Visit Smallstep at booth #2045 during RSAC 2026!

Connect Fleet DM to Smallstep

Smallstep can integrate with Fleet DM to deploy certificates to your Fleet-managed devices. Fleet has a native Smallstep integration that makes it easy to configure Dynamic SCEP for certificate enrollment.

In this document, we will configure your Fleet instance for use with your Smallstep team.

Requirements

You will need:

Client requirements:

  • For SCEP certificate enrollment, devices must be MDM-enrolled in Fleet
  • The Smallstep agent will need to reach the following domains:
    smallstep.com
    api.smallstep.com
    gateway.smallstep.com
    control.infra.smallstep.com
    *.[team-name].ca.smallstep.com
    auth.smallstep.com
    att.smallstep.com
    

Supported platforms:

  • macOS, iOS, iPadOS (via .mobileconfig profiles)
  • Windows (via .xml SyncML profiles)
  • Linux (via agent software deployment)

Step 1. Get a Fleet API token

Smallstep needs a Fleet API token to sync your device inventory. You can use a personal API token for testing, or create a dedicated API-only user for production use.

Option A: Use a personal API token

  1. In Fleet, click your profile icon in the top right and select My account
  2. Click Get API token
  3. Copy the token — you'll need it for the next step

For production use, we recommend creating a dedicated API-only user for the Smallstep integration rather than using a personal account token. An API-only user cannot log into the Fleet UI and is intended for automated integrations.

You'll need the fleetctl CLI tool installed and authenticated with admin privileges.

  1. Configure fleetctl with your Fleet server address:

    fleetctl config set --address 'https://fleet.example.com'
    
  2. Log in with your admin credentials:

    fleetctl login
    
  3. Create the API-only user:

    fleetctl user create --name 'Smallstep' \
      --email 'smallstep-api@example.com' \
      --password 'your-secure-password' \
      --api-only
    
  4. The command will output an API token:

    Success! The API token for your new user is: <TOKEN>
    

    Copy this token — you'll need it for the next step.

The default role for API-only users is Observer, which grants read-only access to hosts and device information. This is the appropriate permission level for Smallstep device sync.

Step 2. Connect Fleet to Smallstep

Now you'll add your Fleet API credentials to Smallstep.

  1. In the Smallstep console, go to Settings → Device Management
  2. Under Available Providers, find Fleet and click Connect
  3. Fill in the fields:
    • API Base URL: Your Fleet server URL (for example, https://fleet.example.com)
    • API Token: Paste the API token from the previous step
    • Name/Alias: An optional identifier for this connection (for example, Production Fleet)
  4. Click Connect MDM
  5. After connecting, temporarily save the following values:
    • SCEP URL (for example, https://your-team.scep.smallstep.com/p/agents/integration-fleet-abc123)
    • SCEP Challenge URL (for example, https://your-team.scep.smallstep.com/webhook/abc123-def4-5678-9abc-def012345678/challenge)
    • Challenge Username
    • Challenge Password
    • Under Authority Certificates, download the Root CA certificate.

Within a few minutes, you will see your Fleet devices in the Devices tab. Your Smallstep device inventory syncs from Fleet approximately every four hours.

Step 3. Add the Smallstep Certificate Authority in Fleet

Now we'll add the Smallstep SCEP credentials to Fleet.

  1. In Fleet, go to Settings (click your profile icon in the top right)
  2. Navigate to Integrations → Certificate authorities
  3. Click Add CA
  4. From the dropdown, select Smallstep
  5. Fill in the fields:
    • Name: A unique identifier using letters, numbers, and underscores only (for example, SMALLSTEP_AGENT). Fleet will create configuration profile variables with this name as a suffix.
    • SCEP URL: Paste the SCEP URL from Smallstep
    • Challenge URL: Paste the SCEP Challenge URL from Smallstep
    • Username: Paste the Challenge Username from Smallstep
    • Password: Paste the Challenge Password from Smallstep
  6. Click Add CA

Fleet will test the CA connection after you create it.

If you plan to use GitOps instead of the Fleet UI, skip this step and see the GitOps section below for the YAML-based alternative.

Step 4. Create SCEP configuration profiles

Fleet deploys certificates to devices using configuration profiles. You'll need to create profiles that include the SCEP payload with Fleet's dynamic variables.

