|
|
@ -1,7 +1,7 @@
|
|
|
|
---
|
|
|
|
---
|
|
|
|
title: Using Certificates for AADJ On-premises Single-sign On single sign-on
|
|
|
|
title: Using Certificates for AADJ On-premises Single-sign On single sign-on
|
|
|
|
description: If you want to use certificates for on-premises single-sign on for Azure Active Directory joined devices, then follow these additional steps.
|
|
|
|
description: If you want to use certificates for on-premises single-sign on for Azure Active Directory joined devices, then follow these additional steps.
|
|
|
|
keywords: identity, PIN, biometric, Hello, passport, AADJ, SSO,
|
|
|
|
keywords: identity, PIN, biometric, Hello, passport, AADJ, SSO,
|
|
|
|
ms.prod: w10
|
|
|
|
ms.prod: w10
|
|
|
|
ms.mktglfcycl: deploy
|
|
|
|
ms.mktglfcycl: deploy
|
|
|
|
ms.sitesec: library
|
|
|
|
ms.sitesec: library
|
|
|
@ -14,11 +14,12 @@ ms.collection: M365-identity-device-management
|
|
|
|
ms.topic: article
|
|
|
|
ms.topic: article
|
|
|
|
localizationpriority: medium
|
|
|
|
localizationpriority: medium
|
|
|
|
ms.date: 08/19/2018
|
|
|
|
ms.date: 08/19/2018
|
|
|
|
ms.reviewer:
|
|
|
|
ms.reviewer:
|
|
|
|
---
|
|
|
|
---
|
|
|
|
|
|
|
|
|
|
|
|
# Using Certificates for AADJ On-premises Single-sign On
|
|
|
|
# Using Certificates for AADJ On-premises Single-sign On
|
|
|
|
|
|
|
|
|
|
|
|
**Applies to**
|
|
|
|
**Applies to:**
|
|
|
|
- Windows 10
|
|
|
|
- Windows 10
|
|
|
|
- Azure Active Directory joined
|
|
|
|
- Azure Active Directory joined
|
|
|
|
- Hybrid Deployment
|
|
|
|
- Hybrid Deployment
|
|
|
@ -27,7 +28,7 @@ ms.reviewer:
|
|
|
|
If you plan to use certificates for on-premises single-sign on, then follow these **additional** steps to configure the environment to enroll Windows Hello for Business certificates for Azure AD joined devices.
|
|
|
|
If you plan to use certificates for on-premises single-sign on, then follow these **additional** steps to configure the environment to enroll Windows Hello for Business certificates for Azure AD joined devices.
|
|
|
|
|
|
|
|
|
|
|
|
> [!IMPORTANT]
|
|
|
|
> [!IMPORTANT]
|
|
|
|
> Ensure you have performed the configurations in [Azure AD joined devices for On-premises Single-Sign On](hello-hybrid-aadj-sso-base.md) before you continue.
|
|
|
|
> Ensure you have performed the configurations in [Azure AD joined devices for On-premises Single-Sign On](hello-hybrid-aadj-sso-base.md) before you continue.
|
|
|
|
|
|
|
|
|
|
|
|
Steps you will perform include:
|
|
|
|
Steps you will perform include:
|
|
|
|
- [Prepare Azure AD Connect](#prepare-azure-ad-connect)
|
|
|
|
- [Prepare Azure AD Connect](#prepare-azure-ad-connect)
|
|
|
@ -45,7 +46,7 @@ You need to install and configure additional infrastructure to provide Azure AD
|
|
|
|
- A Windows Server 2012 R2 domain joined server that hosts the Network Device Enrollment Services role
|
|
|
|
- A Windows Server 2012 R2 domain joined server that hosts the Network Device Enrollment Services role
|
|
|
|
|
|
|
|
|
|
|
|
### High Availaibilty
|
|
|
|
### High Availaibilty
|
|
|
|
The Network Device Enrollment Services (NDES) server role acts as a certificate registration authority. Certificate registration servers enroll certificates on behalf of the user. Users request certificates from the NDES service rather than directly from the issuing certificate authority.
|
|
|
|
The Network Device Enrollment Services (NDES) server role acts as a certificate registration authority. Certificate registration servers enroll certificates on behalf of the user. Users request certificates from the NDES service rather than directly from the issuing certificate authority.
|
|
|
|
|
|
|
|
|
|
|
|
The architecture of the NDES server prevents it from being clustered or load balanced for high availability. To provide high availability, you need to install more than one identically configured NDES servers and use Microsoft Intune to load balance then (in round-robin fashion).
|
|
|
|
The architecture of the NDES server prevents it from being clustered or load balanced for high availability. To provide high availability, you need to install more than one identically configured NDES servers and use Microsoft Intune to load balance then (in round-robin fashion).
|
|
|
|
|
|
|
|
|
|
|
@ -55,17 +56,17 @@ The Network Device Enrollment Service (NDES) server role can issue up to three u
|
|
|
|
- Encryption
|
|
|
|
- Encryption
|
|
|
|
- Signature and Encryption
|
|
|
|
- Signature and Encryption
|
|
|
|
|
|
|
|
|
|
|
|
If you need to deploy more than three types of certificates to the Azure AD joined device, you need additional NDES servers. Alternatively, consider consolidating certificates templates to reduce the number of certificate templates.
|
|
|
|
If you need to deploy more than three types of certificates to the Azure AD joined device, you need additional NDES servers. Alternatively, consider consolidating certificate templates to reduce the number of certificate templates.
|
|
|
|
|
|
|
|
|
|
|
|
### Network Requirements
|
|
|
|
### Network Requirements
|
|
|
|
All communication occurs securely over port 443.
|
|
|
|
All communication occurs securely over port 443.
|
|
|
|
|
|
|
|
|
|
|
|
## Prepare Azure AD Connect
|
|
|
|
## Prepare Azure AD Connect
|
|
|
|
Successful authentication to on-premises resources using a certificate requires the certificate to provide a hint about the on-premises domain. The hint can be the user's Active Directory distinguished name as the subject of the certificate, or the hint can be the user's user principal name where the suffix matches the Active Directory domain name.
|
|
|
|
Successful authentication to on-premises resources using a certificate requires the certificate to provide a hint about the on-premises domain. The hint can be the user's Active Directory distinguished name as the subject of the certificate, or the hint can be the user's user principal name where the suffix matches the Active Directory domain name.
|
|
|
|
|
|
|
|
|
|
|
|
Most environments change the user principal name suffix to match the organization's external domain name (or vanity domain), which prevents the user principal name as a hint to locate a domain controller. Therefore, the certificate needs the user's on-premises distinguished name in the subject to properly locate a domain controller.
|
|
|
|
Most environments change the user principal name suffix to match the organization's external domain name (or vanity domain), which prevents the user principal name as a hint to locate a domain controller. Therefore, the certificate needs the user's on-premises distinguished name in the subject to properly locate a domain controller.
|
|
|
|
|
|
|
|
|
|
|
|
To include the on-premises distinguished name in the certificate's subject, Azure AD Connect must replicate the Active Directory **distinguishedName** attribute to the Azure Active Directory **onPremisesDistinguishedName** attribute. Azure AD Connect version 1.1.819 includes the proper synchronization rules need to for these attributes.
|
|
|
|
To include the on-premises distinguished name in the certificate's subject, Azure AD Connect must replicate the Active Directory **distinguishedName** attribute to the Azure Active Directory **onPremisesDistinguishedName** attribute. Azure AD Connect version 1.1.819 includes the proper synchronization rules needed for these attributes.
|
|
|
|
|
|
|
|
|
|
|
|
### Verify AAD Connect version
|
|
|
|
### Verify AAD Connect version
|
|
|
|
Sign-in to computer running Azure AD Connect with access equivalent to _local administrator_.
|
|
|
|
Sign-in to computer running Azure AD Connect with access equivalent to _local administrator_.
|
|
|
@ -100,8 +101,8 @@ Sign-in to a domain controller or management workstation with access equivalent
|
|
|
|
Sign-in to a domain controller or management workstation with access equivalent to _domain administrator_.
|
|
|
|
Sign-in to a domain controller or management workstation with access equivalent to _domain administrator_.
|
|
|
|
|
|
|
|
|
|
|
|
1. Open **Active Directory Users and Computers**.
|
|
|
|
1. Open **Active Directory Users and Computers**.
|
|
|
|
2. Expand the domain node from the navigation pane.
|
|
|
|
2. Expand the domain node from the navigation pane.
|
|
|
|
3. Click **Computers** from the navigation pane. Right-click the name of the NDES server that will host the NDES server role. Click **Add to a group...**.
|
|
|
|
3. Click **Computers** from the navigation pane. Right-click the name of the NDES server that will host the NDES server role. Click **Add to a group...**.
|
|
|
|
4. Type **NDES Servers** in **Enter the object names to select**. Click **OK**. Click **OK** on the **Active Directory Domain Services** success dialog.
|
|
|
|
4. Type **NDES Servers** in **Enter the object names to select**. Click **OK**. Click **OK** on the **Active Directory Domain Services** success dialog.
|
|
|
|
|
|
|
|
|
|
|
|
> [!NOTE]
|
|
|
|
> [!NOTE]
|
|
|
@ -118,10 +119,10 @@ Sign-in to a domain controller or management workstation with access equivalent
|
|
|
|
4. Click **Finish**.
|
|
|
|
4. Click **Finish**.
|
|
|
|
|
|
|
|
|
|
|
|
> [!IMPORTANT]
|
|
|
|
> [!IMPORTANT]
|
|
|
|
> Configuring the service's account password to **Password never expires** may be more convenient, but it presents a security risk. Normal service account passwords should expire in accordance with the organizations user password expiration policy. Create a reminder to change the service account's password two weeks before it will expire. Share the reminder with others that are allowed to change the password to ensure the password is changed before it expires.
|
|
|
|
> Configuring the service's account password to **Password never expires** may be more convenient, but it presents a security risk. Normal service account passwords should expire in accordance with the organizations user password expiration policy. Create a reminder to change the service account's password two weeks before it will expire. Share the reminder with others that are allowed to change the password to ensure the password is changed before it expires.
|
|
|
|
|
|
|
|
|
|
|
|
### Create the NDES Service User Rights Group Policy object
|
|
|
|
### Create the NDES Service User Rights Group Policy object
|
|
|
|
The Group Policy object ensures the NDES Service account has the proper user right assign all the NDES servers in the **NDES Servers** group. As you add new NDES servers to your environment and this group, the service account automatically receives the proper user rights through Group Policy.
|
|
|
|
The Group Policy object ensures the NDES Service account has the proper user right to assign all the NDES servers in the **NDES Servers** group. As you add new NDES servers to your environment and this group, the service account automatically receives the proper user rights through the Group Policy.
|
|
|
|
|
|
|
|
|
|
|
|
Sign-in a domain controller or management workstations with _Domain Admin_ equivalent credentials.
|
|
|
|
Sign-in a domain controller or management workstations with _Domain Admin_ equivalent credentials.
|
|
|
|
|
|
|
|
|
|
|
@ -135,10 +136,10 @@ Sign-in a domain controller or management workstations with _Domain Admin_ equiv
|
|
|
|
8. In the content pane, double-click **Allow log on locally**. Select **Define these policy settings** and click **OK**. Click **Add User or Group...**. In the **Add User or Group** dialog box, click **Browse**. In the **Select Users, Computers, Service Accounts, or Groups** dialog box, type **Administrators;Backup Operators;DOMAINNAME\NDESSvc;Users** where **DOMAINNAME** is the NetBios name of the domain (Example CONTOSO\NDESSvc) in **User and group names**. Click **OK** twice.
|
|
|
|
8. In the content pane, double-click **Allow log on locally**. Select **Define these policy settings** and click **OK**. Click **Add User or Group...**. In the **Add User or Group** dialog box, click **Browse**. In the **Select Users, Computers, Service Accounts, or Groups** dialog box, type **Administrators;Backup Operators;DOMAINNAME\NDESSvc;Users** where **DOMAINNAME** is the NetBios name of the domain (Example CONTOSO\NDESSvc) in **User and group names**. Click **OK** twice.
|
|
|
|
9. In the content pane, double-click **Log on as a batch job**. Select **Define these policy settings** and click **OK**. Click **Add User or Group...**. In the **Add User or Group** dialog box, click **Browse**. In the **Select Users, Computers, Service Accounts, or Groups** dialog box, type **Administrators;Backup Operators;DOMAINNAME\NDESSvc;Performance Log Users** where **DOMAINNAME** is the NetBios name of the domain (Example CONTOSO\NDESSvc) in **User and group names**. Click **OK** twice.
|
|
|
|
9. In the content pane, double-click **Log on as a batch job**. Select **Define these policy settings** and click **OK**. Click **Add User or Group...**. In the **Add User or Group** dialog box, click **Browse**. In the **Select Users, Computers, Service Accounts, or Groups** dialog box, type **Administrators;Backup Operators;DOMAINNAME\NDESSvc;Performance Log Users** where **DOMAINNAME** is the NetBios name of the domain (Example CONTOSO\NDESSvc) in **User and group names**. Click **OK** twice.
|
|
|
|
10. In the content pane, double-click **Log on as a service**. Select **Define these policy settings** and click **OK**. Click **Add User or Group...**. In the **Add User or Group** dialog box, click **Browse**. In the **Select Users, Computers, Service Accounts, or Groups** dialog box, type **NT SERVICE\ALL SERVICES;DOMAINNAME\NDESSvc** where **DOMAINNAME** is the NetBios name of the domain (Example CONTOSO\NDESSvc) in **User and group names**. Click **OK** three times.
|
|
|
|
10. In the content pane, double-click **Log on as a service**. Select **Define these policy settings** and click **OK**. Click **Add User or Group...**. In the **Add User or Group** dialog box, click **Browse**. In the **Select Users, Computers, Service Accounts, or Groups** dialog box, type **NT SERVICE\ALL SERVICES;DOMAINNAME\NDESSvc** where **DOMAINNAME** is the NetBios name of the domain (Example CONTOSO\NDESSvc) in **User and group names**. Click **OK** three times.
|
|
|
|
11. Close the **Group Policy Management Editor**.
|
|
|
|
11. Close the **Group Policy Management Editor**.
|
|
|
|
|
|
|
|
|
|
|
|
### Configure security for the NDES Service User Rights Group Policy object
|
|
|
|
### Configure security for the NDES Service User Rights Group Policy object
|
|
|
|
The best way to deploy the **NDES Service User Rights** Group Policy object is to use security group filtering. This enables you to easily manage the computers that receive the Group Policy settings by adding them to a group.
|
|
|
|
The best way to deploy the **NDES Service User Rights** Group Policy object is to use security group filtering. This enables you to easily manage the computers that receive the Group Policy settings by adding them to a group.
