Skip to content

Commit 7596d1c

Browse files
committed
Merge branch 'main' into release-cm2205-tp
2 parents 3c6394f + f51d7aa commit 7596d1c

3 files changed

Lines changed: 11 additions & 64 deletions

File tree

memdocs/intune/enrollment/android-samsung-knox-mobile-enroll.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -105,7 +105,7 @@ For step-by-step guidance, see the [Samsung's Create Profile](https://docs.samsu
105105
To assign MDM Profiles to devices, supported Samsung Knox devices must be added to the Knox Portal using one of the following methods:
106106
- **Using Samsung-Approved Reseller(s):** Use this method if you're purchasing devices from one of the Samsung-approved resellers. Resellers can auto-upload devices for you when approved. [Visit the Samsung Knox Enrollment User Guide to learn how to add resellers](https://docs.samsungknox.com/KME-Getting-Started/Content/Register_resellers.htm).
107107

108-
- **Using the Knox Deployment App (KDA):** Use this method if you have existing devices that need to be enrolled using KME. You can either use Bluetooth or NFC to add devices to the Knox Portal using this method. [Visit the Samsung Knox Enrollment User Guide to learn about using the KDA](https://docs.samsungknox.com/KME-Getting-Started/Content/add-device-info.htm).
108+
- **Using the Knox Deployment App (KDA):** Use this method if you have existing devices that need to be enrolled using KME. You can either use Bluetooth or NFC to add devices to the Knox Portal using this method. [Visit the Samsung Knox Enrollment User Guide to learn about using the KDA](https://docs.samsungknox.com/admin/knox-mobile-enrollment/about-kda.htm).
109109

110110
## Assign an MDM profile to devices
111111
You must assign an MDM profile to added devices in the Knox Portal before they can be enrolled. [Visit the Samsung Knox Enrollment User Guide to learn about device configuration](https://docs.samsungknox.com/KME-Getting-Started/Content/configure-devices.htm).

memdocs/intune/protect/certificates-imported-pfx-configure.md

Lines changed: 9 additions & 62 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ keywords:
55
author: brenduns
66
ms.author: brenduns
77
manager: dougeby
8-
ms.date: 02/28/2022
8+
ms.date: 05/11/2022
99
ms.topic: how-to
1010
ms.service: microsoft-intune
1111
ms.subservice: protect
@@ -82,65 +82,6 @@ When you use Intune to deploy an **imported PFX certificate** to a user, there a
8282

8383
- **Certificate Connector for Microsoft Intune**: When a device requests a PFX certificate that was imported to Intune, the encrypted password, the certificate, and the device's public key are sent to the connector. The connector decrypts the password using the on-premises private key, and then re-encrypts the password (and any plist profiles if using iOS) with the device key before sending the certificate back to Intune. Intune then delivers the certificate to the device and the device decrypts it with the device's private key and install the certificate.
8484

85-
<!-- Remainder is deprecated content, now covered by the install of the new certificate connector>
86-
87-
Before you begin, [review requirements for the connector](certificate-connectors.md) and ensure your environment and your Windows server is ready to support the connector.
88-
89-
1. Sign in to the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431).
90-
91-
2. Select **Tenant administration** > **Connectors and tokens** > **Certificate connectors** > **+ Add**.
92-
93-
3. Click *Download the certificate connector software* for the connector for PKCS #12, and save the file to a location you can access from the server where you're going to install the connector.
94-
95-
![Microsoft Intune Connector download](./media/certificates-imported-pfx-configure/download-connector.png)
96-
97-
4. After the download completes, sign in to the server and run the installer (PfxCertificateConnectorBootstrapper.exe).
98-
- When you accept the default installation location, the connector installs to `Program Files\Microsoft Intune\PFXCertificateConnector`.
99-
- The connector service runs under the local system account. If a proxy is required for internet access, confirm that the local service account can access the proxy settings on the server.
100-
101-
5. The PFX Certificate Connector for Microsoft Intune opens the **Enrollment** tab after installation. To enable the connection to Intune, **Sign In**, and enter an account with Azure global administrator or Intune administrator permissions.
102-
103-
> [!WARNING]
104-
> By default, in Windows Server **IE Enhanced Security Configuration** is set to **On** which can cause issues with the sign-in to Microsoft 365.
105-
106-
6. Close the window.
107-
108-
7. In the Microsoft Endpoint Manager admin center, go back to **Tenant administration** > **Connectors and tokens** > **Certificate connectors**. In a few moments, a green check mark appears and the connection status updates. The connector server can now communicate with Intune.
109-
110-
> [!NOTE]
111-
> The following changes must be made for GCC High and DoD tenants prior to using the PFX Certificate Connector.
112-
>
113-
> 1. Use a text editor to edit the two following *.config* files, which updates the service endpoints for the GCC High environment. Notice that these updates change the URIs from **.com** to **.us** suffixes. There are a total of three URI updates, two updates within the **PFXCertificateConnectorUI.exe.config** file, and one update in the **Microsoft.Intune.Connectors.PfxCreateLegacy.exe.config** file.
114-
> - File Name: <install_Path>\Microsoft Intune\PFXCertificateConnector\ConnectorUI\ PFXCertificateConnectorUI.exe.config
115-
>
116-
> Example: (%programfiles%\Microsoft Intune\PFXCertificateConnector\ConnectorUI\ PFXCertificateConnectorUI.exe.config)
117-
> ```
118-
> <appSettings>
119-
> <add key="SignInURL" value="https://portal.manage.microsoft.us/Home/ClientLogon" />
120-
> <add key="LocationServiceEndpoint" value="RestUserAuthLocationService/RestUserAuthLocationService/ServiceAddresses" />
121-
> <add key="AccountPortalURL" value="https://manage.microsoft.us" />
122-
> </appSettings>
123-
> ```
124-
>
125-
> - </appSettings>File Name: <install_Path>\Microsoft Intune\PFXCertificateConnector\ConnectorSvc\Microsoft.Intune.Connectors.PfxCreateLegacy.exe.config
126-
>
127-
> Example: (%programfiles%\ Microsoft Intune\PFXCertificateConnector\ConnectorSvc\Microsoft.Intune.Connectors.PfxCreateLegacy.exe.config)
128-
> ```
129-
> <appSettings>
130-
> <add key="BaseServiceAddress" value="https://manage.microsoft.us/" />
131-
> <add key="TimerFrequency" value="30000" />
132-
> <add key="PfxTimerFrequency" value="30000" />
133-
> <add key="PfxImportRecryptionFrequency" value="30000" />
134-
> <add key="CloudCAConnTimeoutInMilliseconds" value="30000" />
135-
> ```
136-
>
137-
> 2. On the server that hosts the connector, add or edit the following registry key to match teh following:
138-
> `HKLM\Software\Microsoft\MicrosoftIntune\PFXCertificateConnector\MbaseManagementAddress`
139-
> - If *MbaseManagementAddress* isn't present, add it as a child key below *PFXCertificateConnector*.
140-
> - Set the *String Value* for *MbaseManagementAddress* to `https://manage.microsoft.us`
141-
142-
-->
143-
14485
## Import PFX Certificates to Intune
14586

