Skip to content

Commit aa8494a

Browse files
authored
Merge pull request #6281 from MicrosoftDocs/main
12/3/2021 AM Publish
2 parents 1c260c2 + 0e58d98 commit aa8494a

5 files changed

Lines changed: 63 additions & 35 deletions

File tree

memdocs/intune/enrollment/android-corporate-owned-work-profile-enroll.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -63,12 +63,12 @@ To set up Android Enterprise corporate-owned work profile device management, fol
6363
### Create an enrollment profile
6464

6565
> [!NOTE]
66-
> - Tokens for corporate-owned devices with a work profile will not expire automatically. If an admin decides to revoke a token , the profile associated with it will not be displayed in **Devices** > **Android** > **Android enrollment** > **Corporate-owned devices with work profile (Preview)**. To see all profiles associated with both active and inactive tokens, click on **Filter** and check the boxes for both "Active" and "Inactive" policy states.
66+
> - Tokens for corporate-owned devices with a work profile will not expire automatically. If an admin decides to revoke a token , the profile associated with it will not be displayed in **Devices** > **Android** > **Android enrollment** > **Corporate-owned devices with work profile**. To see all profiles associated with both active and inactive tokens, click on **Filter** and check the boxes for both "Active" and "Inactive" policy states.
6767
> - For corporate-owned work profile (COPE) devices, the `afw#setup` enrollment method and the Near Field Communication (NFC) enrollment method are only supported on devices running Android 8-10. They are not available on Android 11. For further details, refer to the Google developer docs [here](https://developers.google.com/android/management/provision-device#company-owned_devices_for_work_and_personal_use:~:text=Note%3A%20DPC%20identifier%20method%20only%20supports%20full%20device%20management%20provisioning%20and%20cannot%20be%20used%20for%20corporate%2Downed%2C%20personally%20enabled,(COPE)%20provisioning%20on%20Android%2011%20devices.,-Company%2Downed).
6868
6969
You must create an enrollment profile so that users can enroll corporate-owned work profile devices. When the profile is created, it provides you with an enrollment token (random string) and a QR code. Depending on the Android OS and version of the device, you can use either the token or QR code to [enroll the dedicated device](#enroll-the-corporate-owned-work-profile-devices).
7070

71-
1. Sign in to the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) and choose **Devices** > **Android** > **Android enrollment** > **Corporate-owned devices with work profile (Preview)**.
71+
1. Sign in to the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) and choose **Devices** > **Android** > **Android enrollment** > **Corporate-owned devices with work profile**.
7272
2. Choose **Create profile** and fill out the fields.
7373
- **Name**: Type a name that you'll use when assigning the profile to the dynamic device group.
7474
- **Description**: Add a profile description (optional).
@@ -101,7 +101,7 @@ You can immediately expire the token/QR code. From this point on, the token/QR c
101101

102102
Revoking a token/QR code won't have any effect on devices that are already enrolled.
103103

104-
1. Sign in to the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) and choose **Devices** > **Android** > **Android enrollment** > **Corporate-owned devices with work profile (Preview)**.
104+
1. Sign in to the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) and choose **Devices** > **Android** > **Android enrollment** > **Corporate-owned devices with work profile**.
105105
2. Choose the profile that you want to work with.
106106
3. Choose **Token**.
107107
5. To revoke the token, choose **Revoke token** > **Yes**.

memdocs/intune/fundamentals/in-development.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -72,8 +72,6 @@ End users will be able to more easily see the compliance status of their devices
7272
### Password complexity for Android devices<!-- 9321870 -->
7373
The **Require device lock** setting in Intune will be extended to include values (**Low Complexity**, **Medium Complexity**, and **High Complexity**). If the device lock doesn’t meet the minimum password requirement, you will be able to **warn**, **wipe data**, or **block** the end user from accessing a managed account in a managed app. This feature targets devices that operate on Android 11+. For devices operating on Android 10 and earlier, setting a complexity value of **Low**, **Medium**, or **High** will default to the expected behavior for **Low Complexity**. For related information, see [Android app protection policy settings in Microsoft Intune](..\apps\app-protection-policy-settings-android.md).
7474