|
|
|
|
|
|
|
|
|
|
|
|
Sign-in to a domain controller or management workstation with access equivalent to _domain administrator_.
|
|
|
|
Sign-in to a domain controller or management workstation with access equivalent to _domain administrator_.
|
|
|
|
|
|
|
|
|
|
|
@ -159,7 +160,7 @@ Sign-in to a domain controller or management workstation with access equivalent
|
|
|
|
3. In the **Select GPO** dialog box, select **NDES Service User Rights** or the name of the Group Policy object you previously created and click **OK**.
|
|
|
|
3. In the **Select GPO** dialog box, select **NDES Service User Rights** or the name of the Group Policy object you previously created and click **OK**.
|
|
|
|
|
|
|
|
|
|
|
|
> [!IMPORTANT]
|
|
|
|
> [!IMPORTANT]
|
|
|
|
> Linking the **NDES Service User Rights** Group Policy object to the domain ensures the Group Policy object is in scope for all computers. However, not all computers will have the policy settings applied to them. Only computers that are members of the **NDES Servers** global security group receive the policy settings. All others computers ignore the Group Policy object.
|
|
|
|
> Linking the **NDES Service User Rights** Group Policy object to the domain ensures the Group Policy object is in scope for all computers. However, not all computers will have the policy settings applied to them. Only computers that are members of the **NDES Servers** global security group receive the policy settings. All others computers ignore the Group Policy object.
|
|
|
|
|
|
|
|
|
|
|
|
## Prepare Active Directory Certificate Authority
|
|
|
|
## Prepare Active Directory Certificate Authority
|
|
|
|
You must prepare the public key infrastructure and the issuing certificate authority to support issuing certificates using Microsoft Intune and the Network Devices Enrollment Services (NDES) server role. In this task, you will
|
|
|
|
You must prepare the public key infrastructure and the issuing certificate authority to support issuing certificates using Microsoft Intune and the Network Devices Enrollment Services (NDES) server role. In this task, you will
|
|
|
@ -177,46 +178,52 @@ When deploying certificates using Microsoft Intune, you have the option of provi
|
|
|
|
|
|
|
|
|
|
|
|
Sign-in to the issuing certificate authority with access equivalent to _local administrator_.
|
|
|
|
Sign-in to the issuing certificate authority with access equivalent to _local administrator_.
|
|
|
|
|
|
|
|
|
|
|
|
1. Open and elevated command prompt. Type the command
|
|
|
|
1. Open an elevated command prompt and type the following command:
|
|
|
|
```
|
|
|
|
```
|
|
|
|
certutil -setreg Policy\EditFlags +EDITF_ATTRIBUTEENDDATE
|
|
|
|
certutil -setreg Policy\EditFlags +EDITF_ATTRIBUTEENDDATE
|
|
|
|
```
|
|
|
|
```
|
|
|
|
2. Restart the **Active Directory Certificate Services** service.
|
|
|
|
2. Restart the **Active Directory Certificate Services** service.
|
|
|
|
|
|
|
|
|
|
|
|
### Create an NDES-Intune authentication certificate template
|
|
|
|
### Create an NDES-Intune authentication certificate template
|
|
|
|
NDES uses a server authentication certificate to authenticate the server endpoint, which encrypts the communication between it and the connecting client. The Intune Certificate Connector uses a client authentication certificate template to authenticate to the certificate registration point.
|
|
|
|
NDES uses a server authentication certificate to authenticate the server endpoint, which encrypts the communication between it and the connecting client. The Intune Certificate Connector uses a client authentication certificate template to authenticate to the certificate registration point.
|
|
|
|
|
|
|
|
|
|
|
|
Sign-in to the issuing certificate authority or management workstations with _Domain Admin_ equivalent credentials.
|
|
|
|
Sign-in to the issuing certificate authority or management workstations with _Domain Admin_ equivalent credentials.
|
|
|
|
|
|
|
|
|
|
|
|
1. Open the **Certificate Authority** management console.
|
|
|
|
1. Open the **Certificate Authority** management console.
|
|
|
|
2. Right-click **Certificate Templates** and click **Manage**.
|
|
|
|
2. Right-click **Certificate Templates** and click **Manage**.
|
|
|
|
3. In the **Certificate Template Console**, right-click the **Computer** template in the details pane and click **Duplicate Template**.
|
|
|
|
3. In the **Certificate Template Console**, right-click the **Computer** template in the details pane and click **Duplicate Template**.
|
|
|
|
4. On the **General** tab, type **NDES-Intune Authentication** in **Template display name**. Adjust the validity and renewal period to meet your enterprise's needs.
|
|
|
|
4. On the **General** tab, type **NDES-Intune Authentication** in **Template display name**. Adjust the validity and renewal period to meet your enterprise's needs.
|
|
|
|
**Note:** If you use different template names, you'll need to remember and substitute these names in different portions of the lab.
|
|
|
|
|
|
|
|
5. On the **Subject** tab, select **Supply in the request**.
|
|
|
|
> [!NOTE]
|
|
|
|
6. On the **Cryptography** tab, validate the **Minimum key size** is **2048**.
|
|
|
|
> If you use different template names, you'll need to remember and substitute these names in different portions of the lab.
|
|
|
|
7. On the **Security** tab, click **Add**.
|
|
|
|
|
|
|
|
8. Type **NDES server** in the **Enter the object names to select** text box and click **OK**.
|
|
|
|
5. On the **Subject** tab, select **Supply in the request**.
|
|
|
|
9. Select **NDES server** from the **Group or users names** list. In the **Permissions for** section, select the **Allow** check box for the **Enroll** permission. Clear the **Allow** check box for the **Enroll** and **Autoenroll** permissions for all other items in the **Group or users names** list if the check boxes are not already cleared. Click **OK**.
|
|
|
|
6. On the **Cryptography** tab, validate the **Minimum key size** is **2048**.
|
|
|
|
10. Click on the **Apply** to save changes and close the console.
|
|
|
|
7. On the **Security** tab, click **Add**.
|
|
|
|
|
|
|
|
8. Type **NDES server** in the **Enter the object names to select** text box and click **OK**.
|
|
|
|
|
|
|
|
9. Select **NDES server** from the **Group or users names** list. In the **Permissions for** section, select the **Allow** check box for the **Enroll** permission. Clear the **Allow** check box for the **Enroll** and **Autoenroll** permissions for all other items in the **Group or users names** list if the check boxes are not already cleared. Click **OK**.
|
|
|
|
|
|
|
|
10. Click on the **Apply** to save changes and close the console.
|
|
|
|
|
|
|
|
|
|
|
|
### Create an Azure AD joined Windows Hello for Business authentication certificate template
|
|
|
|
### Create an Azure AD joined Windows Hello for Business authentication certificate template
|
|
|
|
During Windows Hello for Business provisioning, Windows 10 requests an authentication certificate from the Microsoft Intune, which requests the authentication certificate on behalf of the user. This task configures the Windows Hello for Business authentication certificate template. You use the name of the certificate template when configuring the NDES Server.
|
|
|
|
During Windows Hello for Business provisioning, Windows 10 requests an authentication certificate from Microsoft Intune, which requests the authentication certificate on behalf of the user. This task configures the Windows Hello for Business authentication certificate template. You use the name of the certificate template when configuring the NDES Server.
|
|
|
|
|
|
|
|
|
|
|
|
Sign-in a certificate authority or management workstations with _Domain Admin equivalent_ credentials.
|
|
|
|
Sign in a certificate authority or management workstations with _Domain Admin equivalent_ credentials.
|
|
|
|
|
|
|
|
|
|
|
|
1. Open the **Certificate Authority** management console.
|
|
|
|
1. Open the **Certificate Authority** management console.
|
|
|
|
2. Right-click **Certificate Templates** and click **Manage**.
|
|
|
|
2. Right-click **Certificate Templates** and click **Manage**.
|
|
|
|
3. Right-click the **Smartcard Logon** template and choose **Duplicate Template**.
|
|
|
|
3. Right-click the **Smartcard Logon** template and choose **Duplicate Template**.
|
|
|
|
4. On the **Compatibility** tab, clear the **Show resulting changes** check box. Select **Windows Server 2012** or **Windows Server 2012 R2** from the **Certification Authority** list. Select **Windows Server 2012** or **Windows Server 2012 R2** from the **Certification Recipient** list.
|
|
|
|
4. On the **Compatibility** tab, clear the **Show resulting changes** check box. Select **Windows Server 2012** or **Windows Server 2012 R2** from the **Certification Authority** list. Select **Windows Server 2012** or **Windows Server 2012 R2** from the **Certification Recipient** list.
|
|
|
|
5. On the **General** tab, type **AADJ WHFB Authentication** in **Template display name**. Adjust the validity and renewal period to meet your enterprise's needs.
|
|
|
|
5. On the **General** tab, type **AADJ WHFB Authentication** in **Template display name**. Adjust the validity and renewal period to meet your enterprise's needs.
|
|
|
|
**Note:** If you use different template names, you'll need to remember and substitute these names in different portions of the deployment.
|
|
|
|
|
|
|
|
6. On the **Cryptography** tab, select **Key Storage Provider** from the **Provider Category** list. Select **RSA** from the **Algorithm name** list. Type **2048** in the **Minimum key size** text box. Select **SHA256** from the **Request hash** list.
|
|
|
|
> [!NOTE]
|
|
|
|
|
|
|
|
> If you use different template names, you'll need to remember and substitute these names in different portions of the deployment.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
6. On the **Cryptography** tab, select **Key Storage Provider** from the **Provider Category** list. Select **RSA** from the **Algorithm name** list. Type **2048** in the **Minimum key size** text box. Select **SHA256** from the **Request hash** list.
|
|
|
|
7. On the **Extensions** tab, verify the **Application Policies** extension includes **Smart Card Logon**.
|
|
|
|
7. On the **Extensions** tab, verify the **Application Policies** extension includes **Smart Card Logon**.
|
|
|
|
8. On the **Subject** tab, select **Supply in the request**.
|
|
|
|
8. On the **Subject** tab, select **Supply in the request**.
|
|
|
|
9. On the **Request Handling** tab, select **Signature and encryption** from the **Purpose** list. Select the **Renew with same key** check box. Select **Enroll subject without requiring any user input**.
|
|
|
|
9. On the **Request Handling** tab, select **Signature and encryption** from the **Purpose** list. Select the **Renew with same key** check box. Select **Enroll subject without requiring any user input**.
|
|
|
|
10. On the **Security** tab, click **Add**. Type **NDESSvc** in the **Enter the object names to select** text box and click **OK**.
|
|
|
|
10. On the **Security** tab, click **Add**. Type **NDESSvc** in the **Enter the object names to select** text box and click **OK**.
|
|
|
|
12. Select **NDESSvc** from the **Group or users names** list. In the **Permissions for NDES Servers** section, select the **Allow** check box for the **Read**, **Enroll**. Clear the **Allow** check box for the **Enroll** and **Autoenroll** permissions for all other entries in the **Group or users names** section if the check boxes are not already cleared. Click **OK**.
|
|
|
|
12. Select **NDESSvc** from the **Group or users names** list. In the **Permissions for NDES Servers** section, select the **Allow** check box for **Read** and **Enroll**. Clear the **Allow** check box for the **Enroll** and **Autoenroll** permissions for all other entries in the **Group or users names** section if the check boxes are not already cleared. Click **OK**.
|
|
|
|
13. Close the console.
|
|
|
|
13. Close the console.
|
|
|
|
|
|
|
|
|
|
|
|
### Publish certificate templates
|
|
|
|
### Publish certificate templates
|
|
|
@ -231,7 +238,7 @@ Sign-in to the certificate authority or management workstations with an _Enterpr
|
|
|
|
2. Expand the parent node from the navigation pane.
|
|
|
|
2. Expand the parent node from the navigation pane.
|
|
|
|
3. Click **Certificate Templates** in the navigation pane.
|
|
|
|
3. Click **Certificate Templates** in the navigation pane.
|
|
|
|
4. Right-click the **Certificate Templates** node. Click **New**, and click **Certificate Template** to issue.
|
|
|
|
4. Right-click the **Certificate Templates** node. Click **New**, and click **Certificate Template** to issue.
|
|
|
|
5. In the **Enable Certificates Templates** window, select the **NDES-Intune Authentication** and **AADJ WHFB Authentication** templates you created in the previous steps. Click **OK** to publish the selected certificate templates to the certificate authority.
|
|
|
|
5. In the **Enable Certificates Templates** window, select the **NDES-Intune Authentication** and **AADJ WHFB Authentication** templates you created in the previous steps. Click **OK** to publish the selected certificate templates to the certificate authority.
|
|
|
|
6. Close the console.
|
|
|
|
6. Close the console.
|
|
|
|
|
|
|
|
|
|
|
|
## Install and Configure the NDES Role
|
|
|
|
## Install and Configure the NDES Role
|
|
|
@ -250,10 +257,10 @@ Install the Network Device Enrollment Service role on a computer other than the
|
|
|
|
Sign-in to the certificate authority or management workstations with an _Enterprise Admin_ equivalent credentials.
|
|
|
|
Sign-in to the certificate authority or management workstations with an _Enterprise Admin_ equivalent credentials.
|
|
|
|
|
|
|
|
|
|
|
|
1. Open **Server Manager** on the NDES server.
|
|
|
|
1. Open **Server Manager** on the NDES server.
|
|
|
|
2. Click **Manage**. Click **Add Roles and Features**.
|
|
|
|
2. Click **Manage**. Click **Add Roles and Features**.
|
|
|
|
3. In the **Add Roles and Features Wizard**, on the **Before you begin** page, click **Next**. Select **Role-based or feature-based installation** on the **Select installation type** page. Click **Next**. Click **Select a server from the server pool**. Select the local server from the **Server Pool** list. Click **Next**.
|
|
|
|
3. In the **Add Roles and Features Wizard**, on the **Before you begin** page, click **Next**. Select **Role-based or feature-based installation** on the **Select installation type** page. Click **Next**. Click **Select a server from the server pool**. Select the local server from the **Server Pool** list. Click **Next**.
|
|
|
|

