%3CLINGO-SUB%20id%3D%22lingo-sub-1310393%22%20slang%3D%22en-US%22%3EGo%20passwordless%20on%20Android%20devices%20using%20derived%20credentials%20with%20Microsoft%20Endpoint%20Manager%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1310393%22%20slang%3D%22en-US%22%3E%3CP%3EMicrosoft%20Endpoint%20Manager%20is%20excited%20to%20announce%20support%20for%20derived%20credentials%20on%20Android%20Enterprise%20fully%20managed%20devices.%20This%20release%20of%20derived%20credentials%20is%20integrated%20with%20Entrust%20Datacard%20and%20Intercede%20in%20support%20of%20NIST%20800-157%20requirements.%20It%20is%20available%20immediately%20on%20Android%20Enterprise%20fully%20managed%20devices%20running%20Android%207.0%20and%20above.%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EDerived%20credentials%20help%20enable%20mobile%20productivity%20at%20high-security%20organizations%20that%20use%20physical%20smart%20card%20readers%20to%20authenticate%20employees%20and%20contractors%20for%20secure%20access.%20Smart%20cards%20provide%20seamless%20and%20secure%20authentication%20to%20apps%2C%20websites%2C%20Wi-Fi%2C%20and%20VPN%20as%20well%20as%20enable%20the%20use%20of%20S%2FMIME%20to%20sign%20and%20encrypt%20email.%20With%20use%20of%20productivity%20apps%20on%20mobile%20devices%20becoming%20commonplace%20in%20many%20government%20and%20high%20security%20organizations%2C%20there%20is%20a%20need%20to%20embrace%20iOS%20and%20Android%20devices%20for%20work%20while%20still%20maintaining%20a%20highly%20secure%20environment.%20On%20laptops%20and%20desktops%2C%20users%20can%20connect%20smart%20card%20readers.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThis%20article%20discusses%20how%20to%20enable%20the%20same%20level%20of%20security%20when%20authenticating%20using%20their%20Android%20phones.%20In%20a%20previous%20article%2C%20we%20discussed%20support%20for%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fenterprise-mobility-security%2Fmicrosoft-intune-helps-high-security-customers-authenticate%2Fba-p%2F914247%22%20target%3D%22_blank%22%3Ederived%20credentials%20on%20iOS%3C%2FA%3E%2C%20and%20in%20the%20future%20we%20expect%20to%20add%20support%20for%20Windows%2010%20and%20other%20partners%20such%20as%20DISA%20Purebred.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--1357352355%22%20id%3D%22toc-hId--1357352355%22%3EMobile%20device%20enrollment%20flow%20with%20derived%20credentials%3C%2FH2%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ESo%20how%20do%20smart%20card%20users%20join%20the%20secure%20passwordless%20revolution%20from%20their%20mobile%20phones%20if%20they%20cannot%20plug-in%20their%20smart%20card%20into%20their%20phone%20for%20authentication%3F%20They%20begin%20by%20authenticating%20themselves%20using%20a%20smart%20card%20reader%20on%20trusted%20devices%20which%20links%20the%20authentication%20with%20their%20mobile%20device.%26nbsp%3B%20A%20digital%20certificate%20is%20then%20issued%20to%20the%20mobile%20device.%20In%20order%20to%20make%20the%20user%20experience%20smooth%20for%20end%20users%2C%20the%20derived%20credential%20enrollment%20flow%20is%20built%20into%20the%20Intune%20Company%20Portal%20app%2C%20which%20is%20the%20app%20used%20to%20enroll%20the%20device%20with%20Intune.%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ELet's%20walk%20through%20the%20end%20user%20experience%20on%20day%20zero%2C%20where%20a%20user%20wants%20to%20enroll%20an%20Android%20Enterprise%20fully%20managed%20device%20with%20Microsoft%20Intune%20(now%20a%20part%20of%20Microsoft%20Endpoint%20Manager)%20to%20get%20access%20to%20company%20resources%2C%20such%20as%20Office%20365%20apps%20on%20mobile.%20End%20users%20authenticate%20using%20their%20smart%20card%20(from%20a%20smart%20card%20enabled%20device)%20when%20enrolling%20the%20mobile%20device%20with%20Intune%20and%20then%20once%20more%20with%20the%20derived%20credential%20issuer%E2%80%99s%20identity%20system.%20After%20successfully%20completing%20both%20steps%2C%20a%20digital%20certificate%20is%20issued%20to%20the%20mobile%20device.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EUsers%20will%20be%20prompted%20shortly%20after%20enrollment%20to%20retrieve%20their%20derived%20credential%20and%20will%20be%20guided%20through%20the%20process.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EEnrollment%20starts%20with%20a%20new%20or%20factory-reset%20device.%20Intune%20and%20Android%20Enterprise%20provide%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fintune%2Fenrollment%2Fandroid-fully-managed-enroll%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Emultiple%20methods%20for%20initiating%20fully%20managed%20device%20enrollment%3C%2FA%3E%20such%20as%20QR%20code%20or%20token%20enrollment.%3C%2FLI%3E%0A%3CLI%3EDuring%20the%20out-of-box%20experience%2C%20the%20user%20is%20guided%20through%20enrolling%20with%20Intune%20and%20installing%20and%20authenticating%20to%20the%20Microsoft%20Intune%20app.