Skip to content

Event: Register For Our Upcoming Event

Register Now

NDES and SCEP Explained: The Backbone of Automated Certificate Enrollment

NDES AND SCEP

As organizations accelerate adoption of Zero Trust, device authentication, and cloud-managed infrastructure, traditional manual certificate enrollment is no longer scalable. Whether onboarding thousands of laptops via Intune, issuing certificates for VPN access, or enabling Wi-Fi authentication across global offices, automated certificate enrollment is essential.

This is where SCEP (Simple Certificate Enrollment Protocol) and NDES (Network Device Enrollment Service) play a critical role in Microsoft PKI ecosystems.

Despite their importance, many administrators deploy them without fully understanding how they work, how they differ, or how to secure them properly. Misconfigured NDES servers remain one of the most common PKI weaknesses discovered during security audits.

In this article, we will break down:

  • What SCEP is and why it still matters
  • How NDES works in Microsoft PKI
  • Real-world deployment scenarios
  • Common mistakes and security risks
  • Best practices for modern enterprise environments

What is SCEP?

SCEP, or Simple Certificate Enrollment Protocol, is a protocol originally developed by Cisco to automate certificate enrollment for network devices that cannot easily join Active Directory.

Unlike traditional AD-based enrollment methods, SCEP allows devices to:

  • Request certificates using HTTP/HTTPS
  • Authenticate using a shared secret or challenge
  • Automatically retrieve signed certificates

SCEP was designed for devices such as:

  • Routers and switches
  • VPN gateways
  • Network appliances
  • IoT devices
  • Mobile devices

Over time, it has evolved into the de facto standard for certificate enrollment in device management platforms, including Microsoft Intune and many MDM solutions.

What is NDES?

NDES (Network Device Enrollment Service) is Microsoft’s implementation of SCEP.

It acts as a bridge between devices and the Microsoft Certification Authority, allowing devices that cannot authenticate via Active Directory to still obtain certificates securely.

In simple terms, this is how it works:

  1. Devices talk to NDES using SCEP
  2. NDES validates the request
  3. NDES submits the request to Microsoft CA
  4. The CA issued the certificate
  5. NDES delivers it back to the device

Without NDES, SCEP cannot be used with Microsoft ADCS.

Why NDES Still Matters in Modern PKI?

Some administrators assume SCEP is outdated because it was created decades ago. However, the opposite is true; SCEP usage has grown dramatically due to modern device management trends.

Let’s have a look at a couple of use cases where NDES is widely used:

1. Microsoft Intune Device Certificate Enrollment

Organizations deploying Intune often rely on NDES to issue, Device authentication certificates, Wi-Fi certificates, VPN certificates, Email authentication certificates, etc.

Without NDES, Intune cannot issue certificates from on-premises ADCS.

2. Client Authentication Certificates

NDES is commonly used to issue client authentication certificates for Windows Always-On VPN, Third-party VPN clients, Hybrid remote access architectures, etc.

This enables Passwordless VPN authentication tied to device identity.

3. IoT and Network Device Enrollment

NDES allows certificates to be issued to Printers, Cameras, Manufacturing systems, and Network devices

These devices often cannot join AD, making SCEP the only scalable option.

How NDES Works: Architecture Overview

A typical NDES deployment involves four components:

  1. The requesting device (MDM-managed or network device)
  2. The NDES server
  3. The Microsoft Certification Authority (CA)
  4. The certificate template is configured for SCEP
How NDES works
How NDES Works: Architecture Overview

The process works as follows:

Step 1: Device Requests Enrollment: The device contacts the NDES endpoint using SCEP.

Step 2: NDES Issues a Challenge Password: NDES generates a one-time password used to validate the request.

Step 3: Device Submits Certificate Request: The device submits its certificate request along with the challenge.

Step 4: NDES Submits to the CA: NDES forwards the request to the Microsoft CA using a designated template.

Step 5: Certificate is Issued: The CA signs the certificate and returns it to NDES.

Step 6: Device Retrieves Certificate: The certificate is delivered back to the requesting device.

Common NDES Misconfigurations Found in Security Assessments

In my experience during PKI Assessment, several recurring issues appear. Let’s talk about some of them today.

