How to Configure Certificate Based Authentication for WorxMail and XenMobile 10



Similar documents
Authentication in XenMobile 8.6 with a Focus on Client Certificate Authentication

App Orchestration 2.5

Exchange 2010 PKI Configuration Guide

Junio SSL WebLogic Oracle. Guía de Instalación. Junio, SSL WebLogic Oracle Guía de Instalación CONFIDENCIAL Página 1 de 19

Architecture and Data Flow Overview. BlackBerry Enterprise Service Version: Quick Reference

App Orchestration 2.0

Deploying the XenMobile Solution

MaaS360 Cloud Extender

How to Configure NetScaler Gateway 10.5 to use with StoreFront 2.6 and XenDesktop 7.6.

MaaS360 On-Premises Cloud Extender

Citrix XenMobile Mobile Device Management

Advanced Administration

Sophos Mobile Control Installation guide. Product version: 3.5

Step-by-step Guide for Configuring Cisco ACS server as the Radius with an External Windows Database

App Orchestration 2.5

Deploying NetScaler Gateway in ICA Proxy Mode

Citrix Receiver for Mobile Devices Troubleshooting Guide

WHITE PAPER Citrix Secure Gateway Startup Guide

Administration Guide. BlackBerry Enterprise Service 12. Version 12.0

Sophos UTM Web Application Firewall for Microsoft Exchange connectivity

XenDesktop 5 with Access Gateway

Administering Jive Mobile Apps

Sophos Mobile Control Installation guide. Product version: 3.6

Introduction to the EIS Guide

Sophos Mobile Control Installation guide. Product version: 3

Certificate Management

Sophos Mobile Control SaaS startup guide. Product version: 6

How To Integrate An Ipm With Airwatch With Big Ip On A Server With A Network (F5) On A Network With A Pb (Fiv) On An Ip Server On A Cloud (Fv) On Your Computer Or Ip

NSi Mobile Installation Guide. Version 6.2

AVG Business Secure Sign On Active Directory Quick Start Guide

Zenprise Device Manager 6.1

BlackBerry Enterprise Service 10. Version: Configuration Guide

Windows Intune Walkthrough: Windows Phone 8 Management

AVG Business SSO Connecting to Active Directory

Citrix Worx App SDK Overview

Kaspersky Lab Mobile Device Management Deployment Guide

Going native with mobile applications:

Setting Up SSL on IIS6 for MEGA Advisor

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

User Management Tool 1.5

Deployment Guide ICA Proxy for XenApp

Configuration Guide. BES12 Cloud

Generating an Apple Push Notification Service Certificate for use with GO!Enterprise MDM. This guide provides information on...

BlackBerry Enterprise Service 10. Universal Device Service Version: Administration Guide

Introduction to Mobile Access Gateway Installation

External Authentication with Citrix Secure Gateway - Presentation server Authenticating Users Using SecurAccess Server by SecurEnvoy

Sophos Mobile Control Installation guide

CWS- 300: Deploying and Managing Citrix Workspace Suite

How To Enable A Websphere To Communicate With Ssl On An Ipad From Aaya One X Portal On A Pc Or Macbook Or Ipad (For Acedo) On A Network With A Password Protected (

Preparing for GO!Enterprise MDM On-Demand Service

Product Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15

Tenrox. Single Sign-On (SSO) Setup Guide. January, Tenrox. All rights reserved.

Windows Phone 8 Device Management

SECO Whitepaper. SuisseID Smart Card Logon Configuration Guide. Prepared for SECO. Publish Date Version V1.0

Configuration Guide BES12. Version 12.3

UP L18 Enhanced MDM and Updated Protection Hands-On Lab

Protecting Juniper SA using Certificate-Based Authentication. Quick Start Guide

Using etoken for Securing s Using Outlook and Outlook Express

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Mobility Manager 9.0. Installation Guide

Sophos Mobile Control Installation guide. Product version: 5.1

XenMobile Logs Collection Guide

X.509 Certificate Generator User Manual

Zendesk SSO with Cloud Secure using MobileIron MDM Server and Okta

DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication

Certificate technology on Pulse Secure Access

This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections:

Defender Token Deployment System Quick Start Guide

Certificate technology on Junos Pulse Secure Access

Exchange Reporter Plus SSL Configuration Guide

Intel vpro Technology. How To Purchase and Install Symantec* Certificates for Intel AMT Remote Setup and Configuration

Introduction to Directory Services

Entrust Managed Services PKI

Workflow Guide. Establish Site-to-Site VPN Connection using Digital Certificates. For Customers with Sophos Firewall Document Date: November 2015

Symantec Managed PKI Service Deployment Options

Using Microsoft s CA Server with SonicWALL Devices

Configuration Guide BES12. Version 12.2

Mobile Device Management Version 8. Last updated:

How To - Implement Single Sign On Authentication with Active Directory

ClickShare Network Integration

CA Nimsoft Service Desk

Copyright 2013, 3CX Ltd.


