Skip to content

Deploying SCEP via Intune + Aruba ClearPass with OCSP/CRL Validation

In today’s enterprise environments, password-based Wi-Fi authentication is simply not enough. Credential theft, phishing, and unauthorized device access are constant threats. The gold standard for securing wireless access is certificate-based EAP-TLS authentication, where only managed, trusted devices with valid certificates can connect to your network.

Before diving into the steps, here is the full architecture of what we built. Every component plays a specific role from certificate issuance in the cloud all the way to RADIUS enforcement at the wireless layer.

Before the steps, here is why EAP-TLS with device certificates is far superior to username/password methods like PEAP-MSCHAPv2:

  • No credential theft risk – there is no password to phish or steal.
  • Device identity assurance – only Intune – managed devices receive certificates.
  • Seamless UX – users connect automatically with zero password prompts.
  • Instant revocation – lost or decommissioned devices can be cut off immediately.
  • Zero Trust alignment – only known, healthy, managed devices gain access.

Certificate Enrollment & Connection Flow

The diagram below shows the full 10-step flow from device enrollment in Intune all the way to network access being granted by ClearPass. Understanding this flow is essential for troubleshooting.

NDES is the Microsoft server role that bridges Intune and your internal CA. It implements the SCEP protocol, allowing devices to request certificates without direct CA access.

  • Dedicated Windows Server 2016+ for NDES – never install on the CA server itself.
  • NDES service account with Enroll permissions on the certificate template.
  • Enterprise CA already configured and operational.
  • SSL certificate for the NDES server accessible over HTTPS.
  1. Install the NDES role: Server Manager > Add Roles and Features > Active Directory Certificate Services > Network Device Enrollment Service.
  2. Configure the NDES service account with Enroll permissions on your device certificate template.
  3. Create a certificate template: duplicate the Workstation Authentication template, set Subject Name to Supply in the request, enable Client Authentication EKU.
  4. Publish the certificate template on your CA.
  5. Configure NDES to use the template via the registry: HKLM\SOFTWARE\Microsoft\Cryptography\MSCEP.
  6. Verify NDES is accessible over HTTPS: https://<NDES_FQDN>/certsrv/mscep/mscep.dll

The Intune Certificate Connector is installed on the NDES server and acts as the relay between Intune’s cloud service and your on-premises CA. This is the critical piece that enables Intune to push SCEP certificate requests from enrolled devices to your CA.

Installation Steps

  1. In Intune Admin Center, go to: Tenant Administration > Connectors and Tokens > Certificate Connectors.
  2. Click Add and download the Certificate Connector installer (IntuneCertificateConnector.exe).
  3. Run the installer on your NDES server. Sign in with an Intune Administrator account when prompted.
  4. Select the SCEP certificate option during setup (add PKCS if needed).
  5. Complete the installation. The connector registers automatically with Intune.
  6. Back in Intune Admin Center, verify the connector shows as Active with a green status under Certificate Connectors.

With NDES and the connector running, create the SCEP certificate profile in Intune. This tells devices what type of certificate to request and where to request it from.

First, deploy your Root CA certificate to devices as a Trusted Certificate profile so devices trust certificates your CA issues.

  1. Intune Admin Center > Devices > Configuration Profiles > Create Profile.
  2. Platform: Windows 10 and later. Profile type: Templates > Trusted Certificate.
  3. Upload your Root CA .cer file and assign to the target user/device group.
  • Create a new profile: Platform: Windows 10 and later. Profile type: Templates > SCEP Certificate.
  • Certificate type: Device (machine-based auth, not user-based).
  • Subject name format: CN={{DeviceId}} – embeds device identity in the certificate.
  • Subject alternative name: URI = {{AADDeviceId}} for additional device identification.
  • Certificate validity period: Set your desired duration (e.g., 1 year).
  • Key storage provider: Enroll to TPM KSP — certificate private key is hardware-bound and cannot be exported.
  • SCEP Server URLs: Enter your NDES URL – https://ndes.yourdomain.com/certsrv/mscep/mscep.dll
  • Assign the profile to your user/device group and save.