|
|
|
|

|
|
|
|
4. On the **Select server roles** page, select **Active Directory Certificate Services** from the **Roles** list.
|
|
|
|
4. On the **Select server roles** page, select **Active Directory Certificate Services** from the **Roles** list.
|
|
|
|

|
|
|
|

|
|
|
|
Click **Add Features** on the **Add Roles and Feature Wizard** dialog box. Click **Next**.
|
|
|
|
Click **Add Features** on the **Add Roles and Feature Wizard** dialog box. Click **Next**.
|
|
|
|

|
|
|
|

|
|
|
@ -270,8 +277,8 @@ Sign-in to the certificate authority or management workstations with an _Enterpr
|
|
|
|
* **Management Tools > IIS 6 Management Compatibility > IIS 6 WMI Compatibility**
|
|
|
|
* **Management Tools > IIS 6 Management Compatibility > IIS 6 WMI Compatibility**
|
|
|
|

|
|
|
|

|
|
|
|
9. Click **Install**. When the installation completes, continue with the next procedure. **Do not click Close**.
|
|
|
|
9. Click **Install**. When the installation completes, continue with the next procedure. **Do not click Close**.
|
|
|
|
> [!Important]
|
|
|
|
> [!IMPORTANT]
|
|
|
|
> The .NET Framework 3.5 is not included in the typical installation. If the server is connected to the Internet, the installation attempts to get the files using Windows Update. If the server is not connected to the Internet, you need to **Specify an alternate source path** such as \<driveLetter>:\\Sources\SxS\
|
|
|
|
> .NET Framework 3.5 is not included in the typical installation. If the server is connected to the Internet, the installation attempts to get the files using Windows Update. If the server is not connected to the Internet, you need to **Specify an alternate source path** such as \<driveLetter>:\\Sources\SxS\
|
|
|
|

