For the latest version, please use Certificate Lifecycle Manager 6.7.0!

Integrating MTG SCEP with Microsoft Intune

This guide walks you through configuring Microsoft Intune to work with MTG SCEP for automated certificate enrollment on your devices.

Prerequisites: Azure AD administrative privileges and access to your MTG CLM environment.

Azure AD App Registration

Create an Azure AD application that MTG SCEP will use to authenticate with Microsoft Intune. This application provides the client credentials needed for SCEP request validation.

Step-by-step Instructions

  1. Access Azure Portal

    Navigate to portal.azure.com and sign in with your Azure AD administrative account.

  2. Navigate to App Registrations

    In the search bar at the top, type "App registrations" and select it from the results.

    Click to reveal screenshot
    intune 0 app registrations
  3. Create New Registration

    Select New registration at the top of the App registrations page.

  4. Configure Application Details

    Complete the registration form:

    • Name: Enter a descriptive name such as "MTG SCEP Integration"

    • Supported account types: Select "Accounts in this organizational directory only (Default Directory only - Single tenant)"

    • Redirect URI:

      • Platform: Select "Web"

      • URI: Enter localhost

      Click to reveal screenshot
      intune 1 app integrations
    The redirect URI is a placeholder required by Azure AD for app registration. The SCEP integration uses application permissions, not delegated authentication, so this URI is never actually called. However, Azure AD requires a valid format.
  5. Register the Application

    Click Register at the bottom of the form.

  6. Capture Critical IDs

    Immediately after creation, on the app overview page, locate and copy these two values:

    • Application (client) ID: A GUID like 12345678-1234-1234-1234-123456789abc

    • Directory (tenant) ID: A GUID like abcdef01-1234-1234-1234-abcdef012345

      Click to reveal screenshot

      intune 2 save ids]

    Save these IDs in a secure location now. You will need them for MTG SCEP configuration. The Application (client) ID identifies your app to Azure AD. The Directory (tenant) ID identifies your Azure AD instance. Both are required for MTG to authenticate correctly.
  7. Navigate to Certificates & Secrets

    In the left sidebar, click Certificates & secrets.

    Click to reveal screenshot

    600

  8. Create Client Secret

    Click New client secret at the top of the page.

    Click to reveal screenshot
    intune 4 new client secret button
  9. Configure Secret Parameters

    Complete the form:

    • Description: Enter "MTG SCEP Integration Key"

    • Expires: Select 12 months (or per your security policy)

      Click to reveal screenshot
      intune 5 new client secret details

    Click Add to create the secret.

  10. Capture Client Secret Value

    Immediately after creation, copy the Value (not the Secret ID!) from the table:

    Click to reveal screenshot
    intune 6 copy secret id value
    You can only view this value once. If you navigate away or lose it, you must generate a new secret. Store it alongside your Application ID and Tenant ID.

Verification Checklist

Before proceeding to the next subsections, confirm you have saved these three values:

  • Application (client) ID

  • Directory (tenant) ID

  • Client secret value

With the above credentials saved, you are ready to configure API permissions.

Configure API Permissions

Grant your Azure AD application permission to read device and configuration data from Microsoft Intune. MTG SCEP uses these permissions to validate that requesting devices are managed by Intune and to retrieve device attributes for certificate subject construction.

Step-by-step Instructions

  1. Navigate to API Permissions

    In your registered application, select API permissions from the left sidebar.

    Click to reveal screenshot
    intune 7 api permissions
  2. Add Microsoft Graph Permissions

    Click to reveal screenshot
    intune 8 add permission button
    • Click Add a permission at the top of the page.

    • Select Microsoft Graph from the list of available APIs.

    • Choose Application permissions (not Delegated permissions). SCEP validation uses app-only authentication, which requires Application permissions.

    Application permissions allow the Azure AD app to access Intune data without a signed-in user. This is required for server-to-server authentication used by MTG SCEP.
  3. Search and Select Specific Permissions

    In the search box, type "application" to filter the list. Check the following permission:

    Application.Read.All

    Click to reveal screenshot
    intune 9 add permissions 1

    Switch back to the main application selection pane and instead of "Microsoft Graph" now select group "Intune".

    In the search box, type "scep" to filter the list. Check the following permission:

    scep_challenge_provider

    Click to reveal screenshot
    intune 10 add permissions 2

    Click Add permissions at the bottom of the panel.

  4. Grant Admin Consent

    After adding permissions, you must grant admin consent for your organization. Click Grant admin consent for MTG at the top of the API permissions page.

    Confirm the action when prompted.

