Step-by-Step Guide: Migrate Certificate-Based Wi-Fi Authentication from GPO to Microsoft Intune

Step-by-Step Guide: Migrating Certificate-Based Wi-Fi Authentication from GPO to Microsoft Intune (2025 Edition)

Migrating from Group Policy (GPO) and on-premises PKI to Microsoft Intune for certificate-based Wi-Fi authentication can seem complex. But with Microsoft’s 2025 enhancements — including Microsoft Cloud PKI and improvements to the Intune Certificate Connector — this process is now more streamlined and secure than ever.

This guide provides detailed, step-by-step instructions to help administrators transition from traditional GPO deployments to Intune-managed certificate-based Wi-Fi authentication using EAP-TLS.


🔍 Step 1: Assess Your Current Certificate and Wi-Fi Setup

Before you migrate, gather key details about your existing infrastructure.

1.1 Review Current Components

  • Certificate Authority (CA): Note whether you’re using an Enterprise CA or Standalone CA.
  • RADIUS Server: Identify which Network Policy Server (NPS) or RADIUS service handles Wi-Fi authentication.
  • Certificate Templates: Review templates used for Wi-Fi certificates (e.g., User or Computer Authentication).
  • GPOs in Use:
    • Locate Group Policies that deploy Wi-Fi profiles or certificates.
    • Export configuration settings for reference.

1.2 Document Authentication Flow

Map how certificates are currently used for authentication:

  • Devices request certificates via GPO auto-enrollment.
  • RADIUS validates certificates against the CA’s root and issuing CAs.
  • Wi-Fi network enforces EAP-TLS (certificate-based authentication).

☁️ Step 2: Choose Your Intune Certificate Deployment Method

Microsoft Intune supports three main certificate deployment models. Choose based on your organization’s infrastructure and future plans.

Deployment Option Description Best For
Microsoft Cloud PKI Fully managed cloud-based CA service built into Intune. No on-prem infrastructure required. Cloud-first or hybrid organizations.
SCEP via Intune Certificate Connector Uses on-prem CA with NDES integration for scalable certificate issuance. Large hybrid organizations with existing PKI.
PKCS via Intune Certificate Connector Direct connector-to-CA communication, no NDES required. Smaller or specific certificate deployments.

🏗️ Step 3: Set Up Microsoft Cloud PKI (Recommended Cloud-First Method)

If you’re migrating to a modern cloud-first setup, Microsoft Cloud PKI simplifies deployment by removing dependency on on-prem servers.

3.1 Prerequisites

  • Intune Suite or Cloud PKI Add-on license.
  • Intune admin or Global admin permissions.
  • Wi-Fi network must support EAP-TLS.

3.2 Configure Microsoft Cloud PKI

  1. Go to: Intune Admin Center → Tenant Administration → Cloud PKI.
  2. Click + Create Cloud PKI.
  3. Define your hierarchy:
    • Root CA Name – e.g., “Contoso Root CA – Cloud”.
    • Issuing CA Name – e.g., “Contoso Issuing CA 01”.
  4. Choose Cloud Managed Root or integrate with existing on-prem trust.
  5. Configure certificate lifetime (default 1 year) and renewal period.

3.3 Deploy the Root Certificate

  1. Navigate to Devices → Configuration Profiles → + Create Profile.
  2. Platform: Windows 10 and later.
    Profile type: Trusted certificate.
  3. Upload the exported Cloud PKI root certificate.
  4. Assign to All Devices or specific device groups.

🔑 Step 4: Create and Deploy a SCEP or PKCS Certificate Profile in Intune

Depending on your setup (Cloud PKI, SCEP, or PKCS), you’ll need to create a certificate deployment profile.

Option A: SCEP Certificate Profile (With NDES)

Requirements:

  • On-prem Enterprise CA.
  • NDES and Intune Certificate Connector installed.
  • HTTPS certificate for NDES endpoint.

Setup Steps

  1. Install the Intune Certificate Connector on a Windows Server.
    • Download from the Intune Admin Center → Tenant Administration → Connectors and Tokens → Certificate Connector.
    • Run installer → Sign in with a Global or Intune Administrator account.
  2. Verify the connector status under Connectors and Tokens.
  3. Install and configure NDES:
    • Add the Network Device Enrollment Service role via Server Manager.
    • Specify your Enterprise CA.
  4. In Intune, go to:
    Devices → Configuration Profiles → + Create → Windows → SCEP certificate.
  5. Configure:
    • Subject name format: CN={{DeviceName}} or CN={{UserPrincipalName}}.
    • Key usage: Digital signature, key encipherment.
    • Root certificate: Choose the Trusted Root profile you created earlier.
    • Renewal period: e.g., 6 months before expiry.
  6. Assign the profile to target device groups.

Option B: PKCS Certificate Profile (Without NDES)

Requirements:

  • On-prem Enterprise CA.
  • Intune Certificate Connector installed (no NDES).

Setup Steps

  1. Install and register the Intune Certificate Connector as described above.
  2. In Intune:
    • Navigate to Devices → Configuration Profiles → + Create → Windows → PKCS certificate.
  3. Configure:
    • Subject name format: CN={{UserPrincipalName}}.
    • Select CA and Certificate Template.
    • Add Extended Key Usages (e.g., Client Authentication).
  4. Assign to users or devices that need certificates.
  5. Validate certificate issuance via Certificates (Local Computer) → Personal → Certificates.

📶 Step 5: Configure and Deploy the Wi-Fi Profile in Intune

Once certificates are configured, create a Wi-Fi profile that uses EAP-TLS authentication.

Steps

  1. Navigate to Devices → Configuration Profiles → + Create → Windows → Wi-Fi.
  2. Enter:
    • Network name (SSID): Your corporate Wi-Fi SSID.
    • Connection type: Enterprise.
    • Security type: WPA2-Enterprise or WPA3-Enterprise.
  3. Under EAP type, choose EAP-TLS.
  4. In the Server Trust section:
    • Add your RADIUS/NPS server FQDN.
    • Upload your Trusted Root Certificate (from Cloud PKI or CA).
  5. Under Client Authentication, select:
    • Certificate profile: The SCEP or PKCS profile created earlier.
  6. Assign the profile to target device or user groups (e.g., “All Corporate Laptops”).

🧠 Step 6: Configure RADIUS or NPS for Intune Certificates

For the Wi-Fi authentication to succeed, your RADIUS/NPS must trust the issuing CA.

Steps

  1. On your NPS/RADIUS server:
    • Open Network Policy Server → Policies → Network Policies.
    • Edit the Wi-Fi policy used for authentication.
  2. Under Conditions, ensure:
    • NAS Port Type: Wireless – IEEE 802.11.
    • Authentication method: EAP (PEAP) or EAP-TLS.
  3. Under EAP Configuration, ensure:
    • Smart Card or other certificate (EAP-TLS) is selected.
    • The CA certificate matches the one used by Intune (Cloud PKI or On-Prem CA).
  4. If using Cloud PKI, import the Cloud PKI Root CA certificate into the NPS server’s Trusted Root Certification Authorities store.

🔍 Step 7: Validate and Test

After profiles are deployed, verify that certificates and Wi-Fi connections work as expected.

Testing Checklist

  • On a managed device, open Certificates → Personal Store:
    • Confirm that a valid certificate was issued by your CA or Cloud PKI.
  • Connect to your Wi-Fi:
    • The connection should authenticate silently (EAP-TLS).
  • In Intune:
    • Navigate to Devices → Monitor → Configuration profiles.
    • Check for successful deployments or errors.
  • In Event Viewer:
    • Review logs under Microsoft → Windows → DeviceManagement-Enterprise-Diagnostics-Provider.
    • Look for Event ID 208 or Event ID 301 for successful certificate deployment.

🧰 Step 8: Decommission Legacy GPO Certificate Policies

Once you confirm successful authentication:

  1. Disable old GPOs that deploy Wi-Fi or certificate policies.
  2. Remove auto-enrollment settings from Group Policy (under Computer Configuration → Windows Settings → Security Settings → Public Key Policies).
  3. Update documentation to reflect new Intune-based certificate management.

🛡️ Step 9: Apply Security and Monitoring Best Practices (2025 Updates)

  • Enable Certificate Lifecycle Monitoring:
    In Cloud PKI, enable automatic certificate renewal alerts and expiration reports.
  • Use Conditional Access Policies:
    Require certificate-based authentication for device access to critical resources.
  • Automate Certificate Revocation:
    Integrate Cloud PKI with Microsoft Defender for Endpoint to revoke certificates if a device is compromised.
  • Deploy Redundant Certificate Connectors:
    For hybrid setups, install multiple connectors in different data centers for high availability.
  • Audit Certificate Activity:
    Regularly review Intune audit logs and PKI issuance logs for anomalies.

✅ Final Verification and Maintenance

Once migrated:

  1. Test connectivity across device types (Windows, macOS, iOS, Android).
  2. Ensure RADIUS continues to validate Cloud PKI or SCEP-issued certificates.
  3. Review Intune reporting for certificate deployment metrics.
  4. Periodically back up certificate templates, CA configuration, and Intune policy exports.

🧭 Summary: Choosing the Right Certificate Path

Deployment Type Requires On-Prem CA Requires NDES Best For 2025 Feature Highlights
Microsoft Cloud PKI ❌ No ❌ No Cloud-first organizations Auto-renewal, built-in monitoring, zero-trust integration
SCEP with NDES ✅ Yes ✅ Yes Hybrid enterprises Large-scale automation, works with existing CA
PKCS ✅ Yes ❌ No Small or user-specific use cases Simpler setup, limited scalability

🔗 Helpful Resources


By following this detailed step-by-step approach, you can modernize your certificate deployment and Wi-Fi authentication using Intune — ensuring a secure, scalable, and fully cloud-integrated solution that aligns with Microsoft’s Zero Trust security model for 2025 and beyond.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top