75-
### Unified delivery of Azure AD Enterprise and Office Online applications in the Android Company Portal<!-- 1817862 -->
76-
7775
<!-- ***********************************************-->
7876

7977
## Device security

memdocs/intune/protect/certificate-authority-add-scep-overview.md

Lines changed: 2 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ keywords:
55
author: brenduns
66
ms.author: brenduns
77
manager: dougeby
8-
ms.date: 12/01/2021
8+
ms.date: 12/03/2021
99
ms.topic: how-to
1010
ms.service: microsoft-intune
1111
ms.subservice: protect
@@ -113,12 +113,6 @@ Be sure you have the required permissions to register an Azure AD app. See [Requ
113113
2. Expand **Application** and select the checkbox for **Application.Read.All** (Read all applications).
114114
3. Select **Add permissions** to save this configuration.
115115

116-
1. Select **Add a permission** again.
117-
1. On the *Request API permissions* page, select **Azure Active Directory Graph** > **Application permissions**.
118-
2. Expand **Application** and select the checkbox for **Application.Read.All** (Read all applications).
119-
3. Select **Add permissions** to save this configuration.
120-
121-
<!-- Pending review to replace step 7.c>
122116
1. Use *Microsoft Graph* to add the following permissions to the app:
123117

124118
- **Application.Read.All** (Read all applications).
@@ -127,7 +121,7 @@ Be sure you have the required permissions to register an Azure AD app. See [Requ
127121

128122
> [!NOTE]
129123
> Previously, these permissions were configured by using Azure AD Graph, and available through the App registration UI. Azure AD Graph is now deprecated and will be retired on June 30, 2022. As part of this deprecation path, the capability to add Azure AD Graph permissions to the required permissions for an app registration through the Azure portal is now disabled.
130-
-->
124+
131125
8. Remain on the **API permissions** page, and select **Grant admin consent for** ***\<your tenant>***, and then select **Yes**.
132126

133127
The app registration process in Azure AD is complete.

memdocs/intune/protect/derived-credentials.md

Lines changed: 35 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
---
22
# required metadata
33

4-
title: Use derived credentials for mobile devices in Microsoft Intune
4+
title: Use derived credentials for mobile devices with Microsoft Intune
55
description: Use derived credentials on mobile devices as an authentication method for Intune VPN, email, Wi-Fi profiles, applications, and S/MIME and encryption. Derived credentials are an implementation of the NIST guidelines for Special Publication 800-157.
66
keywords:
77
author: brenduns
88
ms.author: brenduns
99
manager: dougeby
10-
ms.date: 09/08/2021
10+
ms.date: 12/03/2021
1111
ms.topic: how-to
1212
ms.service: microsoft-intune
1313
ms.subservice: protect
@@ -28,9 +28,13 @@ ms.custom: intune-azure
2828
ms.collection: M365-identity-device-management
2929
---
3030

31-
# Use derived credentials in Microsoft Intune
31+
# Use derived credentials with Microsoft Intune
3232

33-
*This article applies to iOS/iPadOS, Android Enterprise fully managed devices that run version 7.0 and above, and devices that run Windows*
33+
*This article applies to:*
34+
35+
- *Android Enterprise fully managed devices that run version 7.0 and above*
36+
- *iOS/iPadOS*
37+
- *Windows 10/11*
3438

3539
In an environment where smart cards are required for authentication or encryption and signing, you can use Intune to provision mobile devices with a certificate that's derived from a user's smart card. That certificate is called a *derived credential*. Intune [supports several derived credential issuers](#supported-issuers), though you can use only a single issuer per tenant at a time.
3640

@@ -87,7 +91,7 @@ For important details about using the different issuers, review guidance for tha
8791
8892
### Required apps
8993