14687
You use [Microsoft Graph](/graph) to import your users PFX certificates into Intune. The helper [PFXImport PowerShell Project at GitHub](https://github.com/microsoft/Intune-Resource-Access/tree/develop/src/PFXImportPowershell) provides you with cmdlets to do the operations with ease.
@@ -159,7 +100,7 @@ To make use of the PowerShell cmdlets, you build the project yourself using Visu
159100

160101
3. On the top, change from **Debug** to **Release**.
161102

162-
4. Go to **Build** and select **Build PFXImportPS**. In a few moments, you'll see the **Build succeeded** confirmation appear at the bottom left of Visual Studio.
103+
4. Go to **Build** and select **Build PFXImportPS**. In a few moments, you'll see the **Build succeeded** confirmation at the bottom left of Visual Studio.
163104

164105
![Visual Studio Build option](./media/certificates-imported-pfx-configure/vs-build-release.png)
165106

@@ -314,9 +255,15 @@ If you use the DigiCert PKI Platform service, you can use the DigiCert **Import
314255
315256
To learn more about the DigiCert Import tool, including how to obtain the tool, see https://knowledge.digicert.com/tutorials/microsoft-intune.html in the DigiCert knowledge base.
316257
258+
### EverTrust
259+
260+
If you use EverTrust as your PKI solution, standalone or combined to an existing PKI, you can configure EverTrust Horizon to import PFX certificates to Intune. After you complete the integration, you won’t need to follow the instructions in the section [Import PFX Certificates to Intune](#import-pfx-certificates-to-intune) that's detailed earlier in this article.
261+
262+
To learn more about EverTrust’s integration with Intune, see https://evertrust.fr/horizon/integrations/intune/.
263+
317264
### KeyTalk
318265
319-
If you use the KeyTalk service, you can configure their service to import PFX certificates to Intune. After you complete integration, you won’t need to follow the instructions in the section [Import PFX Certificates to Intune](#import-pfx-certificates-to-intune) to Intune that's detailed earlier in this article.
266+
If you use the KeyTalk service, you can configure their service to import PFX certificates to Intune. After you complete the integration, you won’t need to follow the instructions in the section [Import PFX Certificates to Intune](#import-pfx-certificates-to-intune) to Intune that's detailed earlier in this article.
320267
321268
To learn more about KeyTalk’s integration with Intune, see https://keytalk.com/support in the KeyTalk knowledge base.
322269

memdocs/intune/protect/microsoft-tunnel-migrate-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ If you use Microsoft Tunnel as a VPN gateway solution for Microsoft Intune, plan
3131

3232
## Platform support
3333

34-
If you've previously configured Microsoft Tunnel for iOS using the standalone Microsoft Tunnel client app, you must migrate your devices to use Microsoft Defender for Endpoint as the tunnel client app before support for the Android standalone tunnel client app ends by the end of June 20, 2022.
34+
If you've previously configured Microsoft Tunnel for iOS using the standalone Microsoft Tunnel client app, you must migrate your devices to use Microsoft Defender for Endpoint as the tunnel client app before support for the iOS standalone tunnel client app ends by the end of July 29, 2022.
3535

3636
Support for the Android standalone tunnel client app ended on January 31, 2022.
3737

0 commit comments

Comments
 (0)