SCEPman

This page describes the controls related to the connectivity to the SCEPman PKI as a service.

SCEPman Identity & Keys

Common Name

The SCEPman CA root certificate’s subject name displayed in the UI. This is the identity that will appear in issued certificates (e.g., Trusted Root CA).

Organization

Organisation name used in the CA’s distinguished name.

Use your own Key Vault

This control allows you to bring an existing Azure Key Vault to store CA keys and secrets securely rather than letting SCEPman generate/manage them.


Tenant Connection

This controls how SCEPman connects to your Azure/Intune tenant (required when using SCEPman with Intune):

No tenant OAuth connection configured yet.


Settings

These settings correspond to configurable SCEPman environment variables that determine how SCEPman behaves.

Remote Debug

Enables remote debug logging for support/troubleshooting. Learn morearrow-up-right.

Default Extended Key Usage

EKU that certificates issued via Certificate Master should include (e.g., ServerAuthentication). This usually influences what purposes issued certs can be used for (e.g., TLS).

Validity Period Days

Default maximum lifetime of certificates issued via Certificate Master (global maximum

can be configured separately). Learn morearrow-up-right.


CRL

Enables CRL support for your SCEPman instance. Learn morearrow-up-right.

Intune Validation

Enables Intune-specific OCSP behaviourarrow-up-right in SCEPman (multiple related features).

Validity Period Days

This setting further reduces the global ValidityPeriodDays for the Intune endpoint.

Compliance Check

When SCEPman receives an OCSP request, SCEPman can optionally check the device compliance state. Learn morearrow-up-right.

Compliance Grace Period Minutes

This setting defines a grace period in minutes during which the device is considered compliant, even if it is not yet. Learn morearrow-up-right.

Device Directory

Determines where to look up devices on OCSP requests for device certificates. Learn morearrow-up-right.


Jamf Validation

When enabled, SCEPman will expose an endpoint (/jamf) that allows Jamf Pro-managed devices to enrol certificates that support automatic revocationarrow-up-right. Learn morearrow-up-right.

Static Validation

Enables the /static SCEP endpoint for non-Intune/Jamf Pro MDM systems. If ruthermore allows issuing certificates to systems that don’t have MDM integration by using a static challenge password. Learn morearrow-up-right.

Default Extended Key Usage

OIDs of the extended key usages (EKUs) that are added by default to the certificate if the Jamf Pro or Static endpoint is used. Learn morearrow-up-right.

Request Password

A challenge password that Jamf Pro or other MDM systems must include in every SCEP request to acquire a certificate. Learn morearrow-up-right.

Client ID and Client Secret

ClientID and ClientSecret are required to establish a connection to the Jamf Pro backend via its API and are an alternative to APIUsername and APIPassword. Learn morearrow-up-right.

Allow Renewals

This allows using the RenewalReq operation on this SCEP endpoint. Learn morearrow-up-right.


Static-AAD Validation

If enabled, SCEPman will expose an endpoint (/static/aad) through which clients managed via MDM systems other than Intune/Jamf Pro can request certificates that are bound to an Entra ID user object, allowing for automatic revocationarrow-up-right of such certificates based on the state/presence of the corresponding Entra ID user object. It requires your MDM to support the sync of user objects from Entra ID. Learn morearrow-up-right.

DC Validation

When enabled, SCEPman will expose an endpoint (/dc) to issue Domain Controller certificates (e.g., Kerberos authentication certs) with a challenge password. Learn morearrow-up-right.

Last updated

Was this helpful?