Skip to main content

Windows Certificate Install Policy

Updated yesterday

The Windows Certificate Install Policy allows administrators to deploy digital certificates to managed Windows devices.
This policy supports both BYOD and corporate-owned deployments and provides a secure, automated method to install certificates required for:

  • Wi-Fi authentication (e.g., WPA2-Enterprise / EAP-TLS)

  • VPN authentication

  • SSL inspection

  • Application authentication

  • Internal services and identity providers

By using this policy, organizations can eliminate manual certificate installation and ensure consistent, compliant device setup across their Windows fleet.

For example, here is how to use this policy to install an SCEP Profile from Okta to Windows Devices.


Requirements

  • Windows 10 or later


Overview

Digital certificates are essential for secure authentication and encrypted communication.
The Windows Certificate Install Policy pushes a certificate payload directly to the user or device certificate store via MDM.
This ensures:

  • No user interaction is required

  • Certificates are installed silently

  • Devices remain compliant with security and access requirements

  • Certificate-based network and app access works immediately after provisioning

This policy is especially useful for Zero Trust environments or organizations enforcing certificate-based identity.


Configurable Settings

Encoded Certificate

This field accepts your certificate in Base64-encoded format.

  • The certificate should be encoded using Base64 (PEM format).

  • The content typically begins with:

    -----BEGIN CERTIFICATE-----

    and ends with:

    -----END CERTIFICATE-----
  • Uploading the encoded certificate ensures it is delivered securely to the device through the Windows MDM channel.

Use cases include:

  • 802.1X Wi-Fi certificates

  • VPN client certificates

  • S/MIME certificates

  • Root CA certificates for trust

  • Intermediate CA chains

Note:
If your certificate includes a private key, ensure it is packaged securely—e.g., as a PFX with proper password protection (not all formats are supported in all Windows versions).


Best Practices

  • Use certificate deployment together with Windows Wi-Fi Policy or Windows VPN Policy for seamless authentication.

  • Deploy root and intermediate CA certificates before issuing individual device certificates.

  • For Wi-Fi/EAP-TLS environments, use certificate-based auth to prevent password sharing.

  • Keep certificates short-lived and rotate regularly for improved security.

  • Use device groups to target certificates by department, location, or function.


How to Configure

  1. Open the Swif Admin Console

  2. Navigate to Policies → Create New Policy

  3. Select Windows Certificate Install Policy

  4. Paste your Base64-encoded certificate into the field provided

  5. Click Continue

  6. Assign the policy to devices or device groups

  7. Save and apply

Devices will download and install the certificate during their next MDM sync.


Troubleshooting

Certificate does not appear on the device

  • Ensure the certificate is correctly Base64-encoded

  • Verify the device is running Windows 10+

  • Check for formatting issues (newlines, missing BEGIN/END headers)

  • Confirm the policy is assigned to the correct device group

Wi-Fi or VPN still fails after certificate installation

  • Confirm the certificate chain (root + intermediate) is installed

  • Ensure the Wi-Fi or VPN profile references the correct certificate

  • Check certificate validity and expiration

  • Confirm the certificate includes required key usages (e.g., Client Auth)

Did this answer your question?