  1. NDES Exposed Directly to the Internet: NDES endpoints often run on IIS and may be published externally without protection. This allows attackers to attempt certificate enrollment, enumerate templates, and exploit IIS vulnerabilities. NDES should always be protected by Application gateways and role-based access rules.
  2. Over-privileged Service Accounts: NDES uses a service account to request certificates from the CA. If this account has excessive permissions, attackers could issue certificates themselves. This risk is particularly severe because certificates can be used for authentication.
  3. Weak Template Configuration: Templates used for SCEP are sometimes configured to allow exportable private keys, allow overly broad usage rights, and issue certificates without approval controls. These misconfigurations can lead to identity compromise.
  4. Lack of monitoring and logging: Many organizations deploy NDES but never monitor it. Without proper monitoring and logging, Rogue certificate issuance goes unnoticed, Enrollment abuse cannot be detected, and incident response becomes difficult.

Security Best Practices for NDES Deployments

To secure NDES in modern environments, organizations should follow several best practices.

1. Isolate NDES Servers

NDES should never be installed directly on the CA.

Instead, deploy it:

  • In a dedicated DMZ segment
  • Behind a reverse proxy or application gateway
  • With limited network access to the CA

2. Restrict Template Permissions

SCEP templates should:

  • Allow only required EKUs
  • Restrict subject name formats
  • Disable private key export when possible

3. Monitor Certificate Issuance

Organizations should:

  • Log SCEP requests
  • Monitor template usage
  • Alert on abnormal enrollment volumes

This is especially important for high-privilege templates.

4. Hardening IIS Configuration

Since NDES runs on IIS, it’s important to note the following:

  • Disable unused modules
  • Enforce TLS 1.2 or higher
  • Apply security headers
  • Regularly patch the server

For more details on security best practices for NDES deployment, refer blog: NDES Security Best Practices

Where SCEP and NDES Start to Show Limitations

Despite their widespread adoption, SCEP and NDES were not originally designed for today’s cloud-native environments.

Several challenges commonly arise in modern deployments:

Limited Security Context

SCEP was designed for simplicity, which means it provides limited identity validation capabilities. Additional controls must often be layered on top to ensure strong device authentication.

Operational Complexity

NDES deployments require:

  • Dedicated servers
  • IIS hardening
  • Network exposure considerations
  • Template configuration management
  • This introduces operational overhead, especially in hybrid or multi-cloud environments.
  • Scaling Challenges

While SCEP works well for endpoint devices, it is less suited for dynamic workloads such as containers, microservices, or ephemeral cloud instances. These modern workloads require faster certificate issuance cycles and stronger identity verification mechanisms.

The Modern Certificate Automation Framework: ACME

ACME, or Automated Certificate Management Environment, was developed to enable fully automated certificate lifecycle management with minimal human involvement.

Unlike SCEP, ACME was built for modern environments and supports:

  • Automated certificate issuance
  • Automated renewal
  • API-driven workflows
  • Identity verification mechanisms

ACME is widely used for public TLS certificates, but enterprises are increasingly adopting it internally for workload identities.

This makes it particularly valuable for:

  • DevOps pipelines
  • Kubernetes clusters
  • Cloud-native services
  • Service-to-service authentication

ACME’s support for short-lived certificates aligns well with Zero Trust principles.

Comparing SCEP, NDES, and ACME in Enterprise PKI

Each technology serves a different purpose. SCEP provides a simple enrollment protocol suited for endpoint devices. NDES enables Microsoft PKI environments to support SCEP-based enrollment. ACME introduces modern automation capabilities tailored to dynamic infrastructure. Organizations often use them together rather than choosing only one. For example:

  • SCEP/NDES for device certificates
  • ACME for server and workload certificates
  • Traditional AD enrollment for domain-joined systems

This layered approach allows enterprises to modernize gradually without disrupting existing infrastructure.

Enterprise PKI Services

Get complete end-to-end consultation support for all your PKI requirements!

Real-World Example: Hybrid Enterprise Deployment

Consider an enterprise adopting Zero Trust and migrating to the cloud simultaneously.

They might plan to deploy:

  • NDES integrated with Intune to manage device certificates
  • ACME-based issuance for container workloads
  • ADCS auto-enrollment for internal servers

This hybrid model enables them to maintain compatibility with legacy systems while modernizing certificate lifecycle management.

It also reduces reliance on passwords and strengthens identity-based access controls across the environment.

How to Choose the Right Enrollment Method

The right approach depends on the type of identities you are managing.

If your focus is on end-user devices or network appliances, SCEP with NDES remains practical and widely supported.

If your focus is on modern workloads or automation-heavy environments, ACME offers stronger integration and scalability.

Most enterprises will need both during their transition toward cloud-native security models.