|
|
|
|

|
|
|
|
|
|
|
|
|
|
|
|
### Configure the NDES service account
|
|
|
|
### Configure the NDES service account
|
|
|
@ -280,19 +287,23 @@ This task adds the NDES service account to the local IIS_USRS group. The task a
|
|
|
|
#### Add the NDES service account to the IIS_USRS group
|
|
|
|
#### Add the NDES service account to the IIS_USRS group
|
|
|
|
Sign-in the NDES server with access equivalent to _local administrator_.
|
|
|
|
Sign-in the NDES server with access equivalent to _local administrator_.
|
|
|
|
|
|
|
|
|
|
|
|
1. Start the **Local Users and Groups** management console (lusrmgr.msc).
|
|
|
|
1. Start the **Local Users and Groups** management console (`lusrmgr.msc`).
|
|
|
|
2. Select **Groups** from the navigation pane. Double-click the IIS_IUSRS group.
|
|
|
|
2. Select **Groups** from the navigation pane. Double-click the IIS_IUSRS group.
|
|
|
|
3. In the **IIS_IUSRS Properties** dialog box, click **Add**. Type **NDESSvc** or the name of your NDES service account. Click **Check Names** to verify the name and then click **OK**. Click **OK** to close the properties dialog box.
|
|
|
|
3. In the **IIS_IUSRS Properties** dialog box, click **Add**. Type **NDESSvc** or the name of your NDES service account. Click **Check Names** to verify the name and then click **OK**. Click **OK** to close the properties dialog box.
|
|
|
|
4. Close the management console.
|
|
|
|
4. Close the management console.
|
|
|
|
|
|
|
|
|
|
|
|
#### Register a Service Principal Name on the NDES Service account
|
|
|
|
#### Register a Service Principal Name on the NDES Service account
|
|
|
|
Sign-in the NDES server with a access equivalent to _Domain Admins_.
|
|
|
|
Sign-in the NDES server with access equivalent to _Domain Admins_.
|
|
|
|
|
|
|
|
|
|
|
|
1. Open an elevated command prompt.
|
|
|
|
1. Open an elevated command prompt.
|
|
|
|
2. Type the following command to register the service principal name<br>
|
|
|
|
2. Type the following command to register the service principal name
|
|
|
|
```setspn -s http/[FqdnOfNdesServer] [DomainName\\NdesServiceAccount]```<br>
|
|
|
|
```
|
|
|
|
where **[FqdnOfNdesServer]** is the fully qualified domain name of the NDES server and **[DomainName\NdesServiceAccount]** is the domain name and NDES service account name separated by a backslash (\\). An example of the command looks like the following.<br>
|
|
|
|
setspn -s http/[FqdnOfNdesServer] [DomainName\\NdesServiceAccount]
|
|
|
|
```setspn -s http/ndes.corp.contoso.com contoso\ndessvc```
|
|
|
|
```
|
|
|
|
|
|
|
|
where **[FqdnOfNdesServer]** is the fully qualified domain name of the NDES server and **[DomainName\NdesServiceAccount]** is the domain name and NDES service account name separated by a backslash (\\). An example of the command looks like the following:
|
|
|
|
|
|
|
|
```
|
|
|
|
|
|
|
|
setspn -s http/ndes.corp.contoso.com contoso\ndessvc
|
|
|
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
|
|
> [!NOTE]
|
|
|
|
> [!NOTE]
|
|
|
|
> If you use the same service account for multiple NDES Servers, repeat the following task for each NDES server under which the NDES service runs.
|
|
|
|
> If you use the same service account for multiple NDES Servers, repeat the following task for each NDES server under which the NDES service runs.
|
|
|
@ -306,16 +317,16 @@ Sign-in a domain controller with a minimum access equivalent to _Domain Admins_.
|
|
|
|
|
|
|
|
|
|
|
|
1. Open **Active Directory Users and Computers**
|
|
|
|
1. Open **Active Directory Users and Computers**
|
|
|
|
2. Locate the NDES Service account (NDESSvc). Right-click and select **Properties**. Click the **Delegation** tab.
|
|
|
|
2. Locate the NDES Service account (NDESSvc). Right-click and select **Properties**. Click the **Delegation** tab.
|
|
|
|

|
|
|
|

|
|
|
|
3. Select **Trust this user for delegation to specified services only**.
|
|
|
|
3. Select **Trust this user for delegation to specified services only**.
|
|
|
|
4. Select **Use any authentication protocol**.
|
|
|
|
4. Select **Use any authentication protocol**.
|
|
|
|
5. Click **Add**.
|
|
|
|
5. Click **Add**.
|
|
|
|
6. Click **Users or Computers...** Type the name of the _NDES Server_ you use to issue Windows Hello for Business authentication certificates to Azure AD joined devices. From the **Avaiable services** list, select **HOST**. Click **OK**.
|
|
|
|
6. Click **Users or Computers...** Type the name of the _NDES Server_ you use to issue Windows Hello for Business authentication certificates to Azure AD joined devices. From the **Avaiable services** list, select **HOST**. Click **OK**.
|
|
|
|

|
|
|
|

|
|
|
|
7. Repeat steps 5 and 6 for each NDES server using this service account.8. Click **Add**.
|
|
|
|
7. Repeat steps 5 and 6 for each NDES server using this service account. Click **Add**.
|
|
|
|
8. Click **Users or computers...** Type the name of the issuing certificate authority this NDES service account uses to issue Windows Hello for Business authentication certificates to Azure AD joined devices. From the **Available services** list, select **dcom**. Hold the **CTRL** key and select **HOST**. Click **OK**.
|
|
|
|
8. Click **Users or computers...** Type the name of the issuing certificate authority this NDES service account uses to issue Windows Hello for Business authentication certificates to Azure AD joined devices. From the **Available services** list, select **dcom**. Hold the **CTRL** key and select **HOST**. Click **OK**.
|
|
|
|
9. Repeat steps 8 and 9 for each issuing certificate authority from which one or more NDES servers request certificates.
|
|
|
|
9. Repeat steps 8 and 9 for each issuing certificate authority from which one or more NDES servers request certificates.
|
|
|
|

|
|
|
|

|
|
|
|
10. Click **OK**. Close **Active Directory Users and Computers**.
|
|
|
|
10. Click **OK**. Close **Active Directory Users and Computers**.
|
|
|
|
|
|
|
|
|
|
|
|
### Configure the NDES Role and Certificate Templates
|
|
|
|
### Configure the NDES Role and Certificate Templates
|
|
|
@ -325,61 +336,65 @@ This task configures the NDES role and the certificate templates the NDES server
|
|
|
|
Sign-in to the certificate authority or management workstations with an _Enterprise Admin_ equivalent credentials.
|
|
|
|
Sign-in to the certificate authority or management workstations with an _Enterprise Admin_ equivalent credentials.
|
|
|
|
|
|
|
|
|
|
|
|
> [!NOTE]
|
|
|
|
> [!NOTE]
|
|
|
|
> If you closed Server Manger from the last set of tasks, start Server Manager and click the action flag that shows a yellow exclamation point.
|
|
|
|
> If you closed Server Manger from the last set of tasks, start Server Manager and click the action flag that shows a yellow exclamation point.
|
|
|
|
|
|
|
|
|
|
|
|

|
|
|
|

|
|
|
|
|
|
|
|
|
|
|
|
1. Click the **Configure Active Directory Certificate Services on the destination server** link.
|
|
|
|
1. Click the **Configure Active Directory Certificate Services on the destination server** link.
|
|
|
|
2. On the **Credentials** page, click **Next**.
|
|
|
|
2. On the **Credentials** page, click **Next**.
|
|
|
|

|
|
|
|

|
|
|
|
3. On the **Role Services** page, select **Network Device Enrollment Service** and then click **Next**
|
|
|
|
3. On the **Role Services** page, select **Network Device Enrollment Service** and then click **Next**
|
|
|
|

|
|
|
|

|
|
|
|
4. On the **Service Account for NDES** page, select **Specify service account (recommended)**. Click **Select...** Type the user name and password for the NDES service account in the **Windows Security** dialog box. Click **Next**.
|
|
|
|
4. On the **Service Account for NDES** page, select **Specify service account (recommended)**. Click **Select...**. Type the user name and password for the NDES service account in the **Windows Security** dialog box. Click **Next**.
|
|
|
|

|
|
|
|

|
|
|
|
5. On the **CA for NDES** page, select **CA name**. Click **Select...**. Select the issuing certificate authority from which the NDES server requests certificates. Click **Next**.
|
|
|
|
5. On the **CA for NDES** page, select **CA name**. Click **Select...**. Select the issuing certificate authority from which the NDES server requests certificates. Click **Next**.
|
|
|
|

|
|
|
|

|
|
|
|
6. On the **RA Information**, click **Next**.
|
|
|
|
6. On the **RA Information**, click **Next**.
|
|
|
|
7. On the **Cryptography for NDES** page, click **Next**.
|
|
|
|
7. On the **Cryptography for NDES** page, click **Next**.
|
|
|
|
8. Review the **Confirmation** page. Click **Configure**.
|
|
|
|
8. Review the **Confirmation** page. Click **Configure**.
|
|
|
|

|
|
|
|

|
|
|
|
8. Click **Close** after the configuration completes.
|
|
|
|
8. Click **Close** after the configuration completes.
|
|
|
|
|
|
|
|
|
|
|
|
#### Configure Certificate Templates on NDES
|
|
|
|
#### Configure Certificate Templates on NDES
|
|
|
|
A single NDES server can request a maximum of three certificate template. The NDES server determines which certificate to issue based on the incoming certificate request that is assigned in the Microsoft Intune SCEP certificate profile. The Microsoft Intune SCEP certificate profile has three values.
|
|
|
|
A single NDES server can request a maximum of three certificate templates. The NDES server determines which certificate to issue based on the incoming certificate request that is assigned in the Microsoft Intune SCEP certificate profile. The Microsoft Intune SCEP certificate profile has three values.
|
|
|
|
* Digital Signature
|
|
|
|
* Digital Signature
|
|
|
|
* Key Encipherment
|
|
|
|
* Key Encipherment
|
|
|
|
* Key Encipherment, Digital Signature
|
|
|
|
* Key Encipherment, Digital Signature
|
|
|
|
|
|
|
|
|
|
|
|
Each value maps to a registry value name in the NDES server. The NDES server translate an incoming SCEP provide value into the correspond certificate template. The table belows shows the SCEP profile value to the NDES certificate template registry value name
|
|
|
|
Each value maps to a registry value name in the NDES server. The NDES server translates an incoming SCEP provided value into the corresponding certificate template. The table below shows the SCEP profile values of the NDES certificate template registry value names.
|
|
|
|
|
|
|
|
|
|
|
|
|SCEP Profile Key usage| NDES Registry Value Name|
|
|
|
|
| SCEP Profile Key usage| NDES Registry Value Name |
|
|
|
|
|:----------:|:-----------------------:|
|
|
|
|
| :-------------------: | :----------------------: |