%20When%20the%20user%20reaches%20a%20sign%20in%20screen%2C%20they%20choose%20%3CSTRONG%3ESign%20in%20from%20another%20device%20%3C%2FSTRONG%3Esince%20they%20don't%20have%20their%20password.On%20a%20smart%20card-enabled%20device%2C%20such%20as%20a%20Windows%20PC%2C%20the%20user%20visits%20%3CA%20href%3D%22https%3A%2F%2Fmicrosoft.com%2Fdevicelogin%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehttps%3A%2F%2Fmicrosoft.com%2Fdevicelogin%3C%2FA%3E%20to%20complete%20their%20authentication%20request%20using%20the%20code%20that%20is%20displayed%20on%20their%20mobile%20device%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B.%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%222004%20Android%2001.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F184595iB14FBBD560E33862%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%222004%20Android%2001.png%22%20alt%3D%222004%20Android%2001.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EThe%20user%20enters%20this%20code%20into%20the%20%3CA%20href%3D%22https%3A%2F%2Fmicrosoft.com%2Fdevicelogin%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehttps%3A%2F%2Fmicrosoft.com%2Fdevicelogin%3C%2FA%3E%20site%20on%20their%20Windows%20PC%20and%20authenticates%20with%20their%20smart%20card%2C%20which%20completes%20the%20authentication%20request%20for%20Intune.%20The%20user%20authenticates%20this%20way%20to%20complete%20the%20rest%20of%20the%20Intune%20enrollment%20workflow%20on%20the%20mobile%20device%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%222004%20Android%2002.png%22%20style%3D%22width%3A%20637px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F184597i6798AC5BF361DFB3%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%222004%20Android%2002.png%22%20alt%3D%222004%20Android%2002.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EAfter%20Intune%20enrollment%2C%20an%20app%20notification%20for%20Microsoft%20Intune%20informs%20the%20user%20that%20they%20need%20to%20go%20through%20the%20enrollment%20process%20to%20get%20a%20mobile%20smart%20credential%20(their%20derived%20credential).%20Alternatively%2C%20email%20notifications%20can%20be%20used%20as%20well.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%222004%20Android%2003.png%22%20style%3D%22width%3A%20328px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F184600i8140B6A27FBB6BAE%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20title%3D%222004%20Android%2003.png%22%20alt%3D%222004%20Android%2003.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EAfter%20clicking%20on%20the%20notification%2C%20the%20user%20is%20taken%20to%20the%20derived%20credential%20enrollment%20flow%20within%20the%20Company%20Portal%20and%20follows%20the%20process%20to%20get%20certificates%20from%20the%20derived%20credential%20provider%20onto%20the%20device.%20This%20experience%20can%20be%20fully%20branded%20with%20your%20organization%E2%80%99s%20user%20documentation%2C%20logo%2C%20name%20and%20more.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%222004%20Android%2004.png%22%20style%3D%22width%3A%20280px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F184599i20A8B003EBEE6F24%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20title%3D%222004%20Android%2004.png%22%20alt%3D%222004%20Android%2004.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EThe%20final%20part%20of%20the%20process%20varies%20depending%20on%20the%20certificate%20provider%2C%20but%20generally%20involves%20using%20a%20physical%20smart%20card%20on%20a%20trusted%20PC%20to%20authenticate%20with%20the%20provider's%20identity%20system%20and%20linking%20the%20authentication%20request%20on%20mobile%20device.%20Depending%20on%20the%20provider%2C%20the%20user%20may%20have%20to%20scan%20a%20QR%20code%20on%20the%20mobile%20device.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%222004%20Android%2005.png%22%20style%3D%22width%3A%20275px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F184598i5439D4E234C44969%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20title%3D%222004%20Android%2005.png%22%20alt%3D%222004%20Android%2005.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EOnce%20the%20process%20is%20complete%20and%20certificates%20are%20received%2C%20the%20mobile%20device%20can%20be%20used%20for%20authentication%2C%20Wi-Fi%2C%20VPN%2C%20or%20S%2FMIME%20signing%20and%2For%20encryption%20with%20apps%20that%20support%20it%2C%20as%20defined%20by%20the%20policies%20configured%20by%20the%20administrator.%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%222004%20Android%2006.png%22%20style%3D%22width%3A%20258px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F184601i5F34BEC1A14EEBF8%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20title%3D%222004%20Android%2006.png%22%20alt%3D%222004%20Android%2006.