90-
Plan to deploy the relevant user facing app to devices that will enroll for a derived credential. Device users use the app to start the credential enrollment process.
94+
Plan to deploy the relevant user-facing app to devices that will enroll for a derived credential. Device users use the app to start the credential enrollment process.
9195

9296
- iOS devices use the Company Portal app. See [Add iOS store apps to Microsoft Intune](../apps/store-apps-ios.md).
9397
- Android Enterprise Fully Managed and Corporate-Owned work profile devices use the Intune App. See [Add Android store apps to Microsoft Intune](../apps/store-apps-android.md).
@@ -121,7 +125,7 @@ Similarly, some derived credential request workflows require the use of the devi
121125
122126
### 2) Review the end-user workflow for your chosen issuer
123127

124-
Following are key considerations for each supported partner. Become familiar with this information so you can ensure your Intune policies and configurations don't block users and devices from successfully completing enrollment for a derived credential from that issuer.
128+
The following are key considerations for each supported partner. Become familiar with this information so you can ensure your Intune policies and configurations don't block users and devices from successfully completing enrollment for a derived credential from that issuer.
125129

126130
#### DISA Purebred
127131

@@ -134,11 +138,18 @@ Review the platform-specific user workflow for the devices you'll use with deriv
134138

135139
- Users need access to a computer or KIOSK where they can use their smart card to authenticate to the issuer.
136140
- iOS and iPadOS devices that will enroll for a derived credential must install the Intune Company Portal app. Android Fully Managed and Corporate-Owned Work Profile devices must install and use the Intune app.
137-
- Use Intune to [deploy the DISA Purebred app](#deploy-the-disa-purebred-app) to devices that will enroll for a derived credential. This app must be deployed through Intune so that it's managed, and can then work with the Intune Company Portal app or Intune App, which device users use to complete the derived credential request.
141+
- Use Intune to [deploy the DISA Purebred app](#deploy-the-disa-purebred-app) to devices that will enroll for a derived credential. This app must be deployed through Intune so that it's managed and can then work with the Intune Company Portal app or Intune App, which device users use to complete the derived credential request.
138142
- To retrieve a derived credential from the Purebred app, the device must have access to the on-premises network. Access might be through corporate Wi-Fi or VPN.
139143
- Device users must work with a live agent during the enrollment process. During enrollment, time-limited one-time passcodes are provided to the user as they continue through the enrollment process.
140144
- When changes are made to a policy that uses derived credentials, such as creation of a new Wi-Fi profile, iOS and iPadOS users are notified to open the Company Portal app.
141145
- Users are notified to open the applicable app when they need to renew their derived credential.
146+
147+
The renewal process happens like this:
148+
- The derived credential issuer needs to issue new or updated certificates before the previous certificates are 80% of the way through their validity period.
149+
- The device checks in during the renewal period (the last 20% of the validity period).
150+
- Microsoft Endpoint Manager notifies the user through email or an app notification to launch the Company Portal.
151+
- The user launches the Company Portal and taps the derived credential notification, and then the derived credential certificates are copied to the device
152+
142153

143154
For information getting and configuring the DISA Purebred app, see [Deploy the DISA Purebred app](#deploy-the-disa-purebred-app) later in this article.
144155

@@ -159,6 +170,12 @@ Review the platform-specific user workflow for the devices you'll use with deriv
159170
- **iOS and iPadOS** - Users are notified to open the Company Portal app.
160171
- **Android Enterprise** *Corporate-Owned Work Profile* or *Fully managed devices* - The Company Portal app doesn't need to open.
161172
- Users are notified to open the applicable app when they need to renew their derived credential.
173+
174+
The renewal process happens like this:
175+
- The derived credential issuer needs to issue new or updated certificates before the previous certificates are 80% of the way through their validity period.
176+
- The device checks in during the renewal period (the last 20% of the validity period).
177+
- Microsoft Endpoint Manager notifies the user through email or an app notification to launch the Company Portal.
178+
- The user launches the Company Portal and taps the derived credential notification, and then the derived credential certificates are copied to the device
162179

