This Library Item is available for Apple and Windows devices
You can only use static challenges with the SCEP Library Item.
Create a SCEP Profile Library Item
Log in to your Iru tenant before you start. To add this Library Item to your Iru Endpoint Library, follow the steps in the Library Overview article.Select Blueprints
Pick the Blueprints you want to use.
General Settings
- URL
The base URL for your SCEP server (like
scep.example.org). - Name (optional) A label to distinguish this CA when you use multiple certificates.
- Challenge A pre-shared secret string for automatic enrollment.
- Fingerprint The certificate authority fingerprint as a hex string.
Subject Configuration
- Subject
Distinguished name in X.500 format. You can use global variables like:
CN=$SERIAL_NUMBER
- Subject Alternative Names (SAN)
Add alternative identifiers, including global variables, like:
RFC 822 Name=$DEVICE_NAME
Key Settings
- Key size Pick your key size (1024, 2048, or 4096 bits).
- Key usage
Options:
- Signing
- Encryption
- Both signing and encryption
Additional Options
- Retries How many times to retry if the server sends a PENDING response.
- Automatic profile redistribution When enabled, Iru checks certificate expiration dates and automatically re-issues new certificates when they’re about to expire.
Renewal only starts when the certificate is within the redistribution window, which must be at least 5 days before expiration. This prevents certificates from being renewed too early, like right after they’re issued.
- When renewing, Iru appends the
$PROFILE_UUIDvariable to the Subject.
Platform-Specific Options
- Apple
- Windows
Apple-Specific Options
- Retry delay How long to wait (in seconds) between retries.
- Allow all apps to access the private key Gives all apps access to the private key in the keychain.
- Prevent private key extraction Prevents exporting the private key from the keychain (macOS 10.15+). You should enable this for better security.
- Certificate expiration notification Sends notifications when certificates are about to expire on macOS.
When Automatic profile redistribution is enabled for Apple devices, specify a user global variable in the Subject Alternative Names (SAN) if user information is required in the certificate. This is necessary because the Wi-Fi Library Item ID is added to the Common Name in the certificate’s subject to track certificate renewal.
Important Considerations
Profile Redistribution
Automatic profile redistribution renews certificates before they expire, so you avoid downtime and keep authentication working smoothly.Preventing Key Extraction
Enabling Prevent the private key data from being extracted prevents end users from exporting the private key. You should enable this for better security.Best Practices
Plan certificate lifecycle
Set certificate validity periods and renewal windows to keep services running without interruption.
Secure challenge secrets
Use strong, unique challenge secrets for each SCEP configuration to prevent unauthorized enrollment.
Monitor certificate status
Check certificate enrollment and renewal status regularly so you can catch and fix issues quickly.
Troubleshooting
Certificate enrollment failing
Certificate enrollment failing
Possible causes:
- Incorrect SCEP server URL
- Invalid challenge secret
- Network connectivity issues
- Certificate authority fingerprint mismatch Solutions:
- Verify SCEP server URL and accessibility
- Confirm challenge secret matches server configuration
- Check network connectivity and firewall rules
- Validate certificate authority fingerprint
Certificate renewal issues
Certificate renewal issues
Possible causes:
- Renewal window too short
- SCEP server not responding
- Certificate validity period conflicts Solutions:
- Ensure renewal window is at least 5 days before expiration
- Check SCEP server availability and logs
- Verify certificate validity period configuration
Private key access problems
Private key access problems
Possible causes:
- Key protection settings too restrictive
- Keychain access permissions
- Application-specific key access requirements Solutions:
- Review key protection and access settings
- Check keychain permissions for applications
- Configure appropriate key access for required applications
Security Considerations
Challenge Security
You should use strong, unique challenge secrets and rotate them regularly to prevent unauthorized enrollment.
Key Protection
Enable private key extraction prevention to keep your certificates secure.
Certificate Monitoring
Monitor certificate enrollment and renewal activities to spot security issues.
Access Control
Set key access permissions based on what your applications need.