- 12 Dec 2024
- 2 Minutes to read
- Print
- DarkLight
- PDF
Intune Connector Guide
- Updated on 12 Dec 2024
- 2 Minutes to read
- Print
- DarkLight
- PDF
Use this guide to integrate your Entra / Azure tenant and the Intune Connector in Axiad Conductor.
Prerequisites
Before configuring the integration, you must define certificate templates within the PKI-aas console, which are intended to be used for SCEP enrollment through Intune. Key considerations include:
Device or user certificate type
Issuing CA
Format of certificate subject and SAN
Intended usage (encryption, digital signature)
Please work with your Axiad Customer Success representative to configure the above prior to deployment.
Entra Tenant Configuration
Create an Enterprise App Registration in the Entra tenant, using any descriptive name
Click register
Within the new Enterprise App, generate a secret
Navigate to Certificate & Secrets > Client Secrets > New client secret
Copy the secret
Important
The secret can only be retrieved at the time of its creation, so be sure to copy it as you will need it later
Go to API Permissions > Add a permission > Microsoft Graph > Application Permissions
Grant the permissions as followed:
Application.Read.All
User.Read
Click on Add a permission > Intune > Application permissions and add the following:
scep_challenge_provider
Click on Add a permission > Azure Rights Management Service and add the following:
Application.Read.All
Grant consent for your tenant once all configuration is complete
Your App Registration settings should appear similar to below
Securely provide the following information to Axiad:
The API secret for the App registration (generated in step 3)
The
aad-app-id
(the ID of the Enterprise App created)The Entra tenant ID
Intune Configuration
As a first step, we will need to ensure Intune-managed devices enrolling for this particular certificate template will trust the certificate issuer. Afterwards, we will create the actual certificate request template.
Contact Axiad to obtain the required certificates in advance.
Within Intune, create a new Device Configuration profile, with the type Template – Trusted Certificate
Under Configuration settings, select the Root CA certificate for the Certificate file
Select Computer certificate store - Root from the Destination store dropdown
Finish the profile configuration
Create another Device Configuration profile, with the type Template - Trusted Certificate
Under Configuration settings, select the ScepRA certificate for the Certificate file
Select Computer certificate store - Intermediate from the Destination store dropdown
Finish the profile configuration
Create a new Configuration Profile, with the type SCEP certificate
Configure the certificate fields, key usages, and SAN names per your requirements, ensuring that this information matches the configuration of the corresponding Certificate Template on Axiad
IMPORTANT
Root Certificate configured under the SCEP Profile MUST match the Root uploaded in step 2
The SCEP URL is bound to a certificate profile, so each URL will map to a different enrollment:
<SERVER_URL>/intune-connect/api/scep/v1.0/enroll/<ENTRA_TENANT_ID>/<AXIAD_CERTIFICATE_PROFILE>/<OS>
Note the following
SERVER_URL: Defined and provided by Axiad
ENTRA_TENANT_ID: Your Entra tenant ID
CERTIFICATE_PROFILE: The name of the certificate template, created on the PKI
OS: Android, iOS or Windows (gor statistical purposes)
Here is a sample of a SCEP certificate profile
General Troubleshooting
There may be a significant delay before a client attempts enrollment (or fetches an Intune profile). You can trigger a manual sync from the Settings panel on the device itself, as shown below. Often times, a reboot of the client machine may prove to be quicker than waiting for a sync:
By default, Windows will track certificate enrollment failures. These provide information on enrollment attempts through Intune and can be seen in the Event Log > Application > Event ID 87: