# Computers

Please follow this guide to distribute certificates to computers (macOS). Before deploying the first certificates via Jamf Pro, follow the [general steps for Jamf Pro](https://docs.scepman.com/certificate-management/jamf/general) first.

{% hint style="success" %}
We strongly recommend configuring all use-case relevant certificate payloads (trusted certificate / SCEP certificate) in a **single** Configuration Profile in Jamf Pro.
{% endhint %}

## SCEPman Root Certificate

As first step you need to deploy SCEPman root certificate. Download this CA certificate via SCEPman dashboard:

![](https://2535731700-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LoGejQeUQcw7lqnQ3WX%2Fuploads%2Fgit-blob-9170eb0435726398eb43f6fac8abd0d5f35e8cc4%2FSCEPmanHomePage.png?alt=media)

Add a new "macOS Configuration Profile" and choose "Certificate" as payload. Enter a meaningful name, upload the certificate (for"Select Certificate Option" select "Upload)" and activate "Allow all apps access":

![](https://2535731700-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LoGejQeUQcw7lqnQ3WX%2Fuploads%2Fgit-blob-d2c01a6e6f5f33ca37ed8f7998b569270fd4dde6%2Fimage%20\(29\).png?alt=media)

Distribute that profile to all clients that should get SCEP certificates later.

## Machine Certificate

Please add another "macOS Configuration Profile" and choose "SCEP" as payload. Activate "Use the External Certificate Authority settings to enable Jamf Pro as SCEP proxy for this configuration profile" and enter the following information:

| Field                      | Description                                     | Value/Example                                  |
| -------------------------- | ----------------------------------------------- | ---------------------------------------------- |
| Name                       | Name/purpose                                    | e.g. "Device Authentication"                   |
| Redistribute Profile       | Re-deploys profile for renewal                  | e.g. "14 days"                                 |
| Subject                    | Subject for certificate, additions are possible | CN=$JSSID,OU=computers,CN=$PROFILE\_IDENTIFIER |
| Allow export from keychain | Controls whether the private key is exportable  | No                                             |
| Allow all apps access      | Controls access to the SCEP certificate         | Yes                                            |

Please adjust other options to your needs.

<figure><img src="https://2535731700-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LoGejQeUQcw7lqnQ3WX%2Fuploads%2FDPXKt0yJZDkMC0HNqxML%2Fimage.png?alt=media&#x26;token=f046e588-36f9-4d70-ba48-d59b9f82c8d5" alt=""><figcaption></figcaption></figure>

## Output on the Client

Besides reporting on Jamf Pro, you can easily verify the distribution of SCEPman Root Certificate and Device Certificate via "Keychain Access" on the desired client (under "System"):

![SCEPman Root Certificate](https://2535731700-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LoGejQeUQcw7lqnQ3WX%2Fuploads%2Fgit-blob-b0e61c04f7257e9c5d07a6b51dcc9ae5f3596af3%2Fimage%20\(31\).png?alt=media)

![Device Certificate](https://2535731700-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LoGejQeUQcw7lqnQ3WX%2Fuploads%2Fgit-blob-14a9a4e0f884e9040e639c6a0d48e3e4042f7dee%2Fimage%20\(32\).png?alt=media)