Installation and Administration Guide

How To Configure Using Different Clients

QMX ios MDM Pre-Requisites and Installation Guide

NEFSIS DEDICATED SERVER

Deploying the BIG-IP LTM and APM with Citrix XenApp or XenDesktop

Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication. Mobile App Activation

Generating an Apple Push Notification Service Certificate for use with GO!Enterprise MDM. This guide provides information on...

Certificate Management

1Y0-250 Implementing Citrix NetScaler 10 for App and Desktop Solutions Practice Exam

Web Interface with Active Directory Federation Services Support Administrator s Guide

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

Configuration Guide for RFMS 3.0 Initial Configuration. WiNG 5 How-To Guide. Digital Certificates. July 2011 Revision 1.0

Scenarios for Setting Up SSL Certificates for View

EM L12 Symantec Mobile Management and Managed PKI Hands-On Lab

Symantec Managed PKI. Integration Guide for ActiveSync

APNS Certificate generating and installation

Transcription:

How to Configure Certificate Based Authentication for WorxMail and XenMobile 10 This article describes how to configure certificate based authentication using Microsoft Certificate Services (PKI) for WorxMail 10.0.3, XenMobile 10 and Microsoft Exchange Server. For this article, the following Citrix and Microsoft components were used: XenMobile Server 10 NetScaler 10.5 build 55.8 WorxMail 10.0.3 for ios, Android and Windows Phone 8.1 Microsoft Windows Server 2008 R2 with Microsoft Certificate Services acting as Root Certificate Authority (CA) Microsoft Exchange Server 2010 SP3* For this scenario, we are assuming that users once enrolled, they will no longer enter domain credentials. Instead, a Worx PIN would be prompted to log on to XenMobile. *Note: Microsoft Exchange Server 2010 was not load balanced.

Table of Contents Prerequisites... 1 Configuration from XenMobile Server 10... 2 PKI Configuration... 2 Setup WorxMail for ios, Android and Windows Phone 8.1... 7 Network Access section (for ios/android only)... 8 Application Settings (for ios/android/windows Phone 8.1)... 8 Setup NetScaler Gateway Settings... 9 Create Enterprise Hub policy for Windows Phone 8.1... 10 Configuration from NetScaler 10.5... 12 Testing... 15 Troubleshooting FAQ... 16

Prerequisites Ensure to check the article CTX200105 - FAQ: Windows Phone 8.1 and XenMobile to wrap Windows Phone 8.1 Worx apps correctly using the latest MDX Toolkit for Windows Phone 8.1 available at the download site. Follow the instructions in the article CTX141541 - Worx Home Setup Fails when trying to Enroll Windows Phone 8.1 Devices to disable Session Reuse on NetScaler if you are using Windows Phone 8.1 devices. Check the Microsoft blog to Configure Certificate-based Authentication for Exchange ActiveSync for Microsoft Exchange Server 2010. Check the article CTX200463 - How to Integrate XenMobile MDM with Microsoft Certificate Services and follow the steps to configure the Microsoft Certificate Services role on the Windows Server and test Certificate Based Authentication (PKI) against the Windows Server acting as Root Certificate Authority. When the Certificate Based authentication has been validated on the Root Certification Authority server, go to the step to Configure XenMobile Server 10 and NetScaler Gateway for Certificate Based authentication. If you are using private server certificates to secure the ActiveSync traffic to the Exchange Server, ensure to have all the Root/Intermediate certificates on the mobile devices. Otherwise, certificate based authentication will fail during the mailbox setup in WorxMail. 1

