• About this guide
    • Acronyms
    • Revision information
    • Other documents
    • Documentation feedback
  • Introduction to PKIaaS
    • PKIaaS benefits
    • PKIaaS capabilities
      • Certification Authority instantiation
      • Certificate issuance
      • Certificate management
      • Certificate status checking
        • Entrust PKIaaS Certificate Revocation Lists
        • Entrust PKIaaS OCSP service
    • PKIaaS operation
    • PKIaaS governance model
      • Entrust responsibilities
      • Customer responsibilities
    • PKIaaS quotas and limits
    • Compliance frameworks
    • Definitions
  • Ordering and activating PKIaaS
    • Placing an order
      • Purchasing enterprise bundles
      • Purchasing services a la carte
    • Activating your Entrust Certificate Service Enterprise account
    • Checking your PKIaaS inventory
    • Activating Entrust TrustedCare (optional)
  • PKIaaS setup wizard
  • Role-Based Access Control
    • User types with PKIaaS roles
    • Creating a user with PKIaaS roles
    • Granting PKIaaS roles to existing users
  • Managing CAs with Entrust Certificate Services Enterprise
    • Creating an online root CA
    • Creating an issuing CA under an online root CA
    • Selecting the certificate profiles of a CA
    • Creating an external subordinate CA
    • Adding an external root CA
    • Adding an issuing CA under an external root CA
    • Downloading a CA certificate
    • Deleting a CA
  • Managing certificates with Entrust Certificate Services Enterprise
    • Issuing certificates
      • Processing a Certificate Signing Request
      • Generating a PKCS #12
    • Browsing and downloading certificates
    • Revoking certificates
    • Managing reports, alerts, and notifications
    • Configuring auto-enrollment
  • Automating Intune enrollment with an Entrust-hosted Enrollment Gateway
    • Intune integration requirements
    • Creating an Intune application in Azure
    • Configuring Intune automation in Entrust Certificate Services
      • Configuring an Entrust PKIaaS issuing CA for Intune
      • Downloading the Entrust PKIaaS CA certification chain for Intune
      • Configuring an Entrust-hosted Certificate Enrollment Gateway for Intune
      • Getting the Intune Service URL
    • Configuring Intune profiles in Azure
      • Creating Intune profiles for Windows in Azure
      • Creating Intune profiles for Android in Azure
      • Creating Intune profiles for MacOS in Azure
      • Creating Intune profiles for iOS and iPadOS in Azure
    • Enrolling user devices with the Intune Company Portal
      • Enrolling Windows devices with the Intune Company Portal
      • Enrolling Android devices with the Intune Company Portal
      • Enrolling iOS devices with the Intune Company Portal
      • Enrolling MacOS devices with the Intune Company Portal
    • Renewing enrolled certificates
    • Revoking and removing certificates
  • Automating MDM enrollment with an Entrust-hosted Enrollment Gateway
    • MDM integration requirements
    • Configuring MDM automation in Entrust Certificate Services
      • Configuring an Entrust PKIaaS issuing CA for MDM
      • Downloading the Entrust PKIaaS root CA certificate for MDM
      • Configuring an Entrust-hosted Certificate Enrollment Gateway for MDM
      • Adding digital identifiers to a Certificate Enrollment Gateway for MDM
        • Profile ID
        • RDN Format
        • Parent DN
      • Getting Certificate Enrollment Gateway settings for MDM
    • Configuring MDM automation in Ivanti Neurons MDM
      • Adding Entrust as issuing certificate authority in Ivanti Neurons MDM
      • Adding the PKIaaS issuing and root CA certificates in Ivanti Neurons MDM
      • Adding an identity certificate in Ivanti Neurons MDM
    • Configuring MDM automation in Jamf
      • Options
        • General
        • Certificate
        • SCEP
          • URL
          • Name
          • Redistribute Profile
          • Subject
          • Subject Alternative Name Type
          • Retries
          • Retry delay
          • Challenge type
          • Entrust Web Service URL
          • Administrator Username
          • Administrator Password
          • Verify Password
          • Digital ID Configuration Name
          • Group Name
          • RDN Variables
          • Key Size
          • Use as digital signature
          • Use for key encipherment
          • Fingerprint
      • Scope
    • Configuring MDM automation in VMware Workspace ONE
