Documentation

Table of Contents 


Other Resources


 

 

Introduction

Use this guide to configure Outbound Simple Certificate Enrollment Protocol (SCEP) settings in a SecureAuth IdP realm.

The Network Device Enrollment Service (NDES) allows software on network and other devices that run without domain credentials to obtain certificates based on SCEP.

SecureAuth IdP supports both Outbound and Inbound from MobileIron SCEP calls.

Outbound SCEP Calls are made when an on-premises Certificate Authority (CA) is being utilized to issue certificates rather than the SecureAuth IdP Cloud Services. A user requests a certificate from SecureAuth IdP to access an application or VPN, and SecureAuth IdP then calls to the on-premises CA via SCEP to receive the certificate to provide access.

Refer to the Inbound SCEP from MobileIron VSP configuration guide for Inbound SCEP Calls from MobileIron configuration steps.

 


Prerequisites

Ensure the following items have been addressed before proceeding to the configuration steps:

  • Issuing CA running on Windows 2008 Enterprise edition or later.
  • Pre-installed and functional SCEP / NDES service.
  • CA's root and intermediates certificate distribution point available to all clients (internal and / or external) to enable access to the AIA and CDP files (CRT and CRL files).
  • SCEP / NDES Listener URL set up for SecureAuth IdP configuration.
  • Access to the SecureAuth IdP Web Admin and all realms requiring Outbound SCEP configuration.

 


Issuing Certificate Authority configuration steps

Properties

1. Enable Auto Enrollment by opening the Certificate Authority from the Start menu.

2. Right-click the Issuing Certificate Name and click Properties.

3. In the new window, click the Policy Module tab, and then click Properties.

4. Select Follow the settings in the certificate template... and click OK.

Registry Editor

The SCEP / NDES server uses a single certificate template to issue all end-user certificates. To select which certificate template to use, complete the following the steps. 

5. Open the Registry Editor on the CA and go to HKEY_LOCAL_MACHINE\Software\Microsoft\Cryptography\MS CEP.

6. Change the values of the following registry keys to a common Template Name, e.g. SecureAuth.

The Template Name appears under the Data field, as shown in the image, and is the name without spaces.

The Template Display Name which is also present should not be used.

7. Start a Command Prompt with Admin privileges on the SCEP server (Start, Cmd, right-click: Run as Admin).

8. Type iisreset and press Enter to restart the IIS server.

Certificate template configuration

An example of the appropriate settings in a Windows 2008 Enterprise Certificate is shown below.

NOTE: The SCEP / NDES server can only use a single certificate template before the type of certificate delivered to the end-user is limited to the settings defined in the template.
This includes key length and algorithm used, certificate validity period, Application Policy, etc.

 

 

 

The certificate key length must be the same in both the SCEP and SecureAuth IdP server configurations (1024 or 2048). A mismatch on either side will cause issues in delivering the certificate properly.

 See example...

 

 

 


SCEP / NDES Server configuration steps

Registry Editor

1. Disable SCEP Enforce Password by updating the following registry key / value pair in the SCEP / NDES server:

 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MSCEP\EnforcePassword]

 Set to: "EnforcePassword"= dword: 00000000

 


SecureAuth IdP configuration steps

This configuration is required for each SecureAuth IdP realm that uses Outbound SCEP calls.

System Info

1. In the SCEP Configuration section, select True from the Use SCEP dropdown.

2. Leave the SCEP Web Service URL as the default unless the web service is being hosted in a different location.

3. Set the SCEP / NDES URL as the SCEP / NDES Listener URL.

4. Click Save after the configuration is complete and before leaving the System Info page to avoid losing changes.



Sample output

1. Go through the SecureAuth IdP workflow to obtain a certificate.

2. Open the Certificate Store to inspect the certificate.

3. Verify the Issued By value states the name of the on-premises CA.