|
|
|
|
|Digital Signature|SignatureTemplate|
|
|
|
|
| Digital Signature | SignatureTemplate |
|
|
|
|
|Key Encipherment|EncryptionTemplate|
|
|
|
|
| Key Encipherment | EncryptionTemplate |
|
|
|
|
|Key Encipherment<br>Digital Signature|GeneralPurposeTemplate|
|
|
|
|
| Key Encipherment<br>Digital Signature | GeneralPurposeTemplate |
|
|
|
|
|
|
|
|
|
|
|
|
Ideally, you should match the certificate request with registry value name to keep the configuration intuitive (encryption certificates use the encryptionTemplate, signature certificates use the signature template, etc.). A result of this intuitive design is the potential exponential growth in NDES server. Imagine an organization that needs to issue nine unique signature certificates across their enterprise.
|
|
|
|
Ideally, you should match the certificate request with the registry value name to keep the configuration intuitive (encryption certificates use the encryption template, signature certificates use the signature template, etc.). A result of this intuitive design is the potential exponential growth in the NDES server. Imagine an organization that needs to issue nine unique signature certificates across their enterprise.
|
|
|
|
|
|
|
|
|
|
|
|
If the need arises, you can configure a signature certificate in the encryption registry value name or an encryption certificate in the signature registry value to maximize the use of your NDES infrastructure. This unintuitive design requires current and accurate documentation of the configuration to ensure the SCEP certificate profile is configured to enroll the correct certificate, regardless of the actual purpose. Each organization needs to balance ease of configuration and administration with additional NDES infrastructure and the management overhead that comes with it.
|
|
|
|
If the need arises, you can configure a signature certificate in the encryption registry value name or an encryption certificate in the signature registry value to maximize the use of your NDES infrastructure. This unintuitive design requires current and accurate documentation of the configuration to ensure the SCEP certificate profile is configured to enroll the correct certificate, regardless of the actual purpose. Each organization needs to balance ease of configuration and administration with additional NDES infrastructure and the management overhead that comes with it.
|
|
|
|
|
|
|
|
|
|
|
|
Sign-in to the NDES Server with _local administrator_ equivalent credentials.
|
|
|
|
Sign-in to the NDES Server with _local administrator_ equivalent credentials.
|
|
|
|
|
|
|
|
|
|
|
|
1. Open an elevated command prompt.
|
|
|
|
1. Open an elevated command prompt.
|
|
|
|
2. Using the table above, decide which registry value name you will use to request Windows Hello for Business authentication certificates for Azure AD joined devices.
|
|
|
|
2. Using the table above, decide which registry value name you will use to request Windows Hello for Business authentication certificates for Azure AD joined devices.
|
|
|
|
3. Type the following command<br>
|
|
|
|
3. Type the following command:
|
|
|
|
```reg add HKLM\Software\Microsoft\Cryptography\MSCEP /v [registryValueName] /t REG_SZ /d [certificateTemplateName]```<br>
|
|
|
|
```
|
|
|
|
where **registryValueName** is one of the three value names from the above table and where **certificateTemplateName** is the name of the certificate template you created for Windows Hello for Business Azure AD joined devices. Example:<br>
|
|
|
|
reg add HKLM\Software\Microsoft\Cryptography\MSCEP /v [registryValueName] /t REG_SZ /d [certificateTemplateName]
|
|
|
|
```reg add HKLM\Software\Microsoft\Cryptography\MSCEP /v SignatureTemplate /t REG_SZ /d AADJWHFBAuthentication```<br>
|
|
|
|
```
|
|
|
|
|
|
|
|
where **registryValueName** is one of the three value names from the above table and where **certificateTemplateName** is the name of the certificate template you created for Windows Hello for Business Azure AD joined devices. Example:
|
|
|
|
|
|
|
|
```
|
|
|
|
|
|
|
|
reg add HKLM\Software\Microsoft\Cryptography\MSCEP /v SignatureTemplate /t REG_SZ /d AADJWHFBAuthentication
|
|
|
|
|
|
|
|
```
|
|
|
|
4. Type **Y** when the command asks for permission to overwrite the existing value.
|
|
|
|
4. Type **Y** when the command asks for permission to overwrite the existing value.
|
|
|
|
5. Close the command prompt.
|
|
|
|
5. Close the command prompt.
|
|
|
|
|
|
|
|
|
|
|
|
> [!IMPORTANT]
|
|
|
|
> [!IMPORTANT]
|
|
|
|
> Use the **name** of the certificate template; not the **display name**. The certificate template name does not include spaces. You can view the certificate names by looking at the **General** tab of the certificate template's properties in the **Certificates Templates** management console (certtmpl.msc).
|
|
|
|
> Use the **name** of the certificate template; not the **display name**. The certificate template name does not include spaces. You can view the certificate names by looking at the **General** tab of the certificate template's properties in the **Certificates Templates** management console (`certtmpl.msc`).
|
|
|
|
|
|
|
|
|
|
|
|
### Create a Web Application Proxy for the internal NDES URL.
|
|
|
|
### Create a Web Application Proxy for the internal NDES URL.
|
|
|
|
Certificate enrollment for Azure AD joined devices occurs over the Internet. As a result, the internal NDES URLs must be accessible externally. You can do this easily and securely using Azure Active Directory Application Proxy. Azure AD Application Proxy provides single sign-on and secure remote access for web applications hosted on-premises, such as Network Device Enrollment Services.
|
|
|
|
Certificate enrollment for Azure AD joined devices occurs over the Internet. As a result, the internal NDES URLs must be accessible externally. You can do this easily and securely using Azure Active Directory Application Proxy. Azure AD Application Proxy provides single sign-on and secure remote access for web applications hosted on-premises, such as Network Device Enrollment Services.
|
|
|
|
|
|
|
|
|
|
|
|
Ideally, you configure your Microsoft Intune SCEP certificate profile to use multiple external NDES URLs. This enables Microsoft Intune to round-robin load balance the certificate requests to identically configured NDES Servers (each NDES server can accommodate approximately 300 concurrent requests). Microsoft Intune sends these requests to Azure AD Application Proxies.
|
|
|
|
Ideally, you configure your Microsoft Intune SCEP certificate profile to use multiple external NDES URLs. This enables Microsoft Intune to round-robin load balance the certificate requests to identically configured NDES Servers (each NDES server can accommodate approximately 300 concurrent requests). Microsoft Intune sends these requests to Azure AD Application Proxies.
|
|
|
|
|
|
|
|
|
|
|
|
Azure AD Application proxies are serviced by lightweight Application Proxy Connector agents. These agents are installed on your on-premises, domain joined devices and make authenticated secure outbound connection to Azure, waiting to process requests from Azure AD Application Proxies. You can create connector groups in Azure Active Directory to assign specific connectors to service specific applications.
|
|
|
|
Azure AD Application proxies are serviced by lightweight Application Proxy Connector agents. These agents are installed on your on-premises, domain joined devices and make authenticated secure outbound connection to Azure, waiting to process requests from Azure AD Application Proxies. You can create connector groups in Azure Active Directory to assign specific connectors to service specific applications.
|
|
|
|
|
|
|
|
|
|
|
@ -395,7 +410,7 @@ Sign-in a workstation with access equivalent to a _domain user_.
|
|
|
|

|
|
|
|

|
|
|
|
5. Sign-in the computer that will run the connector with access equivalent to a _domain user_.
|
|
|
|
5. Sign-in the computer that will run the connector with access equivalent to a _domain user_.
|
|
|
|
> [!IMPORTANT]
|
|
|
|
> [!IMPORTANT]
|
|
|
|
> Install a minimum of two Azure Active Directory Proxy connectors for each NDES Application Proxy. Strategtically locate Azure AD application proxy connectors throughout your organization to ensure maximum availablity. Remember, devices running the connector must be able to communicate with Azure and the on-premises NDES servers.
|
|
|
|
> Install a minimum of two Azure Active Directory Proxy connectors for each NDES Application Proxy. Strategically locate Azure AD application proxy connectors throughout your organization to ensure maximum availability. Remember, devices running the connector must be able to communicate with Azure and the on-premises NDES servers.
|
|
|
|
|
|
|
|
|
|
|
|
6. Start **AADApplicationProxyConnectorInstaller.exe**.
|
|
|
|
6. Start **AADApplicationProxyConnectorInstaller.exe**.
|
|
|
|
7. Read the license terms and then select **I agree to the license terms and conditions**. Click **Install**.
|
|
|
|
7. Read the license terms and then select **I agree to the license terms and conditions**. Click **Install**.
|
|
|
@ -412,9 +427,9 @@ Sign-in a workstation with access equivalent to a _domain user_.
|
|
|
|
1. Sign-in to the [Azure Portal](https://portal.azure.com/) with access equivalent to **Global Administrator**.
|
|
|
|
1. Sign-in to the [Azure Portal](https://portal.azure.com/) with access equivalent to **Global Administrator**.
|
|
|
|
2. Select **All Services**. Type **Azure Active Directory** to filter the list of services. Under **SERVICES**, Click **Azure Active Directory**.
|
|
|
|
2. Select **All Services**. Type **Azure Active Directory** to filter the list of services. Under **SERVICES**, Click **Azure Active Directory**.
|
|
|
|
3. Under **MANAGE**, click **Application proxy**.
|
|
|
|
3. Under **MANAGE**, click **Application proxy**.
|
|
|
|

|
|
|
|

|
|
|
|
4. Click **New Connector Group**. Under **Name**, type **NDES WHFB Connectors**.
|
|
|
|
4. Click **New Connector Group**. Under **Name**, type **NDES WHFB Connectors**.
|
|
|
|

|
|
|
|

|
|
|
|
5. Select each connector agent in the **Connectors** list that will service Windows Hello for Business certificate enrollment requests.
|
|
|
|
5. Select each connector agent in the **Connectors** list that will service Windows Hello for Business certificate enrollment requests.
|
|
|
|
6. Click **Save**.
|
|
|
|
6. Click **Save**.
|
|
|
|
|
|
|
|
|
|
|
@ -426,18 +441,18 @@ Sign-in a workstation with access equivalent to a _domain user_.
