Prepare SCEP Server
Integration with SCEP Key Server
In this release, the Cisco Intelligent Node Manager integrates with a Simple Certificate Enrolment Protocol (SCEP) server version 2.2.0. The integration allows you to manage an SCEP server independently, which acts as a centralized and secure certificate management solution.
The benefit of using an SCEP server is that you can create your own application like the iNode manager to manage the nodes.Limitations:
Intelligent Node software version 4.0.0 is the only version compatible with iNode Manager 24.1.
Configuring a MicroMDM SCEP Server
Before you begin ensure that you have an SCEP server installed. You can download and install the SCEP server from https://github.com/micromdm/scep/releases.
-
Create a new CA.
./scepserver-linux-amd64 ca -init
-
Start the SCEP server.
./scepserver-linux-amd64 -depot depot -port 2016 -challenge=secret
-
Create the mdmscep.config file with the following configuration and place it in the TFTP server where the Intelligent Node software version 4.0.0 is located.
server-url string SCEP server URL keySize int rsa key size (default 2048) challenge string enforce a challenge password Example: server-url = http://175.175.145.254:2016/scep keySize = 2048 challenge = secret
During deployment, for configuring iNode Manager to use MicroMDM SCEP server, user needs to check if iNode Manager UI is available.
Once UI is available, user should configure SCEP details in the UI.
Till the point SCEP details are not configured in the UI, inode-service-manager pod keeps crashing and eventually will lead to unsuccessful deployment, which is expected.
How to check if CA Certificates are configured correctly
Run following commands from a server/VM which has connectivity to SCEP server.
-
scepclient-linux-amd64
How to change the Certificate in MicroMDM SCEP Server
-
Update the SCEP server certificate and key.
-
Restart the SCEP server service.
-
Reboot all the iNodes via iNode Manager or SNMP.
Above steps ensure that all the iNodes and iNode Manager take the new certificate within a 40-minute time span.
server-url, keySize, challenge.
If there are changes, then inode-service-manager pod needs a restart.
challenge
string is configurable.