The Future of Enterprise Certificate Enrollment

Certificate-based authentication is rapidly becoming the default mechanism for securing enterprise environments. As organizations move toward:

  • Passwordless authentication
  • Device identity enforcement
  • Zero Trust access models
  • Cloud-native architecture

Certificate automation becomes a core security capability rather than a niche PKI function.

SCEP and NDES will likely remain in use for device enrollment, while ACME adoption continues to grow for workload identities and infrastructure automation.

The key challenge for security teams is not choosing one protocol over another, but designing a PKI strategy that integrates them cohesively.

How can Encryption Consulting help?

Encryption Consulting has extensive experience delivering end-to-end PKI solutions for enterprise and government clients. We provide both professional services and our automation platform (CertSecure Manager) to ensure your PKI is secure, resilient, and future-ready.

PKI Services

End-to-end advisory, design, and implementation services to help organizations build, modernize, and govern secure Public Key Infrastructure environments.

Project Planning

We assess your cryptographic environment, review PKI configurations, dependencies, and requirements, and consolidate findings into a structured, customer-approved project plan.

CP/CPS Development

In the next phase, we develop Certificate Policy (CP) and Certification Practice Statement (CPS) aligned with RFC#3647. These documents are customized to your organization’s regulatory, security, and operational requirements.

PKI Design and Implementation

We design and deploy resilient PKI infrastructures, including offline Root CAs, issuing CAs, NDES servers, HSM integration, etc., depending on the customer’s needs. Deliverables include PKI design document, build guides, ceremony scripts, and system configurations. Once deployed, we conduct thorough testing, validation, fine-tuning, and knowledge transfer sessions to empower your team.

Business Continuity and Disaster Recovery

Following the deployment, we develop and implement business continuity and disaster recovery strategies, conduct failover testing, and document operational workflows for the entire PKI and HSM infrastructure, supported by a comprehensive PKI operations guide.

Ongoing Support and Maintenance (Optional)

After implementation, we offer a subscription-based yearly support package that provides comprehensive coverage for PKI, CLM, and HSM components. This includes incident response, troubleshooting, system optimization, certificate lifecycle management, CP/CPS updates, key archival, HSM firmware upgrades, audit logging, and patch management.

This approach ensures your PKI infrastructure is not only secure and compliant but also scalable, resilient, and fully aligned with your long-term operational and regulatory goals. 

Certificate Management

Prevent certificate outages, streamline IT operations, and achieve agility with our certificate management solution.

CertSecure Manager 

CertSecure Manager by Encryption Consulting is a certificate lifecycle management solution that simplifies and automates the entire lifecycle, allowing you to focus on security rather than renewals.

Automation for Short-Lived Certificates: With ACME and 90-day/47-day TLS certificates becoming the standard, manual renewal is no longer a practical option. CertSecure Manager automates enrolment, renewal, and deployment to ensure certificates never expire unnoticed.

Seamless DevOps & Cloud Integration: Certificates can be provisioned directly into Web Servers and cloud instances, and they integrate with modern logging tools like Datadog, Splunk, ITSM tools like ServiceNow, and DevOps tools such as Terraform and Ansible.

Multi-CA Support: Many organizations utilize multiple CAs (internal Microsoft CA, public CAs such as DigiCert and GlobalSign, etc.). CertSecure Manager integrates across these sources, providing a single pane of glass for issuance and lifecycle management.

Unified Issuance & Renewal Policies: CertSecure Manager enforces your organization’s key sizes, algorithms, and renewal rules consistently across all certificates, not just automating renewals with multiple CAs, but ensuring every certificate meets your security standards every time.

Proactive Monitoring & Renewal Testing: Continuous monitoring, combined with simulated renewal/expiry testing, ensures you identify risks before certificates impact production systems.

Centralized Visibility & Compliance: One consolidated dashboard displays all certificates, key lengths, strong and weak algorithms, and their expiry dates. Audit trails and policy enforcement simplify compliance with PCI DSS, HIPAA, and other frameworks.

If you’re still wondering where and how to get started with securing your PKI, Encryption Consulting is here to support you with its PKI Support Services. You can count on us as your trusted partner, and we will guide you through every step with clarity, confidence, and real-world expertise.  

Conclusion

Enterprise PKI is evolving from a backend security tool into a central identity infrastructure.

Understanding how SCEP, NDES, and ACME interact allows organizations to build scalable certificate management pipelines that support both legacy environments and modern cloud workloads.

By combining traditional PKI foundations with modern automation frameworks, enterprises can move toward stronger identity-driven security without sacrificing operational efficiency.