|
|
|
|
3. Under **MANAGE**, click **Application proxy**.
|
|
|
|
3. Under **MANAGE**, click **Application proxy**.
|
|
|
|
4. Click **Configure an app**.
|
|
|
|
4. Click **Configure an app**.
|
|
|
|
5. Under **Basic Settings** next to **Name**, type **WHFB NDES 01**. Choose a name that correlates this Azure AD Application Proxy setting with the on-premises NDES server. Each NDES server must have its own Azure AD Application Proxy as two NDES servers cannot share the same internal URL.
|
|
|
|
5. Under **Basic Settings** next to **Name**, type **WHFB NDES 01**. Choose a name that correlates this Azure AD Application Proxy setting with the on-premises NDES server. Each NDES server must have its own Azure AD Application Proxy as two NDES servers cannot share the same internal URL.
|
|
|
|
6. Next to **Internal Url**, type the internal, fully qualified DNS name of the NDES server associated with this Azure AD Application Proxy. For example, https://ndes.corp.mstepdemo.net). You need to match the primary host name (AD Computer Account name) of the NDES server, and prefix the URL with **https**.
|
|
|
|
6. Next to **Internal URL**, type the internal, fully qualified DNS name of the NDES server associated with this Azure AD Application Proxy. For example, https://ndes.corp.mstepdemo.net). You need to match the primary host name (AD Computer Account name) of the NDES server, and prefix the URL with **https**.
|
|
|
|
7. Under **Internal Url**, select **https://** from the first list. In the text box next to **https://**, type the hostname you want to use as your external hostname for the Azure AD Application Proxy. In the list next to the hostname you typed, select a DNS suffix you want to use externally for the Azure AD Application Proxy. It is recommended to use the default, -[tenantName].msapproxy.net where **[tenantName]** is your current Azure Active Directory tenant name (-mstephendemo.msappproxy.net).
|
|
|
|
7. Under **Internal URL**, select **https://** from the first list. In the text box next to **https://**, type the hostname you want to use as your external hostname for the Azure AD Application Proxy. In the list next to the hostname you typed, select a DNS suffix you want to use externally for the Azure AD Application Proxy. It is recommended to use the default, -[tenantName].msapproxy.net where **[tenantName]** is your current Azure Active Directory tenant name (-mstephendemo.msappproxy.net).
|
|
|
|

|
|
|
|

|
|
|
|
8. Select **Passthrough** from the **Pre Authentication** list.
|
|
|
|
8. Select **Passthrough** from the **Pre Authentication** list.
|
|
|
|
9. Select **NDES WHFB Connectors** from the **Connector Group** list.
|
|
|
|
9. Select **NDES WHFB Connectors** from the **Connector Group** list.
|
|
|
|
10. Under **Additional Settings**, select **Default** from **Backend Application Timeout**. Under the **Translate URLLs In** section, select **Yes** next to **Headers** and select **No** next to **Application Body**.
|
|
|
|
10. Under **Additional Settings**, select **Default** from **Backend Application Timeout**. Under the **Translate URLs In** section, select **Yes** next to **Headers** and select **No** next to **Application Body**.
|
|
|
|
11. Click **Add**.
|
|
|
|
11. Click **Add**.
|
|
|
|
12. Sign-out of the Azure Portal.
|
|
|
|
12. Sign-out of the Azure Portal.
|
|
|
|
|
|
|
|
|
|
|
|
> [!IMPORTANT]
|
|
|
|
> [!IMPORTANT]
|
|
|
|
> Write down the internal and external URLs. You will need this information when you enroll the NDES-Intune Authentication certificate.
|
|
|
|
> Write down the internal and external URLs. You will need this information when you enroll the NDES-Intune Authentication certificate.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
### Enroll the NDES-Intune Authentication certificate
|
|
|
|
### Enroll the NDES-Intune Authentication certificate
|
|
|
|
This task enrolls a client and server authentication certificate used by the Intune connector and the NDES server.
|
|
|
|
This task enrolls a client and server authentication certificate used by the Intune connector and the NDES server.
|
|
|
|
|
|
|
|
|
|
|
@ -449,8 +464,8 @@ Sign-in the NDES server with access equivalent to _local administrators_.
|
|
|
|
4. Click **Next** on the **Before You Begin** page.
|
|
|
|
4. Click **Next** on the **Before You Begin** page.
|
|
|
|
5. Click **Next** on the **Select Certificate Enrollment Policy** page.
|
|
|
|
5. Click **Next** on the **Select Certificate Enrollment Policy** page.
|
|
|
|
6. On the **Request Certificates** page, Select the **NDES-Intune Authentication** check box.
|
|
|
|
6. On the **Request Certificates** page, Select the **NDES-Intune Authentication** check box.
|
|
|
|
7. Click the **More information is required to enroll for this certificate. Click here to configure settings** link
|
|
|
|
7. Click the **More information is required to enroll for this certificate. Click here to configure settings** link
|
|
|
|

|
|
|
|

|
|
|
|
8. Under **Subject name**, select **Common Name** from the **Type** list. Type the internal URL used in the previous task (without the https://, for example **ndes.corp.mstepdemo.net**) and then click **Add**.
|
|
|
|
8. Under **Subject name**, select **Common Name** from the **Type** list. Type the internal URL used in the previous task (without the https://, for example **ndes.corp.mstepdemo.net**) and then click **Add**.
|
|
|
|
9. Under **Alternative name**, select **DNS** from the **Type** list. Type the internal URL used in the previous task (without the https://, for example **ndes.corp.mstepdemo.net**). Click **Add**. Type the external URL used in the previous task (without the https://, for example **ndes-mstephendemo.msappproxy.net**). Click **Add**. Click **OK** when finished.
|
|
|
|
9. Under **Alternative name**, select **DNS** from the **Type** list. Type the internal URL used in the previous task (without the https://, for example **ndes.corp.mstepdemo.net**). Click **Add**. Type the external URL used in the previous task (without the https://, for example **ndes-mstephendemo.msappproxy.net**). Click **Add**. Click **OK** when finished.
|
|
|
|
9. Click **Enroll**
|
|
|
|
9. Click **Enroll**
|
|
|
@ -462,44 +477,46 @@ This task configures the Web Server role on the NDES server to use the server au
|
|
|
|
Sign-in the NDES server with access equivalent to _local administrator_.
|
|
|
|
Sign-in the NDES server with access equivalent to _local administrator_.
|
|
|
|
|
|
|
|
|
|
|
|
1. Start **Internet Information Services (IIS) Manager** from **Administrative Tools**.
|
|
|
|
1. Start **Internet Information Services (IIS) Manager** from **Administrative Tools**.
|
|
|
|
2. Expand the node that has the name of the NDES server. Expand **Sites** and select **Default Web Site**.
|
|
|
|
2. Expand the node that has the name of the NDES server. Expand **Sites** and select **Default Web Site**.
|
|
|
|

|
|
|
|

|
|
|
|
3. Click **Bindings...*** under **Actions**. Click **Add**.
|
|
|
|
3. Click **Bindings...*** under **Actions**. Click **Add**.
|
|
|
|

|
|
|
|

|
|
|
|
4. Select **https** from **Type**. Confirm the value for **Port** is **443**.
|
|
|
|
4. Select **https** from **Type**. Confirm the value for **Port** is **443**.
|
|
|
|
5. Select the certificate you previously enrolled from the **SSL certificate** list. Select **OK**.
|
|
|
|
5. Select the certificate you previously enrolled from the **SSL certificate** list. Select **OK**.
|
|
|
|

|
|
|
|

|
|
|
|
6. Select **http** from the **Site Bindings** list. Click **Remove**.
|
|
|
|
6. Select **http** from the **Site Bindings** list. Click **Remove**.
|
|
|
|
7. Click **Close** on the **Site Bindings** dialog box.
|
|
|
|
7. Click **Close** on the **Site Bindings** dialog box.
|
|
|
|
8. Close **Internet Information Services (IIS) Manager**.
|
|
|
|
8. Close **Internet Information Services (IIS) Manager**.
|
|
|
|
|
|
|
|
|
|
|
|
### Verify the configuration
|
|
|
|
### Verify the configuration
|
|
|
|
This task confirms the TLS configuration for the NDES server.
|
|
|
|
This task confirms the TLS configuration for the NDES server.
|
|
|
|
|
|
|
|
|
|
|
|
Sign-in the NDES server with access equivalent to _local administrator_.
|
|
|
|
Sign-in the NDES server with access equivalent to _local administrator_.
|
|
|
|
|
|
|
|
|
|
|
|
#### Disable Internet Explorer Enhanced Security Configuration
|
|
|
|
#### Disable Internet Explorer Enhanced Security Configuration
|
|
|
|
1. Open **Server Manager**. Click **Local Server** from the navigation pane.
|
|
|
|
1. Open **Server Manager**. Click **Local Server** from the navigation pane.
|
|
|
|
2. Click **On** next to **IE Enhanced Security Configuration** in the **Properties** section.
|
|
|
|
2. Click **On** next to **IE Enhanced Security Configuration** in the **Properties** section.
|
|
|
|
3. In the **Internet Explorer Enhanced Security Configuration** dialog, under **Administrators**, select **Off**. Click **OK**.
|
|
|
|
3. In the **Internet Explorer Enhanced Security Configuration** dialog, under **Administrators**, select **Off**. Click **OK**.
|
|
|
|
4. Close **Server Manager**.
|
|
|
|
4. Close **Server Manager**.
|
|
|
|
|
|
|
|
|
|
|
|
#### Test the NDES web server
|
|
|
|
#### Test the NDES web server
|
|
|
|
1. Open **Internet Explorer**.
|
|
|
|
1. Open **Internet Explorer**.
|
|
|
|
2. In the navigation bar, type
|
|
|
|
2. In the navigation bar, type
|
|
|
|
```https://[fqdnHostName]/certsrv/mscep/mscep.dll```
|
|
|
|
```
|
|
|
|
where **[fqdnHostName]** is the fully qualified internal DNS host name of the NDES server.
|
|
|
|
https://[fqdnHostName]/certsrv/mscep/mscep.dll
|
|
|
|
|
|
|
|
```
|
|
|
|
|
|
|
|
where **[fqdnHostName]** is the fully qualified internal DNS host name of the NDES server.
|
|
|
|
|
|
|
|
|
|
|
|
A web page similar to the following should appear in your web browser. If you do not see similar page, or you get a **503 Service unavailable**, ensure the NDES Service account as the proper user rights. You can also review the application event log for events with the **NetworkDeviceEnrollmentSerice** source.
|
|
|
|
A web page similar to the following should appear in your web browser. If you do not see a similar page, or you get a **503 Service unavailable** message, ensure the NDES Service account has the proper user rights. You can also review the application event log for events with the **NetworkDeviceEnrollmentSerice** source.
|
|
|
|
|
|
|
|
|
|
|
|

