Home
%3CLINGO-SUB%20id%3D%22lingo-sub-617822%22%20slang%3D%22en-US%22%3ESupport%20Tip%3A%20Configuring%20a%20Symantec%20PKI%20certificate%20template%20for%20Intune%20PKCS%20deployment%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-617822%22%20slang%3D%22en-US%22%3E%3CP%3EHello%20everyone%2C%20today%20we%20have%20a%20post%20from%20Intune%20Support%20Escalation%20Engineer%20%3CSTRONG%3EMingzhe%20Li%3C%2FSTRONG%3E.%20In%20this%20post%2C%20Mingzhe%20goes%20through%20the%20process%20of%20%3CSPAN%3Econfiguring%20the%20certificate%20template%20when%20using%20the%20Intune%20Certificate%20Connector%20to%20issue%20PKCS%20certificates%20from%20a%20Symantec%20PKI%20Manager%20Web%20Service%20to%20Intune%20managed%20devices.%20Symantec%20will%20be%20the%20ultimate%20authority%20when%20it%20comes%20to%20the%20requirements%20for%20issuing%20certificates%20from%20their%20Certification%20Authority%20service%2C%20but%20this%20should%20get%20you%20working%20in%20most%20scenarios.%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3D%3D%3D%3D%3D%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-1760237564%22%20id%3D%22toc-hId-1760238466%22%20id%3D%22toc-hId-1760238466%22%20id%3D%22toc-hId-1760238466%22%20id%3D%22toc-hId-1760238466%22%20id%3D%22toc-hId-1760238466%22%3E%3CSPAN%3EIntroduction%3C%2FSPAN%3E%3C%2FH2%3E%0A%3CP%3E%3CSPAN%3EIntune%20has%20the%20capability%20to%20deploy%20PKCS%20certificates%20from%20Symantec%20PKI%20Manager%20Web%20Service%20(referred%20as%20Symantec%20CA%20in%20this%20article).%20The%20process%20for%20configuring%20this%20is%20largely%20covered%20in%20the%20following%20docs%20page%3A%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fintune%2Fcertificates-symantec-configure%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3ESet%20up%20Intune%20Certificate%20Connector%20for%20Symantec%20PKI%20Manager%20Web%20Service%3C%2FA%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EHowever%2C%20we%20don%E2%80%99t%20go%20into%20a%20lot%20of%20detail%20regarding%20how%20to%20configure%20the%20certificate%20template%20itself%20so%20that%20it%20works%20correctly%20for%20Microsoft%20Intune.%20I%20recently%20had%20some%20experience%20setting%20this%20up%3C%2FSPAN%3E%3CSPAN%3E%20in%20my%20lab%20so%20I%20thought%20I%E2%80%99d%20share%20that%20with%20you%20here%20in%20case%20you%20ever%20had%20the%20need%20to%20do%20the%20same.%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--791919397%22%20id%3D%22toc-hId--791918495%22%20id%3D%22toc-hId--791918495%22%20id%3D%22toc-hId--791918495%22%20id%3D%22toc-hId--791918495%22%20id%3D%22toc-hId--791918495%22%3E%3CSPAN%3ECreating%20the%20certificate%20template%20in%20Symantec%20PKI%20Manager%20Web%20Service%3C%2FSPAN%3E%3C%2FH2%3E%0A%3CP%3E%3CSPAN%3EYou%20should%20start%20with%20our%20documentation%20on%20this%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fintune%2Fcertificates-symantec-configure%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehere%3C%2FA%3E.%20When%3C%2FSPAN%3E%3CSPAN%3E%20you%20get%20to%20the%20section%20titled%20%3CSTRONG%3EGet%20the%20Certificate%20Profile%20OID%3C%2FSTRONG%3E%26nbsp%3Bit%20can%20be%20a%20little%20confusing%20on%20exactly%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%3Ehow%20to%20configure%20the%20certificate%20template%20correctly%20as%20the%20docs%20don'y%20explicitly%20mention%20how%20to%20do%20this.%20Rather%2C%20it%20recommends%20that%20you%20contact%20Symantec%20support%20if%20you%20have%20any%20issues%20obtaining%20the%20Certificate%20Profile%20OID%3A%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20650px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F114444i201A7E0151228D6A%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22Mingzhe-syman-jch-001.png%22%20title%3D%22Mingzhe-syman-jch-001.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EHere%E2%80%99s%20the%20process%20I%20follow%20when%20creating%20a%20certificate%20template%20in%20Symantec%20CA%20so%20that%20it%20works%20for%20Microsoft%20Intune.