This is the step that ties everything together on the device side. The Intune Wi-Fi profile tells managed devices which SSID to connect to, what authentication method to use (EAP-TLS), and which certificate to present. Without this profile, devices will not know to use the certificate for Wi-Fi authentication.

  1. In Intune Admin Center, go to: Devices > Configuration Profiles > Create Profile.
  2. Platform: Windows 10 and later. Profile type: Templates > Wi-Fi.
  3. Wi-Fi type: Enterprise.
  4. Wi-Fi name (SSID): Enter the exact SSID name of your corporate wireless network (e.g., Corp-WiFi).
  5. Connection name: Enter a friendly display name for the connection (e.g., Corporate Wi-Fi).
  6. EAP type: Select EAP-TLS.
  7. Certificate server names: Enter the FQDN of your ClearPass server (e.g., clearpass.yourdomain.com). This prevents rogue RADIUS server attacks.
  8. Root certificates for server validation: Select the Trusted Certificate profile you created in Step 3.1.
  9. Client Authentication — Certificate type: Select Device certificate.
  10. Client Certificate: Select the SCEP Certificate profile you created in Step 3.2.
  11. Assign this Wi-Fi profile to the same user/device group as the certificate profiles.

Note: Make sure to assign all three Intune Profiles to same USER or DEVICE group. (specifically the Root certificate profile and SCEP profile)

Once all three profiles are received by the device (Trusted Cert, SCEP Cert, Wi-Fi), the following happens automatically:

  • The SCEP profile triggers a certificate request to NDES, and the device receives its machine certificate.
  • The Wi-Fi profile configures the wireless adapter to connect to the SSID using EAP-TLS.
  • The device connects to the SSID automatically – no user interaction required – and presents the machine certificate to ClearPass for authentication.

ClearPass is the RADIUS/NAC platform that enforces authentication at the network layer. When a device connects to the SSID, the wireless controller forwards the auth request to ClearPass, which validates the certificate and applies policy.

  1. In ClearPass, go to Administration > Certificate Store > Trust List.
  2. Import your Root CA and any Intermediate CA certificates. ClearPass must trust the issuing CA chain to validate device certificates.
  1. Navigate to Configuration > Services > Add Service.
  2. Service type: 802.1X Wireless. Name it after your SSID (e.g., CorpSSID-EAP-TLS).
  3. Under Authentication, select EAP-TLS as the allowed EAP type.
  4. Add a certificate-based authentication source.
  1. Go to Configuration > Authentication > Methods > Add.
  2. Select EAP-TLS. Link it to your imported CA trust list.
  1. Go to Configuration > Enforcement > Policies > Add.
  2. Set conditions based on certificate attributes (e.g., CN contains corp) or AD group membership.
  3. Set enforcement profiles to assign VLAN, ACL, or role to authenticated devices.
  1. Go to Configuration > Network > Devices > Add.
  2. Add your Aruba wireless controller. Set the shared secret and vendor (Aruba).

Certificate revocation checking ensures ClearPass rejects certificates that have been revoked – even if they are not yet expired. This is your kill-switch for lost, stolen, or decommissioned devices.

  1. In ClearPass, go to Administration > Certificate Store > OCSP Configuration.
  2. Add the OCSP responder URL from your CA (found in the Authority Information Access extension of issued certs).
  3. Set the OCSP check to Required – this ensures certs without a valid OCSP response are rejected.
  4. In your EAP-TLS authentication method, enable OCSP checking and link it to the OCSP responder.
  1. Ensure your CA publishes CRLs to an accessible HTTP location (not LDAP – ClearPass needs HTTP).
  2. Verify the CDP (CRL Distribution Point) URL from your CA’s certificates is reachable from ClearPass.
  3. Configure ClearPass to fall back to CRL if the OCSP responder is temporarily unreachable.

