When adding a new SSID:  
Copy Settings from existing SSID. Ensure that you upload the RootCA server certificate from CA02 to the Meraki SSID. Save config profile and enable the SSID. Users that are added to the MerakiAuthenticationGroup will now be able to connect to the SSID.   

 

IMPROTANT: Only 3 certificates and a Wi-Fi profile need to be pushed in Intune. RootCA server (device) certificate needs to be uploaded to Meraki SSID.   
 
The following Wi-Fi template is pushed to devices:  
MerkaiSCEPWifiAuthenticationTemplate 

The following certificates are pushed to devices: 

RootCAMerakiIDENTrustROOTWifiSCEPCert 
 
Follow this and look to the rest of this documentation for more details: 
Deploy SCEP Certificate Connector Intune - NielsKok.Tech  

Overview of the Solution 

  1. Certificate Authority (CA): Set up a local CA to issue SCEP certificates to devices. 

  1. Intune: Use Microsoft Intune and the Certificate Connector to manage devices and distribute SCEP certificates automatically. 

  1. Cisco Meraki: Configure the Meraki wireless infrastructure to require SCEP certificates for authentication. 

Capabilities of the certificate connector 

  • The Certificate Connector for Microsoft Intune supports: 

  • PKCS #12 certificate requests. 

  • PKCS imported certificates (PFX file) for S/MIME email encryption for a specific user. 

  • Issuing Simple Certificate Enrollment Protocol (SCEP) certificates. When you use an Active Directory Certificate Services Certification Authority (CA), also called a Microsoft CA, you must also configure the Network Device Enrollment Service (NDES) on the server that hosts the connector. 

  • Use of SCEP with a third-party Certification Authority, doesn’t require use of the Certificate Connector for Microsoft Intune. 

  • Certificate revocation. 

  • Automatic updates to new versions. When servers that host the certificate connector can access the internet, they automatically install new updates to stay current. When a connector fails to automatically update, you can manually update the connector. 

  • Installation of up to 100 instances of the connector per Intune tenant, with each instance on a separate Windows Server. When you use multiple connectors: 

  • Each instance of the connector must have access to the private key used to encrypt the passwords of each uploaded PFX file. 

  • Each instance of the connector should be at the same version. Because the connector supports automatic updates to the newest version, updates can be managed for you by Intune. 

  • Your infrastructure supports redundancy and load balancing, as any available connector instance that supports the same connector features can process your certificate requests. 

  • You can configure a proxy to allow the connector to communicate with Intune. 

  • Certificate Connector should not be installed on the same server as Intune Connector for Active Directory. 

 

Overview of Solution 

  1. Set Up Certificate Authority (CA): Install and configure a local CA to issue SCEP certificates. 

  1. Configure SCEP: Set up a SCEP template and the Certificate Connector. 

  1. Distribute CA Certificate via Intune: Use Intune to distribute the CA certificate to devices. 

  1. Enroll SCEP Certificates Automatically: Use Intune to automatically enroll SCEP certificates. 

  1. Configure Cisco Meraki for EAP-TLS: Set up the Meraki wireless network to authenticate using SCEP certificates. 

  1. Test the Configuration: Ensure that devices can connect using the certificates. 
     

 

General Prerequisites 

Requirements for the computer where you install the connector software: 

  • Windows Server 2012 R2 or later. 

o support Simple Certificate Enrollment Protocol (SCEP) certificates, the Windows Server that hosts the connector must meet the following prerequisites in addition to the general prerequisites: 

  • IIS 7 or higher 

Network Device Enrollment Service (NDES) service, which is part of the Active Directory Certification Services role. The connector isn't supported on the same server as your issuing Certification Authority (CA). For more information, see Configure infrastructure to support SCEP with Intune. 
 Note 

The Server installation must include the Desktop Experience and support use of a browser. For more information, see Install Server with Desktop Experience in the Windows Server 2016 documentation. 

On the Windows Server, select to add the following Server Roles and Features: 

  • Server Roles: 

  • Active Directory Certificate Services 

  • Web Server (IIS) 

  • Features: 

  • .NET Framework 4.7 Features 

  • .NET Framework 4.7 

  • ASP.NET 4.7 

  • WCF Services 

  • HTTP Activation 

  • AD CS > Role Services: 

  • Network Device Enrollment Service - For the connector SCEP when you use a Microsoft CA, install, and configure the Network Device Enrollment Service (NDES) server role. When you configure NDES, you need to assign a user account for use by the NDES application pool. NDES also has its own requirements. 