|
|
|
|

|
|
|
|
|
|
|
|
|
|
|
|
Confirm the web site uses the server authentication certificate.
|
|
|
|
Confirm the web site uses the server authentication certificate.
|
|
|
|

|
|
|
|

|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
## Configure Network Device Enrollment Services to work with Microsoft Intune
|
|
|
|
## Configure Network Device Enrollment Services to work with Microsoft Intune
|
|
|
|
You have successfully configured the Network Device Enrollment Services. You must now modify the configuration to work with the Intune Certificate Connector. In this task, you will enable the NDES server and http.sys to handle long URLs.
|
|
|
|
You have successfully configured the Network Device Enrollment Services. You must now modify the configuration to work with the Intune Certificate Connector. In this task, you will enable the NDES server and http.sys to handle long URLs.
|
|
|
|
|
|
|
|
|
|
|
|
- Configure NDES to support long URLs
|
|
|
|
- Configure NDES to support long URLs
|
|
|
|
|
|
|
|
|
|
|
@ -510,7 +527,7 @@ Sign-in the NDES server with access equivalent to _local administrator_.
|
|
|
|
1. Start **Internet Information Services (IIS) Manager** from **Administrative Tools**.
|
|
|
|
1. Start **Internet Information Services (IIS) Manager** from **Administrative Tools**.
|
|
|
|
2. Expand the node that has the name of the NDES server. Expand **Sites** and select **Default Web Site**.
|
|
|
|
2. Expand the node that has the name of the NDES server. Expand **Sites** and select **Default Web Site**.
|
|
|
|
3. In the content pane, double-click **Request Filtering**. Click **Edit Feature Settings...** in the action pane.
|
|
|
|
3. In the content pane, double-click **Request Filtering**. Click **Edit Feature Settings...** in the action pane.
|
|
|
|

|
|
|
|

|
|
|
|
4. Select **Allow unlisted file name extensions**.
|
|
|
|
4. Select **Allow unlisted file name extensions**.
|
|
|
|
5. Select **Allow unlisted verbs**.
|
|
|
|
5. Select **Allow unlisted verbs**.
|
|
|
|
6. Select **Allow high-bit characters**.
|
|
|
|
6. Select **Allow high-bit characters**.
|
|
|
@ -521,21 +538,23 @@ Sign-in the NDES server with access equivalent to _local administrator_.
|
|
|
|
|
|
|
|
|
|
|
|
#### Configure Parameters for HTTP.SYS
|
|
|
|
#### Configure Parameters for HTTP.SYS
|
|
|
|
1. Open an elevated command prompt.
|
|
|
|
1. Open an elevated command prompt.
|
|
|
|
2. Run the following commands <br>
|
|
|
|
2. Run the following commands:
|
|
|
|
```reg add HKLM\SYSTEM\CurrentControlSet\Services\HTTP\Parameters /v MaxFieldLength /t REG_DWORD /d 65534``` <br>
|
|
|
|
```
|
|
|
|
```reg add HKLM\SYSTEM\CurrentControlSet\Services\HTTP\Parameters /v MaxRequestBytes /t REG_DWORD /d 65534```<br>
|
|
|
|
reg add HKLM\SYSTEM\CurrentControlSet\Services\HTTP\Parameters /v MaxFieldLength /t REG_DWORD /d 65534
|
|
|
|
|
|
|
|
reg add HKLM\SYSTEM\CurrentControlSet\Services\HTTP\Parameters /v MaxRequestBytes /t REG_DWORD /d 65534
|
|
|
|
|
|
|
|
```
|
|
|
|
3. Restart the NDES server.
|
|
|
|
3. Restart the NDES server.
|
|
|
|
|
|
|
|
|
|
|
|
## Download, Install and Configure the Intune Certificate Connector
|
|
|
|
## Download, Install and Configure the Intune Certificate Connector
|
|
|
|
The Intune Certificate Connector application enables Microsoft Intune to enroll certificates using your on-premises PKI for users on devices managed by Microsoft Intune.
|
|
|
|
The Intune Certificate Connector application enables Microsoft Intune to enroll certificates using your on-premises PKI for users on devices managed by Microsoft Intune.
|
|
|
|
|
|
|
|
|
|
|
|
### Download Intune Certificate Connector
|
|
|
|
### Download Intune Certificate Connector
|
|
|
|
Sign-in a workstation with access equivalent to a _domain user_.
|
|
|
|
Sign-in a workstation with access equivalent to a _domain user_.
|
|
|
|
|
|
|
|
|
|
|
|
1. Sign-in to the [Microsoft Endpoint Manager admin center](https://endpoint.microsoft.com/).
|
|
|
|
1. Sign-in to the [Microsoft Endpoint Manager admin center](https://endpoint.microsoft.com/).
|
|
|
|
2. Select **Tenant administration** > **Connectors and tokens** > **Certificate connectors** > **Add**.
|
|
|
|
2. Select **Tenant administration** > **Connectors and tokens** > **Certificate connectors** > **Add**.
|
|
|
|
3. Click **Download the certificate connector software** under the **Install Certificate Connectors** section.
|
|
|
|
3. Click **Download the certificate connector software** under the **Install Certificate Connectors** section.
|
|
|
|

|
|
|
|

|
|
|
|
4. Save the downloaded file (NDESConnectorSetup.exe) to a location accessible from the NDES server.
|
|
|
|
4. Save the downloaded file (NDESConnectorSetup.exe) to a location accessible from the NDES server.
|
|
|
|
5. Sign-out of the Microsoft Endpoint Manager admin center.
|
|
|
|
5. Sign-out of the Microsoft Endpoint Manager admin center.
|
|
|
|
|
|
|
|
|
|
|
@ -544,30 +563,33 @@ Sign-in the NDES server with access equivalent to _domain administrator_.
|
|
|
|
|
|
|
|
|
|
|
|
1. Copy the Intune Certificate Connector Setup (NDESConnectorSetup.exe) downloaded in the previous task locally to the NDES server.
|
|
|
|
1. Copy the Intune Certificate Connector Setup (NDESConnectorSetup.exe) downloaded in the previous task locally to the NDES server.
|
|
|
|
2. Run **NDESConnectorSetup.exe** as an administrator. If the setup shows a dialog that reads **Microsoft Intune NDES Connector requires HTTP Activation**, ensure you started the application as an administrator, then check HTTP Activation is enabled on the NDES server.
|
|
|
|
2. Run **NDESConnectorSetup.exe** as an administrator. If the setup shows a dialog that reads **Microsoft Intune NDES Connector requires HTTP Activation**, ensure you started the application as an administrator, then check HTTP Activation is enabled on the NDES server.
|
|
|
|
3. On the **Microsoft Intune** page, click **Next**.
|
|
|
|
3. On the **Microsoft Intune** page, click **Next**.
|
|
|
|

|
|
|
|

|
|
|
|
4. Read the **End User License Agreement**. Click **Next** to accept the agreement and to proceed with the installation.
|
|
|
|
4. Read the **End User License Agreement**. Click **Next** to accept the agreement and to proceed with the installation.
|
|
|
|
5. On the **Destination Folder** page, click **Next**.
|
|
|
|
5. On the **Destination Folder** page, click **Next**.
|
|
|
|
6. On the **Installation Options** page, select **SCEP and PFX Profile Distribution** and click **Next**.
|
|
|
|
6. On the **Installation Options** page, select **SCEP and PFX Profile Distribution** and click **Next**.
|
|
|
|

|
|
|
|

|
|
|
|
7. On the **Client certificate for Microsoft Intune** page, Click **Select**. Select the certificate previously enrolled for the NDES server. Click **Next**.
|
|
|
|
7. On the **Client certificate for Microsoft Intune** page, Click **Select**. Select the certificate previously enrolled for the NDES server. Click **Next**.
|
|
|
|

|
|
|
|

|
|
|
|
|
|
|
|
|
|
|
|
> [!NOTE]
|
|
|
|
> [!NOTE]
|
|
|
|
> The **Client certificate for Microsoft Intune** page does not update after selecting the client authentication certificate. However, the application rembers the selection and shows it in the next page.
|
|
|
|
> The **Client certificate for Microsoft Intune** page does not update after selecting the client authentication certificate. However, the application rembers the selection and shows it in the next page.
|
|
|
|
|
|
|
|
|
|
|
|
8. On the **Client certificate for the NDES Policy Module** page, verify the certificate information and then click **Next**.
|
|
|
|
8. On the **Client certificate for the NDES Policy Module** page, verify the certificate information and then click **Next**.
|
|
|
|
9. ON the **Ready to install Microsoft Intune Connector** page. Click **Install**.
|
|
|
|
9. ON the **Ready to install Microsoft Intune Connector** page. Click **Install**.
|
|
|
|

|
|
|
|

|
|
|
|
> [!NOTE]
|
|
|
|
|
|
|
|
> You can review the results of the install using the **SetupMsi.log** file located in the **C:\\NDESConnectorSetupMsi** folder
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
10. When the installation completes, select **Launch Intune Connector** and click Finish. Proceed to the Configure the Intune Certificate Connector task.
|
|
|
|
> [!NOTE]
|
|
|
|
|
|
|
|
> You can review the results of the install using the **SetupMsi.log** file located in the **C:\\NDESConnectorSetupMsi** folder.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
10. When the installation completes, select **Launch Intune Connector** and click Finish. Proceed to the Configure the Intune Certificate Connector task.
|
|
|
|

|
|
|
|

|
|
|
|
|
|
|
|
|
|
|
|
### Configure the Intune Certificate Connector
|
|
|
|
### Configure the Intune Certificate Connector
|
|
|
|
Sign-in the NDES server with access equivalent to _domain administrator_.
|
|
|
|
Sign-in the NDES server with access equivalent to _domain administrator_.
|
|
|
|
|
|
|
|
|
|
|
|
1. The **NDES Connector** user interface should be open from the last task.
|
|
|
|
1. The **NDES Connector** user interface should be open from the last task.
|
|
|
|
|
|
|
|
|
|
|
|
> [!NOTE]
|
|
|
|
> [!NOTE]
|
|
|
|
> If the **NDES Connector** user interface is not open, you can start it from **\<install_Path>\NDESConnectorUI\NDESConnectorUI.exe**.
|
|
|
|
> If the **NDES Connector** user interface is not open, you can start it from **\<install_Path>\NDESConnectorUI\NDESConnectorUI.exe**.
|
|
|
|
|
|
|
|
|
|
|
@ -576,10 +598,11 @@ Sign-in the NDES server with access equivalent to _domain administrator_.
|
|
|
|
|
|
|
|
|
|
|
|
3. Click **Sign-in**. Type credentials for your Intune administrator, or tenant administrator that has the **Global Administrator** directory role.
|
|
|
|
3. Click **Sign-in**. Type credentials for your Intune administrator, or tenant administrator that has the **Global Administrator** directory role.
|
|
|
|

