Microsoft Intune Integration
Deploy WPA-Enterprise WiFi profiles and EAP-TLS certificates to managed Windows, iOS, Android, and macOS devices using Microsoft Intune with SCEP integration.
Overview
The Microsoft Intune integration enables:
- WiFi profile deployment to managed devices
- Certificate-based authentication (EAP-TLS)
- SCEP integration for automatic certificate enrollment
- Conditional access policies for WiFi
Prerequisites
- IronWifi account with WPA-Enterprise configured
- Microsoft Intune subscription
- Azure Active Directory
- Devices enrolled in Intune
Architecture Overview
Managed Device → Intune → WiFi Profile → IronWifi RADIUS
↓
SCEP/NDES → IronWifi CA → Certificate
IronWifi SCEP Setup
Step 1: Enable SCEP
- Log in to IronWifi Console
- Navigate to Settings > SCEP
- Enable SCEP service
- Note the SCEP URL:
https://scep.ironwifi.com/your-org
Step 2: Configure Certificate Settings
CA Settings:
- Key Size: 2048-bit (minimum)
- Validity Period: 365 days (recommended)
- Subject Name Format: Configure as needed
Challenge Password:
- Generate or set a challenge password
- Store securely for Intune configuration
Intune Configuration
Create SCEP Profile
- In Microsoft Intune admin center
- Go to Devices > Configuration profiles
- Click Create profile
- Select platform (Windows, iOS, Android, macOS)
- Choose SCEP certificate profile type
SCEP Profile Settings
Certificate Properties:
- Certificate type: User or Device
- Subject name format:
CN={{UserName}},E={{EmailAddress}} - Subject alternative name: UPN or Email as needed
- Certificate validity: Match IronWifi CA setting
- Key usage: Digital signature, Key encipherment
- Key size: 2048
- Hash algorithm: SHA-256
SCEP Server URLs:
https://scep.ironwifi.com/your-org/pkiclient.exe
Root Certificate:
- Upload IronWifi root CA certificate
- Required for trust chain
Create WiFi Profile
- Go to Devices > Configuration profiles
- Click Create profile
- Select platform
- Choose Wi-Fi profile type
WiFi Profile Settings
Basic Settings:
- Network name (SSID): Your secure SSID
- Connect automatically: Yes
- Hidden network: As configured
- Security type: WPA2-Enterprise
EAP Settings:
- EAP type: EAP-TLS
- Certificate server names: Your RADIUS server FQDN
- Root certificate for server validation: IronWifi root CA
Client Authentication:
- Authentication method: Certificate
- Client certificate (Identity): SCEP profile created above
Profile Assignment
Create Device Groups
- In Azure AD, create groups for WiFi access:
WiFi-Managed-DevicesWiFi-BYOD-Devices
Assign Profiles
- Go to each profile (SCEP and WiFi)
- Click Assignments
- Add appropriate groups
- Configure any filters needed
Deployment Order
Ensure profiles deploy in correct order:
- Root CA certificate (trust profile)
- SCEP certificate profile
- WiFi profile
Use Intune's applicability rules or dependencies if needed.
Conditional Access
WiFi-Based Conditional Access
Combine Intune with Azure AD Conditional Access:
- Create Conditional Access policy
- Require device compliance
- Grant access only to compliant devices
- WiFi authentication succeeds only for compliant devices
IronWifi + Azure AD
- Enable Azure AD integration in IronWifi
- Configure RADIUS to check Azure AD groups
- Non-compliant devices fail authentication
Platform-Specific Notes
Windows 10/11
Profile Settings:
- Single sign-on (SSO) can be enabled
- Use machine certificate for pre-login connectivity
- Configure proxy settings if needed
iOS/iPadOS
Additional Settings:
- Trust certificate profile required
- May need to disable MAC randomization
- Per-app VPN can be combined
Android Enterprise
Work Profile:
- WiFi profile applies to work profile
- Personal apps use personal WiFi
Fully Managed:
- WiFi available device-wide
macOS
Settings:
- Similar to iOS configuration
- May require additional trust profiles
- System extension approval may be needed
Troubleshooting
Certificate Not Deploying
- Check SCEP URL is accessible
- Verify challenge password
- Review Intune device sync status
- Check certificate connector logs (if using NDES)
WiFi Not Connecting
- Verify certificate deployed successfully
- Check RADIUS server receives authentication
- Review IronWifi logs for errors
- Confirm EAP settings match
Certificate Renewal
- Certificates auto-renew before expiration
- Monitor renewal threshold settings
- Check for renewal failures in Intune
Monitoring
Intune Reports
- Device configuration status
- Certificate deployment status
- Per-setting compliance
IronWifi Monitoring
- Authentication success/failure rates
- Certificate-based auth metrics
- User/device activity logs
Best Practices
- Test in pilot group before broad deployment
- Use device groups for targeted deployment
- Monitor certificate expiration proactively
- Document configuration for support team
- Plan renewal process before certs expire