Download presentation
Presentation is loading. Please wait.
Published byCharlotte O’Neal’ Modified over 9 years ago
1
November, 2013 XenMobile 8.6 MDM Edition Mobile Device Management Adolfo Montoya, Karen Sciberras, George Ang and Andrew Sandford Lead Support Readiness Specialist
2
© 2013 Citrix | Confidential – Do Not Distribute Document Management CategoryTracking Information Company:Citrix Systems, Inc. Author(s):Adolfo Montoya Owner(s):Worldwide Support Readiness Last modified:11/22/2013 Version:1.0 Length:4 hours
3
© 2013 Citrix | Confidential – Do Not Distribute Ground Rules Introduce yourself Expect FULL participation! We will use Polls on GoToTraining Please raise your hand for questions or comments on GoToTraining Type comments and questions in Chat window I will check your work by making you presenter… be ready! I will call you by name
4
© 2013 Citrix | Confidential – Do Not Distribute Objectives 4 At the end of this course, you will be able to : Module 1: Verify iOS 7 MDM Policies Configure and test some of the new iOS 7 restrictions policies Module 2: Deploy XenMobile Mail Manager for ActiveSync Filtering Install XenMobile Mail Manager Configure and test XenMobile Mail Manager to filter ActiveSync traffic against Exchange Server 2010 Module 3: Integrate XenMobile Device Manager and NetScaler via SSL Offload Configure SSL Offload on NetScaler to load balance HTTP connections to Device Manager server Verify that mobile devices (e.g. iOS/Android) can enroll successfully
5
© 2013 Citrix | Confidential – Do Not Distribute Objectives 5 Module 4: Integrate XenMobile Device Manager with Microsoft PKI Setup Client Certificate authentication on Windows Configure Client Certificate authentication with XenMobile Device Manager Configure Exchange Server 2010 for Client Certificate authentication Verify mobile devices can enroll and test Client Certificate authentication and access their mailbox Module 5: Learn Samsung KNOX and Amazon MDM Policies Learn and configure new Samsung KNOX and Amazon MDM restriction policies
6
© 2013 Citrix | Confidential – Do Not Distribute Assessment 6 There would be an assessment at the end of the course, covering the following modules: Module 1: Verify iOS 7 MDM Policies Module 2: Deploy XenMobile Mail Manager for ActiveSync Filtering Module 3: Integrate XenMobile Device Manager and NetScaler via SSL Offload Module 4: Integrate XenMobile Device Manager with Microsoft PKI Module 5: Learn Samsung KNOX and Amazon MDM Policies
7
Module 1: Verify iOS 7 MDM Policies
8
© 2013 Citrix | Confidential – Do Not Distribute iOS7 Highlights FeatureDescription Per App VPNManaged apps can initiate a per App VPN tunnel. OpenIn Document ControlRestrict opening of documents in managed apps and accounts. Enterprise SSOSingle Sign On experience for enterprise resources that requires Kerberos authentication. Silent Install/UnInstallOnly applicable to supervised iOS devices. New Volume Purchase Program (VPP) service Workflow based VPP Registration Revoke and Re-Issue VPP licenses Auto Configure AppsPush and auto configure iOS7 apps. Restrictions Prevent device unlock via biometric scanning Prevent document transfer via AirDrop Prevent password syncing via iCloud … (many others) Prevent App UnInstallOnly applicable to supervised iOS devices.
9
© 2013 Citrix | Confidential – Do Not Distribute iOS7 Policies in XenMobile 8.6
10
© 2013 Citrix | Confidential – Do Not Distribute Per App VPN
11
© 2013 Citrix | Confidential – Do Not Distribute OpenIn Doc. Control
12
Module 2: Deploy XenMobile Mail Manager for ActiveSync Filtering
13
© 2013 Citrix | Confidential – Do Not Distribute Introduction The XenMobile Mail Manager (XMM) allows you to utilize XDM to gain Dynamic Access Control for Exchange Active Sync (EAS) devices. Here are some of the features: To access EAS device partnership information provided by exchange. To perform an EAS Wipe on a mobile device. To access information about Blackberry devices, and To perform control operations such as Wipe, and Password Reset.
