CA Mobile Device Management 2014 Q1 Getting Started
This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for your informational purposes only and is subject to change or withdrawal by CA at any time. This Documentation is proprietary information of CA and may not be copied, transferred, reproduced, disclosed, modified or duplicated, in whole or in part, without the prior written consent of CA. If you are a licensed user of the software product(s) addressed in the Documentation, you may print or otherwise make available a reasonable number of copies of the Documentation for internal use by you and your employees in connection with that software, provided that all CA copyright notices and legends are affixed to each reproduced copy. The right to print or otherwise make available copies of the Documentation is limited to the period during which the applicable license for such software remains in full force and effect. Should the license terminate for any reason, it is your responsibility to certify in writing to CA that all copies and partial copies of the Documentation have been returned to CA or destroyed. TO THE EXTENT PERMITTED BY APPLICABLE LAW, CA PROVIDES THIS DOCUMENTATION AS IS WITHOUT WARRANTY OF ANY KIND, INCLUDING WITHOUT LIMITATION, ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NONINFRINGEMENT. IN NO EVENT WILL CA BE LIABLE TO YOU OR ANY THIRD PARTY FOR ANY LOSS OR DAMAGE, DIRECT OR INDIRECT, FROM THE USE OF THIS DOCUMENTATION, INCLUDING WITHOUT LIMITATION, LOST PROFITS, LOST INVESTMENT, BUSINESS INTERRUPTION, GOODWILL, OR LOST DATA, EVEN IF CA IS EXPRESSLY ADVISED IN ADVANCE OF THE POSSIBILITY OF SUCH LOSS OR DAMAGE. The use of any software product referenced in the Documentation is governed by the applicable license agreement and such license agreement is not modified in any way by the terms of this notice. The manufacturer of this Documentation is CA. Provided with Restricted Rights. Use, duplication or disclosure by the United States Government is subject to the restrictions set forth in FAR Sections 12.212, 52.227-14, and 52.227-19(c)(1) - (2) and DFARS Section 252.227-7014(b)(3), as applicable, or their successors. Copyright 2014 CA. All rights reserved. All trademarks, trade names, service marks, and logos referenced herein belong to their respective companies. Getting Started 2
Table of Contents About CA Mobile Device Management... 6 CA MDM Architecture... 7 Understanding CA MDM Server... 10 Understanding CA MDM Components... 11 Understanding Policies, Groups, and Devices... 13 How CA MDM Enrollment Works... 14 Enrolling Devices in Management... 15 Enrollment Policies... 15 Enrollment Codes... 15 Device Enrollment with CA MDM Enterprise Application... 16 Device Enrollment with Enrollment Codes... 17 Device Enrollment with Self-Service Portal... 17 Device Enrollment with Custom Installations... 18 CA MDM Application Source and Enrollment Options... 18 Device Reenrollment... 19 Types of Tenants... 21 Types of Groups... 22 Types of Policies... 23 Enrollment Policies... 23 Session Policies... 24 Getting Started 3
Configuration Policies... 24 Application Policies... 24 Getting Started 4
Getting Started Getting Started with CA Mobile Device Management provides an overview of the basic capabilities. About CA Mobile Device Management CA MDM Architecture Understanding CA MDM Server Understanding CA MDM Components Understanding Policies, Groups, and Devices How CA MDM Enrollment Works Types of Tenants Types of Groups Types of Policies Getting Started 5
About CA Mobile Device Management CA Mobile Device Management (MDM) is an enterprise solution for securing and managing the following features: The Mobile users Devices Applications Content (data) with your enterprise policies Getting Started 6
CA MDM Architecture CA Mobile Device Management (CA MDM) uses a distributed architecture. The distributed architecture provides complete functionality and enterprise-grade security while managing mobile devices and computers. The CA MDM architecture uses: The enterprise network behind your firewall for components that require the highest security. The DMZ for proxy components. The public entities in the Internet for publicly available services, such as commercial application markets. CA MDM Architecture Internet, DMZ, and Enterprise Network Getting Started 7
The typical environment of the CA MDM deployment has the following components: Internet consists of the end-user devices and public entities. The CA MDM devices include user devices, such as smartphones and computers that CA MDM manages. Devices have an installed application or have a native capability that CA MDM uses to interact. Devices connect to the CA MDM Servers or their proxies using HTTP and SSL. Public entities and services include the entities that support device management and features, such as: The Apple Push Notification Service (APNS) for managing ios devices. A commercial application market for CA MDM application policies. Getting Started 8