Fleet provides these variables for Smallstep certificate enrollment:

VariableDescription
$FLEET_VAR_SMALLSTEP_SCEP_CHALLENGE_SMALLSTEP_AGENTThe dynamic SCEP challenge string
$FLEET_VAR_SMALLSTEP_SCEP_PROXY_URL_SMALLSTEP_AGENTThe SCEP proxy URL for certificate requests
$FLEET_VAR_SCEP_RENEWAL_IDA unique renewal identifier for the device
$FLEET_VAR_HOST_END_USER_EMAIL_IDPThe end user's email from the identity provider

If you used a different name when adding the CA in Fleet, replace SMALLSTEP_AGENT accordingly.

macOS/iOS SCEP profile (smallstep-agent.mobileconfig)

Create a file called smallstep-agent.mobileconfig with the following structure.

This profile contains three payloads:

  1. SCEP payload: Issues a provisional SCEP certificate that the Smallstep agent uses for bootstrapping into a Device Attested environment
  2. Root CA trust payload: Installs the Smallstep Agent Root CA so the agent can validate its certificate chain. To create this payload, open the downloaded .pem file in a text editor and copy the Base64-encoded certificate contents (everything between -----BEGIN CERTIFICATE----- and -----END CERTIFICATE-----, not including those lines) You will paste this value inside the <data> field of the Root CA trust payload below.
  3. Agent Configuration: A configuration payload for the Smallstep Agent that includes your Smallstep team slug.
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
<plist version="1.0">
<dict>
    <key>PayloadContent</key>
    <array>
        <!-- Payload 1: SCEP Certificate Enrollment -->
        <dict>
            <key>PayloadDisplayName</key>
            <string>Smallstep SCEP</string>
            <key>PayloadIdentifier</key>
            <string>com.smallstep.scep</string>
            <key>PayloadType</key>
            <string>com.apple.security.scep</string>
            <key>PayloadUUID</key>
            <string>C15F6CB6-473E-4B66-9B5B-A7B01C07152F</string>
            <key>PayloadVersion</key>
            <integer>1</integer>
            <key>PayloadContent</key>
            <dict>
                <key>Challenge</key>
                <string>$FLEET_VAR_SMALLSTEP_SCEP_CHALLENGE_SMALLSTEP_AGENT</string>
                <key>Key Type</key>
                <string>RSA</string>
                <key>Key Usage</key>
                <integer>5</integer>
                <key>Keysize</key>
                <integer>2048</integer>
                <key>Subject</key>
                <array>
                    <array>
                        <array>
                            <string>CN</string>
                            <string>step-agent-bootstrap</string>
                        </array>
                    </array>
                    <array>
                        <array>
                            <string>OU</string>
                            <string>$FLEET_VAR_SCEP_RENEWAL_ID</string>
                        </array>
                    </array>
                </array>
                <key>URL</key>
                <string>$FLEET_VAR_SMALLSTEP_SCEP_PROXY_URL_SMALLSTEP_AGENT</string>
            </dict>
        </dict>
        <!-- Payload 2: Smallstep Agent Root CA Trust -->
        <dict>
            <key>PayloadDisplayName</key>
            <string>Smallstep Agent Root CA</string>
            <key>PayloadIdentifier</key>
            <string>com.smallstep.root-ca</string>
            <key>PayloadType</key>
            <string>com.apple.security.pem</string>
            <key>PayloadUUID</key>
            <string>CCE7C356-A5DB-4796-86B5-E8DFAEA7F08E</string>
            <key>PayloadVersion</key>
            <integer>1</integer>
            <key>PayloadContent</key>
            <data>
            <!-- Paste the Base64-encoded Root CA certificate here -->
            </data>
        </dict>
        <!-- Payload 3: Smallstep Agent Settings -->
        <dict>
            <key>PayloadContent</key>
            <array>
                <dict>
                    <key>PayloadType</key>
                    <string>com.smallstep.Agent</string>
                    <key>PayloadVersion</key>
                    <integer>1</integer>
                    <key>PayloadIdentifier</key>
                    <string>com.smallstep.Agent.settings</string>
                    <key>PayloadUUID</key>
                    <string>EBEA31C0-C9A4-4862-A939-E16DA63DE35B</string>
                    <key>PayloadDisplayName</key>
                    <string>Smallstep Agent Settings</string>
                    <key>TeamSlug</key>
                    <string><team-slug></string>
                    <key>Certificate</key>
                    <string>mackms:label=step-agent-bootstrap;se=false;tag=</string>
                </dict>
            </array>
            <key>PayloadDisplayName</key>
            <string>Smallstep Agent</string>
            <key>PayloadIdentifier</key>
            <string>com.smallstep.Agent</string>
            <key>PayloadType</key>
            <string>Configuration</string>
            <key>PayloadUUID</key>
            <string>18F9A37B-AEDB-4D9E-808F-F946ACBF3A46</string>
            <key>PayloadVersion</key>
            <integer>1</integer>
        </dict>
    </array>
    <key>PayloadDisplayName</key>
    <string>Smallstep Certificate</string>
    <key>PayloadIdentifier</key>
    <string>com.smallstep.certificate-profile</string>
    <key>PayloadType</key>
    <string>Configuration</string>
    <key>PayloadUUID</key>
    <string>AD981C97-F3F4-41D8-996A-9DE254012810</string>
    <key>PayloadVersion</key>
    <integer>1</integer>
</dict>
</plist>
  • If you used a different CA name in Fleet, replace SMALLSTEP_AGENT in the variable names accordingly.
  • Replace the <team-slug> value with your Smallstep team slug

