πŸ†• SCEPman SaaS

SCEPman SaaS is a fully managed SCEPman deployment, hosted and maintained entirely by us. It is available as part of the RADIUSaaS & SCEPman SaaS Bundle, which combines both services into a single subscription. This eliminates the need to set up and manage your own SCEPman instance while still providing seamless certificate-based authentication for your RADIUS environment. The following guide walks you through the initial configuration steps to get your SCEPman SaaS instance up and running with RADIUSaaS

Setup SCEPman SaaS

circle-info

If you are already using an existing SCEPman Enterprise deployment in your tenant with RADIUSaaS, make sure to have a look at our migration guide: Migrate from SCEPman Enterprise

1

Enroll SCEPman SaaS

With an enabled SCEPman SaaS license, you will see that the menu section in Settings > SCEPman contains options to enroll and configure your SCEPman CA.

At the top you have the ability to choose the Common Name as well as the Organization name for your CA.

circle-info

The Common Name and Organization will form the subject of the CA certificate during the enrollment.

By clicking Enroll, the setup will start and the status is shown above. After a few minutes the deployment should have been finished and you will see that the RADIUSaaS main menu now contains a section for SCEPman.

The Status page shows the current state of the CA and its integrations as well as the endpoint URLs you need to request certificates.

This page is equivalent to the homepage of a SCEPman Enterprise deployment
circle-check
2

Connect SCEPman to your Azure Tenant

circle-info

You will only need to connect SCEPman to your Azure tenant if you plan to deploy certificate through Intune or the StaticAAD endpoint.

In most scenarios you will want SCEPman to be able to issue certificates by using Intune SCEP profiles and also revoke certificates automatically if a device has been wiped for example.

For this to work as intended, SCEPman requires specific roles in your tenant. This can either happen by consenting to our multi-tenant enterprise application or by providing an app registration holding the required permissions yourself.

Confirm Tenant

circle-info

We recommend the Admin Consent / multi-tenant enterprise application approach to connect to your Azure tenant, since it does not require a client secret that must be monitored for expiration.

The first step of the Admin Consent flow is to enter your tenant ID and confirming it.

Upon clicking Confirm Tenant you will be redirected to Microsofts consent page for authentication and to approve this application initially:

Accepting this consent will add the SCEPman SaaS enterprise application to your tenant but does not yet add the required permissions.

After confirming the tenant, clicking Consent Admin will again redirect you to Microsoft's consent page and asks for your confirmation if the application should be granted the listed permissions. For more information on the required permissions, please refer to our Security & Privacy Q&As.

circle-check
3

Enable Certificate Endpoints

In most scenarios, certificates will be deployed by leveraging Intune SCEP certificate profiles to trigger devices to request certificates from SCEPman. To enable this endpoint, navigate to Settings > SCEPman again and enable the Intune Validation setting and save the configuration:

Compliance Check

As with SCEPman Enterprise, SCEPman can evaluate the validity of a certificate by checking the compliance state of a bound device. Please refer to the SCEPman documentation on this settingarrow-up-right for more information.

Device Directory

Selecting the device directory depends on the specific binding you choose in the SCEP profile:

  • {{DeviceId}} will be looked up in Intune

  • {{AAD_DeviceID}} will be looked up in AAD (Entra ID)

  • {{UserPrincipalName}} (UPN) will be looked up in AAD (Entra ID)

Please refer to the SCEPman documentationarrow-up-right for more details on the device directories.

circle-check
4

Deploy Certificates

With the Intune validation enabled, you will find that the SCEPman status page now shows an endpoint URL for the Intune MDM:

This URL will be used in the Intune SCEP certificate profile for the SCEP Server URL.

Root Certificate

Make sure to create a Trusted Certificate profile in Intune before continuing to the SCEP certificate profile and deploy the CA certificate of SCEPman SaaS to your clients.

SCEPman documentation: Root Certificatearrow-up-right

SCEP Certificate

The process of creating the SCEP certificate profile is identical to SCEPman Enterprise.

SCEPman documentation: SCEP - Intune - Windowsarrow-up-right

circle-check

Establish Trust

To allow devices to authenticate using certificates from your SCEPman SaaS CA and enabling your access points to establish RadSec connections to your RADIUSaaS instance, you will need to trust its CA certificate. To do this, first download your CA certificate from the SCEPman > Status page.

Having the CA certificate in place, navigate to Settings > Trusted Certificates and add a new certificate.

Upload your downloaded certificate file and save:

circle-check

Enable Management of the RADIUSaaS Server Certificate

After you have enrolled SCEPman SaaS, you will notice that the SCEPman Connection section under Settings > Server Settings allows you to pregenerate a certificate and setup a connection.

A connection to your SCEPman instance has already been established at this point and RADIUSaaS can request server certificates. The correct way of going further now depends on if you already use RADIUSaaS to authenticate clients at this point or if this is a fresh setup.

Pregenerate Certificate

RADIUSaaS will request a server certificate and add it to the list of certificates but will not activate it or enable the automatic management.

In case you currently have clients authenticating to RADIUSaaS, this allows you to verify that your Wifi profile has the correct names for server validation as well as the correct root certificate for server validation.

Setup Connection

If this is a fresh setup or after you have verified that your clients use the correct information for validating the server certificate, you can enable the automatic management of the server certificate by clicking Setup Connection.

circle-check

Other Certificate Endpoints

Setting up other certificate endpoints is similar to the way they are set up with SCEPman Enterprise. Make sure to take a look at the relevant documentation:

General

SCEPmanchevron-right

Jamf

Static Validation

Static-AAD Validation

DC

Logs

You can find all application logs that you would expect in SCEPman Enterprise in the Logs section. These include:

  • Service Health Messages

  • Issued Certificates

  • OCSP Responses

  • Warnings and Errors during Validation and Issuance

Last updated

Was this helpful?