Skip to content

Commit 32a31cf

Browse files
authored
Merge pull request #16279 from MicrosoftDocs/main
Publish main to live 10/04/2024, 3:30 PM
2 parents ef981f0 + 9223889 commit 32a31cf

File tree

2 files changed

+33
-21
lines changed

2 files changed

+33
-21
lines changed

memdocs/configmgr/comanage/autopilot-enrollment.md

Lines changed: 23 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.topic: how-to
99
ms.localizationpriority: medium
1010
author: gowdhamankarthikeyan
1111
ms.author: gokarthi
12-
ms.reviewer: mstewart,aaroncz
12+
ms.reviewer: mstewart,aaroncz,frankroj
1313
manager: apoorvseth
1414
ms.collection: tier3
1515
---
@@ -83,12 +83,16 @@ The following components are required to support Autopilot into co-management:
8383

8484
- Windows devices running one of the following versions:
8585

86-
- Windows 11
86+
- Windows 11
8787

88-
> [!NOTE]
89-
> For Windows 11 devices, if a device has not been targeted with a co-management settings policy, the management authority will be set to Intune, during the Autopilot process. Installing Configuration Manager client as Win32 app does not change management authority to Configuration Manager and thus Intune will continue to manage all the co-management workloads. To mitigate this, you must create a co-management settings policy and set **automatically install the Configuration Manager client** to **No** and in Advanced settings, keep default settings for **Override co-management policy and use Intune for all workloads.**
88+
For Windows 11 devices, if a device has not been targeted with a co-management settings policy, the management authority will be set to Microsoft Intune during the Autopilot process. Installing the Configuration Manager client as Win32 app doesn't change management authority to Configuration Manager and Microsoft Intune will continue to manage all the co-management workloads. To set the management authority to Configuration Manager, create a co-management settings policy with the following Advanced settings:<br>
89+
<br>
90+
- **Automatically install the Configuration Manager client.**: **No**
91+
- **Override co-management policy and use Intune for all workloads.**: **No**
92+
93+
For additional information, see [Co-management settings: Windows Autopilot with co-management](https://techcommunity.microsoft.com/t5/microsoft-intune-blog/co-management-settings-windows-autopilot-with-co-management/ba-p/3638500).
9094

91-
- At least Windows 10, version 20H2, with the latest cumulative update
95+
- A [currently supported](/windows/release-health/supported-versions-windows-client#windows-10-supported-versions-by-servicing-option) version of Windows 10.
9296

9397
- Register the device for Autopilot. For more information, see [Windows Autopilot registration overview](/autopilot/registration-overview).
9498

@@ -127,19 +131,25 @@ Use these recommendations for a more successful deployment:
127131

128132
## Limitations
129133

130-
Autopilot into co-management currently doesn't support the following functionality:
134+
- For Windows 11 devices in Microsoft Entra hybrid joined scenario, the management authority will be set to Microsoft Intune during the Windows Autopilot process. Installing Configuration Manager client as Win32 app does not change management authority to Configuration Manager and Microsoft Intune will continue to manage all the co-management workloads.
131135

132-
- Microsoft Entra hybrid joined devices - If the device is targeted with co-management settings policy, in Microsoft Entra hybrid join scenario, the autopilot provisioning times out during ESP phase.
136+
To change the management authority to Configuration Manager, set the following registry key value:<br>
137+
<br>
138+
- Path: **HKLM\SOFTWARE\Microsoft\DeviceManageabilityCSP\Provider\MS DM Server**
139+
- Value: **ConfigInfo**
140+
- REG_SZ: **2**
141+
142+
For more information, see [Co-management settings: Windows Autopilot with co-management](https://techcommunity.microsoft.com/t5/microsoft-intune-blog/co-management-settings-windows-autopilot-with-co-management/ba-p/3638500).
133143

134-
> [!NOTE]
135-
>
136-
> For Windows 11 devices in Microsoft Entra hybrid joined scenario, the management authority will be set to Intune, during the Autopilot process. Installing Configuration Manager client as Win32 app does not change management authority to Configuration Manager and thus Intune will continue to manage all the co-management workloads. To mitigate this, along with Configuration Manager client installation, registry value **ConfigInfo** in registry path **HKLM\SOFTWARE\Microsoft\DeviceManageabilityCSP\Provider\MS DM Server** must be set to **2** which will set the management authority as Configuration Manager.
144+
- Autopilot into co-management currently doesn't support the following functionality:
145+
146+
- Microsoft Entra hybrid joined devices - If the device is targeted with co-management settings policy, in Microsoft Entra hybrid join scenario, the autopilot provisioning times out during ESP phase.
137147

138-
- Autopilot pre-provisioning.
148+
- Autopilot pre-provisioning.
139149

140-
- Workloads switched to **Pilot Intune** with pilot collections. This functionality is dependent upon collection evaluation, which doesn't happen until after the client is installed and registered. Since the client won't get the correct policy until later in the Autopilot process, it can cause indeterminate behaviors.
150+
- Workloads switched to **Pilot Intune** with pilot collections. This functionality is dependent upon collection evaluation, which doesn't happen until after the client is installed and registered. Since the client won't get the correct policy until later in the Autopilot process, it can cause indeterminate behaviors.
141151

142-
- Clients that authenticate with PKI certificates. You can't provision the certificate on the device before the Configuration Manager client installs and needs to authenticate to the CMG. Microsoft Entra ID is recommended for client authentication. For more information, see [Plan for CMG client authentication: Microsoft Entra ID](../core/clients/manage/cmg/plan-client-authentication.md#azure-ad).
152+
- Clients that authenticate with PKI certificates. You can't provision the certificate on the device before the Configuration Manager client installs and needs to authenticate to the CMG. Microsoft Entra ID is recommended for client authentication. For more information, see [Plan for CMG client authentication: Microsoft Entra ID](../core/clients/manage/cmg/plan-client-authentication.md#azure-ad).
143153

144154
## Configure
145155

memdocs/intune/protect/certificates-configure.md

Lines changed: 10 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
---
22
# required metadata
33

4-
title: Learn about the types of certificate that are supported by Microsoft Intune
4+
title: Types of certificate that are supported by Microsoft Intune
55
description: Learn about Microsoft Intune's support for Simple Certificate Enrollment Protocol (SCEP), Public Key Cryptography Standards (PKCS) certificates.
66
keywords:
77
author: lenewsad
88
ms.author: lanewsad
99
manager: dougeby
10-
ms.date: 08/21/2023
10+
ms.date: 10/04/2024
1111
ms.topic: conceptual
1212
ms.service: microsoft-intune
1313
ms.subservice: protect
@@ -58,7 +58,8 @@ To provision a user or device with a specific type of certificate, Intune uses a
5858

5959
In addition to the three certificate types and provisioning methods, you need a trusted root certificate from a trusted Certification Authority (CA). The CA can be an on-premises Microsoft Certification Authority, or a [third-party Certification Authority](certificate-authority-add-scep-overview.md). The trusted root certificate establishes a trust from the device to your root or intermediate (issuing) CA from which the other certificates are issued. To deploy this certificate, you use the *trusted certificate* profile, and deploy it to the same devices and users that receive the certificate profiles for SCEP, PKCS, and imported PKCS.
6060

61-
> [!TIP]
61+
> [!TIP]
62+
>
6263
> Intune also supports use of [Derived credentials](derived-credentials.md) for environments that require use of smartcards.
6364
6465
### What’s required to use certificates
@@ -120,11 +121,13 @@ When you use a Microsoft Certification Authority (CA):
120121

121122
When you use a third-party (non-Microsoft) Certification Authority (CA):
122123

123-
- To use SCEP certificate profiles:
124+
- SCEP certificate profiles don't require use of the Microsoft Intune Certificate Connector. Instead, the third-party CA handles the certificate issuance and management directly. To use SCEP certificate profiles without the Intune Certificate Connector:
124125
- Configure integration with a third-party CA from [one of our supported partners](certificate-authority-add-scep-overview.md#third-party-certification-authority-partners). Setup includes following the instructions from the third-party CA to complete integration of their CA with Intune.
125126
- [Create an application in Microsoft Entra ID](certificate-authority-add-scep-overview.md#set-up-third-party-ca-integration) that delegates rights to Intune to do SCEP certificate challenge validation.
127+
128+
For more information, see [Set up third-party CA integration](../protect/certificate-authority-add-scep-overview.md#set-up-third-party-ca-integration)
126129

127-
- PKCS imported certificates require you to [Install the Certificate Connector for Microsoft Intune](certificate-connector-install.md).
130+
- PKCS imported certificates require use of the Microsoft Intune Certificate Connector. See [Install the Certificate Connector for Microsoft Intune](certificate-connector-install.md).
128131

129132
- Deploy certificates by using the following mechanisms:
130133
- [Trusted certificate profiles](certificates-trusted-root.md#create-trusted-certificate-profiles) to deploy the Trusted Root CA certificate from your root or intermediate (issuing) CA to devices
@@ -152,10 +155,9 @@ When you use a third-party (non-Microsoft) Certification Authority (CA):
152155

153156
[!INCLUDE [windows-phone-81-windows-10-mobile-support](../includes/windows-phone-81-windows-10-mobile-support.md)]
154157

158+
[!INCLUDE [android-device-administrator-support](../includes/android-device-administrator-support.md)]
155159

156-
[!INCLUDE [android_device_administrator_support](../includes/android-device-administrator-support.md)]
157-
158-
## Next steps
160+
## Related content
159161

160162
More resources:
161163

0 commit comments

Comments
 (0)