Android
Last updated
Last updated
The following article describes how to deploy a device or a user certificate for Android. Android certificate deployment is similar to Windows 10, macOS, and iOS certificate deployments.
Android provides two distinct solution sets: one is the work profile (known as Personally-Owned Work Profile) and the other is the fully managed device (known also as Fully Managed, Dedicated, and Corporate-Owned Work Profile). In both scenarios, the settings for certificate configuration profiles remain consistent.
Android device administrator management was released in Android 2.2 as a way to manage Android devices. Then beginning with Android 5, the more modern management framework of Android Enterprise was released (for devices that can reliably connect to Google Mobile Services). Google is encouraging movement from device administrator management by decreasing its management support in new Android releases. For more information please check MS. Intune Decreasing support for Android device admin
The basis for deploying SCEP certificates (device or user) is to trust the root certificate of SCEPman. Therefore, you have to download the CA Root certificate and deploy it as a Trusted certificate profile via Microsoft Intune:
Note, that you have to use the same group for assigning the Trusted certificate and SCEP profile. Otherwise, the Intune deployment might fail.
Please follow the instructions of #Device certificates and take care of the following differences:
It is required to have a Subject alternative name in the SCEP Certificate, User Type. Without a SAN, you have no access to your company's Wi-Fi.
To ensure the correct deployment of certificates on your Android device, there are two options:
In newer Android versions (e.g. 14), you can verify certificates (user and trusted certs.) from the settings > security and privacy
Via 3rd party apps like My Certificates or X509 Certificate Viewer Tool