  5. Verify Status

    The Status column for both permissions should now show a green checkmark and "Granted".

    Click to reveal screenshot
    1200

If status shows "Not granted," click Grant admin consent for MTG again.

Verification Checklist

Before proceeding to the next steps, confirm:

  • Application.Read.All permission is granted

  • scep_challenge_provider permission is granted

  • Status shows green checkmark for both permissions

Configure MTG SCEP Settings

Update SCEP Parameters

  • Access your MTG CLM application.properties file and navigate to the SCEP configuration section.

Required Configuration Parameters:

  • ms.intune.app.id: Your Azure AD Application (client) ID

  • ms.intune.app.key: Your generated client secret value

  • ms.intune.app.tenant: Your tenant identifier

Verify SCEP Status

Service Status Check

  • Verify SCEP service is running.

  • Confirm network connectivity from Intune to your SCEP endpoint.

  • Test SCEP URL accessibility: scep.example.com/scep.

Certificate Authority Validation

  • Ensure your issuing CA is properly configured.

  • Verify certificate templates are available for mobile device enrollment.

  • Confirm CA certificate chain is complete.

Deploy Root CA via Intune Trusted Certificate Profile

Upload the CLM root CA to Intune and deploy it to iOS devices as a trusted certificate. The profile is initially assigned to an empty security group to avoid impacting production devices.

Step-by-step Instructions

  1. Navigate to Device Configuration

    In the Intune admin center, go to Devices → Configuration.

    Click to reveal screenshot
    intune 12 devices config create profile
  2. Create New Profile

    Click Create profile at the top of the page.

    Select your preferred platform (in this example iOS) as the platform and Trusted Certificate as the profile type, then click Create.

    Click to reveal screenshot
    intune 13 create profile
  3. Configure Basic Settings

    In the Basics tab, specify a distinctive name:

    • Name: CLM Root CA

    • Description (optional): E.g., Deploys the CLM root certificate to devices for SCEP validation

    • Click Next.

    Click to reveal screenshot
    intune 14 config name
  4. Upload Certificate File

    In the Configuration settings tab, click the certificate file selector and choose your .cer format file.

    Click Next.

    Click to reveal screenshot
    intune 15 config upload
  5. Assign to Security Group

    In the Assignments tab, click Add groups.

    Search for and select the empty security group you created earlier.

    Click Select, then click Next.

    This step assumes you do not already have enrolled devices. The group shows 0 devices initially. This is expected and prevents the profile from affecting any devices until you explicitly add your device after enrollment.
    Click to reveal screenshot
    intune 16 config assignments
    Click to reveal screenshot
    intune 17 select groups to include
  6. Review and Create

    In the Review + Create tab, verify:

    • Platform is your desired one.

    • Profile type is Trusted Certificate.

    • Assignment shows your group with 0 devices currently.

    • Certificate file is attached.

      Click Create.

      Click to reveal screenshot
      intune 18 review and create

Verification Checklist

Before proceeding, confirm:

  • Profile appears under Devices → Configuration.

  • Assignment column shows your group with 0 of 0 devices.

  • Profile Status shows as Created or Active.

The trusted certificate profile is now ready but not deployed to any devices. The profile will apply automatically once your device enrolls and is added to the security group. Proceed to the next section to create the SCEP certificate profile that will reference this root CA.

Create SCEP Certificate Profile in Intune

Create a SCEP certificate profile that requests device certificates from MTG CLM. This profile references the trusted root CA and defines how certificates are issued to devices.

Step-by-step Instructions

  1. Navigate to Device Configuration

    In the Intune admin center, go to DevicesConfiguration.

    Click to reveal screenshot
    intune 12 devices config create profile
  2. Create New Profile

    Click Create profile at the top of the page.

    Select your platform, then Templates as the profile type and SCEP Certificate as template. Click Create.

    Click to reveal screenshot
    intune 19 scep certificate template
  3. Configure Basic Settings

    In the Basics tab, specify:

    • Name: e.g., CLM Device Certificate - iOS

    • Description (optional): Requests device certificates from MTG SCEP endpoint

    • Click Next.

  4. Configure MTG SCEP Settings

    In the Configuration settings tab, enter the MTG SCEP details:

    • SCEP Server URL: scep.example.com/scep (replace with your actual MTG SCEP endpoint)

    • Subject name format: CN={{DeviceName}} (or your preferred subject format)

    • Certificate type: Device

    • Key size: 2048

    • Key usage: Digital signature and Key encipherment (check both)

    • Root CA: Select the trusted certificate profile created above

    • Renewal threshold: 20 (percentage of certificate lifetime before renewal)

    • Extended key usage: Add client authentication if needed

    • Hash algorithm: SHA-256 (default)

      Click to reveal screenshot
      intune 19 scep certificate template

    Click Next.

