Overview
This section describes how to configure MobileIron Cloud UEM servers.
To configure MobileIron Cloud UEM server, follow this workflow.
Integrate MDM and UEM Servers with Cisco ISE
This section describes how to configure MobileIron Cloud UEM servers.
To configure MobileIron Cloud UEM server, follow this workflow.
| 1. | Log in to the MobileIron Cloud portal. |
|
| 2. | From the top menu, choose Users. |
|
| 3. | From the Add drop-down list, choose Add API User. |
|
| 4. | In the Add API User window, enter values for these fields:
|
|
| 5. | In the Assign Roles area, check the Cisco ISE Operations check box to allow the user to invoke the APIs required for Cisco ISE integration. |
|
| 6. | Click Done. |
You can configure a local CA with this procedure. MobileIron Cloud also offers a wider range of CA configurations. Choose the type that best matches your organization’s requirements.
For information on the various types of certificate management supported by MobileIron Cloud, refer to http://mi.extendedhelp.mobileiron.com/75/all/en/Welcome.htm#LocalCertificates.htm.
| 1. | In the MobileIron Cloud portal, choose . |
|
| 2. | Click Add. |
|
| 3. | Click Create a Standalone Certificate Authority. |
|
| 4. | In the dialog box , enter the details in the respective fields.
|
If you use a trusted third-party CA to generate identity certificates, you can ignore this task.
If you use the local MobileIron Cloud CA or an internal CA that is private to your company or organization, you must upload the Root Certificate of the CA. When you upload this certificate, it is distributed to the connected devices, which can then trust the source or issuer of the identity certificate used for authentication.
| 1. | From the MobileIron Cloud menu, choose Configurations. |
|
| 2. | Click Add and choose Certificate. |
|
| 3. | In the Name field, enter a name for the trusted certificate. |
|
| 4. | In the Configuration Setup area, click Choose File and choose the trusted or root certificate for your CA. |
|
| 5. | Click Next. |
Configure an identity certificate in MobileIron Cloud to set up the certificate authentication mechanism for mobile devices. Identity Certificates are X.509 certificates (.p12 or .pfx files). You can also generate identity certificates dynamically using a CA as the source.
If you have identity certificates in MobileIron cloud that are already configured for Cisco ISE MDM use cases, update the certificate’s settings to enable GUID information retrieval from MobileIron servers.
| 1. | From the MobileIron Cloud top menu, choose Configurations and click Identity Certificate. |
|
| 2. | In the Name field, enter a value. |
|
| 3. | In the Configuration Setup area, from the drop-down list, choose Dynamically Generated. |
|
| 4. | From the Source drop-down list, choose the CA that you configured in the procedure Configure a Certificate Authority in MobileIron Cloud. |
|
| 5. | From the Subject Alternative Name Type drop-down list, choose Uniform Resource Identifier. |
|
| 6. | In the Subject Alternative Name Value field, enter ID:Mobileiron:GUID:${deviceGUID}. Configure the Subject Alternative Name field for GUID. Optional: Alternatively, to use the Common Name (CN) field to push GUID to Cisco ISE, in the Subject field, enter CN=ID:Mobileiron:GUID:${deviceGUID}. |
|
| 7. | Click Test Configuration and Continue.
The
Configuration Test Successful dialog box displays the details of the created identity certificate.
|
|
| 8. | In the Distribute window, click Custom. |
|
| 9. | In the Define Device Group Distribution area, choose the device groups that you want to distribute in this configuration and click Done. If you update the SAN or CN fields in an existing identity certificate for Cisco ISE MDM use cases, the updated certificates must be sent to the end users connected to your network. To send the updated certificates to end users, in the window, check the Clear cached certificates and issue new ones with recent updates check box. |
If you have already deployed Wi-Fi profiles to your managed iOS and Android devices, edit the Wi-Fi profiles to include the latest identity certificate configuration. The connected devices will then receive new identity certificates with a GUID in the Subject or Subject Alternative Name attributes.
| 1. | From the MobileIron Cloud menu, choose Configurations and click Wi-Fi. |
|
| 2. | In the Name field, enter a value. |
|
| 3. | In the Service Set Identifier (SSID) field, enter the name of your network.
|
|
| 4. | From the Security Type drop-down list, choose the required option. |
|
| 5. | In the Enterprise Settings area, in the Protocols tab, check the TLS check box. |
|
| 6. | In the Authentication tab, enter the required values in the Username and Password fields. |
|
| 7. | From the Identity Certificate drop-down list, choose the identity certificate that you created in the procedure Create an identity certificate in MobileIron Cloud.
Optional: In the
Trust tab, check the check box adjacent to the trusted certificate that you want to use.
|
|
| 8. | In the All Versions area, from the Network Type drop-down list, choose Standard and click Next. In the Distribute window, click the required option. |
|
| 9. | In the Define Device Group Distribution area, check the check boxes adjacent to the device groups that you want to include in this configuration and click Done. |