Category filter

Configure SCEP settings for macOS devices

The document guides IT administrators on configuring SCEP settings for macOS devices and enforcing certificate-based authentication for services such as Wi-Fi, VPN, and email.

The Simple Certificate Enrollment Protocol (SCEP) is a standardized protocol for certificate management and certificate-based authentication. It facilitates certificate deployment to devices from a trusted certificate authority (CA). The obtained certificates are employed for various purposes, such as authentication, encryption, or secure communication.

Configuring SCEP on devices can help administrators establish zero-user-intervention authentication for users across network services via certificates. Devices can use SCEP to automate the process of requesting and receiving digital certificates from a certificate authority (CA). Organizations can opt for certificate-based authentication to prevent unauthorized access to network services, such as Wi-Fi, VPN, and email. Let us understand in detail how to configure SCEP for macOS users from the Hexnode UEM console.

Configure SCEP certificate profiles for Mac

To configure SCEP via policy,

  1. Log in to your UEM portal.
  2. Navigate to Policies > New Policy. Assign a suitable name and description (optional) for the policy. You can also choose to continue with an existing policy.
  3. Go to macOS > Security > SCEP. Click Configure.
  4. Enter a name in the Configuration name field to identify the SCEP Configuration.
  5. Select the type of Certificate Authority provider :
    • Microsoft CA (AD CS): Select this option if you’re using Microsoft Active Directory Certificate Services.
    • Generic: Select this option if you’re using a third-party CA that supports the SCEP protocol.

Configuring SCEP settings for macOS using policies from Hexnode

SCEP Configuration using Microsoft (AD CS)

SCEP Configuration using Microsoft (AD CS)

To configure SCEP using Microsoft CA (AD CS):

Configuration Description
Server type Select your server environment:
  • On-prem: Choose this if your Microsoft CA is managed within your local infrastructure.
  • Cloud: Choose this if your Microsoft CA is hosted in a cloud-based environment.
Server URL Provide the server URL. This is the URL that the device uses to contact the certificate authority to obtain an identity certificate.
Subject Configure the subject to include identifying information in the Certificate Signing Request (CSR) to the SCEP server. Type the representation of a X.500 name used to identify entities. For e.g.: – you can use shortcuts as C=Country, ST=State, O=Organization Name etc. This field supports the use of all wildcards.
Challenge type Select how the device will authenticate its certificate request: The options are:
  • Microsoft SCEP (mscep) – Password
  • Microsoft SCEP (mscep) – URL
  • None
Challenge (Appears when Microsoft SCEP (mscep) – Password is selected) Enter the SCEP challenge password for authenticating the certificate request.
Agent Choose an Active Directory (AD) agent for SCEP server connectivity. The agent enables devices to request certificates from your Microsoft CA, primarily for on-prem setups.
Note:


If the AD agent isn’t listed, ensure you configure the Hexnode UEM AD agent settings.

Challenge URL (Appears when Microsoft SCEP (mscep) – URL is selected) Enter the URL provided by your Certificate Authority where the device can retrieve a one-time challenge password.
Username (Appears when Microsoft SCEP (mscep) – URL is selected) Enter the username for the SCEP CA.
Password (Appears when Microsoft SCEP (mscep) – URL is selected) Enter the password for the SCEP CA.
Key size Select the key size in bits, either 1024 or 2048. The default value is 1024.
Key type Select the key encryption type. Key type is currently RSA.
Key used for Specify the usage of the key in the certificate from the following options:
  • Signing – Use the key in the certificate as a signature.
  • Encryption – Encrypt the data exchanged over the https connection by the SCEP server.
  • Signing and Encryption – Use the key for both signing and encryption which are described above.

Note that some certificate authorities won’t support both signing and encryption simultaneously.

Allow export from Keychain Access Uncheck this option to restrict the export of the private key from the keychain.
Number of automatic retries Type the number of times to retry when the server shows a pending response.
Retry delay (in seconds) Specify the number of seconds between subsequent retries.
Allow all app access By default, this option grants all applications on the device access to the certificate. If left unchecked, users must manually allow access to the applications through the device’s Keychain Access.
Subject Alternative Name Provide additional details for the certificate. This field supports the use of wildcards. The available options are:
  • DNS
  • Email address
  • UPN
  • URI
  • SID

You can provide multiple alternative names using this option.

Upload certificate to extract fingerprint Provide the fingerprint of the CA certificate to ensure that the portal connects to the correct SCEP Server.

Generic SCEP Configuration

Generic SCEP Configuration

To configure generic SCEP:

Configuration Description
Server URL Provide the SCEP server URL. This is the URL that the device uses to contact the certificate authority to obtain an identity certificate.
Subject Configure Subject to include identifying information in the Certificate Signing Request (CSR) to the SCEP server. Type the representation of a X.500 name used to identify entities. For e.g.: – you can use shortcuts as C=Country, L=Locality ST=State, O=Organization Name CN=Common Name OU=Organizational Unit etc.
Challenge Specify the secret key that the SCEP server uses to verify a certificate request from a user to Certificate Authority (CA).
Key size Select the key size in bits from options of 1024, 2048, or 4096. The default value is 1024 bits.
Key type Select the key encryption type. Key type is currently RSA.
Key used for Specify the usage of the key in the certificate from the following options:
  • Signing – Use the key in the certificate as a signature.
  • Encryption – Encrypt the data exchanged over the https connection by the SCEP server.
  • Signing and Encryption – Use the key for both signing and encryption which are described above.

Note that some certificate authorities won’t support both signing and encryption simultaneously.

Allow export from Keychain Access Uncheck this option to restrict the export of the private key from the keychain.
Number of automatic retries Type the number of times to retry when the server shows a pending response.
Retry delay (in seconds) Specify the number of seconds between subsequent retries.
Allow all app access By default, this option grants all applications on the device access to the certificate. If left unchecked, users must manually allow access to the applications through the device’s Keychain Access.
Subject Alternative Name Specify the type of alternative name for the SCEP server and its value. You can choose a type of alternative name from the following:
  • DNS
  • Email address
  • UPN
  • URI
  • SID

You can provide multiple alternative names using this option.

Upload certificate to extract fingerprint Upload a CA certificate in this field to save its fingerprint. The device uses this fingerprint to verify the authenticity of the CA’s response during certificate enrollment with the CA server.

Associate SCEP profile settings with target devices

If the policy is not saved,

  1. Navigate to Policy Targets > Devices > +Add Devices.
  2. Choose the target devices and click OK. Click Save.
  3. You can also associate the policy with device groups, users, user groups or domains from the left pane of the Policy Targets tab.

If the policy is already saved,

  1. Go to Policies and choose the desired policy.
  2. Click on the Manage drop-down and select Associate Targets.
  3. Choose the target entities and click Associate.

What happens at the device end?

After successful policy association, certificate-based authentication becomes mandatory for the devices accessing configured network services such as Wi-Fi, VPN, and email. For instance, when SCEP is configured along with a Wi-Fi policy and associated with the devices, it mandates the provision of a certificate to access the configured Wi-Fi network, ensuring secure authentication. With this policy, access to an organization’s network services is regulated through certificates, enhancing security.

Managing Mac Devices