Configure Workspace ONE UEM so that managed Apple and select Android devices can connect to an enterprise network through Cisco IPsec using a certificate for authentication.
Certificate authentication is handled from the point where the user’s device enrolls into Workspace ONE UEM to when the user has VPN access to the protected enterprise network. 1. After the device enrolls, Workspace ONE UEM sends the device a profile that contains the user’s identity certificate and Cisco IPSec VPN configuration settings. 2. When the device uses VPN, the device sends the identity certificate to ASA’s VPN endpoint for authentication. 3. ASA verifies that the device identity certificate came from the same CA as its own identity certificate and both were signed with the CA’s certificate. 4. Optionally, if CRL Checking is enabled, the ASA regularly receives, parses, and caches the CA’s CRL to validate the device identity certificate has not been revoked. 5. ASA grants the device VPN access. The device can now securely access internal enterprise resources.
Deactivate the local CA on the ASA firewall to ensure that certificates are authenticated against the external CA.
Select Disable.
Select OK.
Configure IPsec VPN.
Integrate Workspace ONE UEM with the external CA so that Workspace ONE UEM can request and deploy Identity Certificates. Configure the CA and the request template in the Workspace ONE UEM console.
Setting | Description |
---|---|
Authority Type | Microsoft ADCS |
Protocol | ADCS If you select SCEP, then there are different text boxes and selections available not covered by this documentation. |
Server Hostname | Enter the host name of the CA server. |
Authority Name | Enter the actual CA name. This value is the name of the CA to which the AD CS endpoint is connected. This value can be found by launching the Certification Authority application on the CA server. |
Authentication | Select Service Account so the device user enters credentials. |
User name | This value is the user name of the AD CS Admin Account which has sufficient access to allow Workspace ONE UEM to request and issue certificates. |
Password | This value is the password of the AD CS Admin Account which has sufficient access to allow Workspace ONE UEM to request and issue certificates. |
Additional Options | None |
Deploy a device profile from Workspace ONE UEM console with IPSec VPN and Certificate payloads to devices. This device profile deploys an Identity Certificate and IPSec VPN settings to configure all assigned devices.
Setting | Description |
---|---|
Connection Type | IPSec (Cisco) |
Connection Name | Enter a name that helps identify this specific VPN. |
Server | Enter the URL that users connect to for establishing their VPN connection. |
Account | If your VPN has been configured to apply user credentials in addition to a certificate for authentication, then specify an account to pass to the VPN endpoint. To pass Workspace ONE UEM User Account names to the VPN endpoint, use the {EnrollmentUser} lookup value. |
Machine Authentication | Certificate |
Identity Certificate | Select the credential configured for the certificate. |
Include User PIN | Ensure this is not selected. Unselect this option. |
Enable VPN On Demand | Ensure this is not selected. Unselect this option. |
You can confirm that the VPN certificate is operational by pushing a profile to the device and testing whether or not the device is able to connect and sync to the configured ASA firewall. If the device is not connecting and shows a message that the certificate cannot be authenticated or the account cannot connect to the ASA firewall, then there is a problem in the configuration. * Make sure that a certificate is being issued by the external CA to the device by checking the following information. * Go to the external CA’s server, launch the certification authority application, and browse to the “issued certificates” section.
* Find the last certificate that was issued and it should have a subject that matches the one created in the certificate template section earlier in this documentation.
If there is no certificate then there is an issue with the external CA, client access server (e.g., ADCS), or with the Workspace ONE UEM connection to the client access server.
* Check that the permissions of the client access server (e.g., ADCS) Admin Account are applied correctly to the external CA and the template on the external CA.
* Check that the account information is entered correctly in the Workspace ONE UEM configuration.
If the certificate is being issued, make sure that it is in the Profile payload and on the device.
Navigate to Devices > Profiles > List View. In the Device Profiles screen for the user’s device, select Actions and then, select </ > View XML to view the profile XML. There is certificate information that appears as a large section of text in the payload.
On the device, go to the profiles list, select details and see if the certificate is present.
If the certificate is on the device and contains the correct information, then the problem is most likely with the security settings on the ASA firewall.
Confirm that the address of the VPN endpoint is correct in the Workspace ONE UEM profile and that all the security settings have been adjusted for allowing certificate authentication on the firewall.
A very good test to run is to manually configure a single device to connect to IPSec VPN using certificate authentication. This should work outside of Workspace ONE UEM and until this works properly, Workspace ONE UEM will not be able to configure a device to connect to IPSec VPN with a certificate.