Let's take a look at the tasks that Tom, the EMM administrator of MobX, has to do from downloading WSO2 EMM to registering the iOS device of Kim, the device owner.
...
Tip | ||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| ||||||||||||||||||||
|
...
Create an email account (e.g., tom-mobx@gmail.com) to send out emails to users who register with WSO2 EMM.
Note If you are using a Google mail account, note that Google treats WSO2 EMM as a third-party application and restricts it from sending emails by default. Disable this restriction before sending sending emails to confirm user registrations or invite users.
Expand title Expand this to enable Google to provide access to third-party applications... - Navigate to https://myaccount.google.com/security.
- Click Signing in to Google on the left menu and make sure that the 2-Step Verification is disabled or off.
- Click Connected apps and sites on the left menu and enable Allow less secure apps.
Open the
<EMM_HOME>/repository/conf/axis2/axis2.xml
file, uncomment themailto
transportSender section, and configure the EMM email account.
Before the configuration:Code Block <!-- Uncomment and configure the SMTP server information check com.sun.mail.smtp package documentation for descriptions of properties <transportSender name="mailto" class="org.apache.axis2.transport.mail.MailTransportSender"> <parameter name="mail.smtp.host">smtp.gmail.com</parameter> <parameter name="mail.smtp.port">587</parameter> <parameter name="mail.smtp.starttls.enable">true</parameter> <parameter name="mail.smtp.auth">true</parameter> <parameter name="mail.smtp.user">synapse.demo.0</parameter> <parameter name="mail.smtp.password">mailpassword</parameter> <parameter name="mail.smtp.from">synapse.demo.0@gmail.com</parameter> </transportSender> -->
Tip Tip: For
mail.smtp.from
,mail.smtp.user
, andmail.smtp.password
, use the email address, username, and password (respectively) from the mail account you set up.Example, after the configuration:
Code Block <transportSender name="mailto" class="org.apache.axis2.transport.mail.MailTransportSender"> <parameter name="mail.smtp.host">smtp.gmail.com</parameter> <parameter name="mail.smtp.port">587</parameter> <parameter name="mail.smtp.starttls.enable">true</parameter> <parameter name="mail.smtp.auth">true</parameter> <parameter name="mail.smtp.user">tom-mobx</parameter> <parameter name="mail.smtp.password">$mobx1234</parameter> <parameter name="mail.smtp.from">tom-mobx@gmail.com</parameter> </transportSender>
...
Generating an MDM APNS certificate
Except for a few operations (ring, message and get location) that are performed by the WSO2 EMM agent, all the other device operations, and policies are applied on an iOS device via it's operating system. Therefore, for the WSO2 EMM server to communicate with the operating system of the device, you need to generate the MDM APNS certificate.
The MDM APNS certificate will be referred to as the MDM certificate in the EMM Console.
- Go to https://appleid.apple.com/account#!&page=create and get an Apple ID, if you do not have one already.
- Go to the Apple Push Certificate Portal at https://identity.apple.com/pushcert/ and log in with your customer account details. You do not need an enterprise account for this. Your Apple ID is sufficient.
- Click Create Certificate and agree to the terms and conditions.
- Upload the encoded
.plist
file you received via email from WSO2 earlier in this guide. Download the generated MDM signing certificate, which is a certificate for third-party servers provided by Apple, and rename it to
MDM_Certificate.pem
.Get the
USERID
(TOPIC ID) from the MDM signing certificate (MDM_Certificate.pem
), as it will be used later in the configuration.