14
© 2013 Citrix | Confidential – Do Not Distribute XMM Components The XenMbile Mail Manager (XMM) consist of three main components: Exchange ActiveSync (EAS) Access Control Management: Communicates with Device Manager to retrieve EAS policies from Device Manager, and then merges this policy with any locally defined policy to determine which EAS devices that should be allowed or denied access to Exchange. Local policies allows extending the policy rules to allow access control by AD Group, User, Device Type, or Device User Agent Remote Powershell Management: Responsible for scheduling and invoking remote PowerShell commands to enact the policy compiled by EAS Access Control Management. Mobile Service Provider: Provides a web service interface so that Device Manager can query EAS and/or Blackberry devices, and issue control operations such as Wipe against them.
15
© 2013 Citrix | Confidential – Do Not Distribute XMM Components
16
© 2013 Citrix | Confidential – Do Not Distribute System and Software Requirements ComponentRequirement Server Software MS SQL or MS SQL Express 2008/2012 Microsoft.NET Framwork 4.5 Exchange Server 2010 SP2 or higher, OR Exchange 2013 MS Office 365 Blackberry Enterprise Service v5 (optional) Server Machine Requirements Windows Management Framework must be installed PowerShell V2 supported The PowerShell execution policy must be set to RemoteSigned by running “Set-ExecutionPolicy RemoteSigned” from the PowerShell command prompt. Memory1 GB HDDNTFS-formatted with 150 MB disk space
17
© 2013 Citrix | Confidential – Do Not Distribute Permissions If you are using the XMM with an onsite Exchange Server, you will need to ensure the minimum permissions specified in the Exchange Configuration Management Console must be allowed to execute the following Exchange- specific PowerShell commands: Get-CASMailbox Set-CASMailbox Get-Mailbox Get-ActiveSyncDevice Get-ActiveSyncDeviceStatistics Clear-ActiveSyncDevice
18
© 2013 Citrix | Confidential – Do Not Distribute Before Installation… Ensure that the following conditions are met:.NET Framework 4.5 SQL Server (one of the following): MS SQL 2008 MS SQL 2008 Express MS SQL 2012 MS SQL 2012 Express MS SQL 2012 Express\LocalDB XMM “one LDAP Per Domain” Caveat XMM supports only one LDAP configuration per-installation. If you want to manage the traffic of more than one LDAP configuration (such as the root domain, sub-domain), you will need to install XMM for each domain.
19
© 2013 Citrix | Confidential – Do Not Distribute Installation
20
© 2013 Citrix | Confidential – Do Not Distribute Installation
21
© 2013 Citrix | Confidential – Do Not Distribute Installation
22
© 2013 Citrix | Confidential – Do Not Distribute Installation
23
© 2013 Citrix | Confidential – Do Not Distribute Configuring XMM You can use the XMM Configuration utility to extend the capabilities of XDM to perform the following configuration: Create access control rules that can either allow of block Exchange ActiveSync (EAS) devices from accessing Exchange services. Build dynamic and statics rules that enforce corporate email policies, allowing you to block those users in violation. Perform an EAS wipe out of compliance devices
24
© 2013 Citrix | Confidential – Do Not Distribute To configure the Exchange Server
25
© 2013 Citrix | Confidential – Do Not Distribute To configure the Exchange Server
26
© 2013 Citrix | Confidential – Do Not Distribute To configure the Database Properties
27
© 2013 Citrix | Confidential – Do Not Distribute To configure the Database Properties
28
© 2013 Citrix | Confidential – Do Not Distribute To configure the Mobile Service Provider (MSP)
29
© 2013 Citrix | Confidential – Do Not Distribute To configure the Mobile Service Provider (MSP) hostname in Device Manager
30
© 2013 Citrix | Confidential – Do Not Distribute XMM and Exchange ‘Quarantine’ Mode XMM when configured in conjunction with MS Exchange ‘Quarantine’ mode, will allow the Exchange Admin to quarantine a user’s device until that device can be determined to be compliant In Exchange quarantine mode, a user’s email inbox is blocked, but the user can still see their calendar, appointments, and contacts.