  • Web Server Role (IIS) > Role Services: 

  • Security 

  • Request Filtering 

  • Application Development 

  • .NET Extensibility 4.7 

  • ASP.NET 4.7 

  • Management Tools 

  • IIS Management Console 

  • IIS 6 Management Compatibility 

  • IIS 6 Metabase Compatibility 

  • IIS 6 WMI Compatibility 

In addition, NDES requires the following.NET Framework 3.5 Features: 

  • .NET Framework 3.5 

  • HTTP Activation 

Requirements for SCEP certificate templates: 

  • Certificate templates you use for SCEP requests must be configured with permissions that allow the Certificate Connector service account to auto enroll the certificate. 

  • The certificate templates must be added to the CA. 

  • To support automatic updates of the connector software, the server must have access to the Azure update service: 

  • Port: 443 

  • Endpoint: autoupdate.msappproxy.net 

  • The Enhanced Security Configuration must be deactivated. 

  • On the Certificate connector server Enable Service Logon for the service account.  

 

 
Certificate connector service account 

The certificate connector requires an account to use as a service account. This account is used by the connector to access the Windows Server, communicate with Intune, and access the Certification Authority to service PKI requests. 

The connector service account must have the following permissions: 

  • Issue and Manage Certificates permissions on the Certification Authority (required only for revocation scenarios). 
    Certification Authority MMC snap-in, right-click on the CA name and select Properties. On the Security tab, add the group and grant it Read, Log on as a service, Issue and Manage Certificates and Request Certificates permissions. 

  • Read and Enroll permissions on any certificate template that you use to issue certificates. 

The following options are supported for use as the certificate connector service account: 

  • SYSTEM 

  • Domain user - Use any domain user account that is an administrator on the Windows Server. 

 
 
 
Step-by-Step Implementation Guide 

Step 1: Set Up Certificate Authority 

 

  1. Install AD Certificate Services 

  • Open Server Manager. 

  • Add the Active Directory Certificate Services role. 

  • Choose Certification Authority during the setup. 

  1. Configure CA 

  • After installation, configure the CA as an Enterprise CA with default settings. 

Step 2: Configure SCEP and Certificate Connector 

  1. Create SCEP Certificate Template 

  • Open Certificate Templates console (certtmpl.msc). 

  • Duplicate the “User” template (or another suitable template). 

  • Name it (e.g., "Intune SCEP Certificate").                                                                 

  • In the Security tab, add the Intune service account with “Enroll” permissions. 

  • In the Subject Name tab, choose “Supply in the request.” 

  1. Publish the SCEP Template 

  • Open the Certificate Authority console. 

  • Right-click on Certificate Templates and select “New” > “Certificate Template to Issue.” 

  • Select your new SCEP certificate template and click OK. 

  1. Install Certificate Connector on server separate from CA 

  • Download the Microsoft Intune Certificate Connector from the Microsoft site. 

  • Install it on a Windows server in your environment, ensuring it can communicate with your CA and Intune. 

  • Add the functionalities and roles required by the Certificate Connector. 

  • Uninstall and Reinstall the Certificate Connector. 

  1. Configure the Certificate Connector 

  • Assigned the Logon as a service right for the service account in group policy editor on both servers. Computer Configuration > Windows Settings > Security Settings > Local Policies > User Rights AssignmentLog on as a service 

  • Ensure that Certificate Connector Server is targeting the Root CA Server. You can check this in MMC under Certificate Authority.  

  • Open the Certificate Connector configuration tool. 

  • Sign in with your Intune admin account. 

  • Configure the connector to use your CA and the published SCEP template. 

Step 3: Distribute CA Certificate via Intune 

  1. Export CA Certificate 

  • Export the Root CA certificate from the CA server using certmgr.msc 
    To identify the root certificate check if Issuer and Subject fields for equality. 

  • Right click > all tasks > export > file location as .cer 

  1. Import CA Certificate in Intune 

  • In the Intune Admin Center, navigate to Devices Configuration > Policies > Trusted Certificate  

  • Import the CA certificate and create the Trusted Certificate.  

Step 4: Enroll SCEP Certificates Automatically 

  1. Create SCEP Certificate Enrollment Profile 

  • In Intune, go to Devices > Configuration profiles > Create profile. 

