Event banner
Utilize, configure, and manage Cloud PKI like a pro
Event details
Microsoft Cloud PKI in depth! Start with a tour of the significant improvements made to this Microsoft Intune Suite feature since its release in March 2024. We’ll then offer comprehensive guidance for several critical areas:
- Proper deletion of a certificate authority: Learn the essential steps to correctly delete a certificate authority, ensuring a smooth and error-free process.
- Microsoft NPS (RADIUS) configuration: Get expert advice on configuring Network Policy Server (NPS) when using Cloud PKI, including best practices and common pitfalls to avoid.
- Upcoming leaf certificate reporting improvements: Discover the new enhancements in leaf certificate reporting that will soon be released and understand how they can benefit your organization.
- SCEP certificate profile configuration: Gain insights into the common challenges and solutions when configuring a SCEP certificate profile so you can streamline your setup and avoid potential issues.
This session is designed for IT professionals and administrators who are looking to deepen their understanding of Cloud PKI and get up-to-date on the latest advancements. Don't miss this opportunity to enhance your skills and help ensure your organization's PKI infrastructure is optimized for success.
Speakers: Bill Calero, Jack Poehlman
This session is part of Microsoft Technical Takeoff: Windows and Intune.
39 Comments
- mhendel05Copper Contributor
Is the CRL, AIA, OCSP still publicly accessible over port 80? or 443 possible
- Jack_Poehlman
Microsoft
The CRL and AIA are published per standard at HTTP / port 80. Currently OCSP is not published by Cloud PKI.
- Tlou_KCopper Contributor
This was great. I have an AADJ device that can't connect to the domain WiFi. I have to rewatch the video and try the BYOCA deployment again.
- Max_Stein
Microsoft
Thanks for taking the time to attend, and your feedback - we're glad to hear it was helpful! As Alex and Bill mentioned below, feel free to review those two suggestions further review. If you need any further assistance and are active out on social media, feel free to give our team a shout for further support with your deployment: aka.ms/IntuneSuppTeam.
- AlexandreI1340Copper Contributor
AADJ devices are not in on-prem AD (by default). Depending on your Radius configuration you may decide to bring them onprem, but they will arrive with their Azure Object ID instead of names (so you may decide to add that to the cert and instruct Radius to check for that).
- Bill Calero
Microsoft
Also, please give the online docs a good read - https://aka.ms/cloudpkidocs
- Heather_Poulsen
Community Manager
Thanks for joining today’s session on “Utilize, configure, and manage Cloud PKI like a pro” at Microsoft Technical Takeoff. We're still here answering questions live until 10:30. Q&A will remain open through Friday so keep your comments and questions coming! Up next: Skill up! Cloud PC management and reporting
- richardhicksCopper Contributor
You should build a cloud RADIUS solution too. ;)
- Bill Calero
Microsoft
I would love to build a cloud RADIUS solution ... on my wish list :-)
- AlexandreI1340Copper Contributor
anything to do with NTDS container?
- Jack_Poehlman
Microsoft
The NTDS container holds the NT Auth certificates set with the PKIView.msc utility..
- richardhicksCopper Contributor
To clarify, only issuing CA certificates are required in the NTAuth store. Details here:
https://directaccess.richardhicks.com/2024/03/05/microsoft-intune-cloud-pki-and-active-directory/
- AlexandreI1340Copper Contributor
why can't use device write-back for EntraId -joined?
- Jack_Poehlman
Microsoft
We'd love to hear specifically what you are looking for in this scenario. Please let us know at aka.ms/IntuneFeedback
- AlexandreI1340Copper Contributor
green field really depends on certificate usage you need. (for example SSL certs).
- Jack_Poehlman
Microsoft
no disagreement.
- ucbryanweaverCopper Contributor
If we have an ADCS on premise, would it be best to first implement BYOCA and then implement the Intune CA if we are wanting to retire the BYOCA?
- Jack_Poehlman
Microsoft
ucbryanweaver yes, you could absolutely take the approach of first using BYOC CA as a sort of bridge as you move from on-premises to cloud only and later move to Could based Root and issuing CA's.
- AlexandreI1340Copper Contributor
Aer there any other selling point other than "offload load from onprem CA and HCSM backend"? It looks like a properly configured on-prem CA (with NDES and published CRL) is more flexible and does not need additional charges. I guess in mixed environment ADCS only is no brainer.
- Bill Calero
Microsoft
TBH, these are great selling points... HSM is expensive and challenging to configure and maintain on-prem ... the NDES RA certs below do not autorenew - requiring manual admin intervention, often leading to an outtage ... so yeah, these are great selling point :-)
CEP Encryption
Exchange Enrollment Agent (Offline request)
- richardhicksCopper Contributor
NDES certificates can be configured to automatically renew, if needed. :)
- AlexandreI1340Copper Contributor
URI for SID does not have schema and column (which is the must)?
- Jack_Poehlman
Microsoft
Please reference the Intune Customer success blog article, Support tip: Implementing strong mapping in Microsoft Intune certificates | Microsoft Community Hub You need to define the URI with {{OnPremisesSecurityIdentifier}} Intune will handle the proper schema delivery.