163180
#### Intercede
164181

@@ -177,6 +194,12 @@ Review the platform-specific user workflow for the devices you'll use with deriv
177194
- **iOS and iPadOS** - Users are notified to open the Company Portal app.
178195
- **Android Enterprise** *Corporate-Owned Work Profile* or *Fully managed devices* - The Company Portal app doesn't need to open.
179196
- Users are notified to open the applicable app when they need to renew their derived credential.
197+
198+
The renewal process happens like this:
199+
- The derived credential issuer needs to issue new or updated certificates before the previous certificates are 80% of the way through their validity period.
200+
- The device checks in during the renewal period (the last 20% of the validity period).
201+
- Microsoft Endpoint Manager notifies the user through email or an app notification to launch the Company Portal.
202+
- The user launches the Company Portal and taps the derived credential notification, and then the derived credential certificates are copied to the device
180203

181204
### 3) Deploy a trusted root certificate to devices
182205

@@ -195,7 +218,7 @@ Create new policies or edit existing policies to use derived credentials. Derive
195218
- App authentication
196219
- Wi-Fi
197220
- VPN
198-
- email (iOS only)
221+
- Email (iOS only)
199222
- S/MIME signing and encryption, including Outlook (iOS only)
200223

201224
Avoid requiring use of a derived credential to access a process that you'll use as part of the process to get the derived credential, as that can prevent users from completing the request.
@@ -237,7 +260,7 @@ After you save the configuration, you can make changes to all fields except for
237260

238261
To use **DISA Purebred** as your derived credential issuer for Intune, you must get the DISA Purebred app and then use Intune to deploy the app to devices. Then users request the derived credential from DISA Purebred by using the Company Portal App on their iOS/iPadOS device, or the Intune app on their Android devices.
239262

240-
In addition to the deploying the DISA Purebred app with Intune, the device must have access to the on-premises network. To provide this access, consider using a VPN or corporate Wi-Fi.
263+
In addition to deploying the DISA Purebred app with Intune, the device must have access to the on-premises network. To provide this access, consider using a VPN or corporate Wi-Fi.
241264

242265
**Complete the following tasks**:
243266

@@ -311,13 +334,13 @@ For Windows, users don't work through a smartcard registration process to obtain
311334

312335
1. **Install the app from the Derived Credential providers on the Windows device**.
313336

314-
When you install the Windows app from a derived credential provider on a Windows device, the derived certificate is added to that devices Windows certificate store. After the certificate is added to the device, it becomes available for use a derived credential authentication method.
337+
When you install the Windows app from a derived credential provider on a Windows device, the derived certificate is added to that device's Windows certificate store. After the certificate is added to the device, it becomes available for use a derived credential authentication method.
315338

316339
After you get the app from your chosen provider, the app can be deployed to Users, or directly installed by the user of the device.
317340

318341
2. **Configure Wi-Fi and VPN profiles to use derived credentials as the authentication method**.
319342

320-
When configuring a Windows profile for Wi-Fi or VPN, select **Derived credential** for the *Authentication Method*. With this configuration, the profile uses the certificate that installs on the device when the providers app was installed.
343+
When configuring a Windows profile for Wi-Fi or VPN, select **Derived credential** for the *Authentication Method*. With this configuration, the profile uses the certificate that installs on the device when the provider's app was installed.
321344

322345
## Renew a derived credential
323346

@@ -329,7 +352,7 @@ After a device receives a new derived credential, policies that use derived cred
329352

330353
## Change the derived credential issuer
331354

332-
At the tenant level, you can change your credential issuer, although only one issuer is supported for a tenant at a time.
355+
At the tenant level, you can change your credential issuer, although only one issuer is supported by a tenant at a time.
333356

334357
After you change the issuer, users are prompted to get a new derived credential from the new issuer. They must do so before they can use a derived credential for authentication.
335358

0 commit comments

Comments
 (0)