Self Service Enrollment
Last updated
Last updated
Applicable to SCEPman version 2.9 and above
For clients to enroll certificates for themselves without SCEP, they can use the SCEPman REST API. However, they should not be able to enroll any arbitrary certificate, only certificates that are tied to their own identity. Therefore, the SCEPman API has a role that can be assigned to users/groups to enable this.
This role is included from SCEPman 2.9 onwards. If you installed SCEPman prior to this, you need to run the installation script again for this role to appear.
You can check that the Self Service role exists in the SCEPman-api App Registration:
You can create role assignments for users and groups in the SCEPman-api Enterprise Application.
A user with the self-service role can only enroll certificates with the following attributes. (These are the same as the attributes you would select when enrolling certificates via a SCEP profile in Intune for instance). The certificate's validity will be tied to the device object in Intune or Entra Id or to the user object in Entra Id, analogously to Intune-enrolled certificates.
Either the Subject Alternative Name (SAN) must include IntuneDeviceID://<IntuneDeviceId>
as an URI, where <IntuneDeviceId>
without the curly braces is the Device Id of the device in Intune. Or the CN field of the Subject must be the Entra ID device ID or the Intune Device Id.
On Linux, follow the instructions of the Linux Enrollment Guide.
For other plattforms, follow our general instructions for using the Enrollment REST API.
Field | Value |
---|---|
Field | Value |
---|---|
Subject
CN=<AAD_Device_Id>
or CN=<DeviceId>
, where the device is one owned by the user.
SAN (URI)
IntuneDeviceId://<IntuneDeviceId>
Basic Constraints
Subject Type=End Entity
EKUs
Client Authentication, 1.3.6.1.5.5.7.3.2
Subject
CN=<DisplayName>
SAN (Other Name/UPN)
<UserPrincipalName>
Basic Constraints
Subject Type=End Entity
EKUs
Client Authentication, 1.3.6.1.5.5.7.3.2