SCEP Server in IGEL OS 12
This article describes the settings required for connecting the IGEL OS device to an SCEP server.
Menu path: Network > SCEP Client (NDES) > SCEP Server

SCEP server URL
Address by which the SCEP client communicates with the SCEP server.
Examples:
http://myserver.mydomain.com/certsrv/mscep/mscep.dll
(Windows Server 2019)http://myserver.mydomain.com/certsrv/mscep
(before Windows Server 2019)
HTTPS is not supported; however, all security-critical data that are transferred between the SCEP client and other components are encrypted.
Proxy server for SCEP requests
If a proxy must be used, provide its address in the format host:port
; otherwise, leave the field blank.
Challenge password
The password that the SCEP client must present to the SCEP server in its requests (CSR).
Microsoft NDES Server Settings
By default, the password on a Microsoft NDES server is valid for 1 hour and can be used only once. In order to use the password on numerous devices, additional settings must be made on the NDES server. For information, see the section "Password and Password Cache" on https://social.technet.microsoft.com.
On a Microsoft NDES server, you can retrieve the password under https://<HOSTNAME>/certsrv/mscep_admin
Automatic Password Retrieval (NDES only)
When automatic retrieval is enabled, the device extracts the NDES challenge password from the NDES server (https://<HOSTNAME>/certsrv/mscep_admin
).
To enable automatic retrieval of the NDES password, make the following settings in System > Registry:
Set
network.scepclient.cert%.use_ready_made_challenge_password_command
to NDES.Set
network.scepclient.cert%.ndes.challenge_password_retrieval.user
to the username with which the NDES challenge password can be retrieved from the NDES server (https://<HOSTNAME>/certsrv/mscep_admin
).Set
network.scepclient.cert%.ndes.challenge_password_retrieval.crypt_password
to the password with which the NDES challenge password can be retrieved from the NDES server (https://<HOSTNAME>/certsrv/mscep_admin
).If you want HTTPS to be used, you have two options:
Set
network.scepclient.cert%.ndes.challenge_password_retrieval.cacert
to from getca operation.Enter the appropriate certificate under
network.scepclient.cert%.ndes.challenge_password_retrieval.cacert
If you want to use unsecured HTTP, set
network.scepclient.cert%.ndes.challenge_password_retrieval.cacert
to none (not using https).If you want to use Kerberos instead of the Default method NTLM, set
network.scepclient.cert%.ndes.challenge_password_retrieval.auth
to Kerberos. Please note that for Kerberos authentication, Security > Active Directory/Kerberos must be enabled, and the domain must be configured there.
Certificate renewal period (days)
Time interval before certificate expiry during which renewal attempts are performed. (Default: 30)
Certificate expiry check interval (days)
Specifies how often the certificate is checked against its expiry date. (Default: 1)
As an example, a certificate is valid until 31.12. of a year. If the period for renewal is set to 10 days, a new certificate will be requested for the first time on 21.12. of the same year.