LogoLogo
LogoLogo
  • Welcome
  • Details
  • Editions
  • Use Cases
  • SCEPMAN Deployment
    • Getting Started
      • Standard Guide
      • Extended Guide
      • Scenarios
        • Certificate-based Authentication for Entra ID
        • Certificate-based Authentication for RDP
    • Permissions
      • Azure App Registration
      • Managed Identities
    • Deployment Options
      • Marketplace deployment
      • Enterprise deployment
      • Terraform deployment
    • Root CA
    • Intermediate CA
  • Certificate Management
    • Revocation
    • Microsoft Intune
      • Windows
      • macOS
      • Android
      • iOS/iPadOS
      • Linux
    • Jamf Pro
      • General Configuration
      • Computers
      • Devices
      • Users
    • Other MDM Solutions
      • Google Workspace
        • ChromeOS
      • Kandji
      • Mosyle
      • SOTI MobiControl
    • Certificate Master
      • Manage Certificates
      • Certificate Signing Request (CSR)
      • TLS Server Certificate
      • TLS Inspection (Sub CA) Certificate
      • Code Signing Certificate
      • Device Certificate
      • User Certificate
    • Domain Controller Certificates
    • Enrollment REST API
      • Self Service Enrollment
        • Intune Managed Linux Client
        • Unmanaged Linux Client
      • API Enrollment
        • Linux Server
        • Windows Server
      • SCEPmanClient
  • Azure Configuration
    • Application Insights
    • App Service Sizing
      • Autoscaling
    • Custom Domain
    • Geo-Redundancy
    • Health Check
      • Using 3rd Party Monitoring
    • Log Management
    • Moving Resources
    • Private Endpoints
    • Split-Tenancy
  • Update Strategy
  • SCEPman Configuration
    • SCEPman Settings
      • Basics
      • Certificates
      • Certificate Master
      • CRL
      • Dependencies (Azure Services)
        • Azure KeyVault
        • Logging
        • Microsoft Entra ID (Azure AD)
        • National Cloud Platforms
      • Enrollment REST API
      • OCSP
      • SCEP Endpoints
        • DC Validation
        • Intune Validation
        • Jamf Validation
        • Static Validation
        • Static-AAD Validation
    • Certificate Master Settings
      • Basics
      • Microsoft Entra ID (Azure AD)
      • Logging
      • National Cloud Platforms
    • Application Artifacts
    • Certificate Master RBAC
    • Device Directories
    • Intune Strong Mapping
  • Other
    • Security & Privacy
    • Support
    • Licensing
      • Azure Marketplace
      • cleverbridge
    • FAQs
      • General
      • Certificate Connector
      • Network Access Controllers
      • Renewing SCEPman Root CA
    • Troubleshooting
      • Common Problems
      • Certifried Security Vulnerability
      • Cisco ISE Host Header Limitation
      • Intune service discovery API permissions
      • Re-enrollment trigger
  • Uninstallation
  • Change Log
  • Links
  • SCEPman Website
Powered by GitBook
On this page
  • Enable SCEPman CRL
  • Setup Entra ID
  • Usage
  • Manually adding certificate mapping for high affinity binding

Was this helpful?

  1. SCEPMAN Deployment
  2. Getting Started
  3. Scenarios

Certificate-based Authentication for Entra ID

Last updated 1 day ago

Was this helpful?

Certificate-based authentication offers a strong security alternative for accessing Entra ID resources. This article provides a walkthrough of how to configure this method, utilizing SCEPman as the Certificate Authority to streamline certificate management.

Enable SCEPman CRL

Entra ID will require a CRL to validate the certificates. Make sure to set the following environment variables in your app service for the CRL to be available:

Set this to a custom string that will be used in the URL to allow the CRL to be downloaded.

This is the source that SCEPman builds the CRL from. Make sure that this is set to Storage

Setup Entra ID

1

Create PKI in Entra Security Center

In Entra ID, navigate to Protection > Security Center > , click on Create PKI and select a matching display name.

2

Add Certificate Authority

Navigate to the newly created PKI and click on Add certificate authority to upload the CA certificate of your SCEPman instance. This certificate can be obtained from its homepage in the menu on the right side (Get CA Certificate).

For the Certificate revocation list URL you can enter the URL in the following format:

https://scepman.contoso.com/crl/pem/{YourCrlRequestToken}

Make sure to include the /pem/ path in your URL as Entra might have compatibility issues when using the default DER format.

This should now leave you with a certificate authority similar to the following:

3

Enable CBA in Authentication Methods

With the CA in place, we can go on and enable certificate based authentication in Protection > Authentication methods >

Go to the Certificate-based authentication policy, enable it and allow either all users or specific groups to use this method:

4

Configure Certificate-based Authentication

Switch to the Configure tab and go through the options:

Require CRL validation: ✅

This is an essential part of the security this method provides as the CRL will tell Entra ID which certificates have been revoked and shall therefore not be allowed for authentication.

Issuer Hints : ✅

Enabling the issuer hints will only show certificates during authentication, that are issued by the configured CA.

Leave the default settings for authentication binding and go on to create a rule to allow the earlier created certificate authority:

Authentication strength:

This defines the weight of the authentication using this CA. If you select Single-factor authentication, another authentication method can be necessary depending on the application to be accessed.

Affinity binding:

The affinity binding defines the required details in the certificate, that needs to match correlating data in the user object, for the authentication to be allowed. As SCEPman can currently not add any certificate information in user object we recommend to set this to Low unless you configure the required information manually.

The authentication strength and affinity binding settings highly depend on the specific use case and the kind of accounts you want to protect with this authentication method. In case you want to secure highly privileged users you should think of manually adding the certificate information in their user accounts for a high affinity.

Usage

With the configuration being in place, a user can select Use a certificate or smart card:

Which will in turn ask for the certificate to be used for authentication.

Manually adding certificate mapping for high affinity binding

In case you want to enable CBA only using high affinity binding you can manually enter the certificates details in the authorized information of the user.

Navigate to the users properties in Entra ID, edit them and now edit the Certificate user IDs:

Example for the SHA1PublicKey binding:

X509:<SHA1-PUKEY>9600e49d740011187e5c734bab4a3d5d18d2a87a

This is using the certificates thumbprint to strongly map the identity of the user.

The required format of these IDs depends on the fields that have been configured in the authentication methods user binding. A list of formats can be found in the corresponding .

Microsoft documentation
AppConfig:CRL:RequestToken
AppConfig:CRL:Source
Public Key Infrastructure
Policies