  • Choose Windows 10 and later for Platform and SCEP certificate for Profile type. 

  • Select the Root CA Trusted Certificate we just create in Intune. 

  • Certificate Validity period: 3 days 

  • KSP: Enroll to TPM KSP, otherwise Fail 

  • Key Usage: Digital Signature, Key Encipherment 

  • Key Bits: 2048 

  • Hash SHA-2 

  • Extended Key Usage: Client Authentication  

  1. Configure the Profile 

  • Set the Certificate Authority to your local CA. 

  • Choose the SCEP template created for SCEP certificates. 

  • For Subject name, use a suitable configuration (e.g., DNS name or device name). 

  1. Assign the Profile 

  • Assign the profile to the relevant device group. 

Step 5: Configure Cisco Meraki for EAP-TLS 

  1. Access Meraki Dashboard 

  • Log into your Cisco Meraki Dashboard. 

  1. Set Wireless Configuration 

  • Navigate to Wireless > Configure > Access Control. 

  • Set the “Authentication” method to “WPA2 Enterprise with my RADIUS server.” 

  • Enter RADIUS server details (IP, port, and shared secret). 

  1. Enable 802.1X Authentication 

 

Setup with Cloud PKI (These steps were referenced to implement via CA server instead of PKI) : 

  • Choose EAP-TLS as the authentication method, requiring SCEP certificates. 
    Step-by-step walkthrough 

  • The setup of the Microsoft Cloud PKI Within Microsoft Intune navigate to Tenant administration > Cloud PKI and click on Create: 

  •   

  • Tenant Administration Create Microsoft Cloud PKI 

  • Root CA Creation 

  • On the creation wizard fill in the name of the new Root CA  

  • Create Microsoft Cloud PKI set Name (Root CA) 

  • Select the CA type: Root CA with a Validity period: 25 years 

  • Create Microsoft Cloud PKI Root CA properties like CY type, Validity period, EKUs, ... 

  • Extended Key Usages: select as minimum Server Auth and Client Auth. But you can add more if you wish 

  • Fill in all subject attributes for maximum compatibility 

  • O as “your company name” 

  • OU as “IT” 

  • C as “2 digit country code” 

  • ST as “your state” 

  • Locality as “en-us” or “en-gb” or “en-au” or just leave this one blank, no big deal. 

  •  
    For the key size and algorithm, I’ve chosen the strongest one RSA-4096 and SHA-512 

  • Create Microsoft Cloud PKI Root CA Subject Attributes and key size and algorithm 

  • Then click next 

  •  Issuing CA Creation 

  • Let’s proceed with the Issuing CA by doing basically the same again and using CA type Issuing CA. We start with the name of the Issuing CA: 

  • Create Microsoft Cloud PKI Issuing CA set Name 

  • Choose the CA type Issuing CA 

  • Select your newly created Intune based Root CA 
     
    Validity period I chose the maximum of 10 years 

  • The Extended Key Usages (EKU) can be chosen based on the ones I’ve added to the Root CA. 
     
    Extended Key Usages: select as minimum Server Auth and Client Auth. But you can add more if you wish 

  • Create Microsoft Cloud PKI Issuing CA Properties like CA type, Root CA Source, Validity, EKUs... 

  • Fill in the Subject attributes and the key size as per Root CA  

  • Create Microsoft Cloud PKI Issuing CA Subject Attributes 

  • Finally on the summary page, click on Create: 

  • List view Microsoft Cloud PKI created  Root CA and Issuing CA 

  • Now we are going to download the Root CA and Issuing CA certificate, as we want to deploy them later to our devices.  

  • Click on the Root CA, select properties and then click on the Button Download to download the certificate. 

  • Repeat for the Issuing CA 

  • Also for the Issuing CA, copy/save the SCEP URI, we need this in Part 3 

  •   

  • Microsoft Cloud PKI Issuing CA download of .cer file 

  • Part 2 – Meraki SSID. 

  • Log in to Meraki and navigate to the Access Control page and select your desired SSID. 

  • Set SSID to Enabled  

  • Under Security, select Enterprise with Local Auth  

  • Certificate authentication Enabled 

  • Password authentication Disabled 

  • Download the IdenTrust Root CA cert and put it with your previously downloaded Root CA and Issuing CA certificates. You will deploy this to your devices later with Intune.  Here is a copy of it for convenience. 

