Troubleshooting PKCS certificate deployment in Intune
This article gives troubleshooting guidance for several common issues when deploying Public Key Cryptography Standards (PKCS) certificates in Microsoft Intune. Before troubleshooting, ensure you've completed the following tasks, as explained in Configure and use PKCS certificates with Intune:
- Review the requirements for using PKCS certificate profiles.
- Export the root certificate from the Enterprise Certification Authority (CA).
- Configure certificate templates on the certification authority.
- Install and configure the Intune Certificate Connector.
- Create and deploy a trusted certificate profile to deploy the root certificate.
- Create and deploy a PKCS certificate profile.
The most common source of problems for PKCS certificate profiles has been with the configuration of the PKCS certificate profile. Review the profiles configuration and look for typos in server names or fully qualified domain names (FQDNs), and confirm the Certificate Authority and Certificate Authority Name are correct.
- Certification Authority: The internal FQDN of the Certificate Authority computer. For example, server1.domain.local.
- Certification Authority Name: The Certificate Authority Name as displayed in the certification authority MMC. Look under Certification Authority (Local)
You can use the certutil command-line program on the CA to confirm the correct name for the Certification Authority and Certification Authority Name.
PKCS communication overview
The following graphic provides a basic overview of the PKCS certificate deployment process in Intune.
- An Admin creates a PKCS certificate profile in Intune.
- The Intune service requests that the on-premises Intune Certificate Connector create a new certificate for the user.
- The Intune Certificate Connector sends a PFX Blob and Request to your Microsoft Certification Authority.
- The Certification Authority issues and sends the PFX User Certificate back to the Intune Certificate Connector.
- The Intune Certificate Connector uploads the encrypted PFX User Certificate to Intune.
- Intune decrypts the PFX User Certificate and re-encrypts for the device using the Device Management Certificate. Intune then sends the PFX User Certificate to the Device.
- The device reports the certificate status to Intune.
Log files
To identify problems for the communication and certificate provisioning workflow, review log files from both the Server infrastructure, and from devices. Later sections for troubleshooting PKCS certificate profiles refer to log files referenced in this section.
Device logs depend on the device platform:
Logs for on-premises infrastructure
On-premises infrastructure that supports use of PKCS certificate profiles for certificate deployments includes the Microsoft Intune Certificate Connector and the certification authority.
Log files for these roles include Windows Event Viewer, Certificate consoles, and various log files specific to the Intune Certificate Connector, or other role and operations that are part of the on-premises infrastructure.
NDESConnector_date_time.svclog:
This log shows communication from the Microsoft Intune Certificate Connector to the Intune cloud service. You can use the Service Trace Viewer Tool to view this log file.
Related registry key: HKLM\SW\Microsoft\MicrosoftIntune\NDESConnector\ConnectionStatus
Location: On the server that hosts the Intune Certificate Connector at %program_files%\Microsoft intune\ndesconnectorsvc\logs\logs
Windows Application log:
Location: On the server that hosts the Intune Certificate Connector: Run eventvwr.msc to open Windows Event Viewer
Logs for Android devices
For devices that run Android, use the Android Company Portal app log file, OMADM.log. Before you collect and review logs, enable ensure Verbose Logging is enabled, and then reproduce the issue.
To collect the OMADM.logs from a device, see Upload and email logs using a USB cable.
You can also Upload and email logs to support.
Logs for iOS and iPadOS devices
For devices that run iOS/iPadOS, you use debug logs and Xcode that runs on a Mac computer:
Connect the iOS/iPadOS device to Mac, and then go to Applications > Utilities to open the Console app.
Under Action, select Include Info Messages and Include Debug Messages.
Reproduce the problem, and then save the logs to a text file:
- Select Edit > Select All to select all the messages on the current screen, and then select Edit > Copy to copy the messages to the clipboard.
- Open the TextEdit application, paste the copied logs into a new text file, and then save the file.
The Company Portal log for iOS and iPadOS devices doesn't contain information about PKCS certificate profiles.
Logs for Windows devices
For devices that run Windows, use the Windows Event logs to diagnose enrollment or device management issues for devices that you manage with Intune.
