Prerequisites for the Certificate Connector for Microsoft Intune
Стаття
Review the prerequisites and infrastructure requirements for the Certificate Connector for Microsoft Intune. Some prerequisites and infrastructure requirements can vary depending on the features you configure a connector instance to support.
General prerequisites
Requirements for the computer where you install the connector software:
Windows Server 2012 R2 or later.
Примітка
The Server installation must include the Desktop Experience and support use of a browser. For more information, see Install Server with Desktop Experience in the Windows Server 2016 documentation.
To support automatic updates of the connector software, the server must have access to the Azure update service:
Port: 443
Endpoint: autoupdate.msappproxy.net
The Enhanced Security Configuration must be deactivated.
PKCS
Requirements for private and public key pair (PKCS) certificate templates:
Certificate templates that you use for PKCS requests must be configured with permissions that allow the certificate connector service account to enroll the certificate.
The certificate templates must be added to the Certification Authority (CA).
Примітка
Any instance of the connector that supports PKCS can be used to retrieve pending PKCS requests from the Intune Service queue, process Imported certificates, and handle revocation requests. It's not possible to define which connector handles each request.
Therefore, each connector that supports PKCS must have the same permissions and be able to connect with all the certification authorities defined later in the PKCS profiles.
PKCS imported certificates
To support PKCS imported certificates, the server that hosts the connector requires additional configurations, such as configuring a Key storage provider access to allow the Connector Service User to retrieve keys.
The Certification Authority must be configured to allow the connector service account to revoke certificates.
SCEP
To support Simple Certificate Enrollment Protocol (SCEP) certificates, the Windows Server that hosts the connector must meet the following prerequisites in addition to the general prerequisites:
IIS 7 or higher
Network Device Enrollment Service (NDES) service, which is part of the Active Directory Certification Services role. The connector isn't supported on the same server as your issuing Certification Authority (CA). For more information, see Configure infrastructure to support SCEP with Intune.
On the Windows Server, select to add the following Server Roles and Features:
Server Roles:
Active Directory Certificate Services
Web Server (IIS)
Features:
.NET Framework 4.7 Features
.NET Framework 4.7
ASP.NET 4.7
WCF Services
HTTP Activation
AD CS > Role Services:
Network Device Enrollment Service - For the connector SCEP when you use a Microsoft CA, install, and configure the Network Device Enrollment Service (NDES) server role. When you configure NDES, you need to assign a user account for use by the NDES application pool. NDES also has its own requirements.
Web Server Role (IIS) > Role Services:
Security
Request Filtering
Application Development
.NET Extensibility 4.7
ASP.NET 4.7
Management Tools
IIS Management Console
IIS 6 Management Compatibility
IIS 6 Metabase Compatibility
IIS 6 WMI Compatibility
In addition, NDES requires the following.NET Framework 3.5 Features:
.NET Framework 3.5
HTTP Activation
Requirements for SCEP certificate templates:
Certificate templates you use for SCEP requests must be configured with permissions that allow the Certificate Connector service account to auto enroll the certificate.
The certificate templates must be added to the CA.
Accounts
Prepare the following accounts before you install the certificate connector software.
Installation account
You can use any user account that has local administrative permissions on the Windows Server to install the connector software. You can use this same account to configure the Windows Server with the NDES Windows server role should you use SCEP and a Microsoft CA.
Certificate connector service account
The certificate connector requires an account to use as a service account. This account is used by the connector to access the Windows Server, communicate with Intune, and access the Certification Authority to service PKI requests.
The connector service account must have the following permissions:
To use SCEP with a Microsoft CA, you need to add NDES to the server that hosts the connector before installing the connector. When you configure NDES, you need to specify an account for use as the application pool user, which can also be referred to as the NDES service account. This account can be a local or domain user account and must have the following permissions:
Read and Enroll permissions on each SCEP certificate template you use to issue certificates.
Member of the IIS_IUSRS group.
For guidance on configuring the NDES server role for the Certificate Connector for Microsoft Intune, see Set up NDES in Configure infrastructure to support SCEP with Intune.
Microsoft Entra user
When configuring the connector, you need to use a user account that: is either a Global Admin or Intune Admin and has an Intune license assigned.
This module teaches education partners the basics of Intune for Education and how it works with Microsoft Entra ID. Part of the Partner Success Series.
Плануйте та виконуйте стратегію розгортання кінцевих точок, використовуючи основні елементи сучасного керування, підходів до спільного керування та інтеграції Microsoft Intune.