How to Deploy Trusted Root Certificate using Intune Configuration Policy

In this blog post, we’ll check how to Deploy Trusted Root Certificate using Intune Configuration Policy. It’s an essential step for enabling secure communications in enterprise environments. Trusted root certificates ensure that devices can validate the authenticity of services such as internal web portals, VPN connections, or Wi-Fi networks that use certificates issued by a private Certificate Authority (CA).

Without these certificates, users might face SSL errors, failed authentication, or warning messages when connecting to internal resources. In Microsoft Intune, administrators can create a Device Configuration Profile specifically for Windows 10/11 devices to deploy the trusted root certificate.

Choosing the Trusted certificate profile type. The .cer file (in Base-64 encoded X.509 format) representing the root certificate is uploaded, and the profile is then assigned to the appropriate device groups. Intune automatically pushes the certificate to the trusted root certification authorities store on managed Windows devices.

This method ensures consistent certificate distribution across all enrolled Windows devices, enhancing the reliability and security of corporate services. With Intune’s built-in reporting and compliance features, administrators can track deployment success and identify devices that are missing critical certificates. By automating this process, organizations reduce the risk of misconfiguration, strengthen endpoint security, and maintain user productivity with minimal manual intervention.

Patch My PC
How to Deploy Trusted Root Certificate using Intune Configuration Policy. Fig. 1
How to Deploy Trusted Root Certificate using Intune Configuration Policy. Fig. 1

Export a Trusted Root Certificate

First, we need to export a trusted root certificate from the Internal Certificate Authority (CA). In this example, I have exported “HTMD – Root CA.cer” to demonstrate this policy deployment. To export the cert, execute the command from your CA Server. Open Command Promt as Administrator and run “certutil -ca.cert HTMD – Root CA.cer

Issued toIssued byValid from
HTMD – Root CAHTMD – Root CA6/15/2025 to 6/15/2030
How to Deploy Trusted Root Certificate using Intune Configuration Policy. Table. 1

Create a Configuration Policy to Deploy Trusted Root Certificate in Intune

Follow these steps to deploy the Trusted Root Certificate Configuration Policy using Microsoft Intune. First, sign in to the Microsoft Intune Admin Center with your administrator credentials.

  • Navigate to Devices  Windows > Manage devices > Configuration
  • Click on +Create +New Policy
How to Deploy Trusted Root Certificate using Intune Configuration Policy. Fig. 2
How to Deploy Trusted Root Certificate using Intune Configuration Policy. Fig. 2

Next, we will create a new configuration profile from scratch. First, we need to provide the options mentioned below.

  • Platform: Windows 10 and later
  • Profile type: Templates
  • Template name: Trusted Certificate

Note! Templates contain groups of settings, organized by functionality. Use a template when you don’t want to build policies manually or want to configure devices to access corporate networks, such as configuring WiFi or VPNLearn more.

How to Deploy Trusted Root Certificate using Intune Configuration Policy. Fig. 3
How to Deploy Trusted Root Certificate using Intune Configuration Policy. Fig. 3

On the Basics details pane, we can name the configuration policy as “HTMD – Trusted Root Certificate Deployment” if needed, briefly describe the policy’s use (here, I am using “HTMD – Root CA.cer”), and then click Next.

Note! Import the trusted root certificate from your Certification Authority and assign it to devices that use SCEP and PCKS certificates to authenticate with your org’s resources.

How to Deploy Trusted Root Certificate using Intune Configuration Policy. Fig. 4
How to Deploy Trusted Root Certificate using Intune Configuration Policy. Fig. 4

We can now add the required settings to the Configuration settings pane. First, upload the Certificate file, browse and select our exported Root CA, i.e, “HTMD – Root CA.cer“, and the Destination store choose “Computer certificate store – Root” from the drop-down. You can also have options like “Computer certificate store – Intermediate” and “User certificate store – Intermediate”.

How to Deploy Trusted Root Certificate using Intune Configuration Policy. Fig. 5
How to Deploy Trusted Root Certificate using Intune Configuration Policy. Fig. 5

On the next page, leave the Scope tags as Default. If your tenant has custom scope tags, you can select them based on your policy needs, then click on Next.

How to Deploy Trusted Root Certificate using Intune Configuration Policy. Fig. 6
How to Deploy Trusted Root Certificate using Intune Configuration Policy. Fig. 6

Here, I am assigning the configuration policy to the “HTMD – Test Computers” device group. To do this, click on “Add Groups” and select the desired device group under the “Included Groups” option. In this example, I am not using any filters, and the “Excluded Groups” option has been left blank.

How to Deploy Trusted Root Certificate using Intune Configuration Policy. Fig. 7
How to Deploy Trusted Root Certificate using Intune Configuration Policy. Fig. 7

On the next pane, specify how to apply this profile within an assigned group. Intune will only apply the profile to devices that meet the combined criteria of these rules. Find the below-mentioned Applicability Rules selected.

  • Rule – Assign profile if
  • Property – OS edition
  • Value – Windows 10/11 Enterprise
How to Deploy Trusted Root Certificate using Intune Configuration Policy. Fig. 8
How to Deploy Trusted Root Certificate using Intune Configuration Policy. Fig. 8

On the Review + create page, carefully review all the settings you’ve defined for the HTMD – Trusted Root Certificate Deployment policy. Once you’ve confirmed everything is correct, select “Create” to deploy the policy.

How to Deploy Trusted Root Certificate using Intune Configuration Policy. Fig. 9
How to Deploy Trusted Root Certificate using Intune Configuration Policy. Fig. 9

Monitor the Trusted Root Certificate Deployment

The configuration policy has been deployed to the HTMD – Test Computers, a Microsoft Entra ID Device group. Once the device is synced, the policy will take effect immediately. To monitor the policy deployment status from the Intune Portal, follow the steps below.

  • Navigate to Devices >  Windows > Configuration > Search for the “HTMD – Trusted Root Certificate Deployment” configuration policy.
  • Under the Device and user check-in status, you can see the policy’s deployment status
How to Deploy Trusted Root Certificate using Intune Configuration Policy. Fig. 10
How to Deploy Trusted Root Certificate using Intune Configuration Policy. Fig. 10

End User Experience

We can now verify whether the Trusted Root Certificate deployment is worked or not. Logging to the device affected by the policy. Next, we can check the status of the policy using the Manage computer certificates. To do this, open the Local Computer Certificates on the device.

  • Open Run > Type Certlm.msc > Under Certificates – Local Computer > Trusted Root Certification Authorities > Certificates

You can able to see the HTMD – Root CA is successfully deployed. The screenshot below shows that the policy was successfully applied to the system, and it worked as expected!

How to Deploy Trusted Root Certificate using Intune Configuration Policy. Fig. 11
How to Deploy Trusted Root Certificate using Intune Configuration Policy. Fig. 11

Need Further Assistance or Have Technical Questions?

Join the LinkedIn Page and Telegram group to get the latest step-by-step guides and news updates. Join our Meetup Page to participate in User group meetings. Also, Join the WhatsApp Community to get the latest news on Microsoft Technologies. We are there on Reddit as well.

Author

Vaishnav K has over 11 years of experience in SCCM, Device Management, and Automation Solutions. Writes and imparts knowledge about Microsoft Intune, Azure, PowerShell scripting, and automation. Check out my profile on LinkedIn.

Leave a Comment