DMZ consists of the relay or proxy servers. The servers enforce firewall rules. The servers receive a device communication before relaying it to a CA MDM Server in the enterprise network. For CA MDM Access Control for Email, the email proxy server hosts the access control filter. The access control filter allows or blocks incoming requests that are based on access control policy information from CA MDM. We recommend using the relay servers in the DMZ to increase the enterprise network security. Enterprise network specifies the CA MDM component servers and the email network. The component servers and the email network require connectivity to the CA MDM Server, and sometimes to the database. When relay servers are configured for CA MDM components, CA MDM Servers receive an incoming communication from the relay servers. You can consolidate some or all CA MDM Server components onto fewer servers, or onto a single server. If the CA MDM devices are within the enterprise network, configure them to make direct connections to CA MDM Servers. Getting Started 9
Understanding CA MDM Server The CA MDM Server is central to CA MDM operations. The CA MDM Server has no user interface. The CA MDM Server settings and features are available through the CA MDM Administrator Console which is a web application. The CA MDM Server can operate as a single standalone server, or as multiple servers in a server farm. The CA MDM Server communicates with the CA MDM database and other components or devices as necessary. Standalone CA MDM Server is a single-server operating as the only CA MDM Server in the CA MDM environment. The server has a one-to-one relationship with the CA MDM database. CA MDM Server farm is the multiple servers operating together in a CA MDM environment. The servers have a many-to-one relationship with the CA MDM database. A server farm includes one master CA MDM Server and one or more farm servers. Getting Started 10
Understanding CA MDM Components The CA MDM Administrator, database, and server components support the CA MDM Server for operations. The supporting components are as follows: CA MDM Administrator Console provides an interface for CA MDM Server, CA MDM uses role-based access policies to control user rights. Rights are associated with functions in the user interface and with individual tenants. Use CA MDM Administrator to: Define the roles for CA MDM Administrator users. Defines the server configuration. Monitor the system activity. Manage CA MDM devices, groups, and policies. CA MDM administrator, the individual specifies the person who installs and operates the CA MDM product. CA MDM database stores the procedures, configuration properties, device, group, and policy data, and all message and activity logging. For CA MDM Server components, access to the database is either direct or indirect through the CA MDM Server. CA MDM supports Microsoft SQL as the database. Certificate authority supports the enrollment of ios devices or to facilitate the certificate provisioning for an application onboarding. You can also select the Certificate Authority profiles in embedded SCEP requests in the Android and ios Configuration Policies. Certificate authority definitions are assigned to the enrollment and package servers. Enrollment server retrieves enrollment policies and starts the enrollment process for devices requesting enrollment. For ios, the enrollment server also delivers management payloads. The enrollment server is required for handheld device enrollment and ios operations. Self-Service portal lets users enroll their device in CA MDM, and let users view their device information and issue commands. The portal is optional for the enrollment and allows users to install application policies with support from the Package server. acts as a proxy for HTTP and HTTPS connections from the Relay server Internet to a CA MDM component server. The component server includes CA MDM Server or enrollment server. The relay server is optional, but recommended for an increased enterprise network security. Getting Started 11
Package server serves CA MDM application packages to devices (for application policy). For application onboarding, serves certificates and device provisioning data to third-party applications. The portal package server does not serve commercial applications to devices. Email server checks the CA MDM Server for current access control policies. The CA MDM Server delivers the access control policy information to the email proxy in the DMZ. For CA MDM Access Control for hosted email, email hosting is on the Internet. The email hosting does not include an email server in the enterprise. For CA MDM Access Control for local email, an optional feature, the server hosts the access control PowerShell service. Getting Started 12
Understanding Policies, Groups, and Devices Managing your devices with policies is the core of device management. CA MDM uses groups and policies for device management. CA MDM Policy-Group-Device Relationship Policies are linked to groups and are indirectly linked to devices through their common relationship with groups. When devices are enrolled in the management, enrollment policies are applied to the devices. An enrollment policy defines group links for an enrolling device. Groups are linked to devices and policies. Groups are containers for devices. In CA MDM, groups are similar to using groups and organizational units to simplify network resource management in IT operations. You can define group-device links in an enrollment policy or after a device is enrolled. You can also define a group that is composite of multiple groups. Define group links are based on the manual selection for the following devices: The individual devices. Dynamic selection of devices that are based on device attributes. Dynamic selection of devices that are based on user groups for users who have devices. are linked to groups during the enrollment and are implicitly linked to Devices policies through their common relationship with groups. Getting Started 13
