# Change Log

{% hint style="success" %}
If you'd like to **stay up to date on the latest changes and news in the SCEPman changelog**, you can subscribe to our email update service. Subscribers will receive **email notifications** when there are new updates to the changelog.

[**Please click here to sign up for email notifications.**](https://feedback.scepman.com/)
{% endhint %}

## Versions

### 3.0 - December 2025

#### SCEPman 3.0.1639

* Hotfixes
  * Fix issue with strict checks for optional SCEP HTTP parameters.
  * Default configuration with correct backwards compatibility in the DC, Jamf, Static, and StaticAAD endpoints

#### SCEPman 3.0.1631

* [Enrollment to on-prem AD-joined Windows devices!](https://docs.scepman.com/certificate-management/active-directory) You can enroll user, device, and Domain Controller certificates to Windows clients using native methods, i.e. no software required on the clients. The primary use case is Autoenrollment, where you enroll certificates on the on-prem clients without user interaction.
* Caching of valid OCSP results for five seconds by default instead of no caching.
* Breaking change: The CA certificate URL in the AIA extension of issued certificates points changed to /ca, which is only available in SCEPman 2.9 and newer. In the exotic case where you run SCEPman 2.12 in parallel with SCEPman 2.8 or older in geo-redundancy, this may cause problems.
* Improved robustness responding to malformed OCSP requests
* Support for the [Log Ingestion API for logging](https://docs.scepman.com/azure-configuration/log-configuration) to Azure Monitor
* Small improvements and fixes
  * Restored compatibility with Google Workspace (a workaround for a bug in Google's PKCS#7 handling)
  * Improved caching for connectivities on the SCEPman splash page
  * Optimized the SCEPman splash page for smaller screen sizes
  * Fix for rejecting renewal Intune certificates via EST in specific circumstances
  * Library updates, which also fixes some CVE warnings (which are false positives, as SCEPman is not actually affected)

#### Certificate Master 3.0.1419

* Improved UI
  * Better sizing of certificates table
  * More effective use of space on small screens
  * More information about the logged-in user
  * Shorthand links to download the CA certificate (chain)
* Support for the [Log Ingestion API for logging](https://docs.scepman.com/azure-configuration/log-configuration) to Azure Monitor
* Allow requesting a specific lifetime of certificates, e.g. make a certificate valid for 365 days. Maximums and defaults can be configured per type of certificate.
* Small improvements and fixes
  * Library updates
  * Export filtered certificate lists as CSV
  * Bugfix: Dead link when requesting certificates with a restricted role
  * Bugfix: Email addresses field was missing for manually created S/MIME certificates

#### SCEPman PowerShell Module 3.0

* Breaking change: New and existing SCEPman installations will switch logging from the deprecated Data Collector API to Log Ingestion API. In the process, some columns will lose their "\_s" suffix, requiring a change to KQL queries.

#### SCEPmanClient PowerShell Module 3.0

* Allow shorter certificate validity during enrollment (for PowerShell Core only)
* Allow user-protected key creation during enrollment
* Small improvements and fixes
  * Add -Identity parameter for non-interactive service principal authentication
  * Improve authentication flow

### 2.11 - August 2025

#### SCEPman 2.11.1486

* Increased caching (\~4 minutes) of the health status on Intune's SCEP validation backend.

#### SCEPman 2.11.1476

* Active detection and mitigation of the [Intune SID Spoofing Vulnerability](https://docs.scepman.com/other/troubleshooting/sid-spoofing-vulnerability)
  * For certificates requested through Intune, Intune SID extensions in the CSR will now be ignored by default
  * The [AppConfig:AddSidExtension](https://docs.scepman.com/scepman-configuration/application-settings/certificates#appconfig-addsidextension) will now also add SIDs to device certificates
* Short caching (50 seconds) of status results on the SCEPman status page to reduce load on backends, e.g. transaction cost of Azure Key Vault in scenarios with many accesses of the home page (e.g. health probing)
* Caching of results from Microsoft Graph about devices and users to reduce the dependency on these services and increase OCSP response performance. By default, only negative responses are cached.
* Improved heuristic automatic repairs of defect OCSP requests, increasing robustness of the OCSP service
* Smaller improvements, e.g.
  * More specific log messages on some error conditions
  * Further adjustments to logging to avoid clutter and highlight important messages
  * Library updates

#### Certificate Master 2.11.1341

* Fix for issue when requesting wildcard server certificates.