On the device, open Event Viewer > Applications and Services Logs > Microsoft > Windows > DeviceManagement-Enterprise-Diagnostics-Provider
Antivirus exclusions
Consider adding Antivirus exclusions on servers that host the Intune Certificate Connector when:
- Certificate requests reach the server or the Intune Certificate Connector, but are not successfully processed
- Certificates are issued slowly
The following are examples of locations that you might exclude:
- %program_files%\Microsoft Intune\PfxRequest
- %program_files%\Microsoft Intune\CertificateRequestStatus
- %program_files%\Microsoft Intune\CertificateRevocationStatus
Common errors
The following common errors are each addressed in a following section:
- The RPC server is unavailable 0x800706ba
- An enrollment policy server cannot be located 0x80094015
- The submission is pending
- The parameter is incorrect 0x80070057
- Denied by Policy Module
- Certificate profile stuck as Pending
- Error -2146875374 CERTSRV_E_SUBJECT_EMAIL_REQUIRED
The RPC server is unavailable 0x800706ba
During PFX deployment, the trusted root certificate appears on the device but the PFX certificate doesn't appear on the device. The NDESConnector_date_time.svclog log file contains the string The RPC server is unavailable. 0x800706ba, as seen in the first line of the following example:
IssuePfx - COMException: System.Runtime.InteropServices.COMException (0x800706BA): CCertRequest::Submit: The RPC server is unavailable. 0x800706ba (WIN32: 1722 RPC_S_SERVER_UNAVAILABLE)
IssuePfx -Generic Exception: System.ArgumentException: CCertRequest::Submit: The parameter is incorrect. 0x80070057 (WIN32: 87 ERROR_INVALID_PARAMETER)
IssuePfx - COMException: System.Runtime.InteropServices.COMException (0x80094800): The requested certificate template is not supported by this CA. (Exception from HRESULT: 0x80094800)
Cause 1 - Incorrect configuration of the CA in Intune
This issue can occur when the PKCS certificate profile specifies the wrong server, or contains spelling errors for the name or FQDN of the CA. The CA is specified in the following properties of the profile:
- Certification authority
- Certification authority name
Solution:
Review the following settings, and fix if they're incorrect:
- The Certification authority property displays the internal FQDN of your CA server.
- The Certification authority name property displays the name of your CA.
Cause 2 - CA doesn't support certificate renewal for requests signed by previous CA certificates
If the CA FQDN and name are correct in the PKCS certificate profile, review the Windows Application log that's on the certificate authority server. Look for an Event ID 128 that resembles the following example:
Log Name: Application:
Source: Microsoft-Windows-CertificationAuthority
Event ID: 128
Level: Warning
Details:
An Authority Key Identifier was passed as part of the certificate request 2268. This feature has not been enabled. To enable specifying a CA key for certificate signing, run: "certutil -setreg ca\UseDefinedCACertInRequest 1" and then restart the service.
When the CA certificate renews, it must sign the Online Certificate Status Protocol (OCSP) Response Signing certificate. Signing enables the OCSP Response Signing certificate to validate other certificates by checking on their revocation status. This signing isn't enabled by default.
Solution:
Manually force signing of the certificate:
- On the CA server, open an elevated Command Prompt and run the following command: certutil -setreg ca\UseDefinedCACertInRequest 1
- Restart the Certificate Services service.
After the Certificate Services service restarts, devices can receive certificates.
An enrollment policy server cannot be located 0x80094015
An enrollment policy server cannot be located and 0x80094015, as seen in the following example:
IssuePfx - COMException: System.Runtime.InteropServices.COMException (0x80094015): An enrollment policy server cannot be located. (Exception from HRESULT: 0x80094015)
Cause - Certificate enrollment policy server name
This issue occurs if the computer that hosts the Intune Certificate Connector can't locate a certificate enrollment policy server.
Solution:
Manually configure the name of the certificate enrollment policy server on the computer that hosts the Intune Certificate Connector. To configure the name, use the Add-CertificateEnrollmentPolicyServer PowerShell cmdlet.
The submission is pending
After you deploy a PKCS certificate profile to mobile devices, the certificates aren't acquired, and the NDESConnector_date_time.svclog log contains the string The submission is pending, as seen in the following example:
IssuePfx - The submission is pending: Taken Under Submission
IssuePfx -Generic Exception: System.InvalidOperationException: IssuePfx - The submission is pending
In addition, on the certificate authority server, you can see the PFX request in the Pending Requests folder:
Cause - Incorrect configuration for Request Handling
This issue occurs if the option Set the request status to pending. The administrator must explicitly issue the certificate is selected in the certificate authority Properties > Policy Module > Properties dialog box.
Solution:
Edit the Policy Module properties to set: Follow the settings in the certificate template, if applicable. Otherwise, automatically issue the certificate.
The parameter is incorrect 0x80070057
With the Intune Certificate Connector installed and configured successfully, devices don't receive PKCS certificates and the NDESConnector_date_time.svclog log contains the string The parameter is incorrect. 0x80070057, as seen in the following example:
CCertRequest::Submit: The parameter is incorrect. 0x80070057 (WIN32: 87 ERROR_INVALID_PARAMETER)
Cause - Configuration of the PKCS profile
This issue occurs if the PKCS profile in Intune is misconfigured. The following are common misconfigurations:
- The profile includes an incorrect name for the CA.
- The Subject Alternative Name (SAN) is configured for email address, but the targeted user doesn't have a valid email address yet. This combination results in a null value for the SAN, which is invalid.
Solution:
Verify the following configurations for the PKCS profile, and then wait for the policy to refresh on the device:
- Configured with the name of the CA
- Assigned to the correct user group
- Users in the group have valid email addresses
For more information, see Configure and use PKCS certificates with Intune.
Denied by Policy Module
When devices receive the trusted root certificate but don't receive the PFX certificate and the NDESConnector_date_time.svclog log contains the string The submission failed: Denied by Policy Module, as seen in the following example:
IssuePfx - The submission failed: Denied by Policy Module
IssuePfx -Generic Exception: System.InvalidOperationException: IssuePfx - The submission failed
at Microsoft.Management.Services.NdesConnector.MicrosoftCA.GetCertificate(PfxRequestDataStorage pfxRequestData, String containerName, String& certificate, String& password)
Issuing Pfx certificate for Device ID <Device ID> failed
Cause – Computer Account permissions to the certificate template
This issue occurs when the Computer Account of the server that hosts the Intune Certificate Connector doesn't have permissions to the certificate template.
Solution:
- Sign in to your Enterprise CA with an account that has administrative privileges.
- Open the Certification Authority console, right-click Certificate Templates, and select Manage.
- Find the certificate template and open the Properties dialog box of the template.
- Select the Security tab and add the Computer Account for the server where you installed the Microsoft Intune Certificate Connector. Grant that account Read and Enroll permissions.
- Select Apply > OK to save the certificate template, and then close the Certificate Templates console.
- In the Certification Authority console, right-click Certificate Templates > New > Certificate Template to Issue.
- Select the template that you modified, and then click OK.
For more information, see Configure certificate templates on the CA.
Certificate profile stuck as Pending
In the Microsoft Intune admin center, PKCS certificate profiles fail to deploy with a state of Pending. There are no obvious errors in the NDESConnector_date_time.svclog log file. Because the cause of this problem isn't identified clearly in logs, work through the following causes.
Cause 1 - Unprocessed request files
Review the request files for errors that indicate why they failed to be processed.
On the server that hosts the Intune Certificate Connector, use File Explorer to navigate to %programfiles%\Microsoft Intune\PfxRequest.
Review files in the Failed and Processing folders, using your favorite text editor.
In these files, look for entries that indicate errors or suggest problems. Using a web-based search, look up the error messages for clues as to why the request failed to process, and for solutions to those issues.
Cause 2 - Misconfiguration for the PKCS certificate profile
When you don't find request files in the Failed, Processing, or Succeed folders, the cause might be that the wrong certificate is associated with the PKCS certificate profile. For example, a subordinate CA is associated with the profile, or the wrong root certificate is used.
Solution:
- Review your trusted certificate profile to ensure you've deployed the root certificate from your Enterprise CA to devices.
- Review your PKCS certificate profile to ensure it references the correct CA, certificate type, and the trusted certificate profile that deploys the root certificate to devices.
For more information, see Use certificates for authentication in Microsoft Intune.
Error -2146875374 CERTSRV_E_SUBJECT_EMAIL_REQUIRED
PKCS certificates fail to deploy, and the certificate console on the issuing CA displays a message with the string -2146875374 CERTSRV_E_SUBJECT_EMAIL_REQUIRED, as seen in the following example:
Active Directory Certificate Services denied request abc123 because The Email name is unavailable and cannot be added to the Subject or Subject Alternate name. 0x80094812 (-2146875374 CERTSRV_E_SUBJECT_EMAIL_REQUIRED). The request was for CN=" Common Name". Additional information: Denied by Policy Module".
Cause - "Supply in the request" is misconfigured
This issue occurs if the Supply in the request option isn't enabled on the Subject Name tab in the certificate template Properties dialog box.
Solution:
Edit the template to resolve the configuration issue:
- Sign in to your Enterprise CA with an account that has administrative privileges.
- Open the Certification Authority console, right-click Certificate Templates, and select Manage.
- Open the Properties dialog box of the certificate template.
- On the Subject Name tab, select Supply in the request.
- Select OK to save the certificate template, and then close the Certificate Templates console.
- In the Certification Authority console, and right-click Templates > New > Certificate Template to Issue.
- Select the template that you modified, and then select OK.