certificate connectors**. In a few moments, a green check mark appears and the connection status updates. The connector server can now communicate with Intune.
159-
160-
-->
161-
162131
## Create a trusted certificate profile
163132

164133
1. Sign in to the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431).
@@ -195,9 +164,11 @@ Before you begin, [review requirements for the connector](certificate-connectors
195164

196165
8. Select **Next**.
197166

198-
9. In **Assignments**, select the user or device group(s) that will be assigned the profile. For more granularity, see [Create filters in Microsoft Intune](https://go.microsoft.com/fwlink/?linkid=2150376) and apply them by selecting *Edit filter*. Plan to deploy this certificate profile to the same groups that receive the PKCS certificate profile. For more information on assigning profiles, see [Assign user and device profiles](../configuration/device-profile-assign.md).
167+
9. In **Assignments**, select the user or device group(s) that will be assigned the profile. For more granularity, see [Create filters in Microsoft Intune](https://go.microsoft.com/fwlink/?linkid=2150376) and apply them by selecting *Edit filter*.
199168

200-
Select **Next**.
169+
Plan to deploy this certificate profile to the same groups that receive the PKCS certificate profile, and that recieve a configuration profile like a Wi-Fi profile that makes use of the certificate. For more information on assigning profiles, see [Assign user and device profiles](../configuration/device-profile-assign.md).
170+
171+
Select **Next**.
201172

202173
10. (*Applies to Windows 10/11 only*) In **Applicability Rules**, specify applicability rules to refine the assignment of this profile. You can choose to assign or not assign the profile based on the OS edition or version of a device.
203174

@@ -257,7 +228,7 @@ Before you begin, [review requirements for the connector](certificate-connectors
257228

258229
8. Select **Next**.
259230

260-
9. In **Assignments**, select the user or groups that will receive your profile. Plan to deploy this certificate profile to the same groups that receive the trusted certificate profile. For more information on assigning profiles, see [Assign user and device profiles](../configuration/device-profile-assign.md).
231+
9. In **Assignments**, select the user or groups that will receive your profile. Plan to deploy this certificate profile to the same groups that receive the trusted certificate profile, and that receive a configuration profile like a Wi-Fi profile that makes use of the certificate. For more information on assigning profiles, see [Assign user and device profiles](../configuration/device-profile-assign.md).
261232

262233
Select **Next**.
263234

0 commit comments

Comments
 (0)