Windows SCEP profile (smallstep-scep.xml)

For Windows devices, create a file called smallstep-scep.xml using the SyncML format. This profile mirrors the macOS profile above, enrolling a SCEP certificate and trusting the Smallstep Agent Root CA.

To get the CA Thumbprint, go to Certificate Manager → Authorities, click View details on the Agents authority, and copy the Root Fingerprint (SHA-256).

<Replace>
    <Item>
        <Target>
            <LocURI>./Device/Vendor/MSFT/ClientCertificateInstall/SCEP/$FLEET_VAR_SCEP_WINDOWS_CERTIFICATE_ID</LocURI>
        </Target>
        <Meta>
            <Format xmlns="syncml:metinf">node</Format>
        </Meta>
    </Item>
</Replace>
<Replace>
    <Item>
        <Target>
            <LocURI>./Device/Vendor/MSFT/ClientCertificateInstall/SCEP/$FLEET_VAR_SCEP_WINDOWS_CERTIFICATE_ID/Install/KeyUsage</LocURI>
        </Target>
        <Meta>
            <Format xmlns="syncml:metinf">int</Format>
        </Meta>
        <Data>160</Data>
    </Item>
</Replace>
<Replace>
    <Item>
        <Target>
            <LocURI>./Device/Vendor/MSFT/ClientCertificateInstall/SCEP/$FLEET_VAR_SCEP_WINDOWS_CERTIFICATE_ID/Install/KeyLength</LocURI>
        </Target>
        <Meta>
            <Format xmlns="syncml:metinf">int</Format>
        </Meta>
        <Data>2048</Data>
    </Item>
</Replace>
<Replace>
    <Item>
        <Target>
            <LocURI>./Device/Vendor/MSFT/ClientCertificateInstall/SCEP/$FLEET_VAR_SCEP_WINDOWS_CERTIFICATE_ID/Install/HashAlgorithm</LocURI>
        </Target>
        <Meta>
            <Format xmlns="syncml:metinf">chr</Format>
        </Meta>
        <Data>SHA-1</Data>
    </Item>
</Replace>
<Replace>
    <Item>
        <Target>
            <LocURI>./Device/Vendor/MSFT/ClientCertificateInstall/SCEP/$FLEET_VAR_SCEP_WINDOWS_CERTIFICATE_ID/Install/SubjectName</LocURI>
        </Target>
        <Meta>
            <Format xmlns="syncml:metinf">chr</Format>
        </Meta>
        <Data>CN=step-agent-bootstrap,OU=$FLEET_VAR_SCEP_RENEWAL_ID</Data>
    </Item>
</Replace>
<Replace>
    <Item>
        <Target>
            <LocURI>./Device/Vendor/MSFT/ClientCertificateInstall/SCEP/$FLEET_VAR_SCEP_WINDOWS_CERTIFICATE_ID/Install/EKUMapping</LocURI>
        </Target>
        <Meta>
            <Format xmlns="syncml:metinf">chr</Format>
        </Meta>
        <Data>1.3.6.1.5.5.7.3.2</Data>
    </Item>
</Replace>
<Replace>
    <Item>
        <Target>
            <LocURI>./Device/Vendor/MSFT/ClientCertificateInstall/SCEP/$FLEET_VAR_SCEP_WINDOWS_CERTIFICATE_ID/Install/ServerURL</LocURI>
        </Target>
        <Meta>
            <Format xmlns="syncml:metinf">chr</Format>
        </Meta>
        <Data>$FLEET_VAR_SMALLSTEP_SCEP_PROXY_URL_SMALLSTEP_AGENT</Data>
    </Item>
</Replace>
<Replace>
    <Item>
        <Target>
            <LocURI>./Device/Vendor/MSFT/ClientCertificateInstall/SCEP/$FLEET_VAR_SCEP_WINDOWS_CERTIFICATE_ID/Install/Challenge</LocURI>
        </Target>
        <Meta>
            <Format xmlns="syncml:metinf">chr</Format>
        </Meta>
        <Data>$FLEET_VAR_SMALLSTEP_SCEP_CHALLENGE_SMALLSTEP_AGENT</Data>
    </Item>
</Replace>
<Replace>
    <Item>
        <Target>
            <LocURI>./Device/Vendor/MSFT/ClientCertificateInstall/SCEP/$FLEET_VAR_SCEP_WINDOWS_CERTIFICATE_ID/Install/CAThumbprint</LocURI>
        </Target>
        <Meta>
            <Format xmlns="syncml:metinf">chr</Format>
        </Meta>
        <Data>YOUR_ROOT_CA_SHA256_FINGERPRINT</Data>
    </Item>
</Replace>
<Exec>
    <Item>
        <Target>
            <LocURI>./Device/Vendor/MSFT/ClientCertificateInstall/SCEP/$FLEET_VAR_SCEP_WINDOWS_CERTIFICATE_ID/Install/Enroll</LocURI>
        </Target>
    </Item>
</Exec>
  • Replace YOUR_ROOT_CA_SHA256_FINGERPRINT with the Root Fingerprint from the Smallstep Agents authority.
  • If you used a different CA name in Fleet, replace SMALLSTEP_AGENT in the variable names accordingly.