31
© 2013 Citrix | Confidential – Do Not Distribute Understanding XMM Access Rules XenMobile Mail Manager allows you to configure three types of rules: Default Local XDM (rules from Device Manager)
32
© 2013 Citrix | Confidential – Do Not Distribute XMM Access Rules – Default Rules Default access control rules serve as a “catch-all” rule that can be set to allow or deny a device that does not meet the criteria of either the XDM rules or local rules. The Default Rule’s desired state may be set to Allow, Block, or Unchanged. If “Unchanged” is selected, the effect will be that XMM will not modify the state of any devices that are not matched explicitly by a Local or XDM rule.
33
© 2013 Citrix | Confidential – Do Not Distribute To configure Default access rules
34
© 2013 Citrix | Confidential – Do Not Distribute XMM Access Rules – Local Rules Local rules are defined within XenMobile Mail Manager. Local rules can be configured to allow or block based on any of the following properties: ActiveSync Device Id – Uniquely identifies a specific device. Device Type – A set of devices, such as “iPad”, “WP8”, or “Touchdown”. User Agent – A set of devices identified by platform version, such as “iOS/6.1.2”. User – A specific user.
35
© 2013 Citrix | Confidential – Do Not Distribute To configure Local rules
36
© 2013 Citrix | Confidential – Do Not Distribute XMM Access Rules – XDM rules XDM rules are defined within XenMobile Device Manager. These rules are delivered to XenMobile Mail Manager and continuously updated. XDM rules can identify devices by properties known to XDM, such as: Enrolled in Device Manager Jailbroken (iOS) or rooted (Android) devices Forbidden Apps are installed (blacklisted apps) Non-suggested apps are installed Unmanaged Out Of Compliance Non-Compliant Password Revoked status Inactive Device Anonymous status
37
© 2013 Citrix | Confidential – Do Not Distribute To configure XDM rules
38
Module 3: Integrate XenMobile Device Manager and NetScaler via SSL Offload
39
© 2013 Citrix | Confidential – Do Not Distribute Pre Nike Deployment – SSL Bridge SSL3 00100011 0 XM DM 443 8443 SSL3 00100011 0 443 8443 DMZ
40
© 2013 Citrix | Confidential – Do Not Distribute Nike Deployment – SSL Offload SSL3 00100011 0 XM DM 443 8443 80 DMZ
41
© 2013 Citrix | Confidential – Do Not Distribute Why change the deployment? Obvious Advantages: NetScaler becomes de-facto authentication point for all XenMobile traffic SSL Offload, reduces load on XDM, and hence better Scalability
42
© 2013 Citrix | Confidential – Do Not Distribute NetScaler SSL Offload setup XDM 443 8443 80 DMZ SSL Offload vServer 1 SSL Offload vServer 2 443 HTTP HTTPS Insert Client Certificate in the HTTP Header Client Cert Auth enabled No Client Auth
43
© 2013 Citrix | Confidential – Do Not Distribute What’s needed? Two virtual servers 443 8443
44
© 2013 Citrix | Confidential – Do Not Distribute What’s needed? Bind one or more XDM services on HTTP (80)
45
© 2013 Citrix | Confidential – Do Not Distribute What’s needed? Steps required for SSL Offload (HTTPS – 443) virtual server Bind both – Devices and Root CA certificates on virtual server This is important for iOS enrollment to work!
46
© 2013 Citrix | Confidential – Do Not Distribute What’s needed? Steps required for SSL Offload (HTTPS – 443) virtual server Create an SSL Policy that only gets executed when a Client Cert is detected
47
© 2013 Citrix | Confidential – Do Not Distribute What’s needed? Steps required for SSL Offload (HTTPS – 443) virtual server Configure NetScaler to insert NSClientCert header This is important for iOS enrollment to work!
