Managed Cloud PKI Service for Entra ID
Extend policies from Microsoft Entra ID and Intune to the rest of your network and go passwordless with our simple managed cloud enterprise Public Key Infrastructure (PKI). Reduce the risk of phishing attacks, multi-factor (MFA) fatigue attacks, and more. Enhance network segmentation and improve the end-user Entra ID login experience at the same time as you deploy certificates.
A Cloud PKI Designed to Integrate with Microsoft Entra ID
Certificate-based authentication requires more than just a PKI and certificates - you’ll also want something outside of your Microsoft Entra ID infrastructure to authenticate them. SecureW2 provides a complete passwordless platform, including a Cloud RADIUS, server to enable certificate-based authentication. Our vendor-agnostic platform has a decade of integration with any infrastructure, such as all major MDMs like Intune, access points, firewalls, and your SIEM or syslog servers.
Leverage a Secure Certificate-Driven Authentication Method for All Your Critical Resources
A digital certificate delivers so much more identity context to each connection and can be used for various purposes. This makes them one of the most secure authentication methods available. In one convenient centralized location, our managed cloud PKI solution allows you to create certificates for:
Easy Entra ID App Login with Certificate-Based Authentication (CBA)
Digital certificates don’t just improve security - they make accessing necessary resources simple for end-users. Instead of having to remember complex passwords or rely on a password manager, they can use certificate-based authentication to access everything they need, including Entra ID/Azure AD applications.
- Keep Users Connected: Prevent disconnects due to password resets and other password-related issues.
- Support Smart Card Login: Install certificates on smart cards to make application access as simple as plugging in a card.
- Eliminate Password-Sharing: Secure access to critical resources and Azure AD and Intune-managed applications by using digital certificates that can’t be shared.
- Reduce Password Fatigue and Frustration: Save users time and effort that would otherwise be spent on brainstorming new passwords or reusing old, insecure ones.
Easily Deploy & Manage Certificates in One Place
Our Certificate Lifecycle Management solution was designed as an extension of your Microsoft Entra ID cloud environment, automating the certificate lifecycle based on real-time data from your Cloud Identity. Now you can create as many certificate authorities and intermediate certificate authorities as you need, using all your Microsoft Entra ID and Intune policies to automate certificate management.
- Search for any Entra ID user’s certificate or device’s certificate easily, viewing all their certificate lifecycles and authentication events in one place for easy troubleshooting and management
- Customizable certificate templates that allow you to modify all attributes, such as user principal name and more
- Simple and secure, backed by HSM (Hardware Security)
- Integrate with ease to nearly every device management system, Identity Provider, or with BYODs/unmanaged devices
- Automate certificate enrollment and revocation to all your managed devices through our API
- Total cost of ownership (TCO) is less than a third of comparable on-premise Active Directory Certificate Services (AD CS) solution
What Real Customers Have to Say About SecureW2
At SecureW2, we have a laser focus on making products and services that customers love. But don’t take our word for it, check out what some of our customers are saying:
5-Star Support Experience - Thorough assistance for planning, testing and implementation -Fantastic functionality - Thorough Integration Support
The implementation was seemless and easy. It worked immediately, and the individuals working with us were able to tell us exactly what to do.
With SecureW2, we are finally able to stop using user name an passwords for Wi-Fi authentication and strictly use machine based certificates. This has alleviated several pain points with our users.
Very little time was spent configuring the product. SecureW2 was able to help walk my team through all necessary configurations to create our PKI environment and automate certificate deployment. Since then everything has simply just worked and is integrated perfectly with out device lifecycle.
The White Glove Service made it easy to implement and connect to our services The team has been very knowledgeable, And implementation into the network was very simple.
Replace Your Active Directory Certificate Services (AD CS) with our Simpler Managed PKI
Building and managing your own PKI in solutions such as Active Directory Certificate Services can be challenging and costly. But with our managed PKI solution, enterprises of every size can leverage the security of digital certificates with modern automation technology that ensures every step of the certificate lifecycle is manageable. Enjoy the best of both worlds: simplicity and security.
Build Your Own PKI | ||
---|---|---|
Upfront Infrastructure Cost | $0 | $65,216* |
Upfront Software Cost | $0 | $141,383* |
Time for Configuration | 2-4 hours with white glove implentation | Hundreds of hours to set up securely** |
Level of Maintenance required | None | High maintenance with regular manual patches and updates |
AI & Monitoring | Monitoring & AI-driven anomaly detection | Set your own alarms |
Training Required | None | Years |
Support | Team of experts with experienced implementing PKIs for hundreds of organizations | Limited to your team’s experience |
*Costs are in USD, and are based on building an on-premise PKI with Microsoft Active Directory Certificate Services (AD CS).
