How to Use SCEP in CapaOne Mobile Manager

This article explains how SCEP (Simple Certificate Enrollment Protocol) is used in CapaOne Mobile Manager and how it integrates with customer PKI environments, NDES servers, and advanced Wi-Fi configurations.

By the end, you will understand the role of SCEP, what is required for it to work, and common challenges when deploying it on mobile devices. 

Prerequisites 

Before working with SCEP, ensure you understand:

  • The customer’s PKI infrastructure
  • The SCEP server configuration (“recipe”)
  • Required certificates (CA, intermediates, issuing certificates)
  • Network access requirements to the SCEP server
  • Platform limitations on Apple and Android

 

Configuration / Steps

 

1. What SCEP Is

SCEP allows a client device to retrieve a certificate from a certificate authority without user or administrator interaction.

Simple Certificate Enrollment Protocol – Wikipedia

Administrators configure the SCEP server to accept certificate requests from clients that supply the correct SCEP configuration (“recipe”), which differs per customer PKI environment.

2. Usage of SCEP

SCEP can be used for any scenario requiring certificates, but is commonly used for establishing trust for devices and users.

3. SCEP Setup Principles

  • SCEP Servers and NDES

Microsoft PKI environments often use NDES servers, but other implementations may exist.

  • Trust Issues

Since SCEP servers issue certificates from internal PKI infrastructures, devices must trust:

    • The CA certificate
    • Intermediate certificates
    • Issuing certificates

All necessary certificates must be included in the configuration.

  • Access to the SCEP Server

SCEP servers are often located inside customer premises.

Common access challenges:

    • Non-trusted devices reaching internal URLs
    • Limited-access enrollment networks
    • SIM/APN-based network paths
    • TLS certificates that are not globally trusted

If the SCEP server uses internal TLS certificates, the full trust chain must be added to the configuration.

  • Mobile Device Trust Behavior

Mobile devices often do not download certificate chains automatically.
All required trust certificates must be delivered in the profile.

 
4. Requirements for SCEP Servers

The SCEP server must be configured to use a static secret, because mobile devices do not support advanced negotiation.

 
5. Wi-Fi Setup Using SCEP

Advanced Wi-Fi (EAP-TLS) setups may use certificates supplied via SCEP.

A certificate can be either:

    • Pre-created and distributed, or
    • Generated per device using SCEP

Once the Wi-Fi profile includes SSID, WPA settings, EAP-TLS parameters, and trust certificates, the device attempts connection.

    • Apple Devices

Apple devices do not automatically renew certificates.
Profiles must be reapplied to trigger renegotiation.

    • Android Devices

Android does not natively support SCEP.
Devices must use the CapaOne Agent to handle SCEP negotiation.

 

Common Problems & Debugging

SCEP environments can be complex due to trust and PKI chaining requirements.

  1. Trust Chain Requirements

Devices must receive the full certificate chain for:

  • The SCEP server (TLS)
  • Intermediate CAs
  • Root CA
  • RADIUS server (TLS)

If the chain is incomplete, the user will be prompted to manually confirm trust before Wi-Fi connects.

  1. Pre-Verification

Open network standards require pre-verification of certificates.

This must be configured within the Wi-Fi profile by linking certificate payloads to the relevant CA/issuing certificates.

 

Maintenance & Best Practices 

  • Always include the full certificate chain in SCEP and Wi-Fi profiles
  • Ensure SCEP server uses a static secret
  • Validate network access paths early
  • Reapply SCEP/Wi-Fi profiles before certificates expire (Apple)
  • Install the CapaOne Agent on Android devices that need SCEP

Leave a Reply

Your email address will not be published. Required fields are marked *