When to use a User-Cert Group
- Corporate staff with MDM-enrolled laptops. Your MDM (Intune, Jamf, Workspace ONE) enrolls each device, generates a key pair, and installs a user certificate signed by your corporate PKI.
- Employees who roam between their own devices. A single user’s cert can be installed on their laptop and their tablet and their loaner machine. All three authenticate as the same user.
- Audiences where the user is the security principal — compliance and attribution happen at the human level, not the device level.
Typical User-Cert Groups
Each User-Cert Group maps to an Entra user group — usually a Security group populated by your identity team. Typical shapes:- Corporate Staff — mapped to an Entra group that contains every employee eligible for corporate Wi-Fi. Usually the broadest Group.
- Finance — mapped to the Entra Finance group. Attached Attribute Profile puts Finance users on a Finance-specific VLAN with extra controls.
- Engineering — mapped to the Engineering Entra group. Different VLAN, perhaps with additional egress rules enforced by the SGT in the Attribute Profile.
Prerequisites
- The Context has EAP-TLS enabled (Client Authentication Methods card) and Microsoft Entra ID as the Identity Store. See Entra connection.
- At least one Trusted CA is uploaded — see Trusted certificates.
- Users in scope have a per-user certificate installed that chains to one of those trusted CAs.
- The Entra group you want to map already exists.
Creating a User-Cert Group
Name and describe
Typically the Entra group’s purpose — Corporate Staff, Finance,
Engineering. Description should reference the Entra group for
audit reasons.
Pick the Entra Group
The Entra Group selector is populated from the Entra tenant
connected on the Identity Store. Pick the matching Entra group.
Save and attach an Attribute Profile
On Group Settings, attach the Attribute Profile that holds this
audience’s VLAN / SGT. See
Attribute Profiles.
How the cert is read
EntryPoint reads the user identity from a specific field in the client certificate. Most corporate PKI / MDM setups put the user’s UPN (or equivalent identifier) in one of:- The Subject Alternative Name (SAN) extension, as a
userPrincipalNameentry. - The Subject DN, in
CN=or a similar attribute.
Getting certs onto devices
EntryPoint does not issue certificates — that’s your PKI’s job. Typical flows for user-cert distribution:- MDM-issued. Your MDM enrolls the device, generates the key pair on-device (hardware-backed if possible), and installs a user cert signed by your corporate PKI. Intune is the common path for Entra- integrated tenants.
- Corporate PKI + manual install. For smaller fleets, your PKI team issues a per-user cert and IT pushes it plus the Wi-Fi profile.
- SCEP / NDES. A scalable auto-enrolment flavour of the MDM path — still runs in your infrastructure; EntryPoint only sees the final signed cert at authentication time.
User vs Device certs — picking correctly
It’s easy to mix up the two EAP-TLS Group types. Use this cue:- If the security story is “this person is allowed, on whichever machine they’re on” → User-Cert Group. The user’s cert roams between their devices.
- If the security story is “this device is allowed, whoever is sitting at it” → Device-Cert Group. The device’s cert is locked to the machine.
Day-to-day operations
- A new employee joins. Your identity team adds them to the Entra group and your MDM issues them a cert. They authenticate successfully on their next attempt — you don’t do anything on EntryPoint.
- An employee leaves. Your identity team removes them from the Entra group. Next auth → Access-Reject. Revoke the certificate in your PKI / MDM to close the hole fully; update the CRL and EntryPoint stops accepting the cert on next auth regardless of group membership.
- An employee changes teams. Move them from Engineering to Finance in Entra; EntryPoint follows on the next auth.
- A cert expires. Your MDM renews the cert on-device; the user is unaffected. If the renewal fails, their next auth is rejected until the cert is fresh.
Troubleshooting
- Chain-of-trust errors. The issuing CA isn’t uploaded on the Context, or the chain is incomplete (missing intermediate). Fix on Trusted certificates.
- “Principal not found in tenant.” The cert’s user identifier doesn’t resolve in the Entra tenant the Context connects to. Verify the UPN in the cert matches the user’s UPN in Entra.
- User authenticates but lands on the wrong VLAN. The Entra group membership maps to a different EntryPoint Group than you expected, or a Group’s Attribute Profile is misassigned. Start from the Context’s Audit Log and the Group’s Connected Devices tab.
- Everything was working yesterday. Has the Entra tenant secret on the Identity Store expired? Check Entra API Status on Entra connection.
Related
Entra group mapping
How the EntryPoint-to-Entra link is stored and resolved.
Device certificates & Intune
The device-as-principal counterpart.
Trusted certificates
Upload the CAs EntryPoint should validate against.
Attribute Profiles
VLAN / SGT per Group.

