EM L12 Symantec Mobile Management and Managed PKI Hands-On Lab Description Building and Managing a Certficate Authority infrastructure to support your Mobile Management infrastructure can be time consuming and cost prohibitive. Utilizing a VeriSign managed PKI infrastructure can help to alleviate these burdens. In this hands on lab students will have the opportunity to configure the Symantec Mobile Management environment to work with the hosted mpki solution and understand the benefits and advantages associated with it s use. This lab assumes a basic familiarity with SMM 7.1 and the SMP platform. At the end of this lab, you should be able to Understand the advantages of hosted PKI services Understand the requirements for working with a managed PKI account Be able to submit a CSR request to the PKI portal Import the required certificates for use with managed PKI Configure SMM to use a hosted SCEP configuraton profile Notes A brief presentation will introduce this lab session and discuss key concepts. The lab will be directed and provide you with step-by-step walkthroughs of key features. Feel free to follow the lab using the instructions on the following pages. You can optionally perform this lab at your own pace. Be sure to ask your instructor any questions you may have. Thank you for coming to our lab session.
Getting Started Before you begin, you will need to be sure that the SMM-Exchange and SMM-Server virtual machines have been started (in that order). Once the VM s have finished loading, you will be ready to begin. Unless otherwise stated, all of the exercises should be done from the SMM-Server virtual machine. Setup a Symantec Managed PKI Account Installing the Managed PKI Account follows a series of steps. The Symantec PKI client is installed first. The PKI client enables you to install the PKI Manager Sign-in Certificate, which is required to securely access the PKI Manager portal. An administrator of the managed account needs to setup the Symantec Managed PKI Account. You need to configure access to your PKI account from the machine you will use to manage the service. The required certificate for account access will be installed on your workstation. For purposes of these lab exercises, the required account and access certificate and Certificate profile have already been installed and created for you. Verify the Symantec PKI client installation In these next step we will verify that the above requirements are installed and ready for use. 1. On the SMM-Server virtual machine, open Start > Control Panel 2. Select Programs > Programs and Features 3. Verify that the Symantec PKI Client is listed Verify that the PKI Manager Sign-in Certificate is installed Open a MMC certificates snap-in to the Current User account 1. Open the MMC console by clicking Start, type MMC in Search box, and the click Return when mmc.exe appears. 2. Select File > Add/Remove Snap-in, Highlight Certificates and move to Selected snap-ins with the Add button. 3. Leave default setting of My user account and click Finish. 4. Click OK to save changes. 5. Expand Certificates > Personal and select Certificates 6. Verify that the Scott Jareo Certificate, issued by Symantec Class 3 Admin is installed Note: This certificate is used for authentication to the PKI portal, and must be installed on the machine you will use to manage the service 2 of 10
Verify the Certificate Profile To be able to issue certificates from the PKI manager you must first configure the certificate profile that can be used to generate certificates. In this exercise we will walk through the configuraton of this profile, but will not create it as one has already been created for this lab. 1. Open a browser and navigate to the Symantec Managed PKI Portal page https://pki-manager.symauth.com/pki-manager/ 2. Click OK to confirm the Test Drive Admin Certifcate (previously viewed) 3. Enter the required PIN: mpkilab 4. Click OK to login 5. Click on the Manage Certificate Profiles icon on the bottom of the screen. 6. Verify the lab created Profile is already created called TFE Lab, under the Certifcate Profiles found column. The following steps will walk through how this profile was created, we will not need to save an additional profile. 1. Click on the Add Certficate profiles link at the top left hand of the page. 2. The Managed PKI Portal displays the Create Profile wizard with the Select Mode page first. 3. Select Production mode and click Continue 3 of 10
4. The Managed PKI Portal displays the Select Template page. 5. Select Secure Sign-in and then click Continue. 6. The Managed PKI Portal displays the Customize certificate options page. 7. Enter a Certificate Friendly Name. 8. Under Primary certificate options, select Enrollment method box and change the Enrollment Method drop box setting to SCEP 9. Click Continue to accept the change in enrollment method 10. Click on Advanced Options and verify that the SubjectAltName contains a field called othername (UPN) and it s source is set to SCEP Request 11. Click Cancel We do not need to save this particular profile as one has already been created. 4 of 10
Generate a Certificate Signing Request In order to work with the Symantec managed PKI certificate you need to generate a CSR that can be submitted to VeriSign to create the required RA certificate. This request is generated from a trusted machine running IIS. This does not have to be the Mobile Management Server. You can create the RA certificate on a different computer and export it to be used on the Mobile Management Server. You can also create the RA certificate on the Mobile Management Server to avoid needing to export/import the certificate. We will follow that scenario in the following exercise. 1. Open IIS Manager, Select Start > Control Panel > Administrative Tools > Internet Information Services (IIS) Manager, or use the Start menu shortcut. 2. Under Connections, Select the SMM-Server, and then double-click Server Certificates under IIS in the SMM-Server Home column. 3. Click on Create Certificate Request under the Action tab on the far right pane. 4. The system displays the Request Certificate wizard starting with the Distinguished Name Properties page. 5. Enter the following information and click Next : Common Name - The name that is attached to your certificate request, this can be any name you will recognize to identify the certificate. Organization - The name of your organization. Organizational unit - The name of the group or department within your organization City/locality - The city or locality where your organization is located. State/province - The state or province where your organization is located. Country/region - The country or region where your organization is located. 6. Leave the default Microsoft RSA SChannel Cryptographic Provider for the Cryptographic service provider and select 2048 for the Bit length 7. Click Next 8. Click the ellipsis button to browse to a file location 9. Select Desktop as the file locaton, enter a file name, (e.g. csrreq.txt), and Click Open 10. Click Finish, certificate request file will be saved on the desktop. 5 of 10