Windows Root CA profile (smallstep-root-ca.xml)

To install the Smallstep Agent Root CA on Windows, create a second file called smallstep-root-ca.xml using the RootCATrustedCertificates CSP:

<Replace>
    <Item>
        <Target>
            <LocURI>./Device/Vendor/MSFT/RootCATrustedCertificates/Root/YOUR_ROOT_CA_SHA256_FINGERPRINT/EncodedCertificate</LocURI>
        </Target>
        <Meta>
            <Format xmlns="syncml:metinf">b64</Format>
        </Meta>
        <Data>
        <!-- Paste the Base64-encoded Root CA certificate here -->
        </Data>
    </Item>
</Replace>

Step 5. Deploy the configuration profiles and Smallstep agent

Upload profiles

  1. In Fleet, go to Controls → OS settings → Custom settings
  2. Click Add profile
  3. Upload your smallstep-agent.mobileconfig file (for macOS/iOS) or your .xml files (for Windows)
  4. Assign the profile to your desired scope (teams or all devices)

The profiles will be deployed to devices at their next check-in. Fleet will automatically substitute the variables with the appropriate values for each device.

Deploy the agent

The last step is to deploy the Smallstep agent to your endpoints. The agent manages certificates and makes it easy to configure endpoints.

You can deploy the agent using Fleet's software deployment feature:

  1. Download the agent package:
  2. In Fleet, go to Software, choose Custom Package, and add the package for distribution

Alternatively, you can use a separate software management system such as Munki to deploy the agent. See the Smallstep Agent manual installation guide for detailed instructions.

Linux agent configuration

Linux does not support MDM configuration profiles, so the SCEP enrollment flow used for macOS and Windows does not apply. Instead, the Smallstep agent on Linux registers directly using TPM attestation. After installing the agent package, you must configure it with your Smallstep team slug and CA fingerprint.

When adding a Linux agent package in Fleet, add the following post-install script to configure and start the agent:

#!/bin/bash

# Configure the Smallstep agent
mkdir -p /etc/step-agent
cat > /etc/step-agent/agent.yaml << EOF
team: "<your-team-slug>"
fingerprint: "<your-agents-ca-fingerprint>"
EOF

# Enable and start the agent service
systemctl daemon-reload
systemctl enable --now step-agent

Replace <your-team-slug> with your Smallstep team slug (found in Settings → Team), and <your-agents-ca-fingerprint> with the SHA-256 root fingerprint of your Smallstep Agents authority (found in Certificate Manager → Authorities under the Agents authority).

If your fleet includes multiple Linux distributions or architectures, create separate software entries for each package variant. Use Fleet labels to target .deb packages to Debian/Ubuntu hosts and .rpm packages to RHEL/Fedora hosts. See the GitOps section for a complete example with label targeting.

After deployment, Linux devices will self-register with your Smallstep team via TPM attestation. By default, new devices require admin approval in the Smallstep console. To automate approval, you can pre-register devices via API.

GitOps: Configure Fleet with fleetctl

As an alternative to Steps 3 through 5, you can manage your entire Fleet configuration with YAML files and the fleetctl gitops command. This approach is ideal for version-controlled, repeatable deployments.