Configure the SSID on your Aruba wireless controller to use ClearPass as the RADIUS server for 802.1X authentication.

  1. On your Aruba controller, configure the SSID security as WPA2-Enterprise (802.1X).
  2. Set the Primary RADIUS server to your ClearPass management IP or cluster VIP.
  3. Set the RADIUS shared secret to match what you configured in ClearPass.
  4. Enable RADIUS accounting for session tracking in ClearPass.
  5. Set the NAS-Identifier to a meaningful name (e.g., corp-wifi) – used in ClearPass service matching rules.
  6. Apply the SSID to the appropriate AP groups.

Run thorough end-to-end tests to validate every layer before declaring success.

  • Enroll a test device in Intune and confirm the SCEP certificate is deployed (Settings > Certificates on the device).
  • Verify the certificate subject name and SAN match the SCEP profile settings.
  • Confirm the Wi-Fi profile is applied on the device (Settings > Network > Wi-Fi).
  • Connect the test device to the SSID – it should authenticate automatically with no password prompt.
  • Check ClearPass Access Tracker (Monitoring > Live Monitoring > Access Tracker) – auth should show as EAP-TLS with a positive result.
  • Verify the correct VLAN or role is assigned to the device.
  • Revoke the test device certificate on your CA.
  • Wait for OCSP propagation (usually immediate) or CRL update.
  • Attempt to reconnect – the connection should be denied.
  • Confirm ClearPass Access Tracker shows a certificate revocation failure reason.

Any change to the ClearPass service for this SSID – including authentication rules, enforcement policies, OCSP settings, or node assignments – must be reviewed alongside the Intune Wi-Fi profile, SCEP profile, and wireless controller SSID settings. These components are tightly coupled. A change in one layer often requires updates in the others.

After any ClearPass or Intune configuration change, schedule a follow-up test session to run end-to-end validation before closing the change. This is especially important after OCSP/CRL or certificate template changes.

Common Issues & Resolutions
IssueLikely Cause & Resolution
Device not receiving certificateNDES unreachable or connector offline. Verify NDES URL from device browser. Check connector status in Intune.
Wi-Fi profile not connectingCertificate not yet deployed. Check profile assignment order – Trusted Cert and SCEP profiles must deploy before the Wi-Fi profile.
EAP-TLS fails in ClearPassCA trust not imported. Go to ClearPass Trust List and ensure the issuing CA certificate chain is present.
OCSP check failsClearPass cannot reach OCSP responder. Check firewall rules and test connectivity from the ClearPass CLI.
Revocation not enforcedOCSP set to optional. Change OCSP verification to Required in the EAP-TLS authentication method.
Device connects but gets wrong VLANEnforcement policy rule mismatch. Review ClearPass enforcement policy conditions and certificate attribute mapping.
Certificate expired, device locked outRenewal profile missing. Ensure the SCEP profile has a renewal threshold set (e.g., 20% remaining validity).
CRL download failsCA publishing to LDAP only. ClearPass requires HTTP for CRL. Republish CRL to an HTTP distribution point.

Certificate-based Wi-Fi authentication with EAP-TLS, powered by Intune SCEP and Aruba ClearPass, is one of the most robust network access control implementations you can build in a modern enterprise. When combined with real-time revocation checking via OCSP and CRL, you have a system that not only prevents unauthorized access but can also instantly cut off compromised or decommissioned devices.

The deployment spans several moving parts – NDES, the Intune Certificate Connector, SCEP profiles, the Intune Wi-Fi profile, ClearPass services, and your wireless infrastructure. The Wi-Fi profile is the often-missed final piece that instructs devices to actually use the certificate for authentication. When all components are properly configured and tested end-to-end, users get a seamless, password-free connection experience while the network enforces the highest level of access control.

If you are planning a similar deployment, use this guide as your reference. Test OCSP and CRL connectivity thoroughly before go-live, coordinate changes across all three layers, and always validate end-to-end after any configuration change.

Leave a Reply

Your email address will not be published. Required fields are marked *