1. Summary
1.1 This document is the next in the series of my experience with the Symantec Management Platform project. Specifically, the Mobile Device Management solution from Symantec.
1.2 This document details the steps I took to configure the MDM solution in my environment. These steps worked flawlessly (after much trial and error) for me, but should be reviewed with your architect first to ensure they will work for your environment. Most steps will need to be modified based on your requirements for your environment, so please keep that in mind when reading through this article.
1.3 The second part to this series will detail how I configured profile encryption and security. The link will be posted here once it has been published.
2. Determine and document your Architecture
2.1 Even though we have multiple internal and external domains, we setup a few forward/reverse DNS resolvers (explained later) to allow us to go with what Symantec refers to in their documentation as a ‘single domain’ architecture. (We address this later with forward and reverse DNS look ups that resolve the SMM SS and the SCEP server to be used from either inside our network or outside).
2.2 Once you have your architecture model decided, go ahead and save yourself a HUGE headache and fill out this chart with the appropriate information. (The data is just sample data)
2.3 Each of the above servers will need to be configured with the below required components
Device Role | Requirements and Components |
<Server1> AD controller | Windows Server 2003 or 2008 AD Domain Controller in 2008 forest mode (Schema 47)
|
<Server2> Certificate Authority
| Windows Server 2008 (enterprise or data center editions) Certificate Authority
|
<Server3> SCEP and NDES | Windows Server 2008 R2 only Microsoft SCEP service NDES service |
<Server4> SQL | Windows Server 2008 R2 Microsoft SQL server 2005 or 2008 R2 |
<Server5> Symantec Mobile Management Platform (SMP) | Windows Server 2008 R2 SP1 64 bit Symantec Management Platform 7.1 .Net Framework 3.51 IIS 6.0 or IIS 7.5 in IIS 6.0 compatibility mode Silverlight 4.0 Java Runtime Environment ASP.NET |
<Server6> Symantec Mobile Management Site Server (SMM SS) | Windows Server 2008 R2 SP1 .NET Framework 3.51 IIS 6.0 NET framework (IIS 6 compatibility mode for IIS 7.5) ASP.NET Microsoft Message Queuing service
|
3. Pre-Configure the SMM Site Server
3.1 Login to the Symantec Mobile Management Site Server (SMM SS).
3.2 In ServerManager, click Features.
3.3 In the right-hand pane under Features Summary, click AddFeatures.
3.4 In the resulting window, expand MessageQueuing.
3.5 Expand Message Queuing Services.
3.6 Checkmark DirectoryServicesIntegration (for computers joined to a Domain).
3.7 Click the pop up that prompts you to add additional required features.
3.8 Checkmark HTTPSupport.
3.9 Click to add additional required features.
3.10 Click Next, and then click Install.
3.11 Install ASP.NET
3.12 Install IIS.
3.13 Ensure these are checked.
3.14 In IIS6 compatibility mode checkmark these:
3.15 Install the Altiris Agent on the SMM SS.
3.16 Verify agent functionality.
NOTE: I had a forward and reverse DNS resolution created to allow two-way name resolution both for inside our network (intranet) and from outside our network for the SMM SS and the SCEP/NDES server. This is REQUIRED if you are to have your mobile agents installed and communicate both inside your network and from outside your network.
<SMM SS internal DNS> <-> <SMM SS external DNS>
Ex. altirissite103.dir.jccc <--> Altirissite103.jccc.edu
<SCEP/NDES Server internal DNS <--> <SCEP/NDES server external DNS>
Ex. ndes1.dir.jccc <--> -ndes1.jccc.edu
4. Install SMM Solution on SMP
4.1 Login to the SMP.
4.2 Navigate to Start | All Programs | Symantec | Symantec Installation Manager | Symantec Installation Manager.
4.3 After SIM launches, click Install new products.
- Select the latest Symantec Mobile Management suite and install.
- Accept the license agreement and click Next.
- Complete the install.
5. Configure Core SMM Site Server Role
5.1 Login to the SMP.
5.2 Click on Home | Mobile Management.
5.3 Expand Overviews and Reports in the left column.
5.4 Click on and work through the checklist and readiness checks in the right pane.
5.5 Mobile Management Server Status: select your SMM SS.
5.6 Wait about 30 minutes to re-check the status. You may tickle the SMM SS to expedite this process. Note, this only takes a few minutes in 7.5 according to Dave Giles of Symantec).
