Knowledge Base


Configuring Intune and Azure with Sectigo Certificate Manager (SCM)
1. Prerequisites
- Active Sectigo Certificate Manager (SCM) account
- Microsoft Azure subscription
- Microsoft Intune subscription
- Administrative access to Azure, Intune, and SCM
2. Register Application in Azure
2.1 Create Azure Application
- Sign in to the Azure portal (https://portal.azure.com)
- Navigate to Azure Active Directory > App registrations
- Click "New registration"
- Enter a name (e.g., "Sectigo Certificate Manager")
- Select "Accounts in this organizational directory only" under Supported account types
- Click "Register"
2.2 Configure API Permissions
Intune
- In the newly created app, go to "API permissions"
- Click "Add a permission"
- Select "Microsoft Intune API"
- Choose "Application permissions"
- Select "SCEP challenge validation"
- Click "Add permissions"
- Click "Grant admin consent for [Your Organization]"
- In the newly created app, go to "API permissions"
- Click "Add a permission"
- Select "Microsoft Graph API"
- Choose "Application permissions"
- Select "Application.Read.All"
- Click "Add permissions"
- Click "Grant admin consent for [Your Organization]"
2.3 Generate Client Secret
- Go to "Certificates & secrets"
- Click "New client secret"
- Enter a description and select an expiration period
- Click "Add"
- Copy and securely store the generated secret value
2.4 Note Important Information
Record the following information:
- Application (client) ID
- Directory (tenant) ID
- Client Secret
3. Configure Sectigo Certificate Manager (SCM)
3.1 Add Azure Account in SCM
- Log in to SCM admin console
- Navigate to Integrations > Azure Accounts
- Click "Add"
- Enter a name for the account
- Input the Application ID, Directory ID, and Client Secret from Azure
- Click "Test Connection" to verify
- Click "Save"
3.2 Request RA Certificate
- Create SCEP RA Certificate Profile.
- Support will provide you with a CSR to request an SCEP RA Certificate ( Client or Device)
- Using the CSR In SCM request SCEP RA Certificates using the profile that was created
- Please ensure certificate profile is delegated correctly
- Choose the certificate profile
- Enter a common name for the RA certificate, if necessary
- Click "Submit"
- Provide the certificate to Sectigo Support to be added at the back to encrypt SCEP protocol between SCM and Intune
3.3 Configure SCEP Endpoint
- Navigate to Enrollment > SCEP
- Click "Add"
- Select "Intune SCEP" as the endpoint type
- Enter a name for the endpoint
- Select the organization and department
- Choose the certificate profile and term
- Select the RA Certificate created earlier
- Choose the Azure Account created in step 3.1
- Enter a unique URI Extension
- Click "Save"
4. Configure Microsoft Intune
4.1 Create Trusted Certificate Profile
- Sign in to Microsoft Endpoint Manager (https://endpoint.microsoft.com)
- Go to Devices > Configuration profiles
- Click "Create profile"
- Select platform (e.g., Windows 10 and later)
- Choose "Templates" > "Trusted certificate"
- Click "Create"
- Enter a name and description
- Upload the root CA certificate provided by Sectigo
- Click "Next" and assign to appropriate groups
- Review and create the profile
4.2 Create SCEP Certificate Profile
- In Endpoint Manager, go to Devices > Configuration profiles
- Click "Create profile"
- Select platform (e.g., Windows 10 and later)
- Choose "Templates" > "SCEP certificate"
- Click "Create"
- Enter a name and description
- Certificate type: User or Device
- Subject name format: CN={{UserName}} or CN={{DeviceName}}
- Subject alternative name: User principal name (UPN)
- Certificate validity period: As per your policy
- Key usage: Digital signature and Key encipherment
- Key size: 2048
- Hash algorithm: SHA-2
- Root Certificate: Select the trusted certificate profile created earlier
- For SCEP Server URLs, enter the URL from SCM SCEP endpoint
- Format: http://[SCM_IP]/customer/[customer_id]/iscep/default/[org_code]/smime/pkiclient.exe
- Click "Next" and assign to appropriate groups
- Review and create the profile
5. Verify Configuration
- Enroll a test device in Intune
- Monitor the device in Intune for successful certificate deployment
- Check SCM for successful certificate issuance
Troubleshooting
If certificate enrollment fails, check the following:
- Azure application permissions are correctly set
- SCM Azure Account connection is successful
- SCEP endpoint URL is correctly entered in Intune
- RA Certificate in SCM is valid and not expired
- Review Intune device logs for specific error messages
- Consult Sectigo support if issues persist
Additional Resources
- Sectigo Certificate Manager Admin Guide: https://docs.sectigo.com/scm/scm-administrator/
- Microsoft Intune Documentation: https://docs.microsoft.com/en-us/mem/intune/
- Azure Active Directory Documentation: https://docs.microsoft.com/en-us/azure/active-directory/
Benötigen Sie Hilfe?
Benötigen Sie Hilfe beim Kauf? Kontaktieren Sie uns noch heute, um Ihr Zertifikat sofort zu erhalten.
Live chat
Klicken Sie auf die Schaltfläche unten oder auf „Chat mit einem Experten“, um jetzt mit uns zu chatten!