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-1130160478%22%20id%3D%22toc-hId-1130160478%22%3ENext%20steps%3C%2FH2%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWith%20support%20for%20derived%20credentials%2C%20high-security%20customers%20in%20both%20federal%20and%20private%20sector%20can%20deliver%20a%20consistent%20experience%20to%20smart%20card%20users%20on%20not%20only%20Windows%20devices%2C%20but%20mobile%20devices%20as%20well.%20To%20get%20started%2C%20check%20out%20the%20%3CA%20href%3D%22https%3A%2F%2Faka.ms%2Fgetstartedwithintunederivedcredentials%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ederived%20credentials%20documentation%3C%2FA%3E%20for%20instructions%20to%20integrate%20with%20our%20partners%2C%20including%20%3CA%20href%3D%22https%3A%2F%2Fwww.entrustdatacard.com%2Fproducts%2Fauthentication%2Fpiv%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EEntrust%20Datacard%3C%2FA%3E%20and%20%3CA%20href%3D%22https%3A%2F%2Fwww.intercede.com%2Fsolutions%2Ftechnologies%2Fderived-credentials%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EIntercede%3C%2FA%3E.%20We%E2%80%99re%20excited%20to%20help%20Microsoft%20customers%20enable%20secure%20passwordless%20access%20for%20all%20endpoints%20on%20the%20industry%E2%80%99s%20leading%20manageability%20and%20security%20platform.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EMore%20info%20and%20feedback%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EFor%20more%20information%20on%20how%20to%20deploy%20Microsoft%20Endpoint%20Manager%2C%20add%20our%20detailed%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fintune%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Etechnical%20documentation%3C%2FA%3E%3CSPAN%3E%20as%20a%20favorite%3C%2FSPAN%3E.%20Don%E2%80%99t%20have%20Microsoft%20Intune%3F%20Start%20a%20free%20trial%20or%20buy%20a%20subscription%20today!%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAs%20always%2C%20we%20want%20to%20hear%20from%20you!%20If%20you%20have%20any%20suggestions%2C%20questions%2C%20or%20comments%2C%20please%20visit%20us%20on%20our%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2FMicrosoft-Intune%2Fbd-p%2FMicrosoft-Intune%22%20target%3D%22_blank%22%3ETech%20Community%20page%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CDIV%20id%3D%22tinyMceEditorMayunk%20Jain_6%22%20class%3D%22mceNonEditable%20lia-copypaste-placeholder%22%3E%26nbsp%3B%3C%2FDIV%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-left%22%20image-alt%3D%22clipboard_image_6.png%22%20style%3D%22width%3A%2035px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F152075iD067D728839119C3%2Fimage-dimensions%2F35x35%3Fv%3D1.0%22%20width%3D%2235%22%20height%3D%2235%22%20title%3D%22clipboard_image_6.png%22%20alt%3D%22clipboard_image_6.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3BFollow%20%3CA%20href%3D%22https%3A%2F%2Fwww.twitter.com%2Fmsintune%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3E%40MSIntune%3C%2FA%3E%20on%20Twitter%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CEM%3E%26nbsp%3B%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CEM%3E(This%20article%20is%20co-authored%20with%20%3C%2FEM%3EJessica%20Yang%3CEM%3E%2C%20Program%20Manager%2C%20Microsoft%20Endpoint%20Manager)%3C%2FEM%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-1310393%22%20slang%3D%22en-US%22%3E%3CP%3EMicrosoft%20Endpoint%20Manager%20is%20excited%20to%20announce%20support%20for%20derived%20credentials%20on%20Android%20Enterprise%20fully%20managed%20devices.%20This%20release%20of%20derived%20credentials%20is%20integrated%20with%20Entrust%20Datacard%20and%20Intercede%20in%20support%20of%20NIST%20800-157%20requirements.%20It%20is%20available%20immediately%20on%20Android%20Enterprise%20fully%20managed%20devices%20running%20Android%207.0%20and%20above.%20Support%20for%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fenterprise-mobility-security%2Fmicrosoft-intune-helps-high-security-customers-authenticate%2Fba-p%2F914247%22%20target%3D%22_blank%22%3Ederived%20credentials%20on%20iOS%3C%2FA%3E%20is%20already%20available%2C%20and%20in%20the%20future%20we%E2%80%99re%20working%20on%20support%20for%20Windows%2010%20and%20integration%20with%20other%20derived%20credential%20partners%20such%20as%20DISA%20Purebred.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22CLO20_Kendrick_002-0000.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F184582i1020FD5E796FC445%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22CLO20_Kendrick_002-0000.png%22%20alt%3D%22CLO20_Kendrick_002-0000.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-1310393%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EMicrosoft%20Endpoint%20Manager%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EMicrosoft%20Intune%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Microsoft

