Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

Onboard CA and SCEP Integration for Microsoft Intune-Managed Devices

Onboard CA Configuration in Juniper Mist Access Assurance provides a cloud-native SCEP service that integrates directly with Intune for automated client certificate distribution. This eliminates the need for an external PKI and simplifies secure Wi-Fi onboarding with EAP-TLS authentication.

Juniper Mist Access Assurance provides Onboard Certificate Authority (CA) Configuration, which delivers a fully managed Simple Certificate Enrollment Protocol (SCEP) infrastructure. When the Onboard CA is enabled, Access Assurance automatically provisions the Intune SCEP URL. With this URL, users can integrate Intune with Mist Access Assurance without deploying or maintaining any external PKI or on-premises SCEP service. The Onboard CA Certificate provided by Access Assurance is then used to configure a SCEP profile within Intune, enabling secure client certificate issuance to enrolled devices.

By leveraging the Access Assurance SCEP infrastructure, you can automate the distribution of client certificates to Intune-managed endpoints, binding them to Wi-Fi profiles for EAP-TLS authentication. This feature ensures that every device connecting to the network is authenticated through strong, certificate-based trust while fully managed from the Juniper Mist Access Assurance cloud.

Note: When a device is marked as inactive or deleted in Intune, you must revoke the client certificate manually through the Juniper Mist portal.

To enable Intune to leverage Juniper Mist Access Assurance as its SCEP infrastructure for client certificate distribution, follow these steps:

Enable Onboard CA Configuration

To enable the Onboard CA configuration:

  1. From the left menu of the Juniper Mist portal, select Organization > Access > Certificates.

    The Certificate Authorities page appears.

  2. Click the settings icon on the upper-right corner of the page and select Onboard CA Configuration.

  3. Select Active and click OK.

    The onboard Certificate Authority service is enabled, and the respective SCEP endpoints are generated for each MDM.

    When the Onboard CA configuration is activated, you’ll see the following tabs displayed:

    • External—Displays the details of the external CAs.

    • Internal— Displays the details of client certificates issued by the built-in CA through the NAC portal or MDM.

  4. Click the settings icon on the upper-right corner of the page again and select MDM Integration Information.

  5. Copy the Intune SCEP URL listed for Intune. You'll need to use this URL in the Intune SCEP profile.

Download the Mist Org CA and Onboard CA Certificates

The Mist Org CA certificate is required to configure Intune managed clients to trust the RADIUS server certificate of the Mist Access Assurance service. The onboard CA certificate is needed to configure the SCEP profile on Intune.

  1. Click the settings icon on the upper-right corner of the Certificates page and select Download Onboard CA Certificate to download the certificate issued by the built-in Mist Org CA.

  2. Navigate to Organization>Access>Certificates. Click View Mist Certificate and click Download.

    Note: If you are using a Custom RADIUS Server Certificate, the Mist Org CA certificate is not required. You'll need to have the Root CA certificate of the Custom RADIUS Server Certificate issuer.

Link Intune to the Mist Portal

Link your Intune account with Juniper Mist. See Adding Intune to the Mist Portal.

Note: If your Intune account is already linked to the organization, you must relink the MDM account. This ensures that Mist Access Assurance receives the updated set of permissions required for Onboard CA operations.

Create Configuration Profiles

Create OS-specific configuration profiles in Intune.

Create Trusted Certificate Profile

For each OS type that you plan to enroll, create two Trusted Certificate Profiles—one for the Mist CA certificate and one for the Mist SCEP CA certificate.

  1. Navigate to Devices>Configuration, and click Create>New Policy.
  2. Select a platform. We've used Windows 10 and later in this example.

  3. Select Templates as the Profile Type.

  4. Select trust from the template list and click Create.

  5. Provide a name for the Mist Org CA trusted certificate and click Next.

  6. Upload the Mist Org CA certificate that you downloaded earlier.

    If you are using a Custom RADIUS Server Certificate, the Mist Org CA certificate is not required. You'll need to have the Root CA certificate of the Custom RADIUS Server Certificate issuer.

  7. Assign this profile to specific user group or all devices:

  8. Click Next and then click Create.

  9. Repeat steps 1 through 8 for the Mist Onboard CA certificate.

Create a SCEP Certificate Profile

The SCEP certificate profile instructs the client to obtain a client certificate from the Mist SCEP Service. In this example we use the User Certificate type, but you can follow the same steps for a device certificate.

  1. Navigate to Devices>Configuration, and click Create>New Policy.
  2. Select a platform. We've used Windows 10 and later in this example.

  3. Select Templates as the Profile Type.

  4. Select the SCEP from the template list and click Create.

  5. Provide a name for the certificate and click Next.

  6. Enter the configuration settings as shown in the following example. Add the SCEP URL in the SCEP Server URLs field.

    Provide the optimal format of the certificate so that the extra information about the user or device can be encoded for NAC to use in policy evaluation. In this example, the Intune Device ID is encoded in the SAN:DNS field, which enables periodic checks for device compliance. The full user principal name is encoded in the SAN:UPN field, which enables group membership lookup against the Entra ID.

    The client will be instructed to trust the Mist SCEP CA Certificate.

    Note:

    Including the Device ID in the SAN:DNS field is mandatory because NAC uses this value for device identification and compliance checks.

  7. Assign this profile to specific user group or all devices.

  8. Click Next and then click Create.

After the profile is pushed to the Windows client, you'll see a new client certificate issued under Personal User Certificate storage:

Switch to the Juniper Mist portal and confirm that the client certificate is issued under Certificates>Internal.

Create a Wi-Fi Profile

  1. Navigate to Devices>Configuration, and click Create>New Policy.
  2. Select a platform. We've used Windows 10 and later in this example.

  3. Select Templates as the Profile Type.

  4. Select Wi-Fi from the template list.

  5. Provide a name for the certificate and click Next.

  6. Enter the configuration settings as shown in the following example.

    • Select Enterprise as the security type.

    • Provide your SSID name.

    • Set the correct authentication mode (user and computer, user, or computer) based on the type of SCEP certificate you are providing to the clients.

    • Add the Mist CA certificate as the Root Certificate for server (RADIUS) validation.

    • Add the SCEP Profile as the Client certificate for client authentication.

Initiate a device sync from Intune so that the devices can obtain the latest profile updates. The client devices can automatically obtain the digital certificates.