You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: memdocs/intune/apps/app-configuration-policies-use-android.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ keywords:
8
8
author: Erikre
9
9
ms.author: erikre
10
10
manager: dougeby
11
-
ms.date: 08/08/2024
11
+
ms.date: 10/09/2024
12
12
ms.topic: how-to
13
13
ms.service: microsoft-intune
14
14
ms.subservice: apps
@@ -76,6 +76,7 @@ Android Enterprise has several enrollment methods. The enrollment type depends o
76
76
> * Camera
77
77
> * Record audio
78
78
> * Allow body sensor data
79
+
> * Background location
79
80
80
81
11. If the managed app supports configuration settings, the **Configuration settings format** dropdown box is visible. Select one of the following methods to add configuration information:
|Microsoft Windows App|[iOS](https://apps.apple.com/us/app/remote-desktop-mobile/id714464092)|✔|✔ see [Configure device redirection](/azure/virtual-desktop/client-device-redirection-intune).|✖|N/A|N/A|N/A|N/A|✖|
|Microsoft Teams|[Android](https://play.google.com/store/apps/details?id=com.microsoft.teams)|✔|No settings|✔|N/A|✔|✔|✔|✔ Supported for v1416/1.0.0.2023226005 (2023226050) or later|
Copy file name to clipboardExpand all lines: memdocs/intune/configuration/device-restrictions-ios.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -801,6 +801,9 @@ You can also:
801
801
- When set to **Yes**, be sure the device has a Wi-Fi profile. If you don't assign a Wi-Fi profile, then this setting can prevent devices from connecting to the internet. For example, if this device restrictions profile is assigned before a Wi-Fi profile, then the device might be blocked from connecting to the internet.
802
802
803
803
- If the device can't connect, then unenroll the device, and re-enroll with a Wi-Fi profile. Then, set this setting to **Yes** in a device restrictions profile, and assign the profile to the device.
804
+
805
+
> [!NOTE]
806
+
> **Require devices to use Wi-Fi networks set up via configuration profiles** does not support Wi-Fi profiles deployed using [custom profiles](custom-settings-ios.md).
Copy file name to clipboardExpand all lines: memdocs/intune/includes/android-supported-os.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,11 +4,11 @@ ms.author: erikje
4
4
ms.service: microsoft-intune
5
5
ms.subservice: fundamentals
6
6
ms.topic: include
7
-
ms.date: 02/01/2022
7
+
ms.date: 10/10/2024
8
8
ms.localizationpriority: high
9
9
---
10
10
11
11
> [!NOTE]
12
-
> Intune requires Android 8.x or higher for device enrollment scenarios and app configuration delivered through Managed devices app configuration policies. This requirement does not apply to [Microsoft Teams Android devices](https://www.microsoft.com/microsoft-teams/across-devices/devices?rtc=2) as these devices will continue to be supported.
12
+
> This requirement does not apply to [Microsoft Teams Android devices](https://www.microsoft.com/microsoft-teams/across-devices/devices?rtc=2) as these devices will continue to be supported.
13
13
>
14
14
> For Intune app protection policies and app configuration delivered through Managed apps app configuration policies, Intune requires Android 9.0 or higher.
Copy file name to clipboardExpand all lines: memdocs/intune/includes/mdm-supported-devices.md
+4-3Lines changed: 4 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ ms.author: erikje
4
4
ms.service: microsoft-intune
5
5
ms.subservice: fundamentals
6
6
ms.topic: include
7
-
ms.date: 09/06/2024
7
+
ms.date: 10/10/2024
8
8
ms.localizationpriority: high
9
9
---
10
10
@@ -30,8 +30,9 @@ ms.localizationpriority: high
30
30
31
31
### Android
32
32
33
-
- Android 8.0 and later (including Samsung KNOX Standard 3.0 and higher: [requirements](https://www.samsungknox.com/en/knox-platform/supported-devices/2.4+))
- For user-based management methods: Android 10.0 and later
34
+
- For userless management methods: Android 8.0 and later (including Samsung KNOX Standard 3.0 and higher: [requirements](https://www.samsungknox.com/en/knox-platform/supported-devices/2.4+))
35
+
- Android enterprise
35
36
- Android open source project device: [See here for the list of supported devices](../fundamentals/android-os-project-supported-devices.md)
# Add partner certification authority in Intune using SCEP
33
31
34
32
Use third-party certification authorities (CA) with Intune. Third-party CAs can provision mobile devices with new or renewed certificates by using the Simple Certificate Enrollment Protocol (SCEP), and can support Windows, iOS/iPadOS, Android, and macOS devices.