Microsoft Endpoint Manager is excited to announce support for derived credentials on Android Enterprise fully managed devices. This release of derived credentials is integrated with Entrust Datacard and Intercede in support of NIST 800-157 requirements. It is available immediately on Android Enterprise fully managed devices running Android 7.0 and above. 

 

Derived credentials help enable mobile productivity at high-security organizations that use physical smart card readers to authenticate employees and contractors for secure access. Smart cards provide seamless and secure authentication to apps, websites, Wi-Fi, and VPN as well as enable the use of S/MIME to sign and encrypt email. With use of productivity apps on mobile devices becoming commonplace in many government and high security organizations, there is a need to embrace iOS and Android devices for work while still maintaining a highly secure environment. On laptops and desktops, users can connect smart card readers.

 

This article discusses how to enable the same level of security when authenticating using their Android phones. In a previous article, we discussed support for derived credentials on iOS, and in the future we expect to add support for Windows 10 and other partners such as DISA Purebred.

 

Mobile device enrollment flow with derived credentials

 

So how do smart card users join the secure passwordless revolution from their mobile phones if they cannot plug-in their smart card into their phone for authentication? They begin by authenticating themselves using a smart card reader on trusted devices which links the authentication with their mobile device.  A digital certificate is then issued to the mobile device. In order to make the user experience smooth for end users, the derived credential enrollment flow is built into the Intune Company Portal app, which is the app used to enroll the device with Intune. 

 

Let's walk through the end user experience on day zero, where a user wants to enroll an Android Enterprise fully managed device with Microsoft Intune (now a part of Microsoft Endpoint Manager) to get access to company resources, such as Office 365 apps on mobile. End users authenticate using their smart card (from a smart card enabled device) when enrolling the mobile device with Intune and then once more with the derived credential issuer’s identity system. After successfully completing both steps, a digital certificate is issued to the mobile device.

 

Users will be prompted shortly after enrollment to retrieve their derived credential and will be guided through the process.

 

  • Enrollment starts with a new or factory-reset device. Intune and Android Enterprise provide multiple methods for initiating fully managed device enrollment such as QR code or token enrollment.
  • During the out-of-box experience, the user is guided through enrolling with Intune and installing and authenticating to the Microsoft Intune app. When the user reaches a sign in screen, they choose Sign in from another device since they don't have their password.On a smart card-enabled device, such as a Windows PC, the user visits https://microsoft.com/devicelogin to complete their authentication request using the code that is displayed on their mobile device

 .2004 Android 01.png

 

  • The user enters this code into the https://microsoft.com/devicelogin site on their Windows PC and authenticates with their smart card, which completes the authentication request for Intune. The user authenticates this way to complete the rest of the Intune enrollment workflow on the mobile device

2004 Android 02.png

 

  • After Intune enrollment, an app notification for Microsoft Intune informs the user that they need to go through the enrollment process to get a mobile smart credential (their derived credential). Alternatively, email notifications can be used as well.

2004 Android 03.png

 

  • After clicking on the notification, the user is taken to the derived credential enrollment flow within the Company Portal and follows the process to get certificates from the derived credential provider onto the device. This experience can be fully branded with your organization’s user documentation, logo, name and more.

2004 Android 04.png

 

  • The final part of the process varies depending on the certificate provider, but generally involves using a physical smart card on a trusted PC to authenticate with the provider's identity system and linking the authentication request on mobile device. Depending on the provider, the user may have to scan a QR code on the mobile device.

2004 Android 05.png

 

Once the process is complete and certificates are received, the mobile device can be used for authentication, Wi-Fi, VPN, or S/MIME signing and/or encryption with apps that support it, as defined by the policies configured by the administrator.

2004 Android 06.png

 

Next steps

 

With support for derived credentials, high-security customers in both federal and private sector can deliver a consistent experience to smart card users on not only Windows devices, but mobile devices as well. To get started, check out the derived credentials documentation for instructions to integrate with our partners, including Entrust Datacard and Intercede. We’re excited to help Microsoft customers enable secure passwordless access for all endpoints on the industry’s leading manageability and security platform.

 

More info and feedback

 

For more information on how to deploy Microsoft Endpoint Manager, add our detailed technical documentation as a favorite. Don’t have Microsoft Intune? Start a free trial or buy a subscription today!

 

As always, we want to hear from you! If you have any suggestions, questions, or comments, please visit us on our Tech Community page.

 

 

 

clipboard_image_6.png Follow @MSIntune on Twitter

 

 

(This article is co-authored with Jessica Yang, Program Manager, Microsoft Endpoint Manager)