#### Certificate Master 2.11.1329

* Fix for UI bug in actions of certificate table introduced with previous hotfix 2.11.1284.

#### Certificate Master 2.11.1284

* Value sanitation for uncommon certificate values.

#### Certificate Master 2.11.1235

* Submission of CSRs for TLS Inspection, Code Signing, Device, and User certificates (may require SCEPman 2.11)
  * [Fine-grained roles](https://docs.scepman.com/scepman-configuration/rbac/csr-and-form-roles) to determine not only which type of certificates a user may request, but also which method — Forms-based or CSR
* Improved UI
  * Renamed some headings for clarity
* More sanity checks for input data
  * Check that FQDNs requested for a server certificate actually have FQDN syntax
  * Warn about problems with issued certificates if the SCEPman CA certificate seemingly does not support the type
* Smaller improvements and fixed bugs, e.g.
  * Display the revocation button in the certificates table only when the user has permission (it has never worked without permission, but was still shown)
  * Library updates

#### SCEPman PowerShell Module 2.11

* Improved session handling
* Allow [creation of fine-grained roles](https://docs.scepman.com/scepman-configuration/rbac/csr-and-form-roles#adding-the-roles) for Certificate Master

#### SCEPmanClient PowerShell Module 2.11

* Improved PowerShell 5 compatibility
* Allow user protected key creation
* Enable saving requested certificates directly in a Key Vault
* Small improvements

### 2.10 - May 2025

#### SCEPman 2.10.1404

* Smaller Improvements, e.g.
  * Increased robustness when dependent services fail
  * Updates to the SCEPman splash page
  * Adjusted log levels of some log messages to avoid clutter and highlight important messages
  * Allow adding a CDP to issued certificates
  * Specify a specific version of a Key Vault certificate as CA certificate
* Library Updates, including
  * an update to Microsoft.Identity.Web 3.8.2, fixing [CVE-2025-32016](https://www.cve.org/CVERecord?id=CVE-2025-32016)

#### Certificate Master 2.10.997

* Overhaul of Certificate Request UI
* Submission of CSR for web servers (requires SCEPman 2.10)
  * Allowed for users with the Request.Server role in addition to those with Request.All and Admin.Full
  * Users can modify the SAN DNS entries in the enrollment form
* Improved performance when creating certificates via the forms method
* Smaller Improvements, e.g.
  * Fixed an issue where the "Forbidden" page was not displayed to unauthorized users
  * SAN entries of type IP
  * The User certificates form features adding email addresses as SAN entries
* Library Updates, including
  * an update to Microsoft.Identity.Web 3.8.2, fixing [CVE-2025-32016](https://www.cve.org/CVERecord?id=CVE-2025-32016)

#### SCEPman PowerShell Module 2.10

* Small Improvements

#### SCEPmanClient PowerShell Module 2.10 (New!)

* Initial release of this new PowerShell Module for requesting and renewing certificates on Windows, MacOS, and Linux

### 2.9 - December 2024

**SCEPman 2.9.1294**

* [Certificate self-service enrollment via EST/REST API](https://docs.scepman.com/certificate-management/api-certificates/self-service-enrollment)
* [ClientID/ClientSecret support in Jamf](https://docs.scepman.com/scepman-configuration/application-settings/scep-endpoints/jamf-validation#appconfig-jamfvalidation-clientid)
* [Authorized Responders for OCSP Requests](https://docs.scepman.com/scepman-configuration/application-settings/ocsp#appconfig-ocsp-authorizedrespondervalidityhours)
* Smaller improvements, e.g.
  * Configure default EKUs for the REST API, allowing you to enforce specific EKUs
  * Logging improvements to make the log more concise
  * Improved connectivity status evaluation on splash page
  * OCSP Response for the status of SCEPman's CA certificate (for compatibility with a Palo Alto setup)
* Library Updates, including
  * the update to Azure.Identity 1.12, fixing [CVE-2024-35255](https://www.cve.org/CVERecord?id=CVE-2024-35255),
  * the update to Bouncy Castle .NET 2.4, fixing [CVE-2024-29857](https://github.com/bcgit/bc-csharp/wiki/CVE%E2%80%902024%E2%80%9029857).

