Configure Workspace ONE UEM so that managed Apple and select Android devices can connect to an enterprise network through Cisco IPsec using a certificate for authentication.
Certificate authentication is handled from the point where the user's device enrolls into
Workspace ONE UEM to when the user has VPN access to the protected enterprise network.
- After the device enrolls, Workspace ONE UEM sends the device a profile that contains the user's identity certificate and Cisco IPSec VPN configuration settings.
- When the device uses VPN, the device sends the identity certificate to ASA's VPN endpoint for authentication.
- ASA verifies that the device identity certificate came from the same CA as its own identity certificate and both were signed with the CA's certificate.
- Optionally, if CRL Checking is enabled, the ASA regularly receives, parses, and caches the CA's CRL to validate the device identity certificate has not been revoked.
- ASA grants the device VPN access. The device can now securely access internal enterprise resources.

Prerequisites
- Use an external CA server. The CA must be an external Enterprise CA as opposed to a standalone CA. A standalone CAs doe not allow for the configuration and customization of templates.
- For IPSec, you must have a Cisco Adaptive Security Appliance (ASA) connected to your network.
Procedure
- Disable the local CA on the ASA firewall to ensure that certificates are authenticated against the external CA.
- Log into the Cisco Adaptive Security Device Manager (ASDM) to configure your ASA firewall.
- Navigate to .
- Select Disable.
- Select OK.
- Configure IPsec VPN.
- Create a CSR on the ASA firewall and send it to the external CA. This is because the ASA needs an Identity Certificate signed by the external CA. For assistance, follow Cisco’s instructions for Generating a CSR on the ASA firewall.
After you have completed all the steps, a CER file (for example, cert_client_id.cer) downloads to your local machine that was obtained from the external CA.
- Download the certificate from the external CA and install it on the ASA firewall to authenticate that the external CA is a trusted source.
Follow Cisco’s instructions on how to install the external CA’s certificate.
- Configure the IKE policies, tunnel properties and policies, group policies, available VPN client IP addresses (pool), user accounts and group assignments, and associate these configurations to create an IPSec profile used by the VPN clients.
Visit the Cisco website for instructions on creating a remote access connection profile and tunnel group on the ASA for IPSec VPN clients. Complete the steps necessary to configure the external CA and ASA firewall to create a trust using certificates and configure a remote access connection profile and tunnel group so that IPSec VPN certificate authentication can be used by your VPN clients to gain access into your enterprise network.
- Integrate Workspace ONE UEM with the external CA so that Workspace ONE UEM can request and deploy Identity Certificates. Configure the CA and the request template in the Workspace ONE UEM console.
- Configure the CA.
- Log in to the Workspace ONE UEM console as a user with Workspace ONE UEM Administrator privileges, at minimum.
- Navigate to .
- Select Add and complete the settings.
Setting |
Description |
Authority Type |
Microsoft ADCS |
Protocol |
ADCS If you select SCEP, then there are different text boxes and selections available not covered by this documentation. |
Server Hostname |
Enter the host name of the CA server. |
Authority Name |
Enter the actual CA name. This value is the name of the CA to which the AD CS endpoint is connected. This value can be found by launching the Certification Authority application on the CA server. |
Authentication |
Select Service Account so the device user enters credentials. |
User name |
This value is the user name of the AD CS Admin Account which has sufficient access to allow Workspace ONE UEM to request and issue certificates. |
Password |
This value is the password of the AD CS Admin Account which has sufficient access to allow Workspace ONE UEM to request and issue certificates. |
Additional Options |
None |
- Select Save.
- Configure the request template.
Enter information about the Identity Certificate template that
Workspace ONE UEM deploys to devices for VPN certificate authentication.
- Navigate to and select the Request Template tab.
- Select Add.
- Complete the certificate template information.
Setting |
Description |
Certificate Authority |
Select the certificate authority that was just created from the certificate authority drop-down menu. |
Subject Name |
Enter the Subject Name or Distinguished Name (DN) for the template. The text entered in this text box is the Subject of the certificate, which a network administrator can use to determine who or what device received the certificate. A typical entry in this text box is CN=WorkspaceONEUEM.{EnrollmentUser} or CN={DeviceUid} where the {} entries are Workspace ONE UEM lookup values. |
Private Key Length |
This value is typically 2048 but must match the certificate template used by the external CA. |
Private Key Type |
Select the types that match the certificate template used by the external CA. |
SAN Type |
Include one or more Subject Alternate Names with the template. This value is used for extra unique certificate identification. Usually, this value needs to match the certificate template on the server. Use the drop-down menu to select the SAN Type and enter the subject alternate name in the corresponding data entry text box. Each text box supports lookup values. |
Automatic Certificate Renewal |
Has certificates using this template automatically renewed before their expiration date. If enabled, specify the Auto Renewal Period in days and make sure the assignment type is set to Auto. |
Enable Certificate Revocation |
Has certificates automatically revoked when applicable devices are unenrolled or deleted, or if the applicable profile is removed. |
Publish Private Key |
Select to publish the private key to the specified Web service endpoint (directory services or custom Web service). |
- Select Save.
- Deploy a device profile from Workspace ONE UEM console with IPSec VPN and Certificate payloads to devices.
This device profile deploys an Identity