Configure your endpoints for Smallstep Enterprise Relay
Before you begin
To create your Relay server, you will need to give Smallstep the following information:
- Relay Region. The GCP region for the relay, eg.
US_CENTRAL1 - Relay Trust Bundle (optional). This will be used by the Relay to verify client certificates. This bundle needs to include both Root and Intermediate CA certificates for any CAs you want your Relay to trust. By default, your team's Smallstep Accounts Root and Intermediate CAs are trusted.
- Relay Issuing Authority (optional). The CA that will issue the Relay's server TLS certificate. This must be a Smallstep CA in your team. By default, your team's Smallstep Workloads CA is used.
Once we have your details, Smallstep will create your relay server and respond with a Relay URL, which you’ll need for configuring clients.
Typical Client Configuration
On Apple platforms, a typical client could be configured as follows:
- Workloads CA Trust: The Relay’s server certificate is issued by your team’s Workloads CA. Therefore, the client must trust your team's Workloads Root CA to connect to the relay. You can download the Workloads Root CA certificate from your Authorities page.
- Accounts CA Trust: To obtain its client certificate, the client must trust your team's Smallstep Accounts Root CA You can download the Accounts Root CA certificate from your Authorities page.
- Client Certificate: An ACMECertificate MDM payload is used to obtain a client certificate for accessing the Relay.
- Relay Configuration: The Relay is configured using a Relay MDM payload
Example: Jamf Pro Configuration Profile
In this example, we’ll use Jamf Pro to configure endpoints connecting to a Smallstep Relay.
In the Smallstep console:
- Visit Authorities
- Select the Smallstep Accounts authority
- Download the Root Certificate
- Under the Provisioners section of the page, choose the provisioner named
acme-da - Temporarily save the URL shown on the page, eg.
https://accounts.example.ca.smallstep.com/acme/acme-da/directory
- Return to Authorities
- Select the Smallstep Workloads authority
- Download the Root Certificate
In Jamf Pro:
- Choose 🖥️ Computers
- Under the Content Management tab, choose Configuration Profiles
- Add a new Configuration Profile
- Choose Options → General
- Name: Smallstep
- For ACME CA trust, add a Certificate payload
- Certificate Name: Smallstep Accounts Authority
- Certificate Option: Upload
- Certificate Upload: (upload the Accounts Root CA certificate)
- Allow all apps access: ☑️
- For Relay server trust, add a Certificate payload
- Certificate Name: Smallstep Workloads Authority
- Certificate Option: Upload
- Certificate Upload: (upload the Workloads Root CA certificate)
- Allow all apps access: ☑️
- Add a ACMECertificate Payload
- URL: (paste the ACME provisioner URL you saved earlier)
- Name: Smallstep
- Redistribute Profile: 7 days
- Key Size:
384 - Key Type:
ECSECPrimeRandom - Client Identifier:
$SERIALNUMBER - Subject:
/CN=$SERIALNUMBER/L=$PROFILEIDENTIFIER - Hardware Bound: ✅
- Attest: ✅
- Key Usage:
0xB - Extended Key Usage:
1.3.6.1.5.5.7.3.2
- Add a Relay payload
- Relays: Add the URL for your Smallstep Enterprise Relay
- Match domains: Up to you
- Exclude domains: Up to you
- Choose Options → General
Last updated on December 16, 2025
Introducing
Device Identity
Ensure that only company-owned devices can access your enterprise's most sensitive resources.