Managing iOS devices using Microsoft Intune
PKCS certificates that are deployed to iOS/iPadOS devices by Intune via MDM (device configuration profiles) are not exposed to third‑party apps for direct keychain access, even when those apps are MAM-enrolled and use the Intune App SDK.
From the provided information:
- PKCS certificates for authentication are deployed through Intune PKCS certificate profiles that target a specific platform (including iOS) and are tied to an Enterprise CA via the Intune Certificate Connector.
- These certificates are intended for scenarios like Wi‑Fi, VPN, and other system-level authentication, and are managed by the OS/MDM stack rather than by individual apps.
- The Intune documentation and the Tunnel for MAM guidance only describe:
- Deploying trusted root certificates via trusted certificate profiles so that apps (including Tunnel for MAM) can validate server certificates.
- Using PKCS/SCEP profiles for authentication, but not exposing those private keys to arbitrary app keychain access.
For MAM Tunnel on iOS specifically:
- A trusted certificate profile is required only so the app can trust the on‑premises server’s SSL/TLS certificate chain.
- Tunnel for MAM “uses the public-key certificate payload contained in the Intune trusted certificate profile but doesn't require the profile be assigned to any Microsoft Entra user or device groups” and can use a trusted certificate profile from any platform.
- There is no indication that Tunnel for MAM or the Intune App SDK exposes MDM‑deployed client certificates (PKCS) to apps or automatically injects client certificates into
URLSessionmTLS handshakes.
Nothing in the provided material describes:
- Any API or SDK behavior that would allow an app to obtain a
SecIdentityfor an MDM‑deployed PKCS certificate. - Any automatic interception of
NSURLAuthenticationMethodClientCertificatechallenges by the Intune App SDK or Tunnel for MAM to supply a client certificate on behalf of the app.
Based on the available documentation in the context, the supported Intune pattern for apps that use Tunnel for MAM is:
- Use a trusted root certificate profile so the app (or Tunnel) can validate the server certificate chain.
- Use MDM/MAM for device/app trust and conditional access, not for exposing client certificate private keys to third‑party apps.
Therefore, within the scope of the provided information:
- MDM‑deployed PKCS certificates are not documented as accessible to apps (no supported way to retrieve a
SecIdentity). - The Intune App SDK and Tunnel for MAM are documented only as consuming trusted root certificates for server trust, not as brokering client certificates for mTLS.
- No supported mechanism is described that would allow an Intune‑managed iOS app to use an MDM‑deployed PKCS client certificate for mTLS.
References: