Before you do anything else, you’ll need to add a SCEP provisioner to your new authority. To do that, run the command to “Configure step to use this authority” under “Quick Actions” on your authority page. Then run these commands:
# mint a decrypter cert
step ca certificate scep-decrypter decrypter.crt decrypter.key --kty RSA --size 3072 --not-after 8760h
# create the provisioner
step ca provisioner add jumpcloud --type SCEP --challenge <challenge> --scep-decrypter-key-file decrypter.key --scep-decrypter-certificate-file decrypter.crt --encryption-algorithm-identifier 2
This uses the provisioner name jumpcloud, but you can use a different name if you want.
Replace <challenge> in the second command with a SCEP challenge secret (e.g., generated via head /dev/urandom | shasum or whatever your favorite secret-generation-command is). Keep it somewhere safe because you’ll need it later.
With that done, instructions vary for macOS & Windows…
For macOS we’ll create a .mobileconfig profile and upload it to Jumpcloud as a “MDM Custom Configuration Profile”.
You’ll need:
step ca root root.crt to download)https://<your-ca-domain>/scep/<scep-provisioner-name>).mobileconfig profileOpen Apple Configurator and go to file → new profile.
CN=%HardwareUUID%SCEP: <whatever you named your SCEP profile>CN) on your Radius server’s leaf certificateSave this profile. Go to Policy Management → click the big + → Mac → search for “MEM Custom Configuration Profile” and click configure. Upload your mobile config. Assign devices. Save.