United Kingdom | Root Certificate Renewal: The SCEP Failure We Didn’t Expect

Chaz Castillo - 09.04.202620260409

United Kingdom | Root Certificate Renewal: The SCEP Failure We Didn’t Expect

Join our community of 1,000+ IT professionals, and receive tech tips and updates once a week.

Root Certificate Renewal: The SCEP Failure We Didn’t Expect

United Kingdom | Root Certificate Renewal: The SCEP Failure We Didn’t Expect

Introduction 

Certificate renewals are supposed to be boring. 

Planned. Routine. Low‑risk. 

Even when a Root CA certificate is renewed using the existing key pair, most environments expect business as usual certificates continue to be issued, devices stay connected, and users remain unaware that anything changed. 

However, in environments using Microsoft Intune with SCEP, even a Root CA renewal that retains the same key pair can introduce an unexpected failure mode. SCEP enrollments begin to fail, newly provisioned Windows devices are unable to authenticate to the network, and Intune starts reporting certificate deployment errors — all without any policy or configuration changes. 

At first glance, nothing appears broken: 

  • NDES (Network Device Enrollment Service) is running
  • The Intune Certificate Connector is healthy
  • The NAC (Network Access Control) is online and enforcing access policies 

Yet despite everything looking correct, certificate enrollment and EAP‑TLS authentication continue to fail — a lesson learned the hard way. 

The underlying issue turns out to be deceptively simple: a missing or outdated trust relationship on the device following the Root CA renewal, even though the key pair itself did not change. 

This post walks through the environment setup, the symptoms, the root cause, and the validated fix, helping avoid a common SCEP failure that often only surfaces after certificates stop deploying. 

Overview of the Setup 

This issue commonly appears in environments using Microsoft Intune, SCEP, and a third‑party Network Access Control (NAC) platform for certificate‑based network authentication. 

Intune’s role 

  • Deploys the trusted Root CA certificate 
  • Deploys SCEP‑issued certificates (device or user)
  • Deploys the Wi‑Fi profile using EAP‑TLS
  • Provides device identity and trust
  • Does not enforce network access 

3rd‑party NAC’s role

  • Acts as the RADIUS server for 802.1X authentication 
  • Validates certificates during EAP‑TLS
  • Enforces network access policies:
    • VLANs
    • Roles
    • ACLs
    • Quarantine / remediation
  • Optionally evaluates Intune compliance or posture 

Authentication flow 

  1. Intune installs: 
    • Root CA certificate 
    • SCEP‑issued certificate 
    • Wi‑Fi profile (EAP‑TLS) 
  2. Device connects to the network using EAP‑TLS 
  3. NAC validates the certificate chain and attributes 
  4. NAC grants or denies network access 
United Kingdom | Root Certificate Renewal: The SCEP Failure We Didn’t Expect

Common patterns 

  • Device‑based certificates (most common) 
    • Best for corporate devices and pre‑logon access 
  • User‑based certificates 
    • Typically used for BYOD 
  • Hybrid approaches 
    • Certificate authentication plus Intune compliance checks 

Note

Intune provisions and configures certificates; the NAC authenticates and enforces access. 

This separation of responsibility is crucial to understanding the failure.

The Problem 

After renewing the Root CA or Issuing CA certificate, SCEP certificate deployment to Windows devices begins to fail. 

No Intune configuration changes were made, yet: 

  • New certificates are not issued
  • Devices fail EAP‑TLS authentication
  • Network access is denied
  • Intune reports SCEP profile failures 

Symptoms 

Following the CA renewal, administrators observe: 

  • Failed SCEP certificate deployments in Intune 
  • Windows devices unable to enroll for certificates 
  • Errors appearing locally on the device after renewal 
  • Existing certificates continuing to work until expiry 
  • Newly enrolled or reprovisioned devices failing network authentication 

This is commonly seen in environments using: 

  • NDES 
  • Intune Certificate Connector 
  • A third‑party NAC relying on certificate trust 

Error Observed on the Device

On affected Windows devices, the error is visible in Event Viewer at: 

Applications and Services Logs → Microsoft → Windows → DeviceManagement‑Enterprise‑Diagnostics‑Provider → Admin 

In this log, the device records Event ID 307 errors during SCEP enrollment.

United Kingdom | Root Certificate Renewal: The SCEP Failure We Didn’t Expect

Root Cause 

The issue is caused by certificate trust not being refreshed on Windows devices after the Root CA renewal, even when the renewal is performed using the existing key pair. 

When a Root CA or Issuing CA certificate is renewed: 

  • The certificate validity period and metadata change 
  • The renewed certificate is published and used by NDES and the Intune Certificate Connector
  • Windows devices do not automatically update or re‑trust the renewed CA certificate 

Even though the private/public key pair remains the same, the renewed certificate is still treated as a new certificate instance from a trust perspective. If the updated certificate is not redeployed to devices: 

  • The SCEP server certificate chain cannot be fully validated 
  • SCEP enrollment fails during certificate issuance 
  • Intune reports the SCEP profile as failed 
  • The NAC never receives a valid certificate to authenticate 

This confirms the issue is not related to key pair changes, but rather to certificate trust distribution and lifecycle handling on managed devices.

Note

Renewing a Root CA with the existing key pair does not eliminate the need to redeploy the trusted certificate to endpoints. 