48
© 2013 Citrix | Confidential – Do Not Distribute SSL Offload option in NS GUI
49
© 2013 Citrix | Confidential – Do Not Distribute SSL Offload configuration LB vServer 1 Type – SSLSSL Incoming port 443 Configure and Bind Service – HTTP to XDM Server on 80 Configure Bind Install and Bind a Cert-Key pair (for SSL) Install Bind Configure Client Certificate Authentication – details on next slide Enable passing of Client Certificate to XDM, in HTTP Headers – details in further slide LB vServer 2 Type – SSLSSL Incoming port 8443 Configure and Bind Service – HTTP to XDM Server on 80 ConfigureBind Install and Bind a Cert-Key pair (for SSL) Install Bind
50
© 2013 Citrix | Confidential – Do Not Distribute Client Certificate Authentication on vServer 1 On LB vServer 1, enable Client Certificate Authenticationenable Mark this certificate check as Optional CA could be XDM / external PKI vServer Next step is, to install and bind the CA certificate(s) on NetScalerinstall and bind required for validation of Client Certificates For XDM as CA: CA has multiple CA Certificates, of which we require the following: -Intermediate CA for Devices -Root CA of XDM Certificates available at: -C:\Program Files (x86)\Citrix\XenMobile Device Manager\tomcat\conf -cacerts.pem – Contains both certificates -Root CA Certificate representing XDM -Intermediate CA for Device Certificate issuing CA -These certificates will have to be converted from PKCS 12 format to PEM / DERconverted -These certificates need to be linked on NetScalerlinked
51
© 2013 Citrix | Confidential – Do Not Distribute Insert Client Certificate in HTTP Header Create an SSL Policy Rule Expression - CLIENT.SSL.CLIENT_CERT.EXISTS Create an SSL Action Client Certificate – ENABLED Certificate Tag – NSClientCert Bind SSL Action to SSL Policy Bind SSL Policy to vServer 1 More details available herehere
52
© 2013 Citrix | Confidential – Do Not Distribute NetScaler CLI Config Vserver 1 > add server XDM1 192.168.10.30 > add service HTTP_XDM1 192.168.10.30 HTTP 80 > add lb Vserver LB_VS_1 SSL 192.168.10.101 443 > bind lb Vserver LB_VS_1 HTTP_XDM1
53
© 2013 Citrix | Confidential – Do Not Distribute NetScaler CLI Config SSL Certificates > add ssl certKey Devices-CA –cert Devices-CA.cer > add ssl certKey Root-CA –cert Root-CA.cer > bind ssl Vserver LB_VS_1 –certKeyName wildcard- TrainingLab > bind ssl Vserver LB_VS_1 –certKeyName Devices-CA -CA > bind ssl Vserver LB_VS_1 –certKeyName Root-CA -CA > link ssl certKey Devices-CA Root-CA
54
© 2013 Citrix | Confidential – Do Not Distribute NetScaler CLI Config SSL Configuration > set ssl Vserver LB_VS_1 –clientAuth ENABLED –clientCert Optional > add ssl action SSL-Action –clientCert ENABLED – certHeader NSClientCert > add ssl policy SSL-Policy –rule CLIENT.SSL.CLIENT_CERT.EXISTS –action SSL-Action > bind ssl Vserver LB_VS_1 –policyName SSL-Policy – priority 100
55
© 2013 Citrix | Confidential – Do Not Distribute NetScaler CLI Config Vserver 2 > add lb Vserver LB_VS_2 SSL 192.168.10.101 8443 > bind ssl Vserver LB_VS_2 HTTP_XDM1 > bind ssl Vserver LB_VS_2 –certKeyName wildcard- TrainingLab
56
© 2013 Citrix | Confidential – Do Not Distribute Copy the a_patch_860_9998.jar file to \XenMobile Device Manager \tomcat\webapps\[instance_name]\WEB-INF\lib (on all cluster nodes, in a clustered ZDM config) Restart XDM service Browse to http://XDMURL/instance/help-patches.jsp and confirm the patch shows up under the 'in use' column of the resulting pagehttp://XDMURL/instance/help-patches.jsp NetScaler SSL Offload patch for XDM
57
Module 4: Integrate XenMobile Device Manager with Microsoft PKI
58
© 2013 Citrix | Confidential – Do Not Distribute PKI Definitions PKI provides an infrastructure to: Identify – device identity certificates, APNs Encrypt – SSL encryption, APNs Digitally Sign – profile signatures Certificate Authority – creates and publishes digital certificates to an entity (device, user, organization) Registration Authority -- brokers and verifies the request for a certificate from a user or device and communicates with and validates the certificate authority PKI is the basis for connectivity and authentication for MDM
59
© 2013 Citrix | Confidential – Do Not Distribute XDM PKI Standalone
60
© 2013 Citrix | Confidential – Do Not Distribute XDM PKI Standalone
61
© 2013 Citrix | Confidential – Do Not Distribute XDM CAs and Device ID Certificate
62
© 2013 Citrix | Confidential – Do Not Distribute XDM and Microsoft Certificate Services XDM leverages Microsoft Cert Services Web Enrollment It does not use SCEP The Windows server must be Enterprise version as standard does not work
63
© 2013 Citrix | Confidential – Do Not Distribute Create a Certificate Service Account XDM will use certificate to authenticate connection to MS Certificate Authority The Certificate used will be tied to a user which in this case will be the service account This protects the XDM connection from account deletion/disabling if the user account were to be disabled, deleted in Active Directory if the Admin leaves the company, etc This account needs no special rights. A standard AD user is sufficient.
