Skip to content

Commit 3bdff14

Browse files
authored
Merge pull request #2356 from timpeteren/timpeteren-patch-1
Update trusted cert import (assignment filter)
2 parents 9bcff9b + 1ac3644 commit 3bdff14

2 files changed

Lines changed: 14 additions & 18 deletions

File tree

memdocs/intune/protect/certificates-pfx-configure.md

Lines changed: 14 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ keywords:
55
author: brenduns
66
ms.author: brenduns
77
manager: dougeby
8-
ms.date: 09/22/2021
8+
ms.date: 01/18/2022
99
ms.topic: how-to
1010
ms.service: microsoft-intune
1111
ms.subservice: protect
@@ -28,7 +28,7 @@ ms.collection:
2828
---
2929
# Configure and use PKCS certificates with Intune
3030

31-
Microsoft Intune supports the use of private and public key pair (PKCS) certificates. To help you use PKCS certificates, this article reviews what's required, and can help you export of a PKCS certificate, and then add the certificate to an Intune device configuration profile.
31+
Microsoft Intune supports the use of private and public key pair (PKCS) certificates. To help you use PKCS certificates, this article reviews what's required, and can help you export a PKCS certificate, and then add the certificate to an Intune device configuration profile.
3232

3333
Microsoft Intune includes built-in settings to use PKCS certificates for access and authentication to your organizations resources. Certificates authenticate and secure access to your corporate resources like a VPN or a WiFi network. You deploy these settings to devices using device configuration profiles in Intune.
3434

@@ -69,7 +69,7 @@ To use PKCS certificates with Intune, you'll need the following infrastructure:
6969
- [Installation and configuration](certificate-connector-install.md).
7070

7171
> [!TIP]
72-
> Beginning on July 29, 2021, the **Certificate Connector for Microsoft** Intune replaces the use of *PFX Certificate Connector for Microsoft Intune* and *Microsoft Intune Connector*. The new connector includes the functionality of both previous connectors. With the release of version 6.2109.51.0 of the Certificate Connector for Microsoft, the previous connectors are no longer supported.
72+
> Beginning on July 29, 2021, the **Certificate Connector for Microsoft Intune** replaces the use of *PFX Certificate Connector for Microsoft Intune* and *Microsoft Intune Connector*. The new connector includes the functionality of both previous connectors. With the release of version 6.2109.51.0 of the Certificate Connector for Microsoft, the previous connectors are no longer supported.
7373
7474
## Export the root certificate from the Enterprise CA
7575

@@ -141,7 +141,7 @@ Before you begin, [review requirements for the connector](certificate-connectors
141141
142142
3. Select *Download the certificate connector software* for the connector for PKCS #12, and save the file to a location you can access from the server where you're going to install the connector.
143143
144-
![Microsoft Intune Connector download](./media/certificates-pfx-configure/download-connector.png)
144+
:::image type="content source="./media/certificates-pfx-configure/download-connector.png" alt-text="Microsoft Intune Connector download.":::
145145
146146
4. After the download completes, sign in to the server and run the installer (PfxCertificateConnectorBootstrapper.exe).
147147
- When you accept the default installation location, the connector installs to `Program Files\Microsoft Intune\PFXCertificateConnector`.
@@ -189,7 +189,7 @@ Before you begin, [review requirements for the connector](certificate-connectors
189189

190190
6. Select **Next**.
191191

192-
7. In **Configuration settings**, specify the .cer file Root CA Certificate you previously exported.
192+
7. In **Configuration settings**, specify the .cer file for the Root CA Certificate you previously exported.
193193

194194
> [!NOTE]
195195
> Depending on the platform you chose in **Step 3**, you may or may not have an option to choose the **Destination store** for the certificate.
@@ -198,19 +198,15 @@ Before you begin, [review requirements for the connector](certificate-connectors
198198

199199
8. Select **Next**.
200200

201-
9. In **Scope tags** (optional), assign a tag to filter the profile to specific IT groups, such as `US-NC IT Team` or `JohnGlenn_ITDepartment`. For more information about scope tags, see [Use RBAC and scope tags for distributed IT](../fundamentals/scope-tags.md).
202-
203-
Select **Next**.
204-
205-
10. In **Assignments**, select the user or groups that will receive your profile. Plan to deploy this certificate profile to the same groups that receive the PKCS certificate profile. For more information on assigning profiles, see [Assign user and device profiles](../configuration/device-profile-assign.md).
201+
9. In **Assignments**, select the user or device group(s) that will be assigned the profile. For more granularity see [Create filters in Microsoft Intune](https://go.microsoft.com/fwlink/?linkid=2150376) and apply them by selecting *Edit filter*. Plan to deploy this certificate profile to the same groups that receive the PKCS certificate profile. For more information on assigning profiles, see [Assign user and device profiles](../configuration/device-profile-assign.md).
206202

207203
Select **Next**.
208204

209-
11. (*Applies to Windows 10/11 only*) In **Applicability Rules**, specify applicability rules to refine the assignment of this profile. You can choose to assign or not assign the profile based on the OS edition or version of a device.
205+
10. (*Applies to Windows 10/11 only*) In **Applicability Rules**, specify applicability rules to refine the assignment of this profile. You can choose to assign or not assign the profile based on the OS edition or version of a device.
210206

211207
For more information, see [Applicability rules](../configuration/device-profile-create.md#applicability-rules) in *Create a device profile in Microsoft Intune*.
212208