5.7 Reboot the SMM SS. (optional, but I like to do this)
6. Create SMM SS SSL Cert
6.1 Login to the SMM SS.
6.2 In IIS Manager, click on the server name in the left pane.
6.3 Double-click Server Certificate in the middle pane.
6.4 On the most right pane, click Create Domain Certificate.
6.5 Click Create Domain Certificate…
6.6 Fill it in as follows:
Common name: <external FQDN of your SMM SS>
Organization: <your company>
Organizational unit: <your group>
City/locality: <your city>
State/Province: <your state>
Country/region: <your country>
Ex. Common name: altirissite103.dir.jccc.edu
Organization: Johnson County Community College
Organizational unit: Info Services
City/locality: Overland Park
State/Province: Kansas
Country/region: US
6.7 Specify your local Certification Authority or use a public one (varies)
6.8 Give it a friendly name: Ex. SMM SS 103.
6.9 Complete the request.
Note: Due to how our internal CA is set-up (I was granted permissions on the CA server to allow generation and issuing of web certs), my request was instantly completed and the request was immediately completed as I was able to find the newly issued cert in the MMC.
- On the SMM SS, open MMC.
- Add the Certificate Snap-In for Local Computer Account.
- Expand Certificates | Personal | Certificates folder.
- Right-click on the cert request you just completed and choose All Tasks | Export .
- Choose Yes, export the private key.
- Click Next (accepting the PFX option).
- Choose a location to export it to.
- Copy that .pfx file to the SMP.
- Login to the SMP.
- In IIS, Server name, right click and choose All Tasks | Import and browse to the .pfx you copied over earlier.
- Ensure it shows up in IIS Manager | Server Certificates (you may need to cycle IIS).
7. Configure IIS on the SMM SS with new SSL Certificate
7.1 Login to the SMM SS.
7.2 In IIS Manager, expand Computer | Sites |Default Web Site in the left pane.
7.3 Click Bindings in the right column.
7.4 Click https then Edit (or click new if there is no HTTPS listed).
- Set IP address as All Unassigned.
- Set Port to 443
- Select the new SMM SS cert in the SSL certificate dropdown
7.5 Restart IIS.
8. Obtain Root CA Certificate
8.1 Login to the SMP.
8.2 Open MMC.
8.3 Add the Certificate Snap-In for Local Computer Account.
8.4 Expand Certificates | Trusted Root Certification Authorities | Certificates folder.
8.5 On the non-expired Root CA certificate, right-click and select All Tasks | Export.
8.6 Click Next.
8.7 Accept the default DER encoded and click Next.
8.8 Browse to somewhere and save it. (Remember where this is!)
9. Configure APNS Cert on SMM Site Server
9.1 Login to the SMM SS.
9.2 Click on the computer name in IIS Manager.
9.3 Click ServerCertificates.
9.4 Click CreateCertificateRequest… in the right pane.
Enter your information:
Common name: <external FQDN of your SMM SS>
Organization: <your company>
Organizational unit: <your group>
City/locality: <your city>
State/Province: <your state>
Country/region: <your country>
Ex. Common name: altirissite103.dir.jccc.edu
Organization: Johnson County Community College
Organizational unit: Info Services
City/locality: Overland Park
State/Province: Kansas
Country/region: US
9.5 Click Next.
9.6 Change bit length to 2048.
9.7 Click Next.
9.8 Specify location and file name to save as.
9.9 Click Finish.
9.10 In the Console, navigate to Home | Mobile Management.
9.11 Click on Settings in the left column, and then click on iOS Enrollment.
9.12 On that page, click the Request Signed CSR File hyperlink.
9.13 Once you receive the signed CSR visit https://identity.apple.com/pushcert using Firefox, Chrome, or Safari browse (not IE) and sign in with a valid Apple ID (you may need to create one for the purposes of managing your company’s mobile device certificates, or use your account if you wish to take the risk J )
9.14 Click CreateaCertificate and agree to the Terms of Use.
9.15 Select ChooseFile and navigate to the signed CSR that you received back from Symantec, and then click Upload.
9.16 Download that cert (.PEM file) to the SMM SS.
9.17 Complete the CSR request in the SMM SS and give it a friendly name (Global SMM SS)
Note: You will have to change the file type to *.* in order to see the .PEM file.
9.18 You should see the new cert in your MMC |Local Computer | Certificate Snap-in.
9.19 If you see a private key associated with the public key, you have installed the cert successfully.
Note: If it complains about missing the thumbprint, then manually import the .PEM file into the Local Computer | Personal Certificate snap-in in the mmc. Then double-click the cert and copy the thumbprint from the details tab into the APNS Certificate thumbprint field in the SMP.
