LogoLogo
LogoLogo
  • Welcome
  • Details
  • Editions
  • Use Cases
  • SCEPMAN Deployment
    • Getting Started
      • Standard Guide
      • Extended Guide
      • Scenarios
        • Certificate-based Network Authentication
        • Certificate-based Authentication for Entra ID
        • Certificate-based Authentication for RDP
    • Permissions
      • Azure App Registration
      • Managed Identities
    • Deployment Options
      • Marketplace deployment
      • Enterprise deployment
      • Terraform deployment
    • Root CA
    • Intermediate CA
  • Certificate Management
    • Revocation
    • Microsoft Intune
      • Windows
      • macOS
      • Android
      • iOS/iPadOS
      • Linux
    • Jamf Pro
      • General Configuration
      • Computers
      • Devices
      • Users
    • Other MDM Solutions
      • Google Workspace
        • ChromeOS
      • Kandji
      • Mosyle
      • SOTI MobiControl
    • Certificate Master
      • Manage Certificates
      • Certificate Signing Request (CSR)
      • TLS Server Certificate
      • TLS Inspection (Sub CA) Certificate
      • Code Signing Certificate
      • Device Certificate
      • User Certificate
    • Domain Controller Certificates
    • Enrollment REST API
      • Self Service Enrollment
        • Intune Managed Linux Client
        • Unmanaged Linux Client
      • API Enrollment
        • Linux Server
        • Windows Server
      • SCEPmanClient
  • Azure Configuration
    • Application Insights
    • App Service Sizing
      • Autoscaling
    • Custom Domain
    • Geo-Redundancy
    • Health Check
      • Using 3rd Party Monitoring
    • Log Management
    • Moving Resources
    • Private Endpoints
    • Split-Tenancy
  • Update Strategy
  • SCEPman Configuration
    • SCEPman Settings
      • Basics
      • Certificates
      • Certificate Master
      • CRL
      • Dependencies (Azure Services)
        • Azure KeyVault
        • Logging
        • Microsoft Entra ID (Azure AD)
        • National Cloud Platforms
      • Enrollment REST API
      • OCSP
      • SCEP Endpoints
        • DC Validation
        • Intune Validation
        • Jamf Validation
        • Static Validation
        • Static-AAD Validation
    • Certificate Master Settings
      • Basics
      • Microsoft Entra ID (Azure AD)
      • Logging
      • National Cloud Platforms
    • Application Artifacts
    • Certificate Master RBAC
    • Device Directories
    • Intune Strong Mapping
  • Other
    • Security & Privacy
    • Support
    • Licensing
      • Azure Marketplace
      • cleverbridge
    • FAQs
      • General
      • Certificate Connector
      • Renewing SCEPman Root CA
    • Troubleshooting
      • Common Problems
      • Certifried Security Vulnerability
      • Cisco ISE Host Header Limitation
      • Intune service discovery API permissions
      • Re-enrollment trigger
  • Uninstallation
  • Change Log
  • Links
  • SCEPman Website
Powered by GitBook
On this page
  • AppConfig:AuthConfig:ApplicationId
  • AppConfig:AuthConfig:SCEPmanAPIScope
  • AppConfig:AuthConfig:TenantId
  • AppConfig:AuthConfig:ManagedIdentityEnabledOnUnixTime

Was this helpful?

  1. SCEPman Configuration
  2. Certificate Master Settings

Microsoft Entra ID (Azure AD)

AppConfig:AuthConfig:ApplicationId

Linux: AppConfig__AuthConfig__ApplicationId

The Application (client) ID from your Microsoft Entra ID (Azure AD) App registration (SCEPman-CertMaster). This setting is configured during the setup.

Changes can harm your service!

AppConfig:AuthConfig:SCEPmanAPIScope

Linux: AppConfig__AuthConfig__SCEPmanAPIScope

This value comes from the Microsoft Entra ID (Azure AD) app registration. It is used to authenticate against SCEPman and authorize the CSR submissions.

Changes can harm your service!

AppConfig:AuthConfig:TenantId

Linux: AppConfig__AuthConfig__TenantId

The Tenant ID in Microsoft Entra ID (Azure AD). This setting is automatically configured during the setup.

Changes can harm your service!

AppConfig:AuthConfig:ManagedIdentityEnabledOnUnixTime

Linux: AppConfig__AuthConfig__ManagedIdentityEnabledOnUnixTime

Changes can harm your service!

Last updated 1 month ago

Was this helpful?

The time as Unix epoch when the required permissions to the Managed Identity were granted. SCEPman Certificate Master acquires a token using the Managed Identity only after a short delay (60 seconds in SCEPman 2.0) after this time, because only then do the roles in the token reflect the correct permissions added by the CMDlet. The tokens are cached , so if you added a permission after SCEPman Certificate Master has acquired a token, you need to wait up to 24 hours until Certificate Master can use this new permission.

for 24 hours with no way to force refresh the cache