Hello Franz Schenk
In your current setup, the issuing subordinate CA is chained to the offline root CA, which means all certificates issued rely on that root’s trust anchor. Unfortunately, there is no supported migration path to directly “convert” a subordinate CA into a standalone AD-integrated Enterprise CA while retaining validity of previously issued certificates. Once the trust chain changes, existing certificates would no longer validate without the original root CA and its CRLs. The recommended approach is to establish a new AD-integrated Enterprise CA, publish its root certificate to Active Directory, and then gradually reissue certificates for Intune and AOVPN clients under the new hierarchy. During the transition, both PKIs can coexist until all critical certificates are replaced, after which the offline root and its CRLs are no longer required.
I hope this clarifies the situation, and if you find this answer helpful, please hit “Accept Answer” 🙂.
Harry.