Configuration from XenMobile Server 10 PKI Configuration On XenMobile Server 10, log on to the Web admin console (for example, https://xenmobileserver-ip-or- FQDN:4443). 1. Upload the XenMobile Client Certificate (PFX) generated as mentioned in the article CTX200463 - How to Integrate XenMobile MDM with Microsoft Certificate Services, section Generate the XenMobile Client Certificate. Ensure that the PFX certificate does include the private key and all certificates in the chain. 2. In the XenMobile Server 10 console, go to Configure > Settings > Certificates > select Import. 3. Set the following parameters: Import: Keystore Keystore type: PKCS#12 Use as: Server Keystore file: Your XenMobile ClientCertificate.pfx Password: Type the PrivateKey Passphrase 4. Click Import. 5. When imported, verify the certificate was installed correctly. It would be displayed as a Users certificate. 2

6. Create the PKI entity for certificate based authentication. 7. Under Settings section, go to More > Certificate Management > PKI Entities. 8. In the PKI Entities, click Add > select Microsoft Certificate Services Entity. 9. Under General, enter the following parameters: Name: Type any name for the entity Web enrollment service root URL: https://rootca-url/certsrv/ Note: Ensure to add the last slash / in the URL path. certnew.cer page name: certnew.cer (default value) certfnsh.asp: certfnsh.asp (default value) Authentication Type: Client certificate SSL Client Certificate: Select the RootCA who signed the XenMobile Client Certificate. 3

10. Under Templates, add the template that you created when following the article CTX200463 - How to Integrate XenMobile MDM with Microsoft Certificate Services, section Create a Certificate Template for XenMobile Certificate Requests. Note: Ensure not to add any spaces. 11. Skip the HTTP Parameters and go to the CA Certificates section. Ensure to select the Root CA name that correspond to your environment. This Root CA is part of the chain imported from the XenMobile Client Certificate. 12. Click Save. 13. Next, configure the Credentials Providers. 14. Under the Settings section, go to More > Certificate Management > Credential Providers. 4

15. Click Add. 16. Under General section, enter the following parameters: Name: Type any name for the credentials providers. Description: Type any description desired for the credential providers. Issuing entity: Select the PKI entity created earlier. Issuing method: SIGN. Templates: Select the template added under PKI entity. 17. Under Certificate Signing Request, enter the following parameters: Key algorithm: RSA Key size: 2048 Signature algorithm: SHA1withRSA Subject name: cn=$user.username 18. For Subject Alternative Names, click Add and enter the following parameters: Type: User Principal name Value: $user.userprincipalname 5

19. Under the Distribution section, type the following parameters: Issuing CA certificate: Select the Root CA who signed the XenMobile Client Certificate. Select distribution mode: Prefer centralized: Server-side key generation. Note: For the next two sections, Revocation XenMobile and Revocation PKI, set the parameters as required. For the purpose of this article, both options are skipped. 20. Under the Renewal section, type the following parameters: Renew certificates when they expire: ON. Leave all other settings as default or change them as required. 21. Click Save. 6

Setup WorxMail for ios, Android and Windows Phone 8.1 Before uploading to XenMobile, ensure to wrap WorxMail with the latest MDX Toolkit available at the download site. 1. On the XenMobile Server 10 Web console, go to Configure > Apps. 2. Click Add and select MDX to upload WorxMail. 3. Configure the name, description and app category as required. 4. Under MDX Policies, enter the following parameters: 7

Network Access section (for ios/android only) Network access: Tunneled to the internal network Application Settings (for ios/android/windows Phone 8.1) WorxMail Exchange Server: Exchange Server FQDN (for example, mail.domain.com) WorxMail user domain: domain suffix (for example,. domain.com) Background network services: Exchange Server FQDN:443 (e.g. mail.domain.com:443) Background services ticket expiration: 168 hours (default). Note: This is the STA ticket lifetime. Once the ticket expires, then, Worx Home will prompt the user to log on through XenMobile. Once the user is validated, then, a new STA ticket is generated by XenMobile Server and sent to the user. Background network service gateway: NetScaler Gateway FQDN:443 (for example,. gateway.domain.com:443) 5. Click Save. 8

Setup NetScaler Gateway Settings 1. On XenMobile Server 10 Web console, go to Configure > Settings > More > select NetScaler Gateway. 2. Click Add to add your NetScaler Gateway settings. Type the following parameters: Name: Type any name for the NetScaler Gateway External URL: https://yournetscalergatewayurl Logon Type: Certificate Password Required: OFF Set as Default: ON 3. Next, set the following parameters for XenMobile Server to deliver the client certificate to the user using the credential provider created earlier. Deliver user certificate for authentication: ON Credential Provider: Select the Credential Provider created earlier 9