**Certificate Master 2.9.858**

* Smaller improvements
* Library Updates, including
  * the update of Azure.Identity to 1.12, fixing [CVE-2024-35255](https://www.cve.org/CVERecord?id=CVE-2024-35255),
  * the update to Bouncy Castle .NET 2.4, fixing [CVE-2024-29857](https://github.com/bcgit/bc-csharp/wiki/CVE%E2%80%902024%E2%80%9029857).

**SCEPman PowerShell Module 2.9**

Starting with this version, the SCEPman PowerShell Module with have the same major and minor version number as the corresponding SCEPman release.

* New CMDlet `Update-CertificateViaEST` for[ renewing certificates over EST](https://docs.scepman.com/certificate-deployment/api-certificates/use-cases/windows-server) on Windows

### 2.8 - May 2024

**SCEPman 2.8.1225**

* Fix for CRL generation if SCEPman is a Subordinate Certification Authority.

**SCEPman 2.8.1155**

* SCEPman uses a newer URL and data format for the Jamf Bearer authentication, which is required when using Jamf \~11.5.0 and newer, which has disabled the older URL alongside Basic Authentication

**SCEPman 2.8.1135**

* Improvements to OCSP response times
* Logging improvements
  * Tweaking of log levels to better emphasize important information
  * Additional information about certificate revocations
  * Less log clutter
  * A transaction ID in the logs allows to correlate log entries that belong to the same SCEP or OCSP request
* Configure default Extended Key Usages (EKUs) and Key Usages for each SCEP endpoint, e.g. if [you want to enroll smart-card authentication certificates through Jamf](https://docs.scepman.com/scepman-configuration/application-settings/scep-endpoints/jamf-validation#appconfig-jamfvalidation-defaultekus)
* Update to .NET 8
* Library updates
  * Including the update of Azure.Identity to 1.11, fixing [CVE-2024-29992](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29992). Currently, the exploit is not publicly disclosed, so the scope of the issue is unclear, but the published information indicates that SCEPman is likely not affected.
* Small improvements, including:
  * Use a Managed Identity when logging to Azure Event Hub

**Certificate Master 2.8.773**

* Live Revocation Check telling whether a certificate is currently valid and explaining the reason if it isn't
* Update to .NET 8
* Library updates
  * Including the update of Azure.Identity to 1.11, fixing [CVE-2024-29992](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29992). Currently, the exploit is not publicly disclosed, so the scope of the issue is unclear, but the published information indicates that SCEPman is likely not affected.
* Small fixes and improvements including:
  * Fixed a bug where the certificates were not displayed when there was a certificate in the list without CN field.
  * Fixed a bug where a user with only the MANAGE\_INTUNE or MANAGE\_INTUNE\_READ role couldn't see revoked certificates enrolled over Intune.

### 2.7 - February 2024

#### SCEPman 2.7.1068

* Fixed an issue where device certificates were bound to their Intune objects where they should have been bound to their Entra ID objects.

#### SCEPman 2.7.1052

* Fixed an issue with generating the Root CA in new installations of SCEPman.

#### SCEPman 2.7.1049

* Support storing certificates enrolled via Intune in the Storage Account for easier searching.
* SCEPman's EST endpoint allows certificate renewal using mTLS ("simplereenroll"). This is useful for unmanaged devices like web servers and Linux clients.
* Device certificates enrolled via Intune can now contain any Subject, as long as they have a URI in the Subject Alternative Name in the format `IntuneDeviceId://{{DeviceId}}`.
* SCEPman can use a User-Assigned Managed Identity instead of a System-Assigned Managed Identity. This is useful for large geo-redundant deployments, where you do not want to configure the System-assigned Managed Identity on all instances.
* Fixes and small improvements, including:
  * Automatic analysis of OCSP responses with performance issues

#### Certificate Master 2.7.705

* Fixed a case of a broken view of manually revoked certificates enrolled via Intune.