%20Please%20note%20that%20it%20is%20%3CSTRONG%3Erecommended%20to%20use%20this%20template%20for%20Intune%20PKCS%20deployment%20only%3C%2FSTRONG%3E%20as%20this%20has%20not%20been%20tested%20in%20other%20scenarios.%20%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E1.%20First%20we%20need%20to%20log%20on%20to%20the%20Symantec%20PKI%20Manager%20console%20and%20create%20a%20new%20certificate%20profile.%20To%20do%20this%2C%20click%20on%20%3CSTRONG%3EManage%20Certificate%20Profiles%3C%2FSTRONG%3E%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20650px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F114446i99190C0256BCC505%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22Mingzhe-syman-jch-002.png%22%20title%3D%22Mingzhe-syman-jch-002.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E2.%26nbsp%3B%3CSPAN%3ENow%20click%20on%20%3CSTRONG%3EAdd%20certificate%20profiles%3C%2FSTRONG%3E%20at%20the%20top%20(highlighted)%3A%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20650px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F114447i1904987F5CE505FD%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22Mingzhe-syman-jch-003.png%22%20title%3D%22Mingzhe-syman-jch-003.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E3.%20Select%20either%20%3CSTRONG%3ETest%20mode%3C%2FSTRONG%3E%20or%20%3CSTRONG%3EProduction%20mode%3C%2FSTRONG%3E%20(either%20will%20work)%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E4.%20Select%20the%20%3CSTRONG%3EClient%20Authentication%3C%2FSTRONG%3E%20option%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20650px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F114450i3F9E8C757F57908E%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22Mingzhe-syman-jch-005.png%22%20title%3D%22Mingzhe-syman-jch-005.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E5.%20Enter%20a%20%3CSTRONG%3ECertificate%20friendly%20name%3C%2FSTRONG%3E%20for%20your%20new%20template%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20650px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F114453i7D6A3B02D11AADC8%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22Mingzhe-syman-jch-006.png%22%20title%3D%22Mingzhe-syman-jch-006.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E6.%20Click%20on%20%3CSTRONG%3EEnrollment%20method%3C%2FSTRONG%3E%20and%20select%20%3CSTRONG%3EPKI%20web%20services%3C%2FSTRONG%3E%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20601px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F114454iB8C34607310D3E8C%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22Mingzhe-syman-jch-007.png%22%20title%3D%22Mingzhe-syman-jch-007.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E7.%20Click%20on%20%3CSTRONG%3EAdvanced%20options%3C%2FSTRONG%3E%20and%20delete%20%3CSTRONG%3ECommon%20Name%20(CN)%3C%2FSTRONG%3E%20using%20the%20%E2%80%9Cx%E2%80%9D%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20581px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F114455i5D879AE322846D8D%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22Mingzhe-syman-jch-008.png%22%20title%3D%22Mingzhe-syman-jch-008.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E8.%26nbsp%3B%3CSPAN%3ENow%20select%20%3CSTRONG%3EAdd%20field%3C%2FSTRONG%3E%20and%20select%20%3CSTRONG%3ECommon%20Name%20(CN)%3C%2FSTRONG%3E%3CEM%3E%2C%20%3C%2FEM%3E%3CSTRONG%3EWebservice%20Request%3C%2FSTRONG%3E%3CEM%3E%2C%20%3C%2FEM%3Ethen%20set%20%3CSTRONG%3ERequired%3C%2FSTRONG%3E%20to%20%3CSTRONG%3ENo%3C%2FSTRONG%3E.%20This%20is%20important%20as%20the%20certificate%20deployment%20will%20fail%20if%20this%20is%20set%20to%20%3CSTRONG%3EYes%3C%2FSTRONG%3E%3A%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20371px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F114456i4CB5160F68ECFD07%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22Mingzhe-syman-jch-009.png%22%20title%3D%22Mingzhe-syman-jch-009.