213-
12. In **Review + create**, review your settings. When you select Create, your changes are saved, and the profile is assigned. The policy is also shown in the profiles list.
209+
11. In **Review + create**, review your settings. When you select **Create**, your changes are saved, and the profile is assigned. The policy is also shown in the profiles list.
214210

215211
## Create a PKCS certificate profile
216212

@@ -255,20 +251,20 @@ Before you begin, [review requirements for the connector](certificate-connectors
255251
|**Certification authority** |<ul><li>All |Displays the internal fully qualified domain name (FQDN) of your Enterprise CA. |
256252
|**Certification authority name** |<ul><li>All |Lists the name of your Enterprise CA, such as "Contoso Certification Authority". |
257253
|**Certificate template name** |<ul><li>All |Lists the name of your certificate template. |
258-
|**Certificate type** |<ul><li>Android Enterprise (*Corporate-Owned and Personally-Owned Work Profile*)</li><li>iOS</li><li>macOS</li><li>Windows 10/11 |Select a type: <ul><li> **User** certificates can contain both user and device attributes in the subject and subject alternative name (SAN) of the certificate. </il><li>**Device** certificates can only contain device attributes in the subject and SAN of the certificate. Use Device for scenarios such as user-less devices, like kiosks or other shared devices. <br><br> This selection affects the Subject name format. |
254+
|**Certificate type** |<ul><li>Android Enterprise (*Corporate-Owned and Personally-Owned Work Profile*)</li><li>iOS</li><li>macOS</li><li>Windows 10/11 |Select a type: <ul><li> **User** certificates can contain both user and device attributes in the subject and subject alternative name (SAN) of the certificate. </li><li>**Device** certificates can only contain device attributes in the subject and SAN of the certificate. Use Device for scenarios such as user-less devices, like kiosks or other shared devices. <br><br> This selection affects the Subject name format. |
259255
|**Subject name format** |<ul><li>All |For details on how to configure the subject name format, see [Subject name format](#subject-name-format) later in this article. <br><br>For the following platforms, the Subject name format is determined by the certificate type: <ul><li>Android Enterprise (*Work Profile*)</li><li>iOS</li><li>macOS</li><li>Windows 10/11 </li></ul> <p> |
260256
|**Subject alternative name** |<ul><li>All |For *Attribute*, select **User principal name (UPN)** unless otherwise required, configure a corresponding *Value*, and then select **Add**. <br><br> You can use variables or static text for the SAN of both certificate types. Use of a variable isn't required.<br><br>For more information, see [Subject name format](#subject-name-format) later in this article.|
261257
|**Extended key usage** |<ul><li> Android device administrator </li><li>Android Enterprise (*Device Owner*, *Corporate-Owned and Personally-Owned Work Profile*) </li><li>Windows 10/11 |Certificates usually require *Client Authentication* so that the user or device can authenticate to a server. |
262-
|**Allow all apps access to private key** |<ul><li>macOS |Set to **Enable** to give apps that are configured for the associated mac device access to the PKCS certificates private key. <br><br> For more information on this setting, see *AllowAllAppsAccess* the Certificate Payload section of [Configuration Profile Reference](https://developer.apple.com/business/documentation/Configuration-Profile-Reference.pdf) in the Apple developer documentation. |
258+
|**Allow all apps access to private key** |<ul><li>macOS |Set to **Enable** to give apps that are configured for the associated mac device access to the PKCS certificate's private key. <br><br> For more information on this setting, see *AllowAllAppsAccess* the Certificate Payload section of [Configuration Profile Reference](https://developer.apple.com/business/documentation/Configuration-Profile-Reference.pdf) in the Apple developer documentation. |
263259
|**Root Certificate** |<ul><li>Android device administrator </li><li>Android Enterprise (*Device Owner*, *Corporate-Owned and Personally-Owned Work Profile*) |Select a root CA certificate profile that was previously assigned. |
264-
260+
265261
8. Select **Next**.
266262

267263
9. In **Assignments**, select the user or groups that will receive your profile. Plan to deploy this certificate profile to the same groups that receive the trusted certificate profile. For more information on assigning profiles, see [Assign user and device profiles](../configuration/device-profile-assign.md).
268264

269265
Select **Next**.
270266

271-
10. In **Review + create**, review your settings. When you select Create, your changes are saved, and the profile is assigned. The policy is also shown in the profiles list.
267+
10. In **Review + create**, review your settings. When you select **Create**, your changes are saved, and the profile is assigned. The policy is also shown in the profiles list.
272268

273269
### Subject name format
274270

@@ -302,7 +298,7 @@ Platforms:
302298
303299
- **User certificate type**
304300
Format options for the *Subject name format* include two variables: **Common Name (CN)** and **Email (E)**. Email (E) would usually be set with the {{EmailAddress}} variable.
305-
For example: E={{EmailAddress}}
301+
For example: E={{EmailAddress}}
306302

307303
**Common Name (CN)** can be set to any of the following variables:
308304

@@ -336,7 +332,7 @@ Platforms:
336332
- **{{Device_IMEI}}**
337333
- **{{SerialNumber}}**
338334
- **{{IMEINumber}}**
339-
- **{{AzureADDeviceId}}**
335+
- **{{AzureADDeviceId}}**
340336
- **{{WiFiMacAddress}}**
341337
- **{{IMEI}}**
342338
- **{{DeviceName}}**
-33.8 KB
Loading

0 commit comments

Comments
 (0)