How CA MDM Enrollment Works Contents Enrolling Devices in Management Enrollment Policies Enrollment Codes Device Enrollment with CA MDM Enterprise Application Device Enrollment with Enrollment Codes Device Enrollment with Self-Service Portal Device Enrollment with Custom Installations CA MDM Application Source and Enrollment Options Device Reenrollment Install the CA MDM application directly on a device. The device is configured to connect to the CA MDM Server through an enrollment code. The enrollment code is created as part of the CA MDM Server enrollment policy. If you did not use an enrollment policy to provision the device, configure the device settings after the CA MDM installation. CA MDM supports Android, BlackBerry, ios, and the Windows Phone devices. To enroll a device using CA MDM enterprise application, follow these steps: Access the CA MDM Self-Service portal (SSP) by using: A browser on the enrolling device. From a personal computer. Use an enrollment code that the administrator sends to the device. Within SSP, download the CA MDM application for the enrolled device and obtain an enrollment code. For each device type, SSP is associated to the CA MDM Server enrollment policy. To complete the device enrollment process, enter the enrollment code into the CA MDM application. Once you enter the enrollment code, the application connects the device to CA MDM enrollment server, or its relay server proxy. To enroll an ios device download: CA MDM ios application from the Apple App Store. Getting Started 14
A custom-signed CA MDM ios app from SSP (if set up by the CA MDM system administrator). Enrolling Devices in Management To enroll devices in management, use enrollment policies, enrollment codes, CA MDM applications, and the CA MDM Self-Service Portal. All users must install the CA MDM application. The availability and use of the other enrollment tools varies by device type. Enrollment Policies The Enrollment policies let you define provisioning details for devices that you enroll in CA MDM. Create enrollment policies for all device types. Policies vary based on the device type. Policies include: The Enrollment codes Enrollment URLs Custom client naming The CA MDM connection address Group assignments Values for substitution variables, such as for the user name or email address Default channel Signed or unsigned the CA MDM application Enrollment Codes The Enrollment codes simplify connecting a device to CA MDM for an enrollment. The enrollment codes are available for Android, ios, Blackberry devices, and Windows Phone devices. The Enrollment codes are short codes that are easy to enter on the CA MDM application on a device. The Enrollment codes can be communicated to users directly or can be obtained from the CA MDM Self-Service Portal. The user interface and the provisioning details you defined in the enrollment policy drives the rest of the interaction. When you create enrollment policies, create one or more enrollment codes. Each code has its own attributes for an optional expiration date, use with Self-Service Portal, and its enabled or disabled state. Getting Started 15
The enrollment code for Windows Phone consists of a URL. This code is automatically generated when you create an enrollment policy for Windows Phone. The users can get the URL directly from the administrator or they can get it from the Self-Service Portal. Device Enrollment with CA MDM Enterprise Application The End users install the CA MDM application directly on the device. The device can be configured to connect to CA MDM Server through an enrollment code. The enrollment code is created as part of a CA MDM Server enrollment policy. If you did not use an enrollment policy to provision the device, configure the device settings directly after installation. CA MDM supports the following device types: Android BlackBerry ios Windows Phone Device The following steps describe a general overview of how users enroll their devices using a CA MDM enterprise application: Access the CA MDM Self-Service Portal using the browser on the enrolling device. You can access SSP from personal computer, or by administrators sending enrollment codes to devices. Within the portal, download the CA MDM application for the device type you are enrolling. Once you download the CA MDM application, obtain the enrollment code of a device for entry on the device. The portal is tied to a CA MDM Server enrollment policy for each device type. Based on the device type, the policy configuration allows you to download the CA MDM application from within the portal. The portal also provides an enrollment code. To complete the device enrollment process, enter enrollment code into the CA MDM application that is installed on the device. After you enter an enrollment code in the CA MDM app on the device, the app contacts a public URL shortening service to get an expanded address, then connects to that address. The expanded address is used for the following purpose: To connect a device to a CA MDM enrollment server, or its relay server proxy. To enroll in device management with the CA MDM Server. Windows Phone uses the enrollment code URL, obtained from the Self-Service Note: Portal, to enroll the device. During the enrollment, the CA MDM application is silently installed on the device. Getting Started 16
