Following the previous post, which covered setting up a root CA in the cloud, this guide now shifts to using a bring-your-own CA (BYOCA) approach. After establishing your root CA using BYOCA, the next step is to deploy the issuing CA. This issuing CA will manage certificate issuance for Intune-managed devices. During this setup, Cloud PKI will automatically configure the Simple Certificate Enrollment Protocol (SCEP) service, allowing certificates to be requested from the issuing CA on behalf of Intune-managed devices. The six steps below outline how to deploy the issuing CA using the BYOCA approach, continuing from the previous cloud root CA deployment and highlighting the simplicity of Cloud PKI.
On the Tenant admin | Cloud PKI page, click Create.
On the Basics page, provide a valid name for the certification authority.
On the Configuration settings page, fill in the required details:
After completing the configuration, review the details and click Next.
Confirm the settings and click Create to finalize the process. The issuing CA will now be created within Cloud PKI.
The subordinate CA template must be published and available on the CA that's signing the certificate. Open certsrv.msc – Certificate Authority management console on your device to view available certificate templates.
Download the signing request from Endpoint Manager, paste the CSR base64 into AD CS web enrolment portal and click submit.
Download Base 64 encoded certificate from AD CS web enrolment portal.
Upload signed certificate cer file into Endpoint Manager with the chain then click save
Microsoft will start validated the certificate, you will recieve another toast notification within the Endpoint Manager stating its now ready to use.
After downloading the certificates, you can easily make them trusted by using a trusted certificate profile. This profile allows you to add the certificates to a specific store on the device. Follow these eight steps to distribute the certificates to the Trusted Root Certification Authorities store:
Enter Basic Profile Information
Configure Certificate Settings
Assign the Profile