#### Certificate Master 2.7.702

* Show certificates enrolled via Intune from the Storage Account.
* When downloading certificates in PFX format, you can select whether to use a modern cryptographic algorithm required for example by OpenSSL 2.x or a legacy algorithm required by MacOS and Windows Server 2016.
* Small improvements, including:
  * Improved performance for large numbers of certificates in the database
  * Logging to Azure Event Hub like SCEPman
  * Document Signing Certificates
  * Adjustable PFX password length with a default of 24 instead of 32 characters for increased compatibility

### 2.6 - November 2023

#### SCEPman 2.6.945

* Logging to [Azure Event Hub](https://docs.scepman.com/scepman-configuration/application-settings/dependencies-azure-services/logging#appconfig-loggingconfig-azureeventhubconnectionstring)
* Library Updates, including the update to Azure.Identity 1.10.3, fixing [CVE-2023-36414](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36414). Currently, the exploit is not publicly disclosed, so the scope of the issue is unclear, but the published information indicates that SCEPman is likely not affected.
* Robustness for various special cases

#### Certificate Master 2.6.586

* Select Extended Key Usages for each certificate
* Library Updates, including the update to Azure.Identity 1.10.3, fixing [CVE-2023-36414](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36414). Currently, the exploit is not publicly disclosed, so the scope of the issue is unclear, but the published information indicates that Certificate Master is likely not affected.
* Small UI improvements

### 2.5 - July 2023

#### SCEPman 2.5.895

* Bugfix: OCSP Responses encoded GeneralizedTime with fraction of seconds, which is not compliant to RFC 5280, Section 4.1.2.5.2 and caused some clients to reject the OCSP response (we know about Checkpoint).

#### SCEPman 2.5.892

* Define an [enrollment grace period](https://docs.scepman.com/scepman-configuration/application-settings/scep-endpoints/intune-validation#appconfig-intunevalidation-compliancegraceperiodminutes), during which devices are allowed to be incompliant.
* SCEPman can [add extension 1.3.6.1.4.1.311.25.2 with the users' Security Identifiers (SIDs)](https://docs.scepman.com/scepman-configuration/application-settings/certificates#appconfig-addsidextension) to certificates, mitigating [Certifried attacks](https://docs.scepman.com/other/troubleshooting/certifried)
* [Performance improved by around factor 4](https://docs.scepman.com/azure-configuration/azure-sizing)
* Library Updates
* Bugfixes and small improvements, including:
  * streamlined GCC High installation experience
  * UI improvements
  * Robustness for some special cases

#### Certificate Master 2.5.542

* Improvement/fix for displaying Intune certificates

#### Certificate Master 2.5.516

* Download certificates + private keys in PEM format
* Revocation audit trail
* [RBAC roles](https://docs.scepman.com/scepman-configuration/rbac)
* Library Updates
* Minor bugfixes and improvements, including
  * UI search button bugfix
  * Prevent double submissions of CSRs
  * Algorithms with improved compatibility (e.g. AES and SHA-256 for PKCS#12 CertBags)

### 2.4 - April 2023

#### SCEPman 2.4.772

* [Improved CDP endpoint containing manually revoked certificates](https://docs.scepman.com/scepman-configuration/application-settings/crl#appconfig-crl-source)
* [Log to Azure Monitor](https://docs.scepman.com/scepman-configuration/application-settings/dependencies-azure-services/logging)
* Library and Framework updates, including .NET 7
* Bugfixes and improvements

#### Certificate Master 2.4.445

* Form to request Code Signing certificates
* Form to request Sub CA certificates, e.g. for Firewalls that inspect TLS traffic
* Form to manually request user certificates for Client Authentication, e.g. on websites
* UI optimizations
* Library and Framework updates, including .NET 7
* Minor bugfixes and improvements, including:
  * In some cases, revoked Intune certificates were still display in the list of Intune certificates
  * Hide Intune certificates that are not issued by SCEPman
  * Certificates for Jamf devices could show up as "Unknown" in the list of Jamf certificates

