SCEP & PKI Integration
Deploy passwordless, certificate-based WiFi authentication using IronWifi's HSM-protected Certificate Authority and SCEP (Simple Certificate Enrollment Protocol) for automatic certificate provisioning to managed devices.
What is SCEP?
Simple Certificate Enrollment Protocol (SCEP) allows devices to automatically request and receive certificates from a Certificate Authority. This enables:
- Passwordless authentication - No credentials to remember
- Strong security - Certificate-based mutual authentication
- Device management - Certificates tied to specific devices
- Automatic enrollment - MDM integration for deployment
Prerequisites
- IronWifi account with PKI features
- Mobile Device Management (MDM) solution (Intune, Jamf, etc.)
- Devices that support EAP-TLS
IronWifi Certificate Authority
CA Hierarchy
IronWifi uses a three-tier PKI:
- Root CA - Offline, HSM-protected
- Issuing CA - Online, issues certificates
- User/Device Certificates - End-entity certificates
Download CA Certificate
- Navigate to Account > Certificates
- Download the CA certificate chain
- Deploy to clients for trust validation
Setting Up SCEP with Intune
Step 1: Configure SCEP in IronWifi
- Navigate to Connectors > SCEP
- Note the SCEP URL
- Configure certificate template:
- Validity period
- Key size
- Usage (client authentication)
Step 2: Configure Intune SCEP Profile
- In Microsoft Endpoint Manager
- Navigate to Devices > Configuration profiles
- Create profile:
- Platform: Windows 10, iOS, Android, etc.
- Profile type: SCEP certificate
Step 3: SCEP Profile Settings
| Setting | Value |
|---|---|
| Certificate type | User |
| Subject name format | CN={{UserPrincipalName}} |
| Subject alternative name | Email={{EmailAddress}} |
| Certificate validity | 1 year (recommended) |
| Key storage provider | TPM if available |
| Key usage | Digital signature, Key encipherment |
| Key size | 2048 or higher |
| Hash algorithm | SHA-256 |
| Root certificate | IronWifi CA certificate |
| SCEP Server URLs | From IronWifi Console |
Step 4: Configure Trust Profile
Create a trusted certificate profile:
- Create new profile > Trusted certificate
- Upload IronWifi CA certificate
- Deploy to same groups as SCEP profile
Step 5: Configure WiFi Profile
Create WiFi profile for EAP-TLS:
- Create profile > Wi-Fi
- WiFi type: Enterprise
- EAP type: EAP-TLS
- Certificate: SCEP certificate
- Root certificate: IronWifi CA
Step 6: Deploy Profiles
- Assign profiles to user/device groups
- Monitor deployment status
- Verify certificate enrollment
User Auto-Creation
For SCEP to work with new users:
- Navigate to SCEP connector settings
- Enable User Auto-Creation
- Configure user template:
- Username from certificate CN
- Email from certificate SAN
- Default group assignment
note
Users must exist in IronWifi or auto-creation must be enabled for certificate authentication to succeed.
Setting Up SCEP with Jamf
Step 1: Configure Jamf Pro
- Navigate to Settings > PKI Certificates
- Add External CA
- Select SCEP
- Enter IronWifi SCEP URL
Step 2: Create Configuration Profile
- Create new Configuration Profile
- Add SCEP payload
- Configure certificate settings
- Add WiFi payload with EAP-TLS
- Deploy to devices
Manual Certificate Generation
For individual users:
- Navigate to Users > select user
- Click Add Certificate
- Select distribution method:
- Download
- Email to user
- Email download link
- Set validity period
- Click Create
Certificate Formats
| Format | Use Case |
|---|---|
| PKCS#12 (.p12/.pfx) | Windows, Android |
| PEM | macOS, Linux |
| mobileconfig | iOS/iPadOS |
Certificate Revocation
Manual Revocation
- Navigate to user's profile
- Find the certificate
- Click Revoke
- Certificate is immediately invalidated
Automatic Revocation
Certificates can be automatically revoked when:
- User is deleted
- User is disabled
- Certificate expires
RADIUS Configuration
For EAP-TLS authentication:
- Ensure your Network has EAP-TLS enabled
- Configure access points for WPA-Enterprise
- Clients present certificates during 802.1X authentication
- RADIUS validates certificate against CA
Troubleshooting
Certificate Enrollment Failed
- Verify SCEP URL is correct
- Check network connectivity
- Verify MDM profile is deployed
- Review SCEP logs in IronWifi
Authentication Failed
- Verify certificate is valid (not expired/revoked)
- Check CA certificate is trusted on client
- Confirm user exists in IronWifi
- Review RADIUS logs
Certificate Not Trusted
- Deploy CA certificate to clients
- Verify trust chain is complete
- Check certificate hasn't been revoked
Best Practices
- Short validity periods - Easier to manage, more secure
- Use MDM - Automate deployment and renewal
- Monitor expiration - Set up alerts for expiring certificates
- Regular audits - Review issued certificates
- Revoke promptly - When users leave or devices are lost