  5. Assign to Security Group

    In the Assignments tab, click Add groups.

    Search for and select the security group used above.

    Click Select, then click Next.

    The group shows 0 devices initially. This is expected and prevents the profile from affecting any devices until you explicitly add your device after enrollment.
  6. Review and Create

    In the Review + create tab, verify:

    • Platform is your preferred one

    • Profile type is SCEP Certificate

    • SCEP Server URL is correct

    • Root CA references correct profile

    • Assignment shows your test group with 0 devices

      Click Create.

Verification Checklist

Before proceeding, confirm:

  • Profile appears under DevicesConfiguration alongside the root CA profile

  • Profile type column shows SCEP Certificate

  • Assignment column shows your test group with 0 of 0 devices

  • SCEP Server URL is correctly configured

  • Root CA points to the trusted certificate profile

The SCEP certificate profile is now ready but not deployed. When your device enrolls and receives both profiles: - The root CA profile makes the CLM root certificate trusted - The SCEP profile enables the device to request certificates from MTG CLM

Proceed to the next section to enroll your device in Intune.

Enroll device in Intune

Enroll your device in Microsoft Intune using the Company Portal app or Automated Device Enrollment (ADE). This establishes the device as managed and allows it to receive the configuration profiles created in previous sections.

The enrollment steps below have been tested using an iPad (iOS device). While the general approach remains the same for other platforms, deviation is to be expected in some steps due to the nature of each device’s operating system and characteristics.

Enrollment Prerequisites

Before starting enrollment, ensure:

  • Device is running iOS 13.0 or later

  • Apple ID is signed in on the device

  • Device is connected to Wi-Fi with internet access

  • Intune Company Portal app is installed from App Store (for user-driven enrollment)

Step-by-step Instructions

  1. Install Company Portal (if not using ADE)

    Open the App Store on your device and search for "Intune Company Portal". Install the application.

  2. Launch Company Portal

    Open the Company Portal app. Tap Sign In and enter your corporate credentials (the same account used in the Intune admin center).

  3. Begin Enrollment

    After signing in, tap Begin or Enroll when prompted to register your device with Intune.

    Click to reveal screenshot
    intune 21 ipad initial
  4. Accept Terms and Conditions

    Review the privacy statement. Tap Continue to proceed.

    Click to reveal screenshot
    intune 22 ipad privacy info
  5. Download Management Profile

    The app will prompt you to download a management profile. Tap Allow.

    Click to reveal screenshot
    intune 23 allow config profile
  6. Install Management Profile

    Navigate to SettingsGeneralVPN & Device Management. You should see a profile labeled "Management Profile" or similar.

    Tap the profile, then tap Install. Enter your device passcode if prompted.

    Click to reveal screenshot
    intune 26 profile in settings
  7. Trust Remote Management

    A dialog will appear asking you to trust remote management. Tap Trust in the upper-right corner.

    Click to reveal screenshot
    intune 27 profile in settings warning
  8. Continue Enrollment

    Return to the Company Portal app. It should show a continue prompt.

    Click to reveal screenshot
    intune 28 continue after download
  9. Checking Device Settings

    Wait a few minutes for the Device Settings check to complete. Do not switch screens/apps during this process.

    Click to reveal screenshot
    intune 29 checking device settings
  10. Checklist Complete

    You should be now seeing a complete checklist of the previous steps with green checkmarks. Tap Done

    Click to reveal screenshot
    intune 30 all set

Verification Checklist

Before proceeding, confirm:

  • Company Portal shows device as enrolled and compliant

  • Device appears in Intune admin centerDevicesAll devices

  • Device name matches your device’s name

  • Enrolled date is recent (today’s date)

  • Compliance status is "Compliant" or "Not Evaluated" (not "Non-compliant")

Troubleshooting

If enrollment fails:

  • Verify Apple MDM push certificate is active in Intune

  • Check that device is not already enrolled in another MDM

  • Ensure user has appropriate Intune license assigned

  • Review enrollment restrictions in Tenant administrationEnrollment device platform restrictions

With the device enrolled, it will automatically begin receiving assigned configuration profiles. Proceed below to verify profile delivery.

Verify Profile Delivery to Device

Confirm that the device has successfully received both the trusted root CA profile and the SCEP certificate profile . This verification ensures Intune’s profile delivery mechanism is working before attempting certificate issuance.