**This requirement is based on research conducted by Specter Ops.
Automatically Issue Certificates from Any Certificate Authority to Your Devices
Historically, one of the greatest challenges of certificate management has been distributing certificates to all your enterprise’s managed endpoints. That’s no longer the case, thanks to our PKI as a service platform. Our managed device gateway APIs can configure the managed devices on your network for certificate-based authentication with no end-user input.
- Automatically configure and enroll managed company-owned devices through our managed device gateway APIs.
- Connect devices to networks and provide reporting, device analytics, and remote troubleshooting data.
- Push configuration profiles to IoTs, ensuring all devices are using secure certificate-based authentication.
#1-Rated Self-Service Onboarding for BYODs and Unmanaged Devices
SecureW2’s PKI as a service also provides onboarding technology for BYODs. Potential misconfiguration can be a huge window for human error - and a liability for your network security. Our JoinNow MultiOS onboarding application takes human error out of the equation by configuring unmanaged devices for your users.
- Automatic device 802.1x configuration software compatible with every OS, which includes guided user flow where necessary.
- Configure for device or user certificates.
- Enables easy configuration for server certificate validation.
- From start to finish, configuration takes only a minute or two.
- Support for iOS, Windows, macOS, Android, ChromeOS, Linux, and Kindle.
Read More About How We Integrate with Entra ID (Azure AD) for
Public Key Infrastructure for Microsoft Entra ID FAQs
What are the Benefits of a Public Key Infrastructure for Organizations?
The ultimate benefit of a private PKI is passwordless, certificate-based authentication. It’s no secret that passwords are a vulnerability, with organizations like Microsoft recommending that you move away from credentials-based PEAP-MSCHAPv2 to passwordless protocols like EAP-TLS. Certificate-based authentication can be used to secure a range of resources, including your wired & wireless network, VPN, applications, desktop logins, and much more.
Additionally, there are benefits for your end-users. With digital certificates, employees no longer have to deal with frustrating password reset policies and disconnects due to password changes. Customers often tell us that users prefer certificates over MFA alternatives such as an authenticator code or SMS/E-Mail code.
Why Can’t We Just Build Our Own PKI with Active Directory Certificate Services (AD CS) Instead?
Active Directory Certificate Services is Microsoft’s legacy PKI solution that gives organizations the ability to build their own on-premise Public Key Infrastructure. Unfortunately, this often ends up being a costlier venture in terms of finances and time spent. Building a private PKI requires expertise, space for the servers, and regular maintenance. Certificate lifecycle management with Active Directory Certificate Services - from issuance to renewal to building a certificate revocation list - is time-consuming.
It’s important to understand the costs of building a PKI with Active Directory Certificate Services. Aside from taking potentially hundreds of hours to set up initially, there’s a high upfront infrastructure and software cost that can easily exceed $200,000 USD. On top of up-front software and infrastructure costs, Active Directory Certificate Services will have recurring costs in the form of high maintenance.
These costs, unfortunately, are unavoidable. A PKI is a foundational part of security systems. Rushing a configuration, or setting it up with inexperienced professionals is a huge liability. In this writeup by Specter Ops, they identify countless security vulnerabilities organizations will run into if they leave default settings enabled in AD CS. This reason alone is why many organizations choose a managed PKI.
Finally, a PKI service like ours makes it easier to manage on a day-to-day basis. You can generate whatever type of certificate you need, whether it’s a root certificate, a CA certificate, or certificates for user authentication. All of this can be achieved through a single pane of glass, saving you both time and money.
What is the Difference Between Your PKI and Microsoft Cloud PKI?
One of the greatest differences between our natively integrated Entra ID PKI and the new Microsoft Cloud PKI service is that it was designed for vendor neutrality. Yes, our platform can integrate with your Microsoft ecosystem, including Entra ID and Intune. However, we can also integrate with all major IDPs and MDMs, providing the secure authentication method of certificates to any organization regardless of the infrastructure they have.
Microsoft Cloud PKI is part of the Intune subscription. Organizations must have Intune in order to leverage it. For more diverse environments incorporating a range of vendors, it’s easier to have a vendor-neutral solution that can integrate with your entire infrastructure at once. Commonly, organizations manage Apple Devices with an MDM like Addigy, Kandji, Mosyle or Jamf. With SecureW2’s PKI, you can easily point your Apple MDM to us, and we will automate its certificate lifecycle management alongside all your Intune-managed devices.