10. Install the APNS Cert on the SMP
10.1 Login to the SMP.
10.2 Export the Apple cert (including private key) from the SMM SS
10.3 Copy it to the SMP.
10.4 Import it into the SMP MMC Local Computer Account Certificate Snap-in personal folder.(you will need the password you set above)
10.5 Click on Home | Mobile Device Management.
10.6 Click on Settings | iOS Enrollment Settings.
10.7 Click Import button in the Apple Push/mdm Certificate section in the right pane.
10.8 Browse to the Apple cert you exported and copied from the SMM SS.
10.9 Enter the password and click ok.
10.10 You should see the thumbprint appear. xxxxxxxxxxxxxxxxxxx
10.11 Click Save Changes.
11. Record the SCEP/NDES challenge key
This step will need to be completed by the AD architect before continuing.
11.1 Open Internet Explorer and navigate to http://localhost/certsrv/mscep_admin.
11.2 Copy the Enrollment Challenge password into the clipboard and then paste it into a text document
Note: Seeing “This password can be used multiple times and will not expire” is a result of the registry change made previously and indicates that things are configured properly.
12. Configure SCEP Settings on the SMP
12.1 Login to the SMP.
12.2 Click Home | Mobile Management.
12.3 Expand Settings in the left column.
12.4 Click iOS Settings in the left column.
12.5 Click the yellow star next to Cryptographic credential used for authentication.
12.6 On the screen that pops up, click on SCEP in the left column, then click the yellow star in the right pane.
12.7 Enter the following SCEP server information into the corresponding fields:
Name of the Instance: (can be anything you want)
URL: <url to your SCEP/NDES msscep.dll>
Ex. http://yourndesserv.dir.jccc.edu/CertSrv/mscep/MSCEP.dll
- Subject name: CN=<scep username that the service runs under>
- Scroll down to make further changes.
- In the Challenge field, input the Mobile Challenge Password as saved in text document during SCEP setup above.
- Click Save Changes.
13. Create Root CA Certificate Payload
13.1 Open export the trusted root cert for rc-dc2.
13.2 Add it to the initial payload for tablets via these steps.
13.3 Login to the SMP.
13.4 Click Home | Mobile Management.
13.5 Expand Device Management.
13.6 Click Configuration Editor.
13.7 In the right pane, click Credentials.
13.8 Click the yellow star next in the right pane.
13.9 Click Select cert file…
13.10 Choose the Root CA certificate that you exported earlier.
13.11 Give it a friendly name and then Save it.
14. Configure SSL Communication for Device to SMM SS
14.1 Login to the SMP.
14.2 Click Home | Mobile Management.
14.3 Expand Settings in the left column.
14.4 Click on Mobile Management Server.
14.5 Click on the server in the right pane.
14.6 Click the pencil.
14.7 Ensure you choose to override server connection info, then checkmark Use https, then enter the EXTERNAL FQDN of your SMM SS and set the port to 443 for SSL.
14.8 Then click OK.
15. General Enrollment Settings
15.1 Login to the SMP.
15.2 Click Home | Mobile Management.
15.3 Expand Settings in the left column.
15.4 Click General Enrollment Settings.
15.5 Click the plus in the Authentication Settings area and add in your internal domain name as well as your AD server name with port 389 specified, and then click Verify
15.6 Click OK.
15.7 Click Save changes.
15.8 Checkmark Enable authentication check. THIS IS IMPORTANT because it will check the logon users against the AD you specified above for whether or not the enrolled username they enter at enrollment time is allowed to enroll or not. This will keep external people from enrolling their mobile device in your MDM environment.
15.9 You will also need to select Microsoft NDES and enter the password for that user you specified above. Note: IF you choose to go with Symantec’s cert options, you would choose to Enable Symantec MKI Integration and fill in the respective fields, but we did not.
Additional info and documents that helped me a lot:
http://www.symantec.com/docs/HOWTO83157
http://www.symantec.com/docs/TECH206740
http://www.symantec.com/docs/TECH173426
http://www.symantec.com/docs/DOC6827
http://www.symantec.com/docs/DOC6828
http://www.symantec.com/docs/HOWTO55912
http://www.symantec.com/docs/TECH201766
http://www.symantec.com/docs/TECH192351
http://www.symantec.com/docs/TECH201102
http://www.symantec.com/docs/TECH183383
http://www.symantec.com/docs/HOWTO83249