      • Adding a Certificate Authority and a Request Template for MDM automation in VMware Workspace ONE
        • Certificate Authorities
        • Request Templates
      • Adding a profile for trusted certificates in VMware Workspace ONE
      • Adding a PKI profile for MDM automation in VMware Workspace ONE
      • Adding a SCEP profile for MDM automation in VMware Workspace ONE
      • Testing MDM automation in VMware Workspace ONE
  • Automating WSTEP with an Entrust-hosted Enrollment Gateway
    • Planning your WSTEP deployment
    • WSTEP enrollment requirements
      • ECS account requirements for WSTEP enrollment
      • PKIaaS Virtual Machine requirements
        • Network requirements for the PKIaaS Virtual Machine
        • Virtualization platform requirements for the PKIaaS Virtual Machine
          • Azure requirements for the PKIaaS Virtual Machine
          • VMware requirements for the PKIaaS Virtual Machine
      • Windows requirements for WSTEP enrollment
        • Windows user requirements for configuring WSTEP enrollment
        • Network requirements for the Windows devices
        • Active Directory requirements for WSTEP enrollment
    • Preparing the Active Directory forest for WSTEP
      • Creating a PKIaaS WSTEP Service Account
      • Installing the default set of Microsoft Certificate Templates
        • Enabling the Certificate Templates snap-in
        • Installing the default set of Microsoft Certificate Templates using the snap-in
      • Downloading the certificate chain
      • Setting up LDAPS on domain controllers
        • Establishing trust of the LDAPS TLS chain
          • Creating a Group Policy Object for the LDAPS TLS certificate chain
          • Importing the LDAPS TLS certificate chain into the Group Policy Object
          • Linking the TLS LDAPS Group Policy Object to all domains
        • Generating the LDAPS TLS certificates
        • Installing the LDAPS TLS certificates
        • Validating the LDAPS configuration
    • Configuring an Entrust PKIaaS issuing CA for WSTEP
    • Creating an Entrust-hosted Certificate Enrollment Gateway for WSTEP
    • Downloading a PKIaaS Virtual Machine from the PKIaaS portal
    • Installing a PKIaaS Virtual Machine
      • Installing a PKIaaS Virtual Machine on Amazon Web Services
        • Creating an S3 bucket for the PKIaaS Virtual Machine
        • Configuring an IAM policy for the PKIaaS Virtual Machine
          • Creating a new IAM policy
          • Updating an existing IAM policy
        • Creating an IAM role for the PKIaaS Virtual Machine
        • Uploading the OVA file of the PKIaaS Virtual Machine to AWS
        • Creating an AMI import configuration file
        • Preparing the command-line interface
        • Importing the AMI
        • Creating an EC2 instance for the PKIaaS Virtual Machine
        • Opening a PKIaaS Virtual Machine session on AWS
      • Installing a PKIaaS Virtual Machine on Azure
        • Creating an Azure storage account for the PKIaaS Virtual Machine
        • Uploading the VHD image of the PKIaaS Virtual Machine file to Azure
        • Creating an Azure image for the PKIaaS Virtual Machine
        • Creating Azure network rules for the PKIaaS Virtual Machine
        • Creating the PKIaaS Virtual Machine on Azure
        • Opening a PKIaaS Virtual Machine session on Azure
      • Installing a PKIaaS Virtual Machine on VMware vSphere
    • Configuring PKIaaS Virtual Machines on the PKIaaS portal
      • Registering a PKIaaS Virtual Machine
      • Adding an agent to a PKIaaS Virtual Machine
        • Configuring an Active Directory in the agent
        • Preparing the service account for Kerberos
        • Synchronizing the agent with the root Active Directory
      • Linking additional Active Directories to an agent
      • Managing PKIaaS Virtual Machine configurations
        • Selecting PKIaaS Virtual Machine actions
        • Copying the enrollment URL
      • Managing Active Directory configurations
        • Add Root Active Directory
        • Edit Active Directory
        • Delete Active Directory
        • Manage Certificate Templates
        • View discovered domains
    • Enabling WSTEP for users and devices
      • Creating a Group Policy Object for the WSTEP certificate chain
      • Importing the WSTEP certificate chain into the Group Policy Object
      • Enabling PKIaaS WSTEP for users
      • Enabling autoenrollment for users