Step-by-step Instructions

  1. Check Intune Admin Center

    In the Intune admin center, navigate to DevicesAll devices.

    Click on your enrolled device to open the device details page.

  2. Verify Profile Status

    In the device details page, select Device configuration from the left sidebar (or scroll to the Configuration section).

    You should see both profiles listed:

    • CLM Root CA - iOS (Trusted Certificate profile)

    • CLM Device Certificate - iOS (SCEP Certificate profile)

      Check the Status column for each profile. It should show Succeeded or Pending.

  3. Check Last Check-in Time

    On the device details overview, note the Last check-in time. If it’s more than 15 minutes old, you may need to force a sync.

  4. Force Device Sync (if needed)

    On the device, open the Company Portal app.

    Tap Devices → your device → Sync or Check Status to force an immediate sync with Intune.

    Alternatively, in the Intune admin center, select the device and click Sync from the top menu.

  5. Wait for Profile Delivery

    Profiles typically deploy within 5-15 minutes after enrollment. Wait for the status to change to Succeeded on both profiles.

Verification Checklist

Before proceeding, confirm:

  • Both profiles appear in the device’s Device configuration list

  • CLM Root CA - iOS Test shows status Succeeded

  • CLM Device Certificate - iOS Test shows status Succeeded or Pending

  • Last check-in time is recent (within last 15 minutes)

  • Device is showing as Managed in Apple Configurator 2 (optional verification)

Troubleshooting

If profiles show Failed or remain Pending:

  • Verify the device is assigned to the correct security group

  • Check if there are any assignment filter conflicts

  • Review profile deployment status in DevicesConfiguration → select profile → Device status

  • Ensure device OS version meets profile requirements

If only the SCEP profile fails:

This is expected if admin consent is not yet granted. The root CA profile should succeed regardless.

With both profiles delivered successfully, verify the root CA is trusted on the device in the next section.

Verify Root CA is Trusted

Verify that the CLM root certificate has been installed and is trusted in the iOS certificate store. This step ensures the device will accept certificates issued by your CA during the SCEP enrollment process.

Step-by-step Instructions

  1. Open device Settings

    On your enrolled device, open the Settings app.

  2. Navigate to Certificate Trust Settings

    Go to GeneralAboutCertificate Trust Settings (scroll down to find this option).

  3. Locate CLM Root Certificate

    Under ENABLE FULL TRUST FOR ROOT CERTIFICATES, you should see your CLM root certificate listed.

    The certificate will display with a name matching your CA’s subject (e.g., "CLM Root CA" or similar).

  4. Verify Trust Status

    The toggle next to your root certificate should be ON (green).

    If the toggle is OFF, tap it to enable full trust.

  5. View Certificate Details (optional)

    Return to GeneralVPN & Device ManagementConfiguration ProfileMore Details.

    Tap on the root certificate entry to view: * Subject: Should match your CA * Issuer: Should be the same as Subject (self-signed root) * Expires: Certificate validity period

  6. Verify with Safari (optional)

    Open Safari and navigate to a test site that uses a certificate from your CA (if available).

    If the root CA is trusted correctly, you should not see certificate warnings.

Verification Checklist

Before proceeding, confirm:

  • Root certificate appears in SettingsGeneralAboutCertificate Trust Settings

  • Trust toggle is ON (enabled)

  • Certificate details show correct CA name and validity dates

  • Certificate subject and issuer match your CLM root CA

Troubleshooting

If certificate is not visible:

  • Verify the trusted certificate profile shows Succeeded in Intune

  • Force a device sync from Company Portal

  • Check if certificate was delivered to wrong certificate store (should be System/Root)

If trust toggle is OFF:

  • Enable it manually

  • Check if profile requires additional configuration for automatic trust enablement

If certificate shows but SCEP will still fail:

This is expected if admin consent is pending. Root CA trust is independent of API permissions.

The device now trusts your CLM root CA. Proceed below to initiate SCEP certificate enrollment and verify MTG CLM issues a valid device certificate.

Verify Certificate Issuance

Trigger SCEP enrollment on your device and confirm that MTG CLM has issued a device certificate that chains to the CLM root CA.

Step-by-step Instructions

  1. Trigger SCEP Enrollment

On the enrolled device, open the Company Portal app.

Tap Check status to force a device check-in and trigger the SCEP certificate request.

  1. Verify Profile Status in Intune

In the Intune admin center, go to DevicesAll devices and select your device.