ios device end users can download the CA MDM from: Apple App Store The Custom-signed CA MDM application portal Device Enrollment with Enrollment Codes To connect a device to CA MDM and enroll in the management, open the CA MDM application and enter enrollment code. CA MDM contacts a PublicURL shortening service for the expanded address and connects to that address. The expanded address connects a device to the CA MDM enrollment server, its relay server, or enrolls in the management. Open the CA MDM application for the following device types: For the device types that support enrollment codes. When you do not use CA MDM Self-Service Portal. The enrollment codes are supported on Android, ios, BlackBerry, and Windows Phone devices. Device Enrollment with Self-Service Portal For device types that support the CA MDM Self-Service Portal, visit the portal. To get the CA MDM application and enrollment code, visit the portal. To connect to CA MDM and enroll in the management, open the CA MDM application and enter an enrollment code. The SSP portal is supported for Android, ios, Blackberry, and Windows Phone devices. The portal experience varies for the end users by device type: Android, ios specifies access to SSP for a device or a personal computer. The Portal includes a link to the appropriate commercial market for installing CA MDM and provides an enrollment code. ios (version 7 or higher) - access the portal from the enrolling device and click the enroll. Access the portal from a personal computer to activate the enrollment code URL in the portal, then enter the URL in the native web browser (Safari) on the device. BlackBerry specifies access to SSP for enrolling a device or a personal computer. The portal includes a link to install or download the CA MDM application from the CA MDM enrollment policy. The portal provides an enrollment code. Getting Started 17
Windows Phone access the portal from the enrolling device or from a personal computer. Activate the enrollment code URL on the portal, access company apps on the device and provide the enrollment URL and other details. The enrollment URL connects to the discovery service, which in turn contacts the enrollment service for enrollment and authentication. After an end user enters an enrollment code in the application, the application contacts a public URL shortening service. The public URL gets an expanded address and then the application connects to that address. The expanded address is for connecting a device to the following servers. The CA MDM enrollment server Relay server proxy To enroll in the management. Device Enrollment with Custom Installations You can create custom installations for the CA MDM application that users can install directly on devices. To enroll the device, configure the CA MDM application to connect to the CA MDM Server. If you do not define a server address in the enrollment policy, configure the device after installation. Custom installations are supported on the following device types: BlackBerry For BlackBerry, the user opens the application and performs the following tasks: Windows Cancel the enrollment code prompt Define the configuration To enroll for a device management, initiate a connection to the CA MDM enrollment server, or its relay server proxy. For Windows, the user opens the application, perform the following tasks: Define the configuration To enroll for a device management, initiate a connection to the CA MDM Server, or its relay server proxy. CA MDM Application Source and Enrollment Options The summary tables describe the CA MDM application sources and enrollment options for different device types. Key: Getting Started 18
Android Android BB BlackBerry ios ios Win Phone Windows Phone Win- Windows Application Sources Android BB ios Win Win Phone Application from Commercial Market NA NA NA Application from Enrollment Policy NA NA NA Custom-signed Enterprise Application NA NA NA Enrollment Options Android BB ios Win Win Phone Enrollment with Enrollment Codes NA Enrollment with Self-Service Portal NA NA Enrollment with Custom Installations (REMOVE) NA Device Reenrollment Restart management for a device with the same server without hard resetting the device. Reenrollment helps you resolve the following scenarios, which vary by device type: Need for the user to reenter user prompts. The device has been hard reset. Reinstallation of the CA MDM application. To have access to a CA MDM Self-Service Portal management, user can reenroll over the portal. The device in an unapproved state is approved for a device management. Getting Started 19