Copy file name to clipboardExpand all lines: memdocs/intune/protect/certificates-pfx-configure.md
+61-53Lines changed: 61 additions & 53 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -32,6 +32,13 @@ ms.collection:
32
32
---
33
33
# Configure and use PKCS certificates with Intune
34
34
35
+
**Applies to**L
36
+
- Android
37
+
- iOS/iPadOS
38
+
- macOS
39
+
- Windows 10/11
40
+
41
+
35
42
Microsoft Intune supports the use of private and public key pair (PKCS) certificates. This article reviews the requirements for PKCS certificates with Intune, including the export of a PKCS certificate then adding it to an Intune device configuration profile.
36
43
37
44
Microsoft Intune includes built-in settings to use PKCS certificates for access and authentication to your organizations resources. Certificates authenticate and secure access to your corporate resources like a VPN or a WiFi network. You deploy these settings to devices using device configuration profiles in Intune.
@@ -66,6 +73,60 @@ To use PKCS certificates with Intune, you need the following infrastructure:
-[Installation and configuration](certificate-connector-install.md)
68
75
76
+
## Update certificate connector: Strong mapping requirements for KB5014754
77
+
78
+
The Key Distribution Center (KDC) requires a strong mapping format in PKCS certificates deployed by Microsoft Intune and used for certificate-based authentication. The mapping must have a security identifier (SID) extension that maps to the user or device SID. If a certificate doesn't meet the new strong mapping criteria set by the full enforcement mode date, authentication will be denied. For more information about the requirements, see [KB5014754: Certificate-based authentication changes on Windows domain controllers ](https://support.microsoft.com/topic/kb5014754-certificate-based-authentication-changes-on-windows-domain-controllers-ad2c23b0-15d8-4340-a468-4d4f3b188f16).
79
+
80
+
In the Microsoft Intune Certificate Connector, version 6.2406.0.1001, we released an update that adds the object identifier attribute containing the user or device SID to the certificate, effectively satisfying the strong mapping requirements. This update applies to users and devices synced from an on-premises Active Directory to Microsoft Entra ID, and is available across all platforms, with some differences:
81
+
82
+
* Strong mapping changes apply to *user certificates* for all OS platforms.
83
+
84
+
* Strong mapping changes apply to *device certificates* for Microsoft Entra hybrid-joined Windows devices.
85
+
86
+
To ensure that certficate-based authentication continues working, you must take the following actions:
87
+
88
+
- Update the Microsoft Intune Certificate Connector to version 6.2406.0.1001. For information about the latest version and how to update the certificate connector, see [Certificate connector for Microsoft Intune](certificate-connector-overview.md).
89
+
90
+
- Make changes to registry key information on the Windows server that hosts the certificate connector.
91
+
92
+
Complete the following procedure to modify the registry keys and apply the strong mapping changes to certificates. These changes apply to new PKCS certificates and PKCS certificates that are being renewed.
93
+
94
+
>[!TIP]
95
+
> This procedure requires you to modify the registry in Windows. For more information, see the following resources on Microsoft Support:
96
+
> -[How to back up and restore the registry in Windows - Microsoft Support](https://support.microsoft.com/topic/how-to-back-up-and-restore-the-registry-in-windows-855140ad-e318-2a13-2829-d428a2ab0692)
97
+
> -[How to add, modify, or delete registry subkeys and values by using a .reg file - Microsoft Support](https://support.microsoft.com/topic/how-to-add-modify-or-delete-registry-subkeys-and-values-by-using-a-reg-file-9c7f37cf-a5e9-e1cd-c4fa-2a26218a1a23)
98
+
99
+
1. In the Windows registry, change the value for `[HKLM\Software\Microsoft\MicrosoftIntune\PFXCertificateConnector](DWORD)EnableSidSecurityExtension` to **1**.
100
+
101
+
1. Restart the certificate connector service.
102
+
1. Go to **Start** > **Run**.
103
+
2. Open **services.msc**.
104
+
3. Restart these services:
105
+
-**PFX Create Legacy Connector for Microsoft Intune**
106
+
107
+
-**PFX Create Certificate Connector for Microsoft Intune**
108
+
109
+
1. Changes begin applying to all new certificates, and to certificates being renewed. To verify that authentication works, we recommend testing all places where certificate-based authentication could be used, including:
110
+
- Apps
111
+
- Intune-integrated certification authorities
112
+
- NAC solutions
113
+
- Networking infrastructure
114
+
115
+
To roll back changes:
116
+
117
+
1. Restore the original registry settings.
118
+
119
+
1. Restart these services:
120
+
121
+
-**PFX Create Legacy Connector for Microsoft Intune**
122
+
123
+
-**PFX Create Certificate Connector for Microsoft Intune**
124
+
125
+
1. Create a new PKCS certificate profile for affected devices, to reissue certificates without the SID attribute.
126
+
127
+
> [!TIP]
128
+
> If you use a Digicert CA, you must create a certificate template for users with an SID and another template for users without an SID. For more information, see the [DigiCert PKI Platform 8.24.1 release notes](https://knowledge.digicert.com/general-information/release-notes-pki).