      • Enabling PKIaaS WSTEP for devices
      • Enabling autoenrollment for devices
      • Linking the WSTEP Group Policy Object to all domains
    • Managing Microsoft certificate templates in Active Directory
      • Creating and configuring certificate templates
        • Compatibility
        • Cryptography
        • Extensions
        • General
        • Issuance requirements
        • Key Attestation
        • Request Handling
        • Security
        • Server
        • Superseded Templates
      • Disabling a certificate template
    • Managing on-premises PKIaaS Virtual Machines
      • PKIaaS Virtual Machine keyboard shortcuts
      • Browsing PKIaaS Virtual Machine logs
        • Browsing PKIaaS Virtual Machine startup logs
        • Browsing WSTEP enrollment logs
      • Creating an additional PKIaaS Virtual Machine for disaster recovery
      • Recovering a PKIaaS Virtual Machine from disaster
    • Troubleshooting WSTEP enrollment issues
      • Troubleshooting PKIaaS Virtual Machine onboarding issues
      • Troubleshooting WSTEP agent configuration issues
        • DNS Server unreachable
        • Invalid LDAP credentials
        • LDAP timeout
        • TLS handshake failed
        • Unknown LDAP host
      • Troubleshooting Group Policy Object configuration issues
        • Access denied by remote endpoint
        • Remote endpoint not reachable
      • Troubleshooting enrollment and certificate template issues
        • Certificate template not enrolling or autoenrolling
        • Missing certificate template
        • Unexpected behavior of certificate enrollment
  • Automating enrollment with an on-premises Enrollment Gateway
    • Adding an on-premises Enrollment Gateway to an issuing CA
    • Activating an on-premises Certificate Enrollment Gateway
    • Installing an on-premises Certificate Enrollment Gateway
    • Deleting an on-premises Certificate Enrollment Gateway
  • Migrating a customer-hosted Enrollment Gateway to Entrust-hosted
    • Migrating an Intune on-premises Enrollment Gateway to an Entrust-hosted Enrollment Gateway
    • Migrating an MDM on-premises Enrollment Gateway to an Entrust-hosted Enrollment Gateway
    • Migrating a WSTEP on-premises Enrollment Gateway to an Entrust-hosted Enrollment Gateway
  • Managing certificates with Entrust Certificate Hub
  • Integrating third-party tools with the Entrust CA Gateway API
    • Generating CA Gateway credentials
    • Accessing the CA Gateway API
    • Integrating with Ansible
    • Integrating with HashiCorp Vault
    • Integrating with KeyFactor CLM
    • Integrating with ServiceNow
    • Integrating with Venafi
  • Revoking certificates in bulk
  • Certificate profiles reference
    • Authority profiles
      • Azure Firewall Intermediate CA certificate profile
      • Basic authorities certificate profiles
      • TLS Proxy CA certificate profile
    • Subscriber certificate profiles
      • Active Directory (WSTEP) certificate profiles
      • CMPv2 certificate profiles
      • Code signing certificate profile
      • eSIM certificate profiles
      • EST certificate profiles
      • Intune certificate profiles
      • MDMWS certificate profiles
      • Mobile device certificate profile
      • Multiuse certificate profiles
      • Private SSL (ACMEv2) certificate profiles
      • S/MIME Secure Email certificate profiles
      • SCEP certificate profiles
      • Smartcard certificate profiles
      • V2G certificate profiles
  • Post-quantum Lab experimental region
    • Pure post-quantum algorithms
      • SPHINCS+-SHA2-128f-simple (1.3.9999.6.4.13)
      • SPHINCS+-SHA2-128s-simple (1.3.9999.6.4.16)
      • SPHINCS+-SHA2-192f-simple (1.3.9999.6.5.10)
      • SPHINCS+-SHA2-192s-simple (1.3.9999.6.5.12)
      • SPHINCS+-SHA2-256f-simple (1.3.9999.6.6.10)
      • SPHINCS+-SHA2-256s-simple (1.3.9999.6.6.12)
      • Falcon-512 (1.3.9999.3.6)
      • Falcon-1024 (1.3.9999.3.9)
      • ML-DSA-44 (2.16.840.1.101.3.4.3.17)
      • ML-DSA-65 (2.16.840.1.101.3.4.3.18)
      • ML-DSA-87 (2.16.840.1.101.3.4.3.19)
    • Explicit composite algorithms
      • MLDSA44-ECDSA-P256 (2.16.840.1.114027.80.8.1.24)
      • MLDSA44-RSA2048-PKCS15 (2.16.840.1.114027.80.8.1.22)
      • MLDSA65-ECDSA-P384 (2.16.840.1.114027.80.8.1.28)
      • MLDSA65-RSA3072-PKCS15 (2.16.840.1.114027.80.8.1.27)
      • MLDSA65-RSA4096-PKCS15 (2.16.840.1.114027.80.8.1.35)
      • MLDSA87-ECDSA-P384 (2.16.840.1.114027.80.8.1.31)
  • Obtaining support