A screenshot of a computer Description automatically generated 

  • LDAP set to Do not verify with LDAP 

  • OCSP set to Do not verify certificate with OCSP (at least until intune cloud PKI decides to support this function.) 

  • Upload the certificate of your Issuing CA. In our instance this is the Root CA CA02. This will be the device certificate and not the Root Certificate. 

 

  • Part 3 – Intune device profiles for windows devices.   
    (The home stretch)  Process is similar for IOS. 

  • We are going to deploy 5 profiles in this order: 

  • Our Root CA certificate 

  • Our Issuing CA certificate,  

  • Meraki IdenTrust Certificate 

  • SCEP Profile (used in the WiFi Profile). 

  • WiFi profile 

 

  • Log in to intune, > Devices > Configuration Profiles:  

  • First we create the Trust Profiles 

  • Select Create then New Policy 

  • Platform Windows 8.1 and later 

  • Profile Type: Trusted Certificate 

  • Click Next 

  • Name: Enter the name of your Root CA or desired profile name. 

  • Upload the .cer file of the Root CA you downloaded in Part 1.  

  • Set destination store as Computer certificate store – Root 

  • Finish creating the profile setting the profile assignments to your Devices group. 

  • Repeat these steps for the Issuing CA and Iden Trust CA certificates you downloaded also to the Computer certificate store – Root. 

  •  

  • Second we create the SCEP Profile for our devices. 

  • Select Create then New Policy 

  • Platform Windows 8.1 and later 

  • Profile Type: SCEP Certificate 

  • Give it a name and click next. 

  • Certificate type set as Device 

  • Subject Name as CN={{AAD_Device_ID}} 

  • Subject Alternative name as  

  • DNS {{AAD_Device_ID}} 

  • DNS {{DeviceName}} 

  • Validity period as 1 Years 

  • Key storage provider (KSP) set to Enroll to Software KSP.  

  • Note (This is because some TPMs don’t support/like 4096 keys) 

  • Key Usage select both Key encipherment and Digital signature 

  • Key Size 4096 

  • Hash algorithm SHA-2 

  • Root Certificate Select your Root CA. 

  • Extended key usage Client Authentication  

  • Note: Don’t select Any – this wont work with Cloud PKI 

  • SCEP Server URLs: Paste in the SCEP URI we saved in Part 1. If you don’t have it go to your Issuing CA and re-copy. 

  • Save and assign to your Devices group. 

  • A screenshot of a computer Description automatically generated 

  •  

  • If the assignments are made you should get the Root Certificates on the device(s) and a device certificate. 

  •  

  • Windows client certificate trusted root store with deployed Microsoft Cloud PKI issuing and root CA certificates 

  • and also, the device certificate issued by the MS Cloud PKI: 

  • Windows client certificate personal  store with deployed Microsoft Cloud PKI device certificate 

  •  

  •  

  • Third and finally we create the WIFI Profile for our devices. 

  • Select Create then New Policy 

  • Platform Windows 10 and later 

  • Profile Type: WiFi 

  • Click Next 

  • A screenshot of a computer Description automatically generated 

  • A screenshot of a computer Description automatically generated 

  •  

Step 6: Test Configuration 

  1. Enroll Test Device 

  • Ensure a test device is enrolled in Intune. 

  • Verify that it receives both the CA certificate and the SCEP certificate. 

  1. Connect to Wi-Fi 

  • Attempt to connect to the configured SSID. 

  • Select the network, click “Connect,” and monitor for a successful connection. 
     

Step 7: Push to Production  

  • On the CA server change Intune SCEP Certificate in the General tab, adjust the validity period to 6 weeks. 

  • Change CertAuth SSID in Meraki name to reflect the change from testing. 

  • Keep the original Internal SSID until all devices are migrated to Intune.  

 

 

 

Creating and Using SCEP Certificate Profiles with Intune 

 
Certificate Connector for SCEP 

https://learn.microsoft.com/en-us/mem/intune/protect/certificate-connector-overview 
 
Helpful for The Meraki Side of The Configuration  

 

Prerequisites for the Certificate Connector for Microsoft Intune 

 

Another Step-by-Step Guide 

 

Use certificates for authentication in Microsoft Intune 

 

Configure and use PKCS certificates with Intune