Use this guide to configure Outbound Simple Certificate Enrollment Protocol (SCEP) settings in a SecureAuth IdP realm.
The Network Device Enrollment Service (NDES) allows software on network and other devices that run without domain credentials to obtain certificates based on SCEP.
SecureAuth IdP supports both Outbound and Inbound from MobileIron SCEP calls.
Outbound SCEP Calls are made when an on-premises Certificate Authority (CA) is being utilized to issue certificates rather than the SecureAuth IdP Cloud Services. A user requests a certificate from SecureAuth IdP to access an application or VPN, and SecureAuth IdP then calls to the on-premises CA via SCEP to receive the certificate to provide access.
Refer to the Inbound SCEP from MobileIron VSP configuration guide for Inbound SCEP Calls from MobileIron configuration steps.
Ensure the following items have been addressed before proceeding to the configuration steps:
- Issuing CA running on Windows 2008 Enterprise edition or later.
- Pre-installed and functional SCEP / NDES service.
- CA's root and intermediates certificate distribution point available to all clients (internal and / or external) to enable access to the AIA and CDP files (CRT and CRL files).
- SCEP / NDES Listener URL set up for SecureAuth IdP configuration.
- Access to the SecureAuth IdP Web Admin and all realms requiring Outbound SCEP configuration.
Issuing Certificate Authority configuration steps
1. Enable Auto Enrollment by opening the Certificate Authority from the Start menu.
2. Right-click the Issuing Certificate Name and click Properties.
3. In the new window, click the Policy Module tab, and then click Properties.
4. Select Follow the settings in the certificate template... and click OK.
The SCEP / NDES server uses a single certificate template to issue all end-user certificates. To select which certificate template to use, complete the following the steps.
5. Open the Registry Editor on the CA and go to HKEY_LOCAL_MACHINE\Software\Microsoft\Cryptography\MS CEP.
6. Change the values of the following registry keys to a common Template Name, e.g. SecureAuth.
The Template Name appears under the Data field, as shown in the image, and is the name without spaces.
The Template Display Name which is also present should not be used.
7. Start a Command Prompt with Admin privileges on the SCEP server (Start, Cmd, right-click: Run as Admin).
8. Type iisreset and press Enter to restart the IIS server.
Certificate template configuration
An example of the appropriate settings in a Windows 2008 Enterprise Certificate is shown below.
NOTE: The SCEP / NDES server can only use a single certificate template before the type of certificate delivered to the end-user is limited to the settings defined in the template.
This includes key length and algorithm used, certificate validity period, Application Policy, etc.
The certificate key length must be the same in both the SCEP and SecureAuth IdP server configurations (1024 or 2048). A mismatch on either side will cause issues in delivering the certificate properly.
SCEP / NDES Server configuration steps
1. Disable SCEP Enforce Password by updating the following registry key / value pair in the SCEP / NDES server:
Set to: "EnforcePassword"= dword: 00000000
SecureAuth IdP configuration steps
This configuration is required for each SecureAuth IdP realm that uses Outbound SCEP calls.
1. In the SCEP Configuration section, select True from the Use SCEP dropdown.
2. Leave the SCEP Web Service URL as the default unless the web service is being hosted in a different location.
3. Set the SCEP / NDES URL as the SCEP / NDES Listener URL.
4. Click Save after the configuration is complete and before leaving the System Info page to avoid losing changes.
1. Go through the SecureAuth IdP workflow to obtain a certificate.
2. Open the Certificate Store to inspect the certificate.
3. Verify the Issued By value states the name of the on-premises CA.