64
© 2013 Citrix | Confidential – Do Not Distribute Install Microsoft Certification Services Sign in as service account that will be running the CA Ensure service account is a local administrator CA Type – Enterprise Configure IIS for CA installation Ensure both Client Cert Mapping and IIS client Cert Mapping are checked
65
© 2013 Citrix | Confidential – Do Not Distribute CA Configuration for Client Certificate Create certificate for IIS https binding IIS Authentication mode Enable Cert Based Authentication /CertSrv home Configure SSL setting to accept Certificates Create a certificate for Service Account user Create User Template Security tab – grant Service Account user full control Request SSL certificate for Service Account user Install requested certificate Export certificate and private key
66
© 2013 Citrix | Confidential – Do Not Distribute Disable Windows Auth to Test CA Connection Uncheck Enable Integrated Windows Authentication.
67
© 2013 Citrix | Confidential – Do Not Distribute Disable Windows Auth to Test CA Connection Uncheck Enable Integrated Windows Authentication. Close and relaunch your browser This tests the certificate that was created to authenticate with CA Test on the certificate server with service account Should be prompted to select certificate
68
© 2013 Citrix | Confidential – Do Not Distribute Disable Windows Auth to Test CA Connection Uncheck Enable Integrated Windows Authentication. Close and relaunch your browser This tests the certificate that was created to authenticate with CA Test on the certificate server with service account Should be prompted to select certificate Do not proceed with configuration until this part works
69
© 2013 Citrix | Confidential – Do Not Distribute Setup XDM CA Options Import Users Certificate for Service Account
70
© 2013 Citrix | Confidential – Do Not Distribute Setup XDM CA Options Service root URL – trailing “/” at the end is needed
71
© 2013 Citrix | Confidential – Do Not Distribute Configure Available Templates Click New Template Enter the name of the template created for this Note: The Template name is case sensitive
72
© 2013 Citrix | Confidential – Do Not Distribute Configure Available Templates If the wrong template is specified, the following errors are seen: In the zdm.log file 2013-11-13 05:37:03,736 [http-nio-443-exec-7] DEBUG com.sparus.nps.pki.connector.CertSrvResponseParser [UID=28,usr=certsvc@training.lab,dev=9] - Parsed CrtSrv response, found: error=true ReqId=null Message=Your request was denied. The disposition message is: "Denied by Policy Module 0x80094800, The request was for a certificate template that is not supported by the Active Directory Certificate Services policy: XDM User Template.“
73
© 2013 Citrix | Confidential – Do Not Distribute Configure Available Templates If the wrong template is specified, the following errors are seen: In the zdm.log file In the event viewer of server running Certificate Authority
74
© 2013 Citrix | Confidential – Do Not Distribute Configure Available Templates Select the Server cert you recently uploaded. In this case, administrator-user-cert.pfx
75
© 2013 Citrix | Confidential – Do Not Distribute Define a Credential Provider Name Provider Issuing Entity created in previous set Select SIGN and select your template you entered earlier.
76
© 2013 Citrix | Confidential – Do Not Distribute Define a Credential Provider Define key size: Must be 2048 Subject Name: $user.username Fill in username and UPN. UPN is used by Exchange to determine rights to a user mailbox for example.
77
© 2013 Citrix | Confidential – Do Not Distribute Determine Distribution Method
78
© 2013 Citrix | Confidential – Do Not Distribute Create iOS/Andriod Credential Create an iOS/Andriod Credential Select credential provider and MS CA provider you created.
79
© 2013 Citrix | Confidential – Do Not Distribute Caveats When creating a certificate template, Windows 2003 must be selected as the certificate template type. This is needed as Windows 2008 templates are not exposed via web enrollment due to changes in the MS CA. There is potentially a workaround by pointing to another enrollment.dll on the MS side, but that hasn't been explored.
