Internal website shows as "Not Secure" on Azure AD joined devices but secure on Hybrid (Domain + Azure AD) joined devices

Vishal Kumar 0 Reputation points
2025-10-24T15:46:42.9433333+00:00

Hi,

In my organization, we have a mix of devices:

Some are Azure AD joined only

Some are Hybrid joined (both Azure AD and on-prem domain joined)

I’ve deployed an internal website and issued an internal SSL certificate for it.

Here’s the issue I’m facing:

On Hybrid joined devices, the website shows as secure (with a valid certificate).

On Azure AD joined only devices, the same website shows as “Not Secure.”

I’ve verified that the internal certificate is trusted on the hybrid devices, but apparently not on Azure AD joined devices.

My questions are:

Is this behavior related to the fact that the devices are not domain joined (i.e., they’re missing the internal CA trust)?

If yes, what’s the recommended way to make the internal website certificate trusted on Azure AD joined devices as well?

Should I distribute the root CA certificate through Intune or Group Policy?

  Or is there any other Microsoft-recommended approach for this scenario?
  

Thanks in advance for your help!


Azure App Configuration
Azure App Configuration
An Azure service that provides hosted, universal storage for Azure app configurations.
0 comments No comments
{count} votes

1 answer

Sort by: Most helpful
  1. Jerald Felix 7,520 Reputation points
    2025-10-24T15:57:57.8133333+00:00

    Hello Vishal Kumar,

    This is a classic certificate trust issue in mixed Azure AD environments. The internal SSL certificate for your website is trusted on hybrid-joined devices because they sync the root CA from your on-premises Active Directory (via Group Policy), but Azure AD-joined-only devices don't have that automatic trust chain since they're not domain-joined. That's why the site shows "Not Secure" on those devices—the browser can't validate the cert against the internal root CA.

    Yes, this is directly related to the lack of domain join, which means no GPO for CA distribution. The recommended Microsoft approach for Azure AD-joined devices is to deploy the root (and any intermediate) CA certificates via Microsoft Intune, as it handles modern management without needing on-prem dependencies. Group Policy won't apply to pure Azure AD-joined devices anyway, so Intune is the way to go for consistency. Here's how to do it step by step:

    Prepare the Certificate: Export your internal root CA certificate (in .cer or .crt format) from the issuing CA server. Include any intermediates if your chain has them. Don't include the private key—just the public cert.

    Deploy via Intune:

    Sign in to the Microsoft Intune admin center (endpoint.microsoft.com).

      Go to Devices > Configuration profiles > Create profile.
      
         Select Platform: Windows 10 and later, Profile type: Templates > Trusted certificate.
         
            In the Basics tab, name it something like "Internal Root CA Trust."
            
               Under Configuration settings:
               
                     Certificate type: Root certificate for server validation (for website trust) or also Client authentication if needed.
                     
                           Upload your .cer file for the root CA.
                           
                                 Subject name: Match your CA's subject (e.g., CN=YourInternalCA).
                                 
                                       Deploy to the relevant device groups (e.g., all Azure AD-joined devices).
                                       
                                          Assign the profile to your target user or device groups, and set it to monitor deployment status.
                                          
                                          **Verify and Test**:
                                          
                                             After deployment (it can take up to 8 hours, but usually faster), restart devices or run `gpupdate /force` if testing manually.
                                             
                                                On a test Azure AD-joined device, open certmgr.msc, go to Trusted Root Certification Authorities > Certificates, and confirm your CA is listed.
                                                
                                                   Clear browser cache and revisit the site—it should now show as secure.
                                                   
    

    If your environment uses SCEP or PKCS for automated cert issuance, you could extend that via Intune for more dynamic management, but for a simple internal site, the trusted cert profile is sufficient and aligns with Microsoft's guidance for cloud-only devices. Avoid manual installs, as they're not scalable.

    I hope it will help you to solve the issue.

    Best Regards,

    Jerald Felix

    0 comments No comments

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.