You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: memdocs/intune/protect/certificates-pfx-configure.md
+12-16Lines changed: 12 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,7 +28,7 @@ ms.collection:
28
28
---
29
29
# Configure and use PKCS certificates with Intune
30
30
31
-
Microsoft Intune supports the use of private and public key pair (PKCS) certificates. To help you use PKCS certificates, this article reviews what's required, and can help you export of a PKCS certificate, and then add the certificate to an Intune device configuration profile.
31
+
Microsoft Intune supports the use of private and public key pair (PKCS) certificates. To help you use PKCS certificates, this article reviews what's required, and can help you export a PKCS certificate, and then add the certificate to an Intune device configuration profile.
32
32
33
33
Microsoft Intune includes built-in settings to use PKCS certificates for access and authentication to your organizations resources. Certificates authenticate and secure access to your corporate resources like a VPN or a WiFi network. You deploy these settings to devices using device configuration profiles in Intune.
34
34
@@ -69,7 +69,7 @@ To use PKCS certificates with Intune, you'll need the following infrastructure:
69
69
-[Installation and configuration](certificate-connector-install.md).
70
70
71
71
> [!TIP]
72
-
> Beginning on July 29, 2021, the **Certificate Connector for Microsoft** Intune replaces the use of *PFX Certificate Connector for Microsoft Intune* and *Microsoft Intune Connector*. The new connector includes the functionality of both previous connectors. With the release of version 6.2109.51.0 of the Certificate Connector for Microsoft, the previous connectors are no longer supported.
72
+
> Beginning on July 29, 2021, the **Certificate Connector for Microsoft Intune** replaces the use of *PFX Certificate Connector for Microsoft Intune* and *Microsoft Intune Connector*. The new connector includes the functionality of both previous connectors. With the release of version 6.2109.51.0 of the Certificate Connector for Microsoft, the previous connectors are no longer supported.
73
73
74
74
## Export the root certificate from the Enterprise CA
75
75
@@ -189,7 +189,7 @@ Before you begin, [review requirements for the connector](certificate-connectors
189
189
190
190
6. Select **Next**.
191
191
192
-
7. In **Configuration settings**, specify the .cer file Root CA Certificate you previously exported.
192
+
7. In **Configuration settings**, specify the .cer file for the Root CA Certificate you previously exported.
193
193
194
194
> [!NOTE]
195
195
> Depending on the platform you chose in **Step 3**, you may or may not have an option to choose the **Destination store** for the certificate.
@@ -198,19 +198,15 @@ Before you begin, [review requirements for the connector](certificate-connectors
198
198
199
199
8. Select **Next**.
200
200
201
-
9. In **Scope tags** (optional), assign a tag to filter the profile to specific IT groups, such as `US-NC IT Team` or `JohnGlenn_ITDepartment`. For more information about scope tags, see [Use RBAC and scope tags for distributed IT](../fundamentals/scope-tags.md).
202
-
203
-
Select **Next**.
204
-
205
-
10. In **Assignments**, select the user or groups that will receive your profile. Plan to deploy this certificate profile to the same groups that receive the PKCS certificate profile. For more information on assigning profiles, see [Assign user and device profiles](../configuration/device-profile-assign.md).
201
+
9. In **Assignments**, select the user or device group(s) that will be assigned the profile. For more granularity see [Create filters in Microsoft Intune](https://go.microsoft.com/fwlink/?linkid=2150376) and apply them by selecting *Edit filter*. Plan to deploy this certificate profile to the same groups that receive the PKCS certificate profile. For more information on assigning profiles, see [Assign user and device profiles](../configuration/device-profile-assign.md).
206
202
207
203
Select **Next**.
208
204
209
-
11. (*Applies to Windows 10/11 only*) In **Applicability Rules**, specify applicability rules to refine the assignment of this profile. You can choose to assign or not assign the profile based on the OS edition or version of a device.
205
+
10. (*Applies to Windows 10/11 only*) In **Applicability Rules**, specify applicability rules to refine the assignment of this profile. You can choose to assign or not assign the profile based on the OS edition or version of a device.
210
206
211
207
For more information, see [Applicability rules](../configuration/device-profile-create.md#applicability-rules) in *Create a device profile in Microsoft Intune*.
212
208
213
-
12. In **Review + create**, review your settings. When you select Create, your changes are saved, and the profile is assigned. The policy is also shown in the profiles list.
209
+
11. In **Review + create**, review your settings. When you select **Create**, your changes are saved, and the profile is assigned. The policy is also shown in the profiles list.