80
© 2013 Citrix | Confidential – Do Not Distribute Set CAS to Accept Certificates Verify in Exchange Management Console. Basic authentication box should be checked if you want to allow both cert and windows based authentication.
81
© 2013 Citrix | Confidential – Do Not Distribute Verify AD Client Certificates is Enabled Connect to CAS IIS Admin console and enable Client Cert Authenticaiton
82
© 2013 Citrix | Confidential – Do Not Distribute ActiveSync configured to accept Client Cert
83
© 2013 Citrix | Confidential – Do Not Distribute Ensure Windows Authentication is Enabled
84
© 2013 Citrix | Confidential – Do Not Distribute Access Configuration Editor
85
© 2013 Citrix | Confidential – Do Not Distribute Access Configuration Editor Select system.webServer->Security->authentication->ClientCertificateMappingAuthentication
86
© 2013 Citrix | Confidential – Do Not Distribute Enable CertificateMappingAuthentication
87
© 2013 Citrix | Confidential – Do Not Distribute Configure iOS ActiveSync Profile
88
© 2013 Citrix | Confidential – Do Not Distribute Configure iOS Deployment Package
89
Module 5: Learn Samsung KNOX and Amazon MDM Policies
90
© 2013 Citrix | Confidential – Do Not Distribute What is Samsung KNOXKNOX Dual persona approach for device, app, and data security Samsung markets it as the most comprehensive mobile solution for work and play KNOX compatible devices include: Samsung S4 Samsung Note3 Samsung Note 10.1 (2014 Edition)
91
© 2013 Citrix | Confidential – Do Not Distribute XenMobile 8.6 KNOX Policies Use Case/PolicyDescription Exchange ActiveSync for KNOXProvision EAS profile to the container Browser RestrictionsDisable popup, cookies, auto-fill and Javascript Silent App. UnInstallUninstalls apps that are provisioned to the container Container PasscodeProtect apps in container using a PIN code App. BlacklistingB/L apps and prevent users from launching these apps Enterprise VPNIPSec VPN policy for apps provisioned to the container Lock ContainerAdmin can lock container in case the device is lost or stolen Unlock and Reset PasscodeAdmin can unlock container and reset container passcode Container WipeAdmin can selectively wipe KNOX container from device
92
© 2013 Citrix | Confidential – Do Not Distribute KNOX Icon on Device Home Screen KNOX is an app on deviceLogin to containerAccess corporate apps
93
© 2013 Citrix | Confidential – Do Not Distribute Amazon/XenMobile Integration FeatureDescription Silent Install/UninstallInstall and Uninstall Apps w/o user intervention Prevent App UninstallPrevent user from uninstalling apps Device RestrictionsPrevent use of Location Services Factory Reset Bluetooth Turn Off Wi-Fi App. install from Non Amazon app. store
94
© 2013 Citrix | Confidential – Do Not Distribute Prevent ShareFile Uninstall
95
© 2013 Citrix | Confidential – Do Not Distribute Device Restrictions
96
© 2013 Citrix | Confidential – Do Not Distribute Review 96 Module 1: Verify iOS 7 MDM Policies Configure and test some of the new iOS 7 restrictions policies Module 2: Deploy XenMobile Mail Manager for ActiveSync Filtering Install XenMobile Mail Manager Configure and test XenMobile Mail Manager to filter ActiveSync traffic against Exchange Server 2010 Module 3: Integrate XenMobile Device Manager and NetScaler via SSL Offload Configure SSL Offload on NetScaler to load balance HTTP connections to Device Manager server Verify that mobile devices (e.g. iOS/Android) can enroll successfully
97
© 2013 Citrix | Confidential – Do Not Distribute Review 97 Module 4: Integrate XenMobile Device Manager with Microsoft PKI Setup Client Certificate authentication on Windows Configure Client Certificate authentication with XenMobile Device Manager Configure Exchange Server 2010 for Client Certificate authentication Verify mobile devices can enroll and test Client Certificate authentication and access their mailbox Module 5: Learn Samsung KNOX and Amazon MDM Policies Learn and configure new Samsung KNOX and Amazon MDM restriction policies
98
Work better. Live better.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.