What Is SCEP? Simple Certificate Enrollment Protocol (2024)

What Is SCEP (Simple Certificate Enrollment Protocol)?

SCEP stands for Simple Certificate Enrollment Protocol and is a certificate management protocol that helps IT administrators issue certificates automatically. Public key infrastructure (PKI) certificate issuance requires a process for exchanging information with a trusted Certificate Authority (CA) like Sectigo so that the CA can authenticate that a certificate user legitimately represents the identities and domain name(s) associated with the PKI certificate before issuance is completed. SCEP standardizes that exchange with the CA using a URL and a shared secret, making it faster and easier for IT teams to enroll certificates on devices than communicating this information manually.

SCEP has been around for a long time and has gained significant traction with businesses. As the SCEP protocol has no licensing fees and requires very little time for IT teams to configure and execute, it has become an almost ubiquitous component of enterprise security.

For What Use Cases Is It Most Used?

SCEP is commonly applied to a number of certificate use cases. Notably, Mobile Device Management (MDM) systems like Microsoft Intune and Apple MDM use SCEP for PKI certificate enrollment on the growing number of mobile devices and smartphones used by business employees. This allows mobile devices to authenticate connections between apps and enterprise systems and resources. Most networking gear, including routers, load balancers, Wi-Fi hubs, VPN devices, and firewalls, also support the SCEP protocol for certificate enrollment.

SCEP Automates PKI Certificate Enrollment for Mobile Devices and Smartphones via Mobile Device Management (MDM) Systems for Secure Connections to VPN, WI-Fi, and Enterprise Applications

What Is SCEP? Simple Certificate Enrollment Protocol (1)

This protocol is supported on the most common server and device operating systems, including Microsoft Windows, Linux, and Apple iOS and MacOS, as well as directory systems like Active Directory. You can leverage Sectigo’s SCEP server to manage your certificates across all of the device use cases and OS and directory environments you may use in your organization.

Why Use SCEP?

While public key infrastructure offers the strongest and easiest authentication and cryptographic solution for digital identity, the complexity and scale of certificate deployment for most enterprises can be a challenge for busy IT teams. Manually deploying and managing certificates is time-consuming and prone to errors. The end-to-end process of certificate issuance, configuration, and deployment can take up to several hours, whether an enterprise is deploying a single certificate for a Wi-Fi router or managing millions of certificates across all networked devices and user identities it supports. As a result, businesses are exposed to unnecessary risk of sudden outages or failure of critical business systems along with breaches and Man-in-the-Middle (MITM) attacks.

Additionally, manual certificate management puts enterprises at significant risk as it increases the likelihood that certificates can be forgotten until expiration or gaps in ownership occur. With the many potential pitfalls inherent in managing PKI certificates manually, enterprises need the automated certificate enrollment standard the Simple Certificate Enrollment Protocol provides to ensure certificates are correctly issued and configured on a large quantity of devices without human intervention. This automation helps reduce risk and allows IT departments to control operational costs.

How Does the SCEP Protocol Work?

The SCEP enrollment process standardizes the information exchange with the Certificate Authority required to authenticate the certificate request and to issue the certificate. The key elements of this process are:

  • SCEP URL: The URL instructs where devices communicate with the CA to enroll the client certificate. This URL can be placed in an MDM to automate certificate enrollment on mobile devices at scale.
  • SCEP Shared Secret: A Shared Secret is a case-sensitive entrusted password exchanged between the SCEP server and the CA used to authenticate that a user legitimately represents the identities and domain name(s) associated with the PKI certificate.
  • SCEP Certificate Signing Request: Once the connection between the SCEP server and the CA is established and the Shared Secret is authenticated, the Certificate Signing Request (CSR), or SCEP request, can be submitted to the CA. This CSR includes the configuration profile that allows managed devices to auto-enroll for certificates.
  • SCEP Certificate Configuration Profile: Certificate management platforms and MDMs often have a specific set of configuration parameters that are used to define the certificate profile, including certificate validity period, key size, SCEP configuration name, Subject Alternative Name type and value, number of failed attempt retries and retry interval, and additional challenge password type and value.
  • SCEP Signing Certificate: To ensure valid certificates are used, most MDMs require a signing certificate that has been signed by the CA to also be used by devices. This signing certificate encapsulates the entire certificate chain, including the signing certificate, Intermediate CA, and Root CA.