### 2.3 - January 2023

#### SCEPman 2.3.723

* [CSR submission REST API](https://docs.scepman.com/certificate-management/api-certificates)
* Store certificates issued via [Jamf](https://docs.scepman.com/scepman-configuration/application-settings/scep-endpoints/jamf-validation#appconfig-jamfvalidation-enablecertificatestorage), [Static](https://docs.scepman.com/scepman-configuration/application-settings/scep-endpoints/static-validation#appconfig-staticvalidation-enablecertificatestorage), [Static-AAD](https://docs.scepman.com/scepman-configuration/application-settings/scep-endpoints/staticaad-validation#appconfig-staticaadvalidation-enablecertificatestorage), and [DC](https://docs.scepman.com/scepman-configuration/application-settings/scep-endpoints/dc-validation#appconfig-dcvalidation-enablecertificatestorage) endpoints in Storage Account (and allow manual revocation in Certificate Master)
* Partial support of ECC CAs
* Better error messages on some faults
* Improvements to compliance checks
  * An additional extension better suppresses usage of ephemeral certificates on Windows
  * An additional SCEP endpoint for Apple devices prevents issuance of ephemeral certificates
* [Fake CDP endpoint](https://docs.scepman.com/scepman-configuration/application-settings/crl) for cases where a CRL is technically required (the CRL contains no entries yet, though)
* Minor bugfixes/improvements

#### Certificate Master 2.3.327

* [New UI with customizable filters to find view different kinds of certificates](https://docs.scepman.com/certificate-management/manage-certificates#search-for-certificates-in-the-certificate-database)
* Better compatibility with Microsoft's API changes to list certificate issued via Intune
* Minor improvements

### 2.2 - October 2022

* Improved installation experience

#### SCEPman 2.2.631

* [Revoke Intune certificates on some MEM events](https://docs.scepman.com/scepman-configuration/application-settings/scep-endpoints/intune-validation#appconfig-intunevalidation-devicedirectory)
* [Intune-enrolled user certificates become invalid when user risk exceeds a configured threshold](https://docs.scepman.com/scepman-configuration/application-settings/scep-endpoints/intune-validation#appconfig-intunevalidation-userriskcheck) (requires an additional permission for which you must [re-run the SCEPman configuration script](https://docs.scepman.com/scepman-deployment/permissions/post-installation-config#running-the-scepman-installation-cmdlet))
* [Additional static SCEP endpoint with AAD-bound certificates](https://docs.scepman.com/scepman-configuration/application-settings/scep-endpoints/staticaad-validation)
* Library updates

#### SCEPman Certificate Master 2.2.282

* UI improvements
* Additional certificate file formats for Certificate Master
* Certificate Master lists issued client certificates for manual revocation (requires an additional permission for which you must [re-run the SCEPman configuration script](https://docs.scepman.com/scepman-deployment/permissions/post-installation-config#running-the-scepman-installation-cmdlet))
* Library updates

### 2.1.522 - May 2022

* [Request Client Certificates manually through Certificate Master](https://docs.scepman.com/certificate-management/certificate-master/client-certificate-pkcs-12)
* Library and Framework updates
  * Improved Performance with .NET 6
  * Other library updates
* Robustness
* Bearer Authentication for Jamf Classic API
* [Invalidate certificates for Intune devices with pending wipes or otherwise unhealthy management states](https://docs.scepman.com/scepman-configuration/application-settings/scep-endpoints/intune-validation#appconfig-intunevalidation-revokecertificatesonwipe)
* Minor Improvements

### 2.0.473 - March 2022

* [Certificate Management](https://docs.scepman.com/certificate-management/certificate-master)
  * Manually issue TLS Server certificates
  * Revoke manually issued certificates
  * Search for manual certificates
* Library and Framework updates
  * Improved Performance with .NET 5
  * Azure Key Vault
  * Other library updates
* [Easier deployment, no manual app registraton required anymore](https://docs.scepman.com/scepman-deployment/permissions/post-installation-config)
* [Select whether to use AAD or Intune directory for device validity checks](https://docs.scepman.com/scepman-configuration/application-settings/scep-endpoints/intune-validation#appconfig-intunevalidation-devicedirectory)
* New UI
  * So beautiful and with a new logo
  * Detailed information on activated SCEP endpoints
* [Compatibility with GCC High, GCC DoD, and 21Vianet environments](https://docs.scepman.com/scepman-configuration/application-settings/dependencies-azure-services/national-cloud-platforms)
* Various minor improvements

