Understanding Strong Certificate Mapping Enforcement by Microsoft

Strong Cert Mapping Enforcement Requirement

Are you prepared for the strong certificate mapping enforcement that Microsoft brings with its Feb 2025 patch Tuesday update for the Windows Server OS?

Microsoft introduced strong certificate mapping with the May 2022 patch Tuesday security update (KB5014754) for the Windows Server OS line to address vulnerabilities identified with certificate-based authentication. 

However, back then it was introduced in COMPATIBILITY mode, meaning for a certificate-based authentication without a strongly mapped certificate, the authentication was allowed to go through, but an event for the same was to be logged under Event 39 on your DCs under Kdcsvc (in System).

Event 39 on your DC under Kdcsvc (SYSTEM) will show auth requests that did not satisfied the strong cert ificate mapping enforcement

Now with the Feb 2025 patch Tuesday security update for the Windows Server OS line, we will see strong certificate mapping transitioning to FULL ENFORCEMENT mode. And with this server-side change as explained in detail in this MS article, certificate-based authentication will fail for client certificates without strong mapping.

What is Strong Certificate Mapping?

Using any identifiers generated or supplied by something outside the Kerberos KDC or the CA, which is the case for Intune SCEP certificates since the certificate details like CN and SAN are supplied in request by the Intune policy module, must be considered potentially attacker-controlled. Thus, they are a weak form of authentication and should no longer be used for identification purposes when Kerberos is involved.

Technically, before this change, certificate-based authentication would not account for a dollar sign ($) at the end of a machine name. This allowed related certificates to be emulated (spoofed) in various ways. Further, conflicts between User Principal Names (UPN) and sAMAccountName introduced other emulation (spoofing) vulnerabilities.

Strong certificate mapping requires certificates for a user or computer object to be strongly mapped to Active Directory (AD).

For this, a new certificate extension Object Identifier, OID 1.3.6.1.4.1.311.25.2 was added to the certificate used by ADCS that contained the principal’s (user or device) Security Identifier (SID) in Active Directory.

Initially, this could only be applied to the online certificate templates from ADCS, i.e., templates that were configured to build the Subject Name (CN) and Subject Alternate Name (SAN) from Active Directory information.

Offline templates, where the CN and SAN are supplied in the request, like what we do with SCEP certificates in Intune, couldn’t be strongly mapped as they do not build the information from AD, but with what is provided during the request by the requestor (Intune Policy Module). And it is this limitation that kept Microsoft from enforcing Strong Certificate Mapping even after introducing it with the May 2022 update. Instead, they kept going on with the COMPATIBILITY mode.

But in April 2023, Microsoft sorted out this limitation with a new mapping introduced as a preview to work with  KDCs running Windows Server Preview Build 25246 and later. This new mapping, which can be used for offline certificate requests, is a Subject Alternative Name (SAN) tag-based URI with the following format.

URL=tag:microsoft.com,2022-09-14:sid:<value>

In this SAN URI, “microsoft.com” and “2022-09-14” are hard-coded values. The requestor only needs to resolve the SID value for the user or device while making the certificate request and this suffices to meet the strong mapping criteria.

Thus at the end-user space, when a user or device presents a certificate for authentication in Active Directory, the KDC will check if the required mappings are present to verify if the certificate is strongly mapped and issued to the specific user or device that is requesting for auth, thereby protecting against certificate spoofing.

The ability to configure strong mapping in SCEP and PKCS certificates in Intune came with the October 2024 service release. Since then, Microsoft has provided this period of Nov 2024 – Feb 2025 for all the organizations to have transitioned to strongly mapped certificates to start enforcing it at the KDCs with the Feb 2025 patch Tuesday update.

MS Change Timeline

May 10, 2022Microsoft introduces strong certificate mapping in COMPATIBILITY mode. Was possible to revert this to DISABLED mode using Registry.
April 11, 2023Microsoft began Enablement Phase of strong certificate mapping by removing the DISABLED mode. Even if you have had the registry configured, the DC ignored the same and moved to COMPATIBILITY mode.
Feb 13, 2024Certificate mapping in Active Directory Users & Computers defaulted to selecting strong mapping using the X509IssuerSerialNumber instead of weak mapping using the X509IssuerSubject. The setting can still be changed as desired.
Oct, 2024Microsoft rolled out strong mapping for SCEP certificates in Intune for Windows, iOS and MacOS with Android support rolled out in the next month service release.
Feb 11, 2025Microsoft moves strong certificate mapping from COMPATIBILITY mode to FULL ENFORCEMENT mode by default, with an option to Opt-Out via registry, but it will be allowed only till Sept 2025 security update.
Sept 9, 2025Microsoft will make FULL ENFORCEMENT of strong certificate mapping MANDATORY without any exemption.

How does it affect Workplace IT?