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CSPAN%3ENOTE%3C%2FSPAN%3E%3C%2FSTRONG%3E%3CSPAN%3E%20%3CEM%3EAll%20the%20other%20advanced%20settings%20can%20be%20left%20with%20the%20default%20values%2C%20however%20you%20should%20match%20the%20validity%20period%20in%20the%20template%20with%20your%20Intune%20policy%2C%20and%20if%20the%20target%20is%20iOS%20you%20may%20want%20to%20deselect%20non-repudiation%20in%20the%20Key%20Usage%20(KU).%3C%2FEM%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E9.%20Save%20the%20certificate%20template%2C%20making%20note%20of%20the%20OID.%20When%20you%20click%20on%20the%20certificate%20template%20it%20is%20located%20on%20the%20right%20as%20shown%20here%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20609px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F114459i19305759BDF1A2C0%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22Mingzhe-syman-jch-011.png%22%20title%3D%22Mingzhe-syman-jch-011.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E10.%26nbsp%3B%3CSPAN%3ENow%20all%20you%20need%20to%20do%20is%20configure%20a%20PKCS%20certificate%20profile%20in%20Intune%20and%20deploy%20this%20to%20a%20group%20like%20you%20normally%20would%2C%20just%20make%20sure%20that%20%3CSTRONG%3ECertificate%20template%20name%3C%2FSTRONG%3E%20matches%20the%20OID%20obtained%20when%20saving%20the%20certificate%20template%20on%20the%20Symantec%20CA.%20It%20is%20also%20important%20to%20keep%20the%20%3CSTRONG%3ECertification%20authority%3C%2FSTRONG%3E%20and%20%3CSTRONG%3ECertificate%20authority%20name%3C%2FSTRONG%3E%20exactly%20as%20shown%20below.%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20560px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F114460i383A76B5F0089EF5%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22Mingzhe-syman-jch-012.png%22%20title%3D%22Mingzhe-syman-jch-012.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EOnce%20your%20devices%20receive%20the%20Intune%20certificate%20policy%20they%20should%20request%20and%20successfully%20receive%20a%20PKCS%20certificate%20from%20the%20Symantec%20CA.%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EMingzhe%20Li%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CEM%3EIntune%20Support%20Escalation%20Engineer%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%3CEM%3EMicrosoft%3C%2FEM%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-633440%22%20slang%3D%22en-US%22%3ERe%3A%20Support%20Tip%3A%20Configuring%20a%20Symantec%20PKI%20certificate%20template%20for%20Intune%20PKCS%20deployment%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-633440%22%20slang%3D%22en-US%22%3E%3CP%3EThanks%20for%20sharing%20this%20info.%20This%20works%20great%20on%20iOS%20and%20Android.%20When%20can%20we%20see%20support%20for%20MacOS%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-784914%22%20slang%3D%22en-US%22%3ERe%3A%20Support%20Tip%3A%20Configuring%20a%20Symantec%20PKI%20certificate%20template%20for%20Intune%20PKCS%20deployment%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-784914%22%20slang%3D%22en-US%22%3E%3CP%3EHi%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F304744%22%20target%3D%22_blank%22%3E%40mnejmantowicz%3C%2FA%3E%2C%26nbsp%3Bgreat%20question%20and%20apologies%20for%20missing%20this!%3C%2FP%3E%0A%3CP%3EThere%20is%20a%20UserVoice%20item%20you%20may%20want%20to%20add%20your%20vote%20to%3A%20%3CA%20href%3D%22https%3A%2F%2Fmicrosoftintune.uservoice.com%2Fforums%2F291681-ideas%2Fsuggestions%2F12332937-microsoft-intune-ndes-connector-with-symantec-mana%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fmicrosoftintune.uservoice.com%2Fforums%2F291681-ideas%2Fsuggestions%2F12332937-microsoft-intune-ndes-connector-with-symantec-mana%3C%2FA%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-800261%22%20slang%3D%22en-US%22%3ERe%3A%20Support%20Tip%3A%20Configuring%20a%20Symantec%20PKI%20certificate%20template%20for%20Intune%20PKCS%20deployment%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-800261%22%20slang%3D%22en-US%22%3E%3CP%3EThe%20above%20UserVoice%20item%20has%20already%20been%20implemented.%20I%20am%20simply%20wanting%20to%20be%20able%20to%20deploy%20the%20cert%20to%20MacOS.%3C%2FP%3E%3C%2FLINGO-BODY%3E
Microsoft

