About Active Directory Strong Certificate Mapping Configuration
Active Directory Strong Certificate Mapping Configuration involves implementing Microsoft’s security changes to ADCS certificate authentication that enforce strong certificate mapping to address elevation of privilege vulnerabilities related to certificate spoofing.How It Works
Microsoft introduced significant changes to Active Directory Certificate Services (ADCS) certificate authentication with KB5014754. These changes enforce strong certificate mapping to address elevation of privilege vulnerabilities related to certificate spoofing. This applies to customers using Microsoft Active Directory ADCS for certificate-based authentication (such as Wi-Fi or Ethernet with 802.1X) that leverages user attributes in certificates.Enforcement Dates and Requirements
- February 11, 2025 - Strong certificate mapping enforcement began by default
- September 10, 2025 - Compatibility mode will no longer be supported
- Action Required - All certificates used for Active Directory authentication must include the user’s security identifier (SID) in the Subject Alternative Name (SAN) field
Who Needs to Take Action?
This applies to customers using Microsoft ADCS for certificate-based authentication (such as Wi-Fi or Ethernet with 802.1X) that leverages user attributes in certificates.Prerequisites
Assign users to device records
Update AD CS Server
Required Steps
Updating Iru Endpoint ADCS Connector
Navigate to ADCS Integration
Locate Connectors
Redownload Connector
Install Updated Connector
Updating SCIM User Directory Integration
Access Microsoft Entra Admin Center
Locate SCIM Application
Access Provisioning Settings
Access Attribute Mapping
Select User Provisioning
Show Advanced Options
Edit Attribute List
Add Security Identifier Field
onPremisesSecurityIdentifier (leave type as String) and click Save.Add New Mapping
Configure Mapping
- Mapping type: Direct (default)
- Source attribute:
onPremisesSecurityIdentifier - Target attribute:
onPremisesSecurityIdentifier
Save Mapping
onPremisesSecurityIdentifier will appear in user attributes after the next Entra ID SCIM sync (every 20-40 minutes).Updating Certificate Library Items
For SCEP Certificate Library ItemsLocate SCEP Library Items
Edit Library Item
Access SAN Section
Add URI SAN
Enter Strong Mapping ID
$ADCS_STRONG_MAPPING_ID.Save Changes
Locate Certificate Library Items
Edit Certificate Library Item
Access SAN Section
Add URI SAN
Enter Strong Mapping ID
$ADCS_STRONG_MAPPING_ID.Save Changes
Locate Wi-Fi or Ethernet Library Items
Edit Library Item
Configure Identity Certificate
Access SAN Section
Add URI SAN
Enter Strong Mapping ID
$ADCS_STRONG_MAPPING_ID.Save Changes
Deployment and Certificate Reissuance
After updating Library Items:- Iru Endpoint automatically reissues certificates to devices assigned the updated Library Items through their Blueprints
- New certificates will contain the user’s SID in the SAN field, satisfying Microsoft’s strong certificate mapping requirements
- Any reconfigured WiFi or Ethernet connections will automatically use the new certificates
Considerations
Network Connectivity Impact: Incorrectly updating certificates used for network connectivity can cause devices to disconnect from the network. Ensure you have a rollback plan before making changes to production Library Items. Testing Requirements: Test these changes on a subset of devices using a test Blueprint with test Library Items before applying changes to production Library Items. This allows you to verify that the new certificates work correctly with your network infrastructure. Timeline Compliance: Microsoft’s enforcement dates are critical:- February 11, 2025: Strong certificate mapping enforcement began by default
- September 10, 2025: Compatibility mode will no longer be supported
onPremisesSecurityIdentifier will appear in user attributes after the next Entra ID SCIM sync (every 20-40 minutes). Plan accordingly for timing.
Certificate Reissuance: After updating Library Items, Iru Endpoint automatically reissues certificates to devices. Monitor your devices to ensure they receive the updated certificates successfully.