4. Click Save. Create Enterprise Hub policy for Windows Phone 8.1 For Windows Phone 8.1 devices, an Enterprise Hub device policy should be created to deliver the AETX file and the Worx Home client. Note: Ensure that both the AETX and Worx Home files were using the same enterprise certificate from Symantec and the same Publisher ID from the Windows Store developer account. 1. Click Add > More > XenMobile Agent > select Enterprise Hub. 10

2. Ensure to select the correct.aetx file and signed Worx Home app for the Enterprise Hub. 3. Set the assignment to the desired delivery groups. 4. Click Save. 5. Verify the Enterprise Hub device policy for Windows Phone 8.1 is created. 11

Configuration from NetScaler 10.5 1. Disable SSL Session Reuse on both load balancing virtual servers for XenMobile MDM traffic as mentioned in the article CTX141541 - Worx Home Setup Fails when trying to Enroll Windows Phone 8.1 Devices to avoid any issues with Windows Phone 8.1 devices. 2. Under Traffic Management > Load Balancing > Virtual Servers, go to each virtual server (both 443 and 8443), edit SSL Parameters and set SSL Session Reuse to disabled. 3. Next, on the NetScaler Gateway virtual server, set Client Authentication to ENABLED and Mandatory. 4. Create a new authentication Certificate policy so we can extract the User Principal Name from the client certificate provided by Worx Home to NetScaler Gateway. 5. Ensure to set the following parameters for the certificate profile: Authentication Type: CERT Two Factor: OFF User Name Field: SubjectAltName:PrincipalName 12

6. Ensure to bind only the certificate authentication policy as the Primary Authentication in the NetScaler Gateway virtual server. 7. Ensure to bind the Root CA certificate to validate the trust of the client certificate presented to NetScaler Gateway. 13

14

Testing If everything was configured correctly, users should be able to enroll their mobile device against XenMobile, get prompted to create a Worx PIN and be redirected to the Worx Store. When users launch WorxMail for ios, Android or Windows Phone 8.1, they should not get prompted for user credentials to configure their mailbox. Instead, WorxMail will request the client certificate from Worx Home and submit it to Microsoft Exchange Server for authentication automatically. No user intervention would be needed. Example of WorxMail configuring the mailbox during the first time launch: Users should be directed to their mailbox. 15

Troubleshooting FAQ Q. I am able to download and install WorxMail on my mobile device, but during the mailbox configuration WorxMail fails to finish the configuration. What is wrong? 1. If Microsoft Exchange Server ActiveSync is using private SSL server certificates to secure the traffic, ensure to have the Root/Intermediate certificates installed on the mobile device. 2. Check the authentication type selected for ActiveSync. It should have Require client certificates. 3. On Microsoft Exchange Server, check the Microsoft-Server-ActiveSync site to have client certificate mapping authentication enabled (by default it is disabled). The option is under the Configuration Editor > Security > Authentication. 16

Note: After selecting True, ensure to click Apply for the changes take effect. 4. Check the NetScaler Gateway settings on XenMobile Server 10. Ensure that Deliver user certificate for authentication is turned ON and Credential provider has the correct profile selected. 17

Q. How can I see if the client certificate was generated/delivered to the mobile device? This information is available under each managed mobile device enrolled on XenMobile 10. To check the certificate details: 1. Go to the XenMobile Server 10 Web Management console > Manage > Devices. 2. Select one of the devices. 3. Click Edit or Show More. 4. Go to the Delivery Groups section, and search for this entry: NetScaler Gateway Credentials : Requested credential, CertId= 18

Q. I noticed that I cannot deliver Root/Intermediate certificates to my Windows Phone 8.1 device through XenMobile. How can I install these files in order to trust my Exchange Server? You can send Root/Intermediate certificates (.cer) files through email to the Windows Phone 8.1 device and install them directly. 19

Q. I cannot get WorxMail installed successfully on my Windows Phone 8.1 device. What could cause this issue? Ensure the Application Enrollment Token (.AETX) file is delivered through XenMobile using the Enterprise Hub device policy. Ensure the Application Enrollment Token was created using the same Enterprise Certificate from Symantec used to wrap WorxMail and sign Worx Home apps. Ensure the same Publisher ID is being used to sign and wrap Worx Home, WorxMail, and the Application Enrollment Token. 20