### 1.9.207 - July 2021

* [JAMF User Certificates](https://docs.scepman.com/certificate-management/jamf/users)
* Update to the [Compliance Check Preview](https://docs.scepman.com/scepman-configuration/application-settings/scep-endpoints/intune-validation#appconfig-intunevalidation-compliancecheck)
  * Also working for Windows devices during enrollment
* Improved [RADIUS-as-a-Service](https://www.radius-as-a-service.com) compatibility
* Minor advancements
  * Improved error messages
  * Improved Compatibility with ISE with [a new default setting](https://docs.scepman.com/scepman-configuration/application-settings/dependencies-azure-services/azure-keyvault#appconfig-keyvaultconfig-rootcertificateconfig-addextendedkeyusage)

### 1.8.155 - June 2021

* Improved robustness in exceptional situations
  * Correct answers to invalid OCSP requests, which may occur rarely for certificates issued by SCEPman 1.5 or earlier
  * [Certificate issuance scheduling in overload situations](https://docs.scepman.com/scepman-configuration/application-settings/certificates#appconfig-concurrentsceprequestlimit)
  * Option to configure a "Clock Skew" for clients with clocks running slow (> 10 minutes), which [happens in few tenants for Intune-managed Windows devices](https://docs.scepman.com/other/troubleshooting/general#windows-10-devices-cannot-enroll-with-autopilot)
* Logging
  * Less log clutter on Info level
* Performance
  * Caching some repeated requests to Graph API

#### 1.7.140 - June 2021

* Solution for [Microsoft's additional permission requirements preventing SCEPman from issuing certificates via Intune](https://glueckkanja.zendesk.com/hc/en-us/articles/4402360224530-SCEPman-does-not-issue-certificates)

#### 1.7.122 - June 2021

* Bugfix regarding OCSP checks for certificates issued via JAMF

### 1.7.101 - May 2021

* Support for [Computer and Device Certificates via JAMF](https://docs.scepman.com/certificate-management/jamf/general)
* Separate Certificate Lifetimes for each endpoint, e.g. for [Domain Controller Certificates](https://docs.scepman.com/scepman-configuration/application-settings/scep-endpoints/dc-validation#appconfig-dcvalidation-validityperioddays)
* [Secure application configuration in Key Vault](https://docs.scepman.com/scepman-configuration/application-settings#secure-configuration-in-azure-key-vault)
* Moved the release path to <https://github.com/scepman/install>. Please update your setting WEBSITE\_RUN\_FROM\_PACKAGE as described in Section [Application Artifacts](https://docs.scepman.com/scepman-configuration/application-artifacts).
* Preview of [Compliance Checks](https://docs.scepman.com/scepman-configuration/application-settings/scep-endpoints/intune-validation#appconfig-intunevalidation-compliancecheck)
* Minor advancements
  * Workaround a bug on some Android versions to gain correct validity periods
  * SCEPman CA certificates receive an Extended Key Usage to improve compatibility with some versions of Cisco ISE
  * Further improvements to error messages
  * Updated some dependencies
  * Improved Homepage

### 1.6.465 - January 2021

* Bugfix where some OCSP requests were unanswered
* Bugfix impacting local logging

### 1.6.455 - November 2020

* Support for certificates for [Domain Controllers](https://docs.scepman.com/certificate-management/domain-controller-certificates), especially for use in Windows Hello for Business (Enterprise Edition only)
* Generic support for [Other MDM systems via endpoint static](https://docs.scepman.com/certificate-management/static-certificates)
* Improved error logging
* Bug fixing

### 1.5 - July 2020

* Key Usage, Extended Key Usage, and validity period configured in the request (i.e. in Intune)
* Improved performance when answering certificate and OCSP requests

### 1.4 - Mai 2020

* Performance enhancements
* Bug fixing

### 1.3 - October 2019

* Support for Authentication-Only user certificates (VPN, Wifi, network) in addition to device certificates.
* Support for Intune blade certificate list

### 1.2 - 2019

* Changed Log component

### 1.1 - 2019

* Support for SAN Attributes
* Sanity Checks
* First release of Community Edition

### 1.0 - 2019

* Initial release