The device in an unapproved state is approved for a device management. Change a tenant of a device. Changes to the server address, such as the CA MDM Server, enrollment server, or relay server. Getting Started 20
Types of Tenants A tenant is an entity that is defined within the CA MDM environment. A tenant has associated devices, groups, policies, and server configuration. Using the tenants lets you perform the following tasks: Separate devices and operations for different hosting customers. Enterprise divisions. Other entities as appropriate for your operations. The system includes a predefined system tenant and any non-system tenants you add. System tenant defines the predefined tenant with a name that matches the server name. Consider these items about the system tenant: The System tenant is the only tenant unless you add extra tenants. The tenant name matches the server name that you defined during the installation. The system tenant is a valid tenant for devices, groups, policies, server configuration, and all operations. Its policies are shared across all other defined tenants. From another tenant, you can use system tenant policies but cannot edit system tenant policies. The system tenant has access to all server configuration properties. The system tenant is the only tenant that can add extra tenants. Non-system Tenant Consider the following items about the non -system tenants: They are valid tenants for devices, groups, policies, some server configuration, and all operations. They have access to a limited set of server configuration properties. They rely on system tenant configuration settings for all other configuration properties. When using a non -system tenant, system tenant policies are available for use, but not for editing. System tenant policies are identified in a non -system tenants policy list by italic font. Getting Started 21
Types of Groups Various group types are available that leverage to manage the portfolio devices. Within the CA MDM, devices and policies are linked to groups. Group association establishes security and governance of a device. The four types of groups are: Static includes a device that you select manually. Membership changes for the following points: When you add a device to the group. When you delete a device from the group or from CA MDM. Dynamic includes the devices that are included in a device view. Membership changes automatically based on changes to the results of the view. User includes the devices that are associated with users included in a user group. The user group includes the Windows users groups of the CA MDM Server, LDAP groups, or NT domain groups. The device members change as user group membership changes. Membership changes automatically based on changes to the selected groups. Composite includes one or more CA MDM groups. Getting Started 22
Types of Policies Contents Enrollment Policies Session Policies Configuration Policies Application Policies To enroll and manage devices, use policies for a device management. In the CA MDM Administrator, the Policy page is the main page for policy-focused tasks. Policies let you perform the following actions: Provision and enroll devices for a device management. Define device settings Secure devices and data Collect inventory Distribute software Collect device activity data for managing expenses. The following types of policies are available that allow you to enroll and manage different applications, devices, and channels. Application Policies Configuration Policies Enrollment Policies Session Policies Enrollment Policies The enrollment policies automate enrolling a device in the management with initial settings. Based on a device type, an enrollment policy defines the device features. The device features include devices connection address, device ID, and whether the device uses CA MDM Access Control for Email. The enrollment policy prompts the user to collect the user information. The enrollment policy adds a device to groups for extra and ongoing management. Getting Started 23
The enrollment policies are always in a published state. To unpublish an enrollment policy, edit the policy and disable or delete its enrollment codes. Session Policies Session policies select the channels for devices to run. Channels include scripted events and logic to perform tasks on the devices like file transfers and registry updates. For one or more device types in a single policy, you can run the channel script using session policies. Some device types let you select a schedule for running the session channels. The session channels are created and managed on the CA MDM Channel Administrator. Session channels are created as a standalone Windows application on the CA MDM master server. Configuration Policies Configuration policies define the device settings and options, and collect device inventory and device activity expense management data. Application Policies The application policies define commercial and enterprise application packages for ios and Android devices. The policies determine which applications are available for devices to browse and install. Getting Started 24