Android: SCEP profile settings Skip Navigation

Android
: SCEP profile settings

For devices with
Android Management
activation types, see Considerations for Android Management activation types.
Android
: SCEP profile setting
Description
Use
BlackBerry UEM
as a proxy for SCEP requests
This setting specifies whether all SCEP requests from devices are sent through
UEM
. If the CA is behind your firewall, this setting allows you to enroll client certificates to devices without exposing the CA outside of the firewall.
Hide certificate on
Android Enterprise
devices
This setting specifies whether the certificate is visible to
Android Enterprise
users. If the certificate is hidden, users can't select the certificate to use it for additional purposes.
Use
BlackBerry Connectivity Node
for CA connectivity
This setting specifies whether SCEP requests should be routed through the
BlackBerry Connectivity Node
. This setting displays only in
UEM Cloud
.
Encryption algorithm
This setting specifies the encryption algorithm that
Android
devices use for the certificate enrollment request.
Hash function
This setting specifies the hash function that
Android
devices use for the certificate enrollment request.
Certificate thumbprint
This setting specifies the hexadecimal-encoded hash of the root certificate for the CA. You can use the following algorithms to specify the thumbprint: SHA-1, SHA-224, SHA-256, SHA-384, and SHA-512. You must set a value for this setting to activate
Android Enterprise
or
Samsung Knox
devices.
Automatic renewal
This setting specifies how many days before a certificate expires that automatic certificate renewal occurs.
Android work profiles and Samsung KNOX
Subject
This setting specifies the subject for the certificate, if required for your organization's SCEP configuration. Type the subject in the format "/CN=
<common_name>
/O=
<domain_name>
" If the profile is for multiple users, you can use a variable, for example: %UserDistinguishedName%.
SAN type
This setting specifies the subject alternative name type for the certificate, if it is required.
SAN value
This setting specifies the subject alternative representation of the certificate subject. The value must be an email address, the DNS name of the CA server, the fully qualified URL of the server, or principal name.
The "SAN type" setting determines the appropriate value to specify. If set to "RFC822 name," the value must be a valid email address. If set to "URI," the value must be a valid URL that includes the protocol and FQDN or IP address. If set to "NT principal name," the value must be a valid principal name. If set to "DNS name," the value must be a valid FQDN.
Key algorithm
This setting specifies the algorithm that devices use to generate the client key pair. You must select an algorithm that is supported by your CA.
RSA
strength
This setting specifies the
RSA
strength that devices use to generate the client key pair. You must enter a key strength that is supported by your CA.
This setting is valid only if the "Key algorithm" setting is set to "
RSA
".
Key usage
This setting specifies the cryptographic operations that can be performed using the public key that is contained in the certificate.
Extended key usage
This setting specifies the purpose of the key that is contained in the certificate.