214
210
215
211
## Create a PKCS certificate profile
216
212
@@ -255,20 +251,20 @@ Before you begin, [review requirements for the connector](certificate-connectors
255
251
|**Certification authority**|<ul><li>All |Displays the internal fully qualified domain name (FQDN) of your Enterprise CA. |
256
252
|**Certification authority name**|<ul><li>All |Lists the name of your Enterprise CA, such as "Contoso Certification Authority". |
257
253
|**Certificate template name**|<ul><li>All |Lists the name of your certificate template. |
258
-
|**Certificate type**|<ul><li>Android Enterprise (*Corporate-Owned and Personally-Owned Work Profile*)</li><li>iOS</li><li>macOS</li><li>Windows 10/11 |Select a type: <ul><li> **User** certificates can contain both user and device attributes in the subject and subject alternative name (SAN) of the certificate. </il><li>**Device** certificates can only contain device attributes in the subject and SAN of the certificate. Use Device for scenarios such as user-less devices, like kiosks or other shared devices. <br><br> This selection affects the Subject name format. |
254
+
|**Certificate type**|<ul><li>Android Enterprise (*Corporate-Owned and Personally-Owned Work Profile*)</li><li>iOS</li><li>macOS</li><li>Windows 10/11 |Select a type: <ul><li> **User** certificates can contain both user and device attributes in the subject and subject alternative name (SAN) of the certificate. </li><li>**Device** certificates can only contain device attributes in the subject and SAN of the certificate. Use Device for scenarios such as user-less devices, like kiosks or other shared devices. <br><br> This selection affects the Subject name format. |
259
255
|**Subject name format**|<ul><li>All |For details on how to configure the subject name format, see [Subject name format](#subject-name-format) later in this article. <br><br>For the following platforms, the Subject name format is determined by the certificate type: <ul><li>Android Enterprise (*Work Profile*)</li><li>iOS</li><li>macOS</li><li>Windows 10/11 </li></ul> <p> |
260
256
|**Subject alternative name**|<ul><li>All |For *Attribute*, select **User principal name (UPN)** unless otherwise required, configure a corresponding *Value*, and then select **Add**. <br><br> You can use variables or static text for the SAN of both certificate types. Use of a variable isn't required.<br><br>For more information, see [Subject name format](#subject-name-format) later in this article.|
261
257
|**Extended key usage**|<ul><li> Android device administrator </li><li>Android Enterprise (*Device Owner*, *Corporate-Owned and Personally-Owned Work Profile*) </li><li>Windows 10/11 |Certificates usually require *Client Authentication* so that the user or device can authenticate to a server. |
262
-
|**Allow all apps access to private key**|<ul><li>macOS |Set to **Enable** to give apps that are configured for the associated mac device access to the PKCS certificates private key. <br><br> For more information on this setting, see *AllowAllAppsAccess* the Certificate Payload section of [Configuration Profile Reference](https://developer.apple.com/business/documentation/Configuration-Profile-Reference.pdf) in the Apple developer documentation. |
258
+
|**Allow all apps access to private key**|<ul><li>macOS |Set to **Enable** to give apps that are configured for the associated mac device access to the PKCS certificate's private key. <br><br> For more information on this setting, see *AllowAllAppsAccess* the Certificate Payload section of [Configuration Profile Reference](https://developer.apple.com/business/documentation/Configuration-Profile-Reference.pdf) in the Apple developer documentation. |
263
259
|**Root Certificate**|<ul><li>Android device administrator </li><li>Android Enterprise (*Device Owner*, *Corporate-Owned and Personally-Owned Work Profile*) |Select a root CA certificate profile that was previously assigned. |
264
-
260
+
265
261
8. Select **Next**.
266
262
267
263
9. In **Assignments**, select the user or groups that will receive your profile. Plan to deploy this certificate profile to the same groups that receive the trusted certificate profile. For more information on assigning profiles, see [Assign user and device profiles](../configuration/device-profile-assign.md).
268
264
269
265
Select **Next**.
270
266
271
-
10. In **Review + create**, review your settings. When you select Create, your changes are saved, and the profile is assigned. The policy is also shown in the profiles list.
267
+
10. In **Review + create**, review your settings. When you select **Create**, your changes are saved, and the profile is assigned. The policy is also shown in the profiles list.
272
268
273
269
### Subject name format
274
270
@@ -302,7 +298,7 @@ Platforms:
302
298
303
299
-**User certificate type**
304
300
Format options for the *Subject name format* include two variables: **Common Name (CN)** and **Email (E)**. Email (E) would usually be set with the {{EmailAddress}} variable.
305
-
For example: E={{EmailAddress}}
301
+
For example: E={{EmailAddress}}
306
302
307
303
**Common Name (CN)** can be set to any of the following variables:
0 commit comments