Administrators unprepared for this change may incur outages for workloads using certificate-based authentication such as Always On VPN, Wi-Fi, and others, post having the DCs patched with the Feb 2025 update, because with this, all domain controllers will be switched to Full Enforcement mode and authentication requests using certificates without strong mapping will be denied in this configuration.

Mitigation

To conform with the said changes as introduced by Microsoft and mitigate its impact, it requires involvement from multiple teams within IT.

Active Directory Scope

The certificate-based authentication is to be performed by KDC so it’s important to check if the DC infrastructure is ready for strong mapping enforcement.

For certificate-strong mapping verification to work, you need to have all your DCs running Windows Server 2019 or above.

It is this aspect where most of the organizations will be caught off-guard. Though it is not a massive issue to overcome, but still something to plan for the upgrade and enact it. For more clarification on this requirement for upgrade, please refer to Support tip: Implementing strong mapping in Microsoft Intune certificates | Microsoft Community Hub

Thus, if you have DCs running on Windows Server OS below Windows Server 2019 and need time to plan and act on the upgrade, at this point, you only have two possibilities –

  1. Either delay the security patching for all of the DCs indefinitely, or
  2. Bypass the enforcement temporarily by using a registry patch on the DCs, making them still stay in the COMPATIBILITY mode which is Possible only till September 2025!

Now it’s not a good security practice to leave your DCs unpatched with the latest security update for an indefinite time. As such, the best way forward is to go with the Feb 2025 security updates, but as a post-patching activity, have the DCs immediately switch back to COMPATIBILITY mode by enabling the following registry key on all domain controllers.

Key: HKLM:\SYSTEM\CurrentControlSet\Services\Kdc
Name: StrongCertificateBindingEnforcement
Type: DWORD
Value: 1

As mentioned earlier, this is a temporary OPT-OUT and is going to work only till Sept 2025 as MS has announced so far. But this opt-out provides all the teams involved with enough timeline to plan and enact the transition.

Intune Scope

We deploy SCEP or PKCS certificates from Intune to the managed endpoints for the purpose of authentication so that the users can connect to protected WiFi/VPN/Ethernet from their managed devices. As such, it is important to check if the existing SCEP profile is configured for strong mapping.

The strong mapping capability in Intune was released back in Oct 2024, and to implement the same, you must add the OnpremisesSecurityIdentifier URI variable to the SAN in the SCEP profile.

Configuring SCEP profile in Intune for string certificate mapping. Add SAN URI {{OnPremisesSecurityIdentifier}} to satisfy the enforcement.

After you add the URI and value to the certificate profile, Microsoft Intune will append the SAN attribute with the tag and the resolved SID in the format as was mentioned earlier.

tag:microsoft.com,2022-09-14:sid:<value>

Strong mapped certificate as delivered by Intune SCEP profile. SAN contains URI tag microsoft.com,2022-09-14:sid:<value>

You can either make the change in your existing SCEP profiles (if they are already of type User) and increase the renewal threshold to have all the existing certificates renewed with new strong mapped certificates by Sept 2025, or you can plan to phase out the existing SCEP certificates with complete new SCEP profiles from Intune having the strong mapping configured.

It is important to note that for a cloud-only environment where devices are not bound to the Active Directory and it is only users being synced from AD to Entra ID, the strong mapping solution of Intune applies to only User certificates across all platforms. For device certificate type, it only applies to Microsoft Entra hybrid-joined Windows devices. 

For cloud-only devices, as in Entra ID joined Windows devices and all other platforms including iOS, Android, and MacOS, the resulting device objects are created in Entra ID and they don’t exist in AD. As such, certificate type of Device for all other platforms including Entra ID joined Windows devices from Intune cannot be strongly mapped.

Network Scope

The Intune SCEP certs are to be used by network services at the end of the day and as such, the network team also needs to be engaged throughout to check and validate if any configuration changes are required at their backend to accommodate the change in certificates.

Ending

In the end, it is important to understand that as per the change timeline shared above, Microsoft will no longer honor the opt-out registry settings and strictly enforce strong certificate mapping for all certificate-based authentication requests with the September 2025 security update for their Windows Server OS line.

Thus, it is of utmost importance to have your infrastructure ready to comply with the new requirements before it’s too late and you have users and devices stranded with cert-based authentication failures.

Resources

Strong Certificate Mapping Enforcement February 2025

Are you ready? In just a few short weeks(!) Microsoft will release the February 2025 security updates. This is a critical update because Microsoft plans to enable full enforcement of strong certificate mapping on Active Directory Domain Controllers (DCs) with this release. Administrators unprepared for this may incur outages for workloads using certificate-based authentication such…

KB5014754: Certificate-based authentication changes on Windows domain controllers

Update all servers that run Active Directory Certificate Services and Windows domain controllers that service certificate-based authentication with the May 10, 2022 update (see Compatibility mode). The May 10, 2022 update will provide audit events that identify certificates that are not compatible with Full Enforcement mode.

Support tip: Implementing strong mapping in Microsoft Intune certificates | Microsoft Community Hub

Be the first to comment

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.