How Does Your PKI Platform Handle Certificate Lifecycle Management?
We wouldn’t be able to call it PKI as a Service if we didn’t provide you with everything you needed to deploy certificates. SecureW2 is known for its ability to ingest real-time data from IDPs, MDMs, and EDR/XDRs and use that to automate certificate lifecycle management. For endpoint distribution, we have our automatic gateway APIs for managed devices and our self-service onboarding technology that talks directly to any IDP for unmanaged devices/BYODs.
When it comes to revocation, our cloud-based PKI can revoke certificates in a few different ways, including manually and through automatic revocation with some MDMs such as Intune. Our PKI as a service also includes customizable policies you can create, such as non-utilization, which means certificates that aren’t used for a definable period of time (such as 60 days) are automatically revoked. Revoked user certificates and device certificates are revoked through a Certificate Revocation List as opposed to through the Online Certificate Status Protocol (OCSP).
How Does Your PKI Integrate with Intune and other MDMs?
Our PKI leverages an enhanced integration with Intune’s third-party certificate authority (CA) APIs. While JoinNow Connector PKI can integrate with all major MDMs, it works especially closely with Intune.
In typical Simple Certificate Enrollment Protocol (SCEP) certificate deployment, all a device needs to enroll for a certificate is the SCEP URL and key. However, with Intune, our PKI can take an additional step by verifying that a device exists within your Intune organization prior to issuing a certificate. It’s an extra security measure that truly ensures only authorized devices are capable of enrollment.
On top of this extra security check, our PKI can automate the certificate lifecycle even further with Intune. Our enhanced Intune integration allows our PKI service to check with Intune every several minutes. When a device is removed from your Intune organization for any reason, our PKI will automatically revoke that device’s certificate. A similar integration applies to Jamf.
What is the Passwordless Authentication Experience Like for the End-User?
The user experience with certificate-based authentication differs based on whether they are using managed or unmanaged devices/BYODs. For managed devices, the end user will never notice the certificate enrollment process - our PKI as a service includes gateway APIs that will automatically enroll them for a certificate.
For BYODs, you can utilize our self-service onboarding technology, which allows end users to configure their devices for certificates in a matter of minutes. Users simply navigate to our onboarding page, which can be customized, and log in using their Microsoft Entra ID credentials once. Afterward, our dissolvable client can easily configure their devices for certificates and enroll them quickly.
After enrollment, certificate-based authentication is mostly the same for either type of end-user. They no longer need to remember a plethora of passwords, reset those passwords regularly, or adhere to complex password requirements.
What is Azure CBA?
In short, Azure certificate-based authentication (CBA) is a Microsoft authentication feature that allows organizations to use certificates to sign in to Azure. With CBA, a user certificate or a device certificate can be used to authenticate to an Azure AD/Entra ID application instead of a username or password. This has several use cases since Azure can be used to SSO into various systems. The most common use cases we see are to require Devs to verify Device Trust before accessing Azure resources. Applications can be gated behind an Azure sign-in. Lastly, desktop logon can use Azure CBA.
Azure CBA (Entra CBA) is an efficient way for users to access the cloud applications they need to complete work on a daily basis. It’s faster than having to manually type a username/password in and saves them the hassle of regular password resets or changes. It’s also extremely simple to configure.
Can CBA Be Used with Conditional Access Policies?
Yes. Azure Active Directory CBA can be used to create a conditional access policy in Entra ID. Combining certificate-based authentication with conditional access policies allows administrators to create extremely in-depth access control rules.
This configuration doesn’t even need to be challenging. We’ve created a detailed guide outlining how it works and how to CBA authentication policy rules here.
What is the Purpose of Microsoft Entra Multi-Factor Authentication?
Microsoft Entra Multifactor Authentication provides extra assurance about the authenticity of user accounts when they log in. It’s based on the concept of multi-factor authentication (MFA), which simply uses more than one form of identity at the time of authentication.
Microsoft defines various levels of authentication for its own MFA feature. It categorizes the strength of these authentication factors as MFA strength, passwordless MFA strength, and phishing resistant MFA strength. Certificates can be used as one of the factors in MFA, and is categorized as phishing resistant authentication in terms of how secure it is. You can read more about this in our blog on understanding phishing resistant authentication.
Schedule a Demo
Sign up for a quick demonstration and see how SecureW2 can make your organization simpler, faster, and more secure.
Schedule NowPricing Information
Our solutions scale to fit you. We have affordable options for organizations of any size. Click here to see our pricing.
Check Pricing