Open the Device configuration tab and locate both profiles:

  • CLM Root CA – iOS Test (Trusted certificate)

  • CLM Device Certificate – iOS Test (SCEP certificate)

Ensure:

  • CLM Root CA – iOS Test shows Succeeded

  • CLM Device Certificate – iOS Test shows Succeeded (not Error or Pending)

    1. Verify Certificate on device

On your device, open SettingsGeneralVPN & Device Management and select the Intune management profile.

Tap More Details and verify that:

  • A new certificate is present under Certificates.

  • Issuer matches your CLM issuing CA and chains to the CLM root CA.

  • Subject matches the SCEP subject format configured above (for example CN={{AAD_Device_ID}} or CN={{Device_Serial}}).

    1. Verify Certificate in MTG CLM

In MTG CLM, open the Certificates menu.

Confirm that:

  • The certificate subject and serial number match the certificate visible on your device.

Verification Checklist

Before marking the above as complete, confirm:

  • SCEP profile status is Succeeded for the device in Intune.

  • A valid device certificate appears in the Intune management profile on your device.

  • The certificate chains to the CLM root CA.

  • MTG CLM shows the request as Issued, not Rejected or Failed.

SCEP Troubleshooting Reference

Use this section if the SCEP profile shows Error or the certificate does not appear on your device after running Check status.

Common Error Patterns

HTTP 403 / Authorization_RequestDenied

  • Symptom (SME logs):

    • code":"Authorization_RequestDenied","message":"Insufficient privileges to complete the operation" when the SCEP service calls Intune/Graph.

  • Likely causes:

    • The Entra app used by the SCEP server is missing Intune → scep_challenge_provider or required Graph application permissions.

    • Admin consent was not granted for the app, or was granted in the wrong tenant.

  • Fix:

    • In the app registration, add Intune → scep_challenge_provider, then re‑grant admin consent.

    • Verify the SCEP server uses the same Application (client) ID, Tenant ID, and a valid client secret/certificate from that app.

SubjectNameMismatch

  • Symptom (SCEP logs):

    • ErrorCode: SubjectNameMismatch, ErrorDescription: Subject Name in CSR and challenge do not match with different CN strings and lengths.

  • Likely causes:

    • Subject template in Intune adds quotes or extra characters

    • Device name contains characters that are normalized differently between Intune and the CSR.

  • Fix:

    • In the SCEP profile, set Subject name format to a simple template without quotes, for example:

      • CN={{AAD_Device_ID}} or CN={{Device_Serial}}

    • Save the profile and re-run Check status on your device.

SCEP Server Returned Invalid Response / Generic Error

  • Symptom (Intune device view):

    • SCEP profile status Error, details similar to “The SCEP server returned an invalid response.”

  • Likely causes:

    • SCEP endpoint URL mismatch between Intune and the published URL.

    • NDES/MTG SCEP service not reachable or wrong certificate bound in IIS.

    • Intune certificate connector or SCEP policy module not healthy.

  • Fix:

    • Verify the SCEP URL in the Intune profile matches the SME’s URL exactly (protocol, host, path, no stray slash).

    • From a browser, hit the SCEP URL and confirm you get the expected NDES/SCEP landing 403, not 404 or connection failure.

    • Check SCEP/NDES and Intune Certificate Connector logs for HTTP status codes and detailed error text.

Template / CA Rejection (0x80094800 and similar)

  • Symptom:

    • Device never gets a certificate; CA logs show errors such as 0x80094800 or “The request does not contain a certificate template extension.”

  • Likely causes:

    • SCEP certificate template on the CA does not allow the requested key size, EKU, or subject format.

    • NDES service account lacks Enroll permission on the template.

  • Fix:

    • Verify the SCEP template:

      • Key size and algorithm align with the Intune profile.

      • EKU includes Client Authentication (1.3.6.1.5.5.7.3.2).

      • Template is published on the issuing CA.

    • Grant the NDES / SCEP service account Enroll permission on the template and restart the SCEP/NDES service.

When to Re-run the Test

After any backend change (app permissions, SCEP config, CA template):

  1. SME verifies logs are clean for the last change.

  2. On the device, open Company Portal and tap Check status.

  3. In Intune, refresh the device’s Device configuration tab and confirm whether the SCEP profile moves from Error to Succeeded.

If SCEP still fails, capture:

  • The current Intune error message for the SCEP profile on the device.

  • The current SCEP/NDES log entry for that same request.

Use these two together with this troubleshooting reference to identify the next configuration issue.

Conclusion

With successful certificate issuance, the integration is complete. Your device now has:

  • A trusted root CA

  • SCEP enrollment capability

  • Valid device certificate from MTG CLM