Skip to content

Commit b224ebe

Browse files
authored
Merge pull request #7524 from Brenduns/kpi-improvements-may
Minor edits
2 parents ea4cee0 + 2509324 commit b224ebe

1 file changed

Lines changed: 6 additions & 6 deletions

File tree

memdocs/intune/protect/certificates-pfx-configure.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
---
2-
title: Use private and public key certificates in Microsoft Intune
2+
title: Use a PKCS certificate profile to provision devices with certificates in Microsoft Intune
33
description: Use Public Key Cryptography Standards (PKCS) certificates with Microsoft Intune, work with root certificates and certificate templates, and use device configuration profiles for a PKCS Certificate.
44
keywords:
55
author: brenduns
66
ms.author: brenduns
77
manager: dougeby
8-
ms.date: 02/28/2022
8+
ms.date: 05/03/2022
99
ms.topic: how-to
1010
ms.service: microsoft-intune
1111
ms.subservice: protect
@@ -28,7 +28,7 @@ ms.collection:
2828
---
2929
# Configure and use PKCS certificates with Intune
3030

31-
Microsoft Intune supports the use of private and public key pair (PKCS) certificates. To help you use PKCS certificates, this article reviews what's required, and can help you export a PKCS certificate, and then add the certificate to an Intune device configuration profile.
31+
Microsoft Intune supports the use of private and public key pair (PKCS) certificates. This article reviews what's required to use PKCS certificates with Intune, including the export of a PKCS certificate then adding it to an Intune device configuration profile.
3232

3333
Microsoft Intune includes built-in settings to use PKCS certificates for access and authentication to your organizations resources. Certificates authenticate and secure access to your corporate resources like a VPN or a WiFi network. You deploy these settings to devices using device configuration profiles in Intune.
3434

@@ -195,7 +195,7 @@ Before you begin, [review requirements for the connector](certificate-connectors
195195

196196
8. Select **Next**.
197197

198-
9. In **Assignments**, select the user or device group(s) that will be assigned the profile. For more granularity see [Create filters in Microsoft Intune](https://go.microsoft.com/fwlink/?linkid=2150376) and apply them by selecting *Edit filter*. Plan to deploy this certificate profile to the same groups that receive the PKCS certificate profile. For more information on assigning profiles, see [Assign user and device profiles](../configuration/device-profile-assign.md).
198+
9. In **Assignments**, select the user or device group(s) that will be assigned the profile. For more granularity, see [Create filters in Microsoft Intune](https://go.microsoft.com/fwlink/?linkid=2150376) and apply them by selecting *Edit filter*. Plan to deploy this certificate profile to the same groups that receive the PKCS certificate profile. For more information on assigning profiles, see [Assign user and device profiles](../configuration/device-profile-assign.md).
199199

200200
Select **Next**.
201201

@@ -243,7 +243,7 @@ Before you begin, [review requirements for the connector](certificate-connectors
243243
|Setting | Platform | Details |
244244
|------------|------------|------------|
245245
|**Renewal threshold (%)** |<ul><li>All |Recommended is 20% |
246-
|**Certificate validity period** |<ul><li>All |If you didn't change the certificate template, this option may be set to one year. <br><br> Use a validity period of five days or up to 24 months. When the validity period is less than five days, there is a high likelihood of the certificate entering a near-expiry or expired state, which can cause the MDM agent on devices to reject the certificate before it’s installed. |
246+
|**Certificate validity period** |<ul><li>All |If you didn't change the certificate template, this option may be set to one year. <br><br> Use a validity period of five days or up to 24 months. When the validity period is less than five days, there's a high likelihood of the certificate entering a near-expiry or expired state, which can cause the MDM agent on devices to reject the certificate before it’s installed. |
247247
|**Key storage provider (KSP)** |<ul><li>Windows 10/11 |For Windows, select where to store the keys on the device. |
248248
|**Certification authority** |<ul><li>All |Displays the internal fully qualified domain name (FQDN) of your Enterprise CA. |
249249
|**Certification authority name** |<ul><li>All |Lists the name of your Enterprise CA, such as "Contoso Certification Authority". |
@@ -319,7 +319,7 @@ Platforms:
319319

320320
That example includes a subject name format that uses the CN and E variables, and strings for Organizational Unit, Organization, Location, State, and Country values. [CertStrToName function](/windows/win32/api/wincrypt/nf-wincrypt-certstrtonamea) describes this function, and its supported strings.
321321

322-
User attributes are not supported for devices that don’t have user associations, such as devices that are enrolled as Android Enterprise dedicated. For example, a profile that uses *CN={{UserPrincipalName}}* in the subject or SAN won’t be able to get the user principal name when there is no user on the device.
322+
User attributes aren't supported for devices that don’t have user associations, such as devices that are enrolled as Android Enterprise dedicated. For example, a profile that uses *CN={{UserPrincipalName}}* in the subject or SAN can't get the user principal name when there isn't a user on the device.
323323

324324
- **Device certificate type**
325325
Format options for the Subject name format include the following variables:

0 commit comments

Comments
 (0)