Hello everyone, today we have a post from Intune Support Escalation Engineer Mingzhe Li. In this post, Mingzhe goes through the process of configuring the certificate template when using the Intune Certificate Connector to issue PKCS certificates from a Symantec PKI Manager Web Service to Intune managed devices. Symantec will be the ultimate authority when it comes to the requirements for issuing certificates from their Certification Authority service, but this should get you working in most scenarios.

 

=====

 

Introduction

Intune has the capability to deploy PKCS certificates from Symantec PKI Manager Web Service (referred as Symantec CA in this article). The process for configuring this is largely covered in the following docs page:

 

Set up Intune Certificate Connector for Symantec PKI Manager Web Service

 

However, we don’t go into a lot of detail regarding how to configure the certificate template itself so that it works correctly for Microsoft Intune. I recently had some experience setting this up in my lab so I thought I’d share that with you here in case you ever had the need to do the same.

 

Creating the certificate template in Symantec PKI Manager Web Service

You should start with our documentation on this here. When you get to the section titled Get the Certificate Profile OID it can be a little confusing on exactly how to configure the certificate template correctly as the docs don'y explicitly mention how to do this. Rather, it recommends that you contact Symantec support if you have any issues obtaining the Certificate Profile OID:

 

Mingzhe-syman-jch-001.png

Here’s the process I follow when creating a certificate template in Symantec CA so that it works for Microsoft Intune. Please note that it is recommended to use this template for Intune PKCS deployment only as this has not been tested in other scenarios.

 

1. First we need to log on to the Symantec PKI Manager console and create a new certificate profile. To do this, click on Manage Certificate Profiles:

 

Mingzhe-syman-jch-002.png

 

2. Now click on Add certificate profiles at the top (highlighted):

 

Mingzhe-syman-jch-003.png

 

3. Select either Test mode or Production mode (either will work):

 

4. Select the Client Authentication option:

 

Mingzhe-syman-jch-005.png

 

5. Enter a Certificate friendly name for your new template:

 

Mingzhe-syman-jch-006.png

 

6. Click on Enrollment method and select PKI web services:

 

Mingzhe-syman-jch-007.png

 

7. Click on Advanced options and delete Common Name (CN) using the “x”:

 

Mingzhe-syman-jch-008.png

 

8. Now select Add field and select Common Name (CN), Webservice Request, then set Required to No. This is important as the certificate deployment will fail if this is set to Yes:

 

Mingzhe-syman-jch-009.png

NOTE All the other advanced settings can be left with the default values, however you should match the validity period in the template with your Intune policy, and if the target is iOS you may want to deselect non-repudiation in the Key Usage (KU).

 

9. Save the certificate template, making note of the OID. When you click on the certificate template it is located on the right as shown here:

 

Mingzhe-syman-jch-011.png

 

10. Now all you need to do is configure a PKCS certificate profile in Intune and deploy this to a group like you normally would, just make sure that Certificate template name matches the OID obtained when saving the certificate template on the Symantec CA. It is also important to keep the Certification authority and Certificate authority name exactly as shown below.

 

Mingzhe-syman-jch-012.png

Once your devices receive the Intune certificate policy they should request and successfully receive a PKCS certificate from the Symantec CA.

 

Mingzhe Li

Intune Support Escalation Engineer

Microsoft

3 Comments
Senior Member

Thanks for sharing this info. This works great on iOS and Android. When can we see support for MacOS?

Hi @mnejmantowicz, great question and apologies for missing this!

There is a UserVoice item you may want to add your vote to: https://microsoftintune.uservoice.com/forums/291681-ideas/suggestions/12332937-microsoft-intune-ndes...

Senior Member

The above UserVoice item has already been implemented. I am simply wanting to be able to deploy the cert to MacOS.