Self Service Enrollment
For clients to enroll certificates for themselves without SCEP, they can use the SCEPman REST API. However, they should not be able to enroll any arbitrary certificate, only certificates that are tied to their own identity. Therefore, the SCEPman API has a role that can be assigned to users/groups to enable this.
Prerequisites
This role is included from SCEPman 2.9 onwards. If you installed SCEPman prior to this, you need to run the installation script again for this role to appear.
Assigning Self Service Permissions
You can check that the Self Service role exists in the SCEPman-api App Registration:

You can create role assignments for users and groups in the SCEPman-api Enterprise Application.

Certificate Enrollment Requests
A user with the self-service role can only enroll certificates with the following attributes. (These are the same as the attributes you would select when enrolling certificates via a SCEP profile in Intune for instance). The certificate's validity will be tied to the device object in Intune or Entra Id or to the user object in Entra Id, analogously to Intune-enrolled certificates.
Device Certificates
Either the Subject Alternative Name (SAN) must include IntuneDeviceID://<IntuneDeviceId>
as an URI, where <IntuneDeviceId>
without the curly braces is the Device Id of the device in Intune. Or the CN field of the Subject must be the Entra ID device ID or the Intune Device Id.
Subject
CN=<AAD_Device_Id>
or CN=<DeviceId>
, where the device is one owned by the user.
SAN (URI)
IntuneDeviceId://<IntuneDeviceId>
Basic Constraints
Subject Type=End Entity
EKUs
Client Authentication, 1.3.6.1.5.5.7.3.2
User Certificates
Subject
CN=<DisplayName>
SAN (Other Name/UPN)
<UserPrincipalName>
Basic Constraints
Subject Type=End Entity
EKUs
Client Authentication, 1.3.6.1.5.5.7.3.2
Last updated
Was this helpful?