Directory layout

A typical GitOps repository for Fleet looks like this:

fleet-gitops/
├── default.yml
├── teams/
│   └── team.yml
└── lib/
    ├── smallstep-agent.mobileconfig
    ├── smallstep-scep.xml
    ├── smallstep-root-ca.xml
    └── smallstep-agent-setup.sh
  • default.yml — Organization-wide settings, including certificate authorities
  • teams/team.yml — Per-team configuration for profiles and software
  • lib/ — Configuration profile files created in Step 4 and Linux agent setup script

Add the Smallstep CA

In default.yml, add the Smallstep certificate authority under org_settings:

org_settings:
  certificate_authorities:
    smallstep:
      - name: SMALLSTEP_AGENT
        url: <SCEP URL from Smallstep>
        challenge_url: <SCEP Challenge URL from Smallstep>
        username: $SMALLSTEP_CHALLENGE_USERNAME
        password: $SMALLSTEP_CHALLENGE_PASSWORD

The $SMALLSTEP_CHALLENGE_USERNAME and $SMALLSTEP_CHALLENGE_PASSWORD values are environment variables. Set them before running fleetctl gitops:

export SMALLSTEP_CHALLENGE_USERNAME='your-challenge-username'
export SMALLSTEP_CHALLENGE_PASSWORD='your-challenge-password'

Add configuration profiles

In your team YAML file, reference the profile files from Step 4:

controls:
  macos_settings:
    custom_settings:
      - path: ../lib/smallstep-agent.mobileconfig
  windows_settings:
    custom_settings:
      - path: ../lib/smallstep-scep.xml
      - path: ../lib/smallstep-root-ca.xml

Add the Smallstep agent software

In the same team YAML file, add the Smallstep agent packages:

software:
  packages:
    - url: https://packages.smallstep.com/stable/darwin/step-agent-plugin_latest.pkg
    - url: https://packages.smallstep.com/stable/windows/step-agent-plugin_latest_amd64.msi
    - url: https://packages.smallstep.com/stable/linux/step-agent-plugin_amd64_latest.deb
      post_install_script:
        path: ../lib/smallstep-agent-setup.sh
    - url: https://packages.smallstep.com/stable/linux/step-agent-plugin_x86_64_latest.rpm
      post_install_script:
        path: ../lib/smallstep-agent-setup.sh

If your Linux fleet includes multiple architectures, add entries for each variant and use labels_include_any to target the correct package to each host:

    - url: https://packages.smallstep.com/stable/linux/step-agent-plugin_amd64_latest.deb
      post_install_script:
        path: ../lib/smallstep-agent-setup.sh
      labels_include_any:
        - Ubuntu Linux
    - url: https://packages.smallstep.com/stable/linux/step-agent-plugin_arm64_latest.deb
      post_install_script:
        path: ../lib/smallstep-agent-setup.sh
      labels_include_any:
        - Ubuntu Linux
    - url: https://packages.smallstep.com/stable/linux/step-agent-plugin_x86_64_latest.rpm
      post_install_script:
        path: ../lib/smallstep-agent-setup.sh
      labels_include_any:
        - Red Hat Linux
    - url: https://packages.smallstep.com/stable/linux/step-agent-plugin_aarch64_latest.rpm
      post_install_script:
        path: ../lib/smallstep-agent-setup.sh
      labels_include_any:
        - Red Hat Linux

Adapt the label names to match your Fleet label configuration. Fleet includes built-in labels for common Linux distributions. For architecture-specific targeting, you can create custom labels using osquery queries (for example, SELECT 1 FROM system_info WHERE cpu_type = 'x86_64').

Apply the configuration

Run fleetctl gitops to apply the configuration:

fleetctl gitops -f default.yml -f teams/team.yml

Use --dry-run to validate your configuration before applying:

fleetctl gitops -f default.yml -f teams/team.yml --dry-run

The --dry-run flag is useful for CI pipelines. You can run it on pull requests to validate configuration changes before merging.

Confirmation

To confirm certificate deployment:

  1. In Fleet, go to Hosts and select a device that received the profile
  2. Check the OS settings status to verify the profile was applied successfully
  3. In the Smallstep console, go to Devices to verify the device has enrolled and received a certificate

On the device itself:

  • macOS: Open Keychain Access and look for a certificate issued by your Smallstep authority
  • iOS/iPadOS: Go to Settings → General → VPN & Device Management to view installed profiles
  • Windows: Open certmgr.msc and check the Personal certificates store
  • Linux: Run sudo systemctl status step-agent to verify the agent is running, and check /var/lib/step-agent for certificate files

Last updated on February 5, 2026