Create and install the Intermediate and RA Certificates You must now create an RA Certificate to secure communications and identify yourself to Managed PKI. In communications with Managed PKI, the RA certificate is used as a TLS/SSL client authentication certificate. The steps to configure are as follows: Creating your Certificate request 1. In your browser, navigate back to the Symantec Managed PKI Portal page: https://ptnr-pki-manager.bbtest.net/pki-manager if not still open. 2. Click on the Tasks icon and select Get an RA certificate 3. The Managed PKI Portal displays the Get an RA Certificate wizard displaying the Enter CSR page. 4. Open the CSR file previously created on the server desktop 5. Hit CTRL+A to Select All text 6. Hit CTRL+C to copy and then paste the CSR text into the provided form in the PKI portal 7. Click the Cancel button. We do not need to submit this request as one has already been created for this lab. Note: Hitting continue would create the certificate file and provide you an opportunity to download the file. For purposes of this lab environment that file has already been created and downloaded to your VM environment. PLEASE DO NOT SUBMIT A NEW REQUEST, 6 of 10
Completing the certificate request We will now walk through the steps reguired to complete the certificate request in preparation for installing the certifcates. Export the Intermediate Certificate 1. On the SMM-Server VM, navigate to C:\EM L12 MPKI 2. Open the RA-Certificate.p7b certificate file (This is the file that would be downloaded from the PKI portal in the previous step) 3. Navigate to the Certificates sub-folder. Note: The certificate file contains 2 files, the RA certificate (Registration Authority ###########) and an intermediate certificate. Certificates need to be installed on the SMM server. If the certificate request was generated on a server other than the SMM server, you would need to complete the certificate process for the RA certificate and export that certificate to be installed on the SMM server. 4. Right-click the intermediate certificate to export it > All Tasks > Export to open the certificate export wizard. 5. Click Next 6. Leave the default DER encoded binary X.509 (.CER) file type selection and click Next 7. Browse to a file path location such as Desktop to name the file and save it, click Next 8. Click Finish to export the file. Export and the RA Certificate Follow the steps 4-8 above to export the RA certificate to the desktop as a.cer file. Then complete the following: 7 of 10
1. Open IIS. I.e. Select Start > Control Panel > Administrative Tools > Internet Information Services (IIS) Manager. 2. Select the server, and then double-click Server Certificates. 3. Click on Complete Certificate Request under the Action tab on the far right pane. 4. Click the ellipsis button and browses to the RA certificate that was previously exported. 5. Enter a certificate friendly name in the Friendly name field and click OK. 6. The certificate will now be shown in the IIS Server Certificates page. 7. Select the certificate and click the Export link on the right hand side 8. Browse to save the file to the Desktop and give the certificate a password. The file will have a.pfx extension. Configure SCEP Profile 1. In your browser, navigate back to the Symantec Managed PKI Portal page: https://ptnr-pki-manager.bbtest.net/pki-manager if not still open. 2. Click on the Manage Certificate Profiles icon. 3. Select the TFE Lab Certificate profile previously created. 4. 5. Select and copy the endpoint URL found under Manage this profile E.g. http://pkiscep.symauth.com/scep/2.16.840.1.113733.1.16.1.2.3.5.1.1364019/cgi-bin/pkiclient.exe 6. Open the SMM console from the shortcut on the desktop and navigate to Home > Mobile Management 7. Select Device Management > Configuration Editor. 8 of 10
8. Under the ios Configuration column, Click on SCEP and then click on the new payload icon (yellow asterisk) in the right pane. 9. Enter a name and description for the new SCEP payload 10. Paste the certificate profile endpoint as the URL. 11. In addition, enter the following: Enter the Subject field as CN=Authentication Certificate Leave the challenge field blank. Set key size to 2048. Enable both boxes: Use as digital signature, use for key encipherment. 12. Click Save Changes 9 of 10
Activate MPKI Integration Code The code base installed with SMM 7.2 SP1 has been modified with further improvements for the import and automatic configuration of the MPKI certificates. In this final step we will use the Import functionality to add the required certificates to the SMP console and complete the MPKI integration. 1. In the SMP console navigate to Mobile Management > Settings > ios Enrollment. 2. Under the ios Enrollment configuration, set the Cryptographic credential used for authentication select the name of the SCEP MPKI profile previously configured. 3. Scroll down to the SCEP configuration area. 4. Click the Enable Symantec MPKI Integration radio button to turn integration on. 5. Using the Import button browse to import the certificates previously exported for the root authority (RA) certificate, MPKI Intermediate certificate, and MPKI root certificate. Note: The root certificate has been placed in C:\ EM L12 MPKI 6. Leave the default Symantec MPKI URL set to: https://pki-ws.symauth.com/pkiws/usermanagementservice 7. Click the Save button to save changes to configuration files. 8. SMM is now configured to use the Symantec PKI services for SCEP certificate enrollment 10 of 10