You can decode the MDM signing certificate to obtain theUSERID
by executing the following command:Anchor MDM_APNS_TopicID MDM_APNS_TopicID Code Block openssl x509 -in MDM_Certificate.pem -text -noout
Remove the password/pass phrase from your private key file (e.g.,
customerPrivateKey.pem
).Code Block openssl rsa -in customerPrivateKey.pem -out customerKey.pem
Merge the customer key file that was derived in the latter step with the MDM signing certificate to generate the MDM Apple Push Notification Service (APNS) Certificate. In this example, Tom merges the
customerKey.pem
file with theMDM_Certificate.pem
file to generate theMDM_APNSCert.pem
file.Tip Tip: Before you merge the
customerKey.pem
file and theMDM_Certificate.pem
file, make sure both files are in the same directory.Code Block cat MDM_Certificate.pem customerKey.pem > MDM_APNSCert.pem
Open the APNS Certificate (
MDM_APNSCert.pem
) and add a line break between the content of the two files. For example, if your content looks as "-----END CERTIFICATE----------BEGIN RSA PRIVATE KEY-----
", add a line break after 5 dashes so that the content looks as follows:Code Block -----END CERTIFICATE----- -----BEGIN RSA PRIVATE KEY-----
Convert the
MDM_APNSCert.pem
file toMDM_APNSCert.pfx
file. You need a password for this, which you will need again when configuring the iOS platform configurations.Anchor pem_pfx pem_pfx Code Block openssl pkcs12 -export -out MDM_APNSCert.pfx -inkey customerPrivateKey.pem -in MDM_APNSCert.pem
...
- Log in to the EMM Console at
https://<EMM_HOST>:<EMM_PORT>/emm
using admin as the username and password if you haven't previously logged in. Click Menu > CONFIGURATION MANAGEMENT > PLATFORM CONFIGURATIONS > iOS Configurations and fill in the form.
MDM Certificate Password
: Give the same password you gave when converting theMDM_APNS
certificate from thepem
to thepfx
format.MDM Certificate Topic ID
: Give the topic ID of the certificate.
Tip Tip: To learn more about each platform setting, hover your mouse pointer over the help tip.
Configuring WSO2 EMM to install iOS applications
...
- Open the
<EMM_HOME>/repository/conf/app-manager.xml
file. Add
%https%
as the value for theAppDownloadURLHost
property.Code Block <Config name="AppDownloadURLHost">%https%</Config>
Tip Tip: To test WSO2 EMM App management features on Android devices, please use one of the following options:
- Change the value of the
AppDownloadURLHost
property back to HTTP - Continue using HTTPS to install applications on Android devices by Generating a BKS File for Android.
- Change the value of the
Tom has now done the configurations needed to allow users to register and monitor their devices with WSO2 EMM. Tom then proceeds to configure iOS support in EMM.
Creating users and a sample policy
...
- Download the WSO2 EMM sample pack.
Copy the file to a preferred location, navigate to the file via the command prompt, and run the script.
Code Block cd <EMM_QSG_SAMPLE-PACK> ./emm-qsg.ssh
Enter your email address when prompted.
Info title Why? The device owner Kim will be registered with your email address. Therefore, you will be notified via email on how to register your device with WSO2 EMM while following the EMM quick start guide.
Example:
Code Block Enter your email address and press enter : kim@wso2.com
Tip |
---|
Check out the WSO2 EMM dashboard by signing in to the WSO2 EMM console using tom as the username and tomemm as the password: |
Updating the passcode policy
...
The Safari browser will display the EMM iOS Enrollment screen. iOS devices need the root certificate to be downloaded to trust the server certificate. Tap Install EMM Certificate.Anchor Step1 Step1
- The Install Profile screen appears. Tap Install.
- Tap the Skip Agent Installer link at the bottom of the screen.
- On the EMM Registration screen, enter your details:
- Username - Enter kim as the username.
- Password - Enter kimemm as the password.
- Domain - You don't need to enter the domain details for this scenario.
Info By default WSO2 EMM only supports the "bring your own device" (BYOD) registration process for the iOS platform.
Tap Log In.
After reading the End User License Agreement (EULA), tap I accept the terms.
Tap Install when prompted to install the WSO2 Profile Service.
A warning message appears to indicate that by installing the profile the EMM will remotely manage the iOS device. Tap Install.
Tap Trust to confirm that you are aware of the device being remotely managed by installing the profile.
After the profile is installed, click Done.
Upon the successful registration, the following confirmation appears.
Note |
---|
Since you are not installing the WSO2 EMM iOS agent in this guide, you will get a Cannot Open Page warning message after the enrollment is complete. |
...
Note | ||
---|---|---|
| ||
Remember to change change the |