iOS/iPadOS

Deploy certificates to iOS and iPadOS devices via SCEP in Intune using SCEPman.

The following article describes how to deploy a device and/or user certificates for iOS and iPadOS devices. The deployment of the SCEPman Root Certificate is mandatory. Afterward, you can choose between deploying only the device, user, or even both certificate types.

circle-exclamation

Root Certificate

The basis for deploying SCEP certificates is to trust the root certificate of SCEPman. Therefore, you have to download the CA Root certificate and deploy it as a Trusted certificate profile via Microsoft Intune:

circle-info

Note that you have to use the same group for assigning the Trusted certificate and SCEP profile. Otherwise, the Intune deployment might fail.

Device certificates

chevron-rightCertificate type: Devicehashtag

In this section we are setting up a device certificate.

chevron-rightSubject name format: CN={{DeviceId}} or CN={{AAD_Device_ID}}hashtag

SCEPman uses the CN field of the subject to identify the device and as a seed for the certificate serial number generation. Microsoft Entra ID (Azure AD) and Intune offer two different IDs:

  • {{DeviceId}}: This ID is generated and used by Intune (Recommended) (requires SCEPman 2.0 or higher and AppConfig:IntuneValidation:DeviceDirectory to be set to Intune or AADAndIntune)

  • {{AAD_Device_ID}}: This ID is generated and used by Microsoft Entra ID (Azure AD). (Note: When using Automated Device Enrollment via Apple Business Manager, this ID might change during device setup. If so, SCEPman might not be able to identify the device afterwards. The certificate would become invalid in that case.)

You can add other RDNs if needed (e.g.: CN={{DeviceId}}, O=Contoso, CN={{WiFiMacAddress}}). Supported variables are listed in the Microsoft docsarrow-up-right.

chevron-rightSubject alternative name: URI Value:IntuneDeviceId://{{DeviceId}}hashtag

The URI field is recommended by Microsoftarrow-up-right for NAC solutions to identify the devices based on their Intune Device ID.

Other SAN values like DNS can be added if needed.

chevron-rightCertificate validity period: 1 yearshashtag

Important: iOS/iPadOS devices ignore the configuration of the validity period via Intune. Please make sure, to configure AppConfig:ValidityPeriodDays to a fixed value. We recommend 2 years, so you have to set this variable in SCEPman configuration to 730 days. But you can leave the certificate validity period setting to 1 year because Intune ignores it anyway. Important: Also note, that certificates on iOS/iPadOS are only renewed by Intune when the device is unlocked, online, syncing and in scope of the renewal threshold. If certificates are expired (e.g.: device was offline and/or locked for a long time), they won't be renewed any more. Therefore, we recommend to choose an higher value here.

chevron-rightKey usage: Digital signature and key enciphermenthashtag

Please activate both cryptographic actions.

chevron-rightKey size (bits): 2048hashtag

SCEPman supports 2048 bits.

chevron-rightRoot Certificate: Profile from previous stephashtag

Please select the Intune profile from Root Certificate.

chevron-rightExtended key usage: Client Authentication, 1.3.6.1.5.5.7.3.2hashtag

Please choose Client Authentication (1.3.6.1.5.5.7.3.2) under Predefined values. The other fields will be filled out automatically.

Important: iOS/iPadOS devices do not support any Extended Key Usages (EKUs) other than Client Authentication . This means that any other EKUs configured in this profile will be ignored.

chevron-rightRenewal threshold (%): 50hashtag

This value defines when the device is allowed to renew its certificate (based on remaining lifetime of existing certificate). Please read the note under Certificate validity period and select a suitable value that allows the device the renew the certificate over a long period. A value of 50% would allow the device with a 1 years valid certificate to start renewal 182 days before expiration.

chevron-rightSCEP Server URLs: Open the SCEPman portal and copy the URL of Intune MDMhashtag

Example

circle-info

With our stated settings, we fulfill Apples certificate requirementsarrow-up-right.

Example

User Certificates

Please follow the instructions of Device certificates and take care of the following differences:

chevron-rightCertificate type: Userhashtag

In this section we are setting up a user certificate.

chevron-rightSubject name format: CN={{UserName}},E={{EmailAddress}}hashtag

You can define RDNs based on your needs. Supported variables are listed in the Microsoft docsarrow-up-right. We recommend to include the username (e.g.: janedoe) and email address (e.g.: [email protected]) as baseline setting.

chevron-rightSubject alternative name: UPN Value: {{UserPrincipalName}}hashtag

SCEPman uses the UPN in the SAN to identify the user and as a seed for the certificate serial number generation (e.g.: [email protected]). Other SAN values like Email address can be added if needed.

circle-info

With our stated settings, we fulfill Apples certificate requirementsarrow-up-right

Example

Last updated

Was this helpful?