SCEP Enrollment Process Steps

Here are the SCEP enrollment process steps to establish automatic certificate enrollment for a typical certificate management platform or MDM:

  1. Add the SCEP URL
  2. Add the SCEP Shared Secret
  3. Upload the SCEP Signing Certificate
  4. Define the SCEP Configuration that is sent to devices
  5. Define any application-specific certificate settings (e.g. for Wi-Fi or VPN)
  6. Specify which devices receive certificates

Then once authenticated by the CA, a signed CA certificate will be deployed onto the device.

SCEP Certificate Configuration Profile

When setting up a SCEP server, there are a number of certificate properties that the administrator can set in the certificate configuration profile to customize the SCEP implementation. These include things like the following:

  • Certificate template name
  • Certificate type (whether it will be deployed to a device or an end user)
  • Subject name format (how the server creates the certificate request subject name, for example using an email address in the case of a user or a server name or IP address in the case of a device)
  • The certificate validity period (specifying the amount of time required before certificate expiration or certificate revocation)
  • Hash algorithm
  • Root CA certificate
  • Key usage. Key usage can include key encipherment (allowing key exchange when a key is encrypted), or digital signature (allowing exchange when the key is protected by a digital signature).

How Does Sectigo Support This Protocol?

Sectigo recognizes the complexity and scale of most enterprise certificate needs. Enterprises rely on PKI certificates to authenticate and encrypt everything from web servers both in the cloud and on-premises, networked devices, mobile devices, user identities, email systems, network appliances, IoT devices, DevOps environments, digital signatures, and more. As Sectigo offers device certificates that support SCEP in addition to SSL/TLS certificates, Code Signing, S/MIME, and other X.509 certificates that protect critical business systems, enterprises also need a way to automate the end-to-end certificate lifecycle management at scale. Sectigo Certificate Manager supports the SCEP protocol to deliver automated certificate lifecycle management.

How to Configure in Sectigo Certificate Manager

Sectigo Certificate Manager (SCM) provides a single-pane-of-glass management interface that seamlessly integrates enterprise device architectures like Microsoft Intune and Apple MDM, speeding and simplifying the discovery, issuance, deployment, and renewal of all certificates. Sectigo Certificate Manager allows you to issue device certificates using SCEP by creating configuration profiles which are pushed to target devices. The configuration profile can be created using software such as the Apple iOS configuration utility.

To issue device certificates through SCEP, you create new device certificate profiles and enable them for SCEP enrollment. Each device certificate profile is assigned with a device Profile ID to identify it when applied to the devices.

The process must meet these prerequisites to succeed:

  • Your Sectigo account must have at least one certificate profile configured for use with device certificates.
  • SCEP enrollment needs to be enabled for an organization or department, and an access code must be specified. This can be done when adding or editing an organization or department.

How to Issue Certificates via Sectigo Certificate Manager Using SCEP – Simple Certificate Enrollment Protocol

What Is SCEP? Simple Certificate Enrollment Protocol (2)

Typically, the process involves the following:

  • You generate a configuration profile for OTA enrollment using configuration software, then apply the profile to target devices. The SCEP enrollment access code specified for the organization or department is included in the profile. This means the certificate request generated by the device contains the same access code as the challengePassword parameter.
  • Once applied, the device generates the certificate request and forwards it to Sectigo Certificate Manager.
  • The certificate requests are added to the Device Certificates area for approval. The status of the certificate is indicated as Requested.
  • An RAO or DRAO with appropriate privileges approves the request, and then SCM forwards the request to Sectigo. The status of the certificate changes to Applied. Upon issuance of the certificate, SCM collects the certificates. The status of the certificate changes to Issued.
  • The SCEP server pushes the certificates to the target devices for installation.

For a complete guide to SCEP configuration using Sectigo Certificate Manager, go to the Sectigo Knowledge Base and refer to the Sectigo Certificate Manager Administration Guides.

For details on values of parameters to be specified in the configuration profile, contact us

What Is SCEP? Simple Certificate Enrollment Protocol (2024)

FAQs

What is Simple Certificate Enrollment Protocol SCEP? ›

Simple Certificate Enrollment Protocol (SCEP) is an open source protocol that is widely used to make digital certificate issuance at large organizations easier, more secure, and scalable. Using this protocol, SCEP servers issue a one-time password (OTP) to the user transmitted out-of-band (OOB).

What is the CEP certificate enrollment protocol? ›

CEP is a protocol jointly developed by Cisco and Verisign, Inc. CEP is an early implementation of Certificate Request Syntax (CRS), a proposed standard to the IETF. CEP specifies how a device communicates with the CA, how to retrieve the CA's public key, and how to enroll a device with the CA.