|
|
|
|

|
|
|
|
> [!IMPORTANT]
|
|
|
|
|
|
|
|
> The user account must have a valid Intune licenese assigned. If the user account does not have a valid Intune license, the sign-in fails.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
4. Optionally, you can configure the NDES Connector for certificate revocation. If you want to do this, continue to the next task. Otherwise, Click **Close**, restart the **Intune Connector Service** and the **World Wide Web Publishing Service**, and skip the next task.
|
|
|
|
> [!IMPORTANT]
|
|
|
|
|
|
|
|
> The user account must have a valid Intune license assigned. If the user account does not have a valid Intune license, the sign-in fails.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
4. Optionally, you can configure the NDES Connector for certificate revocation. If you want to do this, continue to the next task. Otherwise, Click **Close**, restart the **Intune Connector Service** and the **World Wide Web Publishing Service**, and skip the next task.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
### Configure the NDES Connector for certificate revocation (**Optional**)
|
|
|
|
### Configure the NDES Connector for certificate revocation (**Optional**)
|
|
|
@ -591,30 +614,34 @@ Sign-in the certificate authority used by the NDES Connector with access equival
|
|
|
|
1. Start the **Certification Authority** management console.
|
|
|
|
1. Start the **Certification Authority** management console.
|
|
|
|
2. In the navigation pane, right-click the name of the certificate authority and select **Properties**.
|
|
|
|
2. In the navigation pane, right-click the name of the certificate authority and select **Properties**.
|
|
|
|
3. Click the **Security** tab. Click **Add**. In **Enter the object names to select** box, type **NDESSvc** (or the name you gave the NDES Service account). Click *Check Names*. Click **OK**. Select the NDES Service account from the **Group or user names** list. Select **Allow** for the **Issue and Manage Certificates** permission. Click **OK**.
|
|
|
|
3. Click the **Security** tab. Click **Add**. In **Enter the object names to select** box, type **NDESSvc** (or the name you gave the NDES Service account). Click *Check Names*. Click **OK**. Select the NDES Service account from the **Group or user names** list. Select **Allow** for the **Issue and Manage Certificates** permission. Click **OK**.
|
|
|
|

|
|
|
|

|
|
|
|
4. Close the **Certification Authority**
|
|
|
|
4. Close the **Certification Authority**
|
|
|
|
|
|
|
|
|
|
|
|
#### Enable the NDES Connector for certificate revocation
|
|
|
|
#### Enable the NDES Connector for certificate revocation
|
|
|
|
Sign-in the NDES server with access equivalent to _domain administrator_.
|
|
|
|
Sign-in the NDES server with access equivalent to _domain administrator_.
|
|
|
|
|
|
|
|
|
|
|
|
1. Open the **NDES Connector** user interface (**\<install_Path>\NDESConnectorUI\NDESConnectorUI.exe**).
|
|
|
|
1. Open the **NDES Connector** user interface (**\<install_Path>\NDESConnectorUI\NDESConnectorUI.exe**).
|
|
|
|
2. Click the **Advanced** tab. Select **Specify a different account username and password**. TYpe the NDES service account username and password. Click **Apply**. Click **OK** to close the confirmation dialog box. Click **Close**.
|
|
|
|
2. Click the **Advanced** tab. Select **Specify a different account username and password**. Type the NDES service account username and password. Click **Apply**. Click **OK** to close the confirmation dialog box. Click **Close**.
|
|
|
|

|
|
|
|

|
|
|
|
3. Restart the **Intune Connector Service** and the **World Wide Web Publishing Service**.
|
|
|
|
3. Restart the **Intune Connector Service** and the **World Wide Web Publishing Service**.
|
|
|
|
|
|
|
|
|
|
|
|
### Test the NDES Connector
|
|
|
|
### Test the NDES Connector
|
|
|
|
Sign-in the NDES server with access equivalent to _domain admin_.
|
|
|
|
Sign-in the NDES server with access equivalent to _domain admin_.
|
|
|
|
|
|
|
|
|
|
|
|
1. Open a command prompt.
|
|
|
|
1. Open a command prompt.
|
|
|
|
2. Type the following command to confirm the NDES Connector's last connection time is current.</br>
|
|
|
|
2. Type the following command to confirm the NDES Connector's last connection time is current.
|
|
|
|
```reg query hklm\software\Microsoft\MicrosoftIntune\NDESConnector\ConnectionStatus```</br>
|
|
|
|
```
|
|
|
|
|
|
|
|
reg query hklm\software\Microsoft\MicrosoftIntune\NDESConnector\ConnectionStatus
|
|
|
|
|
|
|
|
```
|
|
|
|
3. Close the command prompt.
|
|
|
|
3. Close the command prompt.
|
|
|
|
4. Open **Internet Explorer**.
|
|
|
|
4. Open **Internet Explorer**.
|
|
|
|
5. In the navigation bar, type</br>
|
|
|
|
5. In the navigation bar, type:
|
|
|
|
```https://[fqdnHostName]/certsrv/mscep/mscep.dll```</br>
|
|
|
|
```
|
|
|
|
where **[fqdnHostName]** is the fully qualified internal DNS host name of the NDES server.</br>
|
|
|
|
https://[fqdnHostName]/certsrv/mscep/mscep.dll
|
|
|
|
A web page showing a 403 error (similar to the following) should appear in your web browser. If you do not see similar page, or you get a **503 Service unavailable**, ensure the NDES Service account as the proper user rights. You can also review the application event log for events with the **NetworkDeviceEnrollmentSerice** source.
|
|
|
|
```
|
|
|
|

|
|
|
|
where **[fqdnHostName]** is the fully qualified internal DNS host name of the NDES server.
|
|
|
|
|
|
|
|
A web page showing a 403 error (similar to the following) should appear in your web browser. If you do not see a similar page, or you get a **503 Service unavailable** message, ensure the NDES Service account has the proper user rights. You can also review the application event log for events with the **NetworkDeviceEnrollmentSerice** source.
|
|
|
|
|
|
|
|

|
|
|
|
6. Using **Server Manager**, enable **Internet Explorer Enhanced Security Configuration**.
|
|
|
|
6. Using **Server Manager**, enable **Internet Explorer Enhanced Security Configuration**.
|
|
|
|
|
|
|
|
|
|
|
|
## Create and Assign a Simple Certificate Enrollment Protocol (SCEP) Certificate Profile
|
|
|
|
## Create and Assign a Simple Certificate Enrollment Protocol (SCEP) Certificate Profile
|
|
|
@ -629,7 +656,7 @@ Sign-in a workstation with access equivalent to a _domain user_.
|
|
|
|
5. Under **Group Name**, type the name of the group. For example, **AADJ WHFB Certificate Users**.
|
|
|
|
5. Under **Group Name**, type the name of the group. For example, **AADJ WHFB Certificate Users**.
|
|
|
|
6. Provide a **Group description**, if applicable.
|
|
|
|
6. Provide a **Group description**, if applicable.
|
|
|
|
7. Select **Assigned** from the **Membership type** list.
|
|
|
|
7. Select **Assigned** from the **Membership type** list.
|
|
|
|

|
|
|
|

|
|
|
|
8. Click **Members**. Use the **Select members** pane to add members to this group. When finished click **Select**.
|
|
|
|
8. Click **Members**. Use the **Select members** pane to add members to this group. When finished click **Select**.
|
|
|
|
9. Click **Create**.
|
|
|
|
9. Click **Create**.
|
|
|
|
|
|
|
|
|
|
|
@ -646,6 +673,7 @@ Sign-in a workstation with access equivalent to a _domain user_.
|
|
|
|
7. Next to **Description**, provide a description meaningful for your environment, then select **Next**.
|
|
|
|
7. Next to **Description**, provide a description meaningful for your environment, then select **Next**.
|
|
|
|
8. Select **User** as a certificate type.
|
|
|
|
8. Select **User** as a certificate type.
|
|
|
|
9. Configure **Certificate validity period** to match your organization.
|
|
|
|
9. Configure **Certificate validity period** to match your organization.
|
|
|
|
|
|
|
|
|
|
|
|
> [!IMPORTANT]
|
|
|
|
> [!IMPORTANT]
|
|
|
|
> Remember that you need to configure your certificate authority to allow Microsoft Intune to configure certificate validity.
|
|
|
|
> Remember that you need to configure your certificate authority to allow Microsoft Intune to configure certificate validity.
|
|
|
|
|
|
|
|
|
|
|
@ -669,7 +697,7 @@ Sign-in a workstation with access equivalent to a _domain user_.
|
|
|
|
3. Click **WHFB Certificate Enrollment**.
|
|
|
|
3. Click **WHFB Certificate Enrollment**.
|
|
|
|
4. Select **Properties**, and then click **Edit** next to the **Assignments** section.
|
|
|
|
4. Select **Properties**, and then click **Edit** next to the **Assignments** section.
|
|
|
|
5. In the **Assignments** pane, select **Selected Groups** from the **Assign to** list. Click **Select groups to include**.
|
|
|
|
5. In the **Assignments** pane, select **Selected Groups** from the **Assign to** list. Click **Select groups to include**.
|
|
|
|

|
|
|
|

|
|
|
|
6. Select the **AADJ WHFB Certificate Users** group. Click **Select**.
|
|
|
|
6. Select the **AADJ WHFB Certificate Users** group. Click **Select**.
|
|
|
|
7. Click **Review + Save**, and then **Save**.
|
|
|
|
7. Click **Review + Save**, and then **Save**.
|
|
|
|
|
|
|
|
|
|
|
@ -679,7 +707,7 @@ You have successfully completed the configuration. Add users that need to enrol
|
|
|
|
> [!div class="checklist"]
|
|
|
|
> [!div class="checklist"]
|
|
|
|
> * Requirements
|
|
|
|
> * Requirements
|
|
|
|
> * Prepare Azure AD Connect
|
|
|
|
> * Prepare Azure AD Connect
|
|
|
|
> * Prepare the Network Device Enrollment Services (NDES) Service Acccount
|
|
|
|
> * Prepare the Network Device Enrollment Services (NDES) Service Account
|
|
|
|
> * Prepare Active Directory Certificate Authority
|
|
|
|
> * Prepare Active Directory Certificate Authority
|
|
|
|
> * Install and Configure the NDES Role
|
|
|
|
> * Install and Configure the NDES Role
|
|
|
|
> * Configure Network Device Enrollment Services to work with Microsoft Intune
|
|
|
|
> * Configure Network Device Enrollment Services to work with Microsoft Intune
|
|
|
|