Devices must explicitly trust the renewed certificate, regardless of whether the key pair changed. 

Why Network Access Breaks 

EAP‑TLS authentication is entirely dependent on trust: 

  • The device must trust the CA 
  • The NAC must trust the same CA 
  • Any mismatch breaks authentication 

After renewal, the NAC often trusts the updated CA, while Windows devices do not, creating a one‑sided trust failure that prevents SCEP enrollment and network access. 

The Fix  

To resolve the issue. 

Reinstall both the Network Device Enrollment Service (NDES) server role and the Microsoft Intune Certificate Connector on the NDES server. 

During reinstallation 

  • New RA (Registration Authority) certificates are automatically reissued 
  • NDES is re‑registered with the renewed CA certificate 
  • Trust is re‑established between: 
    • NDES 
    • The Certificate Authority 
    • Microsoft Intune 

Once the RA certificates are refreshed, SCEP certificate deployment to Windows devices resumes successfully. 

Important: Update the MSCEP Registry Configuration 

After the NDES and Intune Certificate Connector installation wizard completes, do not forget to update the MSCEP registry configuration on the NDES server. 

Registry Location

HKEY_LOCAL_MACHINESOFTWAREMicrosoftCryptographyMSCEP 

What Needs to Be Updated

NDES maps SCEP requests to certificate templates using registry values. These values must match the certificate template name (not the display name) used by your SCEP profile in Intune. 

To update the registry: 

  • Identify the Purpose of the certificate template (found on the Request Handling tab of the template) 
  • Update the corresponding registry value with the template name

Certificate Template Purpose Mapping 

Certificate Template Purpose  Registry Value to Edit Value Seen in Intune SCEP Profile 
Signature SignatureTemplate Digital Signature 
Encryption EncryptionTemplate Key Encipherment 
Signature and encryption GeneralPurposeTemplate Digital Signature / Key Encipherment 

What Happens If the Registry Is Not Updated 

If the MSCEP (Microsoft Simple Certificate Enrollment Protocol) registry values are not updated after reinstalling NDES and the Microsoft Intune Certificate Connector, the environment may appear to be fully functional again but authentication will still fail. 

In this scenario: 

  • NDES and the Intune Certificate Connector are installed successfully 
  • RA certificates are reissued 
  • Intune SCEP, Trusted Certificate, and Wi‑Fi profiles are successfully delivered to the device 
  • The device receives a certificate 
  • Wi‑Fi authentication using EAP‑TLS still fails 

This can be misleading, as Intune shows no deployment errors, yet the device cannot authenticate to the network. 

Evidence on the NDES Server (Wrong Template Used) 

When this occurs, the issue is visible in Event Viewer on the NDES server, under: Event Viewer

Applications and Services Logs → Microsoft → Intune → CertificateConnectors → Operational 

In this log, Event ID 4004 entries show that the SCEP request was processed successfully, but the wrong certificate template was used. The event details include a line similar to:

United Kingdom | Root Certificate Renewal: The SCEP Failure We Didn’t Expect

This indicates that: 

  • NDES is processing SCEP requests 
  • The request is valid 
  • The certificate is being issued using an unexpected or incorrect template 
  • The template does not match the one configured for the Intune SCEP profile 

As a result, the issued certificate does not meet the requirements for EAP‑TLS authentication, and network access is denied. 

Why This Fix Works 

  • RA certificates are tightly bound to the CA certificate state 
  • NDES does not automatically regenerate RA certificates after a CA renewal 
  • Reinstalling NDES and the Intune Certificate Connector is the only supported method to force RA certificate reissuance 

Even when the Root CA is renewed using the existing key pair, RA certificates can still become invalid from a trust perspective. 

Key Takeaways 

  • Renewing a Root CA is not a zero‑impact operation for Intune SCEP 
  • Using the existing key pair does not prevent failures 
  • SCEP failures after CA renewal can originate on the NDES server, not the device 
  • The Microsoft‑supported fix is to reinstall NDES and the Intune Certificate Connector 
  • Plan CA renewals with NDES remediation steps included 

Insentra’s Modern Workplace team helps organisations get ahead of challenges across the Microsoft stack before they become critical issues. Whether you are planning a CA renewal, resolving SCEP failures, or building robust runbooks for the future, we are here to help. Contact our team to ensure your environment is secure, resilient and ready for what comes next. 

Reference 

Microsoft official guidance: SCEP deployment to Windows 10 devices fails after you renew the CA certificate 

Hungry for more?

If you’re waiting for a sign, this is it.

We’re a certified amazing place to work, with an incredible team and fascinating projects – and we’re ready for you to join us! Go through our simple application process. Once you’re done, we will be in touch shortly!

Who is Insentra?

Imagine a business which exists to help IT Partners & Vendors grow and thrive.

Insentra is a 100% channel business. This means we provide a range of Advisory, Professional and Managed IT services exclusively for and through our Partners.

Our #PartnerObsessed business model achieves powerful results for our Partners and their Clients with our crew’s deep expertise and specialised knowledge.

We love what we do and are driven by a relentless determination to deliver exceptional service excellence.

United Kingdom|Citrix Digital Workspace

Insentra ISO 27001:2013 Certification

SYDNEY, WEDNESDAY 20TH APRIL 2022 – We are proud to announce that Insentra has achieved the  ISO 27001 Certification.