What is the certificate enrollment process? ›

A typical certificate enrollment process involves the requester generating a key pair (one public, and one private key), sending only the public key to a CA along with a CSR (Certificate Signing Request), and then receiving a CA-signed public key and a TLS certificate which they can then install on an endpoint.

What is the difference between PKI and SCEP? ›

SCEP or Simple Certificate Enrollment Protocol, is an open-source certificate management protocol that stands for , automating the task of certificate issuance. Public key infrastructure (PKI) certificate issuance requires a process for information exchange with a trusted Certificate Authority (CA).

How do I check my SCEP certificate? ›

For devices that run Windows, use the Windows Event logs to diagnose enrollment or device management issues for devices that you manage with Intune. On the device, open Event Viewer > Applications and Services Logs > Microsoft > Windows > DeviceManagement-Enterprise-Diagnostics-Provider.

What are SCEP functions? ›

Simple Certificate Enrollment Protocol, or SCEP, is a protocol that allows devices to easily enroll for a certificate by using a URL and a shared secret to communicate with a PKI.

What is the purpose of certificate enrollment? ›

Certificate Services Web Enrollment pages allow a user to request both user and computer certificates from a Web browser.

What does CEP mean in compliance? ›

The Certification of Suitability (CEP) is a certificate that certifies compliance of the active pharmaceutical ingredients (API) or pharmaceutical ingredients with that of the rules laid down in the monograph of the European Pharmacopoeia (EP).

How does certificate auto-enrollment work? ›

How Certificate Auto-Enrollment Works?
  1. The auto-enrollment client sends a certificate request to the auto-enrollment server.
  2. The server validates the information provided in the request to check its authenticity.
  3. The auto-enrollment server then submits the request to the Certificate Authority (CA).
Mar 3, 2023

How do I force an automatic certificate enrollment? ›

Go to User Configuration > Windows Settings > Security Settings > Public Key Policies and then under Object Type section in the right pane, select Certificate Services Client - Auto-Enrollment.

What is certificate enrollment server? ›

The Certificate Enrollment Web Service is an Active Directory Certificate Services (AD CS) role service that enables users and computers to perform certificate enrollment by using the HTTPS protocol.

What port does SCEP use? ›

SCEP runs on TCP port 80; however, it can also run on a nonstandard TCP port. SCEP-based enrollment is configured in trustpoint mode. TCP port 80 is the default port used for SCEP and is configurable using the enrollment command.

Is PKI the same as SSL? ›

Email Security (S/MIME Protocol)

These certificates are known as S/MIME certificates. Like the SSL/TLS protocol, here too, PKI is implemented using a certificate — but the way they do so differs. Instead of encrypting the secure communication channel, this end-to-end encryption encrypts the message itself.

Why do I need a PKI certificate? ›

Public Key Infrastructure (PKI) is important because it significantly increases the security of a network and provides the foundation for securing all internet-connected things. PKI is a core component of data confidentiality, information integrity, authentication, and data access control.

Does SCEP use https? ›

To allow devices on the internet to get certificates, you must specify the NDES URL external to your corporate network. The URL can be HTTP or HTTPS. However, to support the following devices, the SCEP Server URL must use HTTPS: Android device administrator.

Where are SCEP logs stored? ›

C:\ProgramData\Microsoft\Microsoft Antimalware\Support: This folder contain bunch of log files which provide more information about SCEP definition updates and SCEP functionality. The name of these log files are following.

How long does my security certificate last? ›

Your CompTIA Security+ certification is good for three years from the date you pass your certification exam.

What is the name of the SCEP service? ›

Microsoft System Center Endpoint Protection (SCEP) is an antivirus and anti-malware tool for Windows.

What is EST protocol? ›

The Enrollment over Secure Transport, or EST is a cryptographic protocol that describes an X. 509 certificate management protocol targeting public key infrastructure (PKI) clients that need to acquire client certificates and associated certificate authority (CA) certificates. EST is described in RFC 7030.

How do I enroll with access code in Sectigo? ›

In the 'Add New Department' or 'Edit Department' dialog, click the 'Client cert' tab. Select the 'Self Enrollment' checkbox. The 'Access Code' field will appear. Enter the access code in the field.

Why are certificates of completion important? ›

Certificates of completion supports your participation in a course and allows employers/ prospective employers to establish whether your knowledge-base corresponds to their skills requirements.

How do I choose a certificate enrollment policy? ›

To enable the Certificate enrollment policy for computer certificates expand Computer Configuration > Policies > Windows Settings > Security Settings and click Public Key Policies. Double click Certificate Services Client - Certificate Enrollment Policy. In the Configuration Model menu, select Enabled.

What is the purpose of a certificate of insurance quizlet? ›

A certificate of insurance is a document used to show that a policy has been issued. Signed by the insurer or its agent, it provides proof of the existence of a policy and the type and amount of its coverage.

What is the difference between GMP and CEP? ›

Consequently, a CEP may be granted with or without an inspection of the manufacturing site being performed. A GMP certificate is granted by EU/EEA national competent authorities after an inspection (with or without the participation of the EDQM).

WHO issues certificate of suitability? ›

Certificate of suitability means a written document issued by the executive director that indicates an applicant has been chosen for licensure if the applicant meets the requirements set forth in section 5(e) of this rule.

What is the difference between Asmf and CEP? ›

ASMF is never approved nor disapproved, but is reviewed everytime it is referenced in the MAA application unlike CEP is approved. ASMF constitutes of two parts, Applicants Part (AP) and Restricted Part (RP).

How do I find my SCEP server URL? ›

In Intune, edit your SCEP certificate profile and copy the Server URL. The URL should resemble https://contoso.com/certsrv/mscep/mscep.dll . Open a web browser, and then browse to that SCEP server URL.

What is network device enrollment service? ›

NDES provides and manages certificates used to authenticate traffic and implement secure network communication with devices that might not otherwise possess valid domain credentials.

Do I have to be auto enrolled? ›

Your employer must meet the legal duties of automatic enrolment. If they don't comply, they can face enforcement action and fines. If your employer is late in their automatic enrolment duties, the Pensions Regulator expects them to pay any missed contributions.

How do I turn off auto enrollment certificate? ›

Disable Autoenrollment
  1. Click Start, click Run, type gpedit. ...
  2. In the left pane, expand Computer Configuration, expand Windows Settings, expand Security Settings, and then expand Public Key Policies.
  3. Double-click Autoenrollment Settings.
  4. Click Do not enroll certificates automatically.
  5. Click OK.
Jun 10, 2009

What is an error occurred while obtaining certificate enrollment policy? ›

The error message "An error occurred while obtaining certificate enrollment policy" means that the client failed to retrieve enrollment policies from EJBCA. Note that this error does not necessarily mean that there's a connection issue.

How do you bypass a certificate error? ›

Launching Chrome with Flags on Windows Copy to clipboard
  1. Press the Win + R keys.
  2. Enter "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe." --ignore-certificate-errors.
  3. Press Enter.
Apr 7, 2022

How long is certificate auto enrollment? ›

Certificate autoenrollment runs every eight hours. When unsupported values of validity and renewal period are configured in a certificate template, the certificate renewal is skipped and the client triggers new enrollment requests instead of renewals, then prompting CA certificate manager approval.

How to bypass invalid certificate? ›

Internet Explorer
  1. In Internet Explorer, navigate to Tools / Internet options.
  2. Click the Advanced tab.
  3. Scroll down to the bottom of the list and uncheck Warn about certificate address mismatch (3rd option from bottom)
  4. Reboot your computer.

What is the purpose of certificate server? ›

A certificate authority server (CA server) offers an easy-to-use, effective solution to create and store asymmetric key pairs for encrypting or decrypting as well as signing or validating anything that depends on a public key infrastructure (PKI).

Why do I need a certificate server? ›

If you deploy SDN with certificate-based authentication, servers are required to use a server certificate to prove their identities to other servers so that they achieve secure communications.

What is my email server certificate? ›

A mail server certificate, also called an email server certificate, encrypts email communications the same way SSL certificates secure data transmission happening through a website.

Is SCEP still supported? ›

This browser is no longer supported.

What port does my server use? ›

Type “Cmd” in the search box. Open “Command Prompt”. Enter the netstat -a command to see your port numbers.

What is SCEP or PKCS? ›

SCEP provisions certificates that are unique to each request for the certificate. PKCS provisions each device with a unique certificate. With Imported PKCS, you can deploy the same certificate that you've exported from a source, like an email server, to multiple recipients.

What are the 3 types of certificates? ›

SSL certificates by validation level

There are three main types of certificates: domain validated (DV), organization validated (OV), and extended validation (EV). An authentic authority must obtain the certificate so that users won't see this message.

Is PKI a private key? ›

PKI, or public key infrastructure, encompasses everything used to establish and manage public key encryption.

What is the difference between SSL protocol and SSL certificate? ›

HTTPS is the secured version of HTTP protocol that is used by the browser for communication. It uses SSL/TLS for delivering the encrypted data. On the other hand, SSL is an encryption protocol that is used to encrypt data.

How does PKI work for dummies? ›

PKI consists of a set of public and private cryptographic keys. The public key can be shared without security concerns, while the private key is typically secret. Certificates are created and stored on a third party, usually called a certificate authority (CA), set up to provide this service.

What is an example of a PKI? ›

Common examples of PKI security today are SSL certificates on websites so that site visitors know they're sending information to the intended recipient, digital signatures, and authentication for Internet of Things devices.

What is the difference between SCEP and PKCS certificate? ›

SCEP provisions certificates that are unique to each request for the certificate. PKCS provisions each device with a unique certificate. With Imported PKCS, you can deploy the same certificate that you've exported from a source, like an email server, to multiple recipients.

What three certificate management options are available for Zscaler private access enrollment certificates? ›

On the Enrollment Certificates page (Configuration & Control > Certificate Management > Enrollment Certificates), you can do the following:
  • Generate a Zscaler-issued enrollment (CA) certificate.
  • Upload a certificate chain.
  • Create a CSR for an enrollment (CA) certificate.

What is server certificate auto-enrollment? ›

How Certificate Auto-Enrollment Works? The auto-enrollment client sends a certificate request to the auto-enrollment server. The server validates the information provided in the request to check its authenticity. The auto-enrollment server then submits the request to the Certificate Authority (CA).

What is the most commonly used format for certificates? ›

PEM is the most common format in which Certificate Authorities (CA) issue certificates.

What is the difference between code signing and SSL certificate? ›

Code signing certificate is used for securing software while SSL certificate is used for securing internet communication. But the issuing authority of certificates can be same for both kinds. In both the cases, a pair of public and private keys are used to encrypt or hash the software or the communication path.

What type of certificate is most often used in modern PKI? ›

The most familiar use of PKI is in SSL certificates. SSL (Secure Sockets Layer) is the security protocol used on the web when you fetch a page whose address begins with https: . TLS (Transport Layer Security) is a newer version of the protocol.

What security certificates should be on my Android? ›

Android uses this PKCS 12 standard that supports certificates with P12 or PFX file extensions. Security certificates that have different extensions must first be changed to P12 or PFX files for Android to accept them.

What is the difference between Zscaler private access and a VPN? ›

Unlike VPNs, which require users to connect to your network to access your enterprise applications, ZPA allows you to give users policy-based secure access only to the internal apps they need to get their work done. With ZPA, application access does not require network access.

How to bypass website Security certificate? ›

Internet Explorer
  1. In Internet Explorer, navigate to Tools / Internet options.
  2. Click the Advanced tab.
  3. Scroll down to the bottom of the list and uncheck Warn about certificate address mismatch (3rd option from bottom)
  4. Reboot your computer.

How do I check my certificate auto enrollment? ›

Go to User Configuration > Windows Settings > Security Settings > Public Key Policies and then under Object Type section in the right pane, select Certificate Services Client - Auto-Enrollment.

What are different certificate enrollment methods? ›

There are two methods for certificate enrollment: DCOM-based certificate enrollment (Direct enrollment) and Web services-based certificate enrollment (WSTEP enrollment). DCOM-based certificate enrollment uses WCCE for certificate requests.

What is the difference between client certificate and server certificate? ›

Client certificates tend to be used within private organizations to authenticate requests to remote servers. Whereas server certificates are more commonly known as TLS/SSL certificates and are used to protect servers and web domains.

What is the purpose of a certificate on a server? ›

A web server certificate is basically an SSL certificate issued to a web server to authenticate its identity to the client. The web server certificate also establishes a secure communication channel with the client for more robust protection.

Top Articles
Latest Posts
Article information

Author: Annamae Dooley

Last Updated:

Views: 6117

Rating: 4.4 / 5 (45 voted)

Reviews: 84% of readers found this page helpful

Author information

Name: Annamae Dooley

Birthday: 2001-07-26

Address: 9687 Tambra Meadow, Bradleyhaven, TN 53219

Phone: +9316045904039

Job: Future Coordinator

Hobby: Archery, Couponing, Poi, Kite flying, Knitting, Rappelling, Baseball

Introduction: My name is Annamae Dooley, I am a witty, quaint, lovely, clever, rich, sparkling, powerful person who loves writing and wants to share my knowledge and understanding with you.