LogoLogo
LogoLogo
  • Welcome
  • Details
  • Configuration
    • Getting Started
      • Generic Guide
      • Scenario-based Guides
        • Microsoft Cloud PKI
        • SCEPman PKI
    • Access Point Setup
      • RadSec
        • Aruba
        • FortiNet
        • Juniper Mist
        • Meraki
        • MikroTik
        • Ruckus
        • UniFi
      • RADIUS
        • ExtremeCloud IQ CoPilot
        • Meraki
        • Sophos UTM
        • UniFi
    • Server Certificate Renewal
  • Admin Portal
    • Home
    • Insights
      • Rule Engine
      • Logs
    • Users
    • Settings
      • Server Settings
      • Trusted Certificates
      • Proxy Settings
      • Permissions
      • User Settings
      • Rules
        • General Structure
        • WiFi
        • LAN
        • VPN
      • Log Exporter
        • Teams
        • Log Analytics
        • Generic Webhook
        • Examples
    • My Invited Users
  • Profile Deployment
    • Microsoft Intune
      • Server Trust
      • WiFi Profile
        • Windows
        • iOS/iPadOS & macOS
        • Android
      • Wired Profile
        • Windows
        • macOS
    • Jamf Pro
      • Server Trust
      • WiFi Profile
      • Wired Profile
    • Google Workspace
      • Server Trust
      • WiFi Profile
  • Other
    • Troubleshooting
    • FAQs
      • General
      • Log & Common Errors
      • MAC Authentication
      • Blast-RADIUS Vulnerability
      • OCSP Soft-fail Consequences
      • Security & Privacy
    • REST API
      • External Monitoring
    • Changelog
  • Licensing
    • Azure Marketplace
  • Support & Service Level
  • RADIUSaaS Website
Powered by GitBook
On this page
  • Step 1: Deploy a Microsoft Cloud PKI
  • Create a Root CA in Intune admin center
  • Create an Issuing CA in Intune admin center
  • Step 2: Establish trust between RADIUSaaS and the Microsoft Cloud PKI
  • Step 3: Configure the RADIUS Server Certificate
  • Step 4: Configure your networking equipment
  • Step 5: Configure Intune Profiles
  • Trusted certificate profiles
  • SCEP certificate profile
  • Wi-Fi profile

Was this helpful?

  1. Configuration
  2. Getting Started
  3. Scenario-based Guides

Microsoft Cloud PKI

This document describes the configuration steps necessary to implement certificate-based WiFi authentication using Microsoft Cloud PKI with Intune.

Last updated 1 month ago

Was this helpful?

It is assumed that the Microsoft Cloud PKI hosts both the Root and Issuing CA. For scenarios involving BYOCAs please refer to Microsoft's online resources or the web.

Step 1: Deploy a Microsoft Cloud PKI

Create a Root CA in Intune admin center

Before you can issue certificates to managed devices, you need to create a root CA in your tenant to act as the trust anchor. To create a root CA in Intune admin center, please follow Microsoft guide.

Please take note of the CRL distribution point as you will need this later in .

Create an Issuing CA in Intune admin center

An issuing CA is required to issue certificates for Intune-managed devices. Cloud PKI automatically provides a SCEP service that acts as a certificate registration authority. It requests certificates from the issuing CA on behalf of Intune-managed devices using a SCEP profile. To create an issuing CA, please follow Microsoft guide.

Please take note of the CRL distribution point as you will need this later in .

Step 2: Establish trust between RADIUSaaS and the Microsoft Cloud PKI

Configure RADIUSaaS to trust client authentication certificates issued by the Microsoft Cloud PKI. Since the cloud PKI requires a tiered CA structure, you must upload both, Root CA and Issuing CA (i.e. the complete chain of trust). To achieve this, please follow below steps:

  1. As verification method select CRL along with DER encoding.

  2. Upload the Contoso Cloud PKI Issuing CA selecting Client Authentication in the upload process.

  3. Again, select CRL as verification method along with DER encoding.

Step 3: Configure the RADIUS Server Certificate

Step 4: Configure your networking equipment

Step 5: Configure Intune Profiles

To set up certificate-based WiFi authentication, we need to create a number of profiles and deploy them via Intune. These profiles are:

Profile Type
Purpose

Trusted certificate

Deploy the Root CA certificate.

Trusted certificate

Deploy the Issuing CA certificate.

Trusted certificate

Deploy the Root CA certificate that has issued the RADIUS Server Certificate.

SCEP certificate

Enroll the client authentication certificate.

Wi-Fi

Deploy the wireless network adapter settings.

Trusted certificate profiles

Microsoft Cloud PKI

  • Platform = Windows 10 and later

  • Profile type = Template

  • Template name = Trusted certificate.

Upload the relevant certificate file (*.cer) in the respective profile:

Note that you have to use the same group for assigning the Trusted certificate and SCEP profiles. Otherwise, the Intune deployment might fail.

This must be repeated for every device platform that shall be using the service (e.g. Windows, macOS, ...)

RADIUS server trust

Next, push the root CA certificate that has issued your RADIUS Server Certificate as described here:

SCEP certificate profile

To create a SCEP certificate profile in Intune admin center, first take a copy of the SCEP URI from Home > Tenant admin > Cloud PKI > Contoso Issuing CA > Properties > SCEP URI.

Next, go to Home > Devices > Windows > Configuration profiles > Create > New Policy with the following parameters:

  • Platform = Windows 10 and later

  • Profile type = Template

  • Template name = SCEP certificate

Next, configure the template according to the screenshot below making sure you attached the Contoso Root Certificate created earlier in step 1 and the SCEP URI you took a copy of above.

This must be repeated for every device platform that shall be using the service (e.g. Windows, macOS, ...)

Wi-Fi profile

Deploy the WiFi adapter settings to your devices by following this article:

Navigate to .

the Contoso Cloud PKI Root CA selecting Client Authentication in the upload process.

Use the copied CRL distribution point URL of the Root CA in the CRL Distribution Points URL input field.

Use the copied CRL distribution point URL of the Issuing CA in the CRL Distribution Points URL input field.

To establish server trust between your endpoint devices and RADIUSaaS, follow .

To configure your networking equipment (WiFi access points, switches, or VPN gateways), follow .

After successful completion of Steps 2 - 4, the Trusted Certificates page of your RADIUSaaS instance will look similar to the one below. Please note that in our example we have used a RadSec-enabled access point.

Deploy the root CA and issuing CA certificates created in via a Trusted certificate profile to your devices by navigating to the Intune admin center and then to Home > Devices > Windows > Configuration profiles > Create > New Policy with the following parameters:

Root CA certificate created

Issuing CA certificate created

Trusted Certificates
MikroTik
Server Trust
WiFi Profile
Step 1
here
here
this
this
Step 2
Step 2
Upload
these instructions
these steps
Root and Issuing CAs
Trusted Certificates Overview required for the Microsoft Cloud PKI.
Relevant Intune Profiles
SCEP Device Certificate Configuration