SCEP MDM payload settings for Apple devices
You can configure SCEP settings to obtain certificates from a certificate authority (CA) for Apple devices enrolled in a mobile device management (MDM) solution. Use the SCEP payload to specify settings that allow the device to obtain certificates from a certificate authority (CA) using the Simple Certificate Enrolment Protocol (SCEP).
The SCEP payload supports the following. For more information, see Payload information. To see a list of SCEP variables, see Variables settings for MDM payloads for Apple devices.
Supported payload identifier: com.apple.security.scep
Supported operating systems and channels: iOS, iPadOS, Shared iPad device, macOS device, macOS user, tvOS.
Supported enrolment types: User Enrolment, Device Enrolment, Automated Device Enrolment.
Duplicates allowed: True — more than one SCEP payload can be delivered to a user or device.
You can use the settings in the table below with the SCEP payload.
The address of the SCEP server.
Any string understood by the certificate authority. It can be used to distinguish between instances.
The representation of an X.500 name represented as an array of OID and value. For example, /C=US/O=Apple Inc. /CN=foo/188.8.131.52=bar, which translates to: [ [ [“C”, “US”] ], [ [“O”, “Apple Inc.”] ], ..., [ [ “184.108.40.206”, “bar” ] ] ]
Subject Alternative Name Type
Specify the type of an alternative name for the SCEP server. Types are RFC 822 Name, DNS Name and Uniform Resource Identifier (URI). This can be the Uniform Resource Locator (URL), Uniform Resource Name (URN), or both.
Subject Alternative Name Value
The value of the subject alternative name.
NT Principal Name
The principal name to be used in the certificate request (optional).
The number of times to poll the SCEP server for a signed certificate before giving up.
The number of seconds to wait between poll attempts.
The pre-shared secret the SCEP server uses to identify the request or user.
Certificate expiry notification threshold
The number of days in advance before the certificate starts showing an expiry notification.
Select a key size (in bits), and — using the tickboxes below this field — select the acceptable uses of the key. The options are1024, 2048 and 4096.
Select to use the key for any of the following:
If your CA uses HTTP, use this field to provide the fingerprint of the CA’s certificate, which the device uses to confirm the authenticity of the CA’s response during enrolment. You can enter a SHA1 or an MD5 fingerprint, or select a certificate to import its signature.
Allow export from the Keychain
Allow the private key to be exported from the Keychain.
Allow access to all apps
Allow all apps to access the certificate in keychain.
Note: This key must be used in macOS to allow a third-party VPN agent to use a certificate for authentication. The certificate payload must be in the same profile as the SCEP payload.
Note: Each MDM vendor implements these settings differently. To learn how SCEP settings are applied to your devices and users, consult your MDM vendor’s documentation.