129
+
69
130
## Export the root certificate from the Enterprise CA
70
131
71
132
To authenticate a device with VPN, WiFi, or other resources, a device needs a root or intermediate CA certificate. The following steps explain how to get the required certificate from your Enterprise CA.
@@ -357,59 +418,6 @@ Platforms:
357
418
> - Device properties used in the *subject* or *SAN* of a device certificate, like **IMEI**, **SerialNumber**, and **FullyQualifiedDomainName**, are properties that could be spoofed by a person with access to the device.
358
419
> - A device must support all variables specified in a certificate profile for that profile to install on that device. For example, if **{{IMEI}}** is used in the subject name of a SCEP profile and is assigned to a device that doesn't have an IMEI number, the profile fails to install.
359
420
360
-
## Update certificate connector for KB5014754 requirements
361
-
362
-
The Windows Kerberos Key Distribution Center (KDC) requires a strong mapping format for certificates issued by Active Directory Certificate Services. This requirement is applicable to PKCS certificates deployed by Microsoft Intune and used for certificate-based authentication. The mapping must have a security identifier (SID) extension that maps to the user or device SID. If a certificate doesn't meet the new strong mapping criteria set by the full enforcement mode date, authentication will be denied. For more information about the requirements, see [KB5014754: Certificate-based authentication changes on Windows domain controllers ](https://support.microsoft.com/topic/kb5014754-certificate-based-authentication-changes-on-windows-domain-controllers-ad2c23b0-15d8-4340-a468-4d4f3b188f16).
363
-
364
-
In the Microsoft Intune Certificate Connector, version 6.2406.0.1001, we released an update that adds the object identifier attribute containing the user or device SID to the certificate, effectively satisfying the strong mapping requirements. This update applies to users and devices synced from an on-premises Active Directory to Microsoft Entra ID, and is available across all platforms, with some differences:
365
-
366
-
* Strong mapping changes apply to *user certificates* for all OS platforms.
367
-
368
-
* Strong mapping changes apply to *device certificates* for Microsoft Entra hybrid-joined Windows devices.
369
-
370
-
To ensure that certficate-based authentication continues working, you must take the following actions:
371
-
372
-
- Update the Microsoft Intune Certificate Connector to version 6.2406.0.1001. For information about the latest version and how to update the certificate connector, see [Certificate connector for Microsoft Intune](certificate-connector-overview.md).
373
-
- Make changes to registry key information on the Windows server that hosts the certificate connector.
374
-
375
-
Complete the following procedure to modify the registry keys and apply the strong mapping changes to certificates. These changes apply to new PKCS certificates and PKCS certificates that are being renewed.
376
-
377
-
>[!TIP]
378
-
> This procedure requires you to modify the registry in Windows. For more information, see the following resources on Microsoft Support:
379
-
> -[How to back up and restore the registry in Windows - Microsoft Support](https://support.microsoft.com/topic/how-to-back-up-and-restore-the-registry-in-windows-855140ad-e318-2a13-2829-d428a2ab0692)
380
-
> -[How to add, modify, or delete registry subkeys and values by using a .reg file - Microsoft Support](https://support.microsoft.com/topic/how-to-add-modify-or-delete-registry-subkeys-and-values-by-using-a-reg-file-9c7f37cf-a5e9-e1cd-c4fa-2a26218a1a23)
381
-
382
-
1. In the Windows registry, change the value for `[HKLM\Software\Microsoft\MicrosoftIntune\PFXCertificateConnector](DWORD)EnableSidSecurityExtension` to **1**.
383
-
384
-
1. Restart the certificate connector service.
385
-
1. Go to **Start** > **Run**.
386
-
2. Open **services.msc**.
387
-
3. Restart these services:
388
-
-**PFX Create Legacy Connector for Microsoft Intune**
389
-
390
-
-**PFX Create Certificate Connector for Microsoft Intune**
391
-
392
-
1. Changes begin applying to all new certificates, and to certificates being renewed. To verify that authentication works, we recommend testing all places where certificate-based authentication could be used, including:
393
-
- Apps
394
-
- Intune-integrated certification authorities
395
-
- NAC solutions
396
-
- Networking infrastructure
397
-
398
-
To roll back changes:
399
-
400
-
1. Restore the original registry settings.
401
-
402
-
1. Restart these services:
403
-
404
-
-**PFX Create Legacy Connector for Microsoft Intune**
405
-
406
-
-**PFX Create Certificate Connector for Microsoft Intune**
407
-
408
-
1. Create a new PKCS certificate profile for affected devices, to reissue certificates without the SID attribute.
409
-
410
-
> [!TIP]
411
-
> If you use a Digicert CA, you must create a certificate template for users with an SID and another template for users without an SID. For more information, see the [DigiCert PKI Platform 8.24.1 release notes](https://knowledge.digicert.com/general-information/release-notes-pki).
412
-
413
421
## Next steps
414
422
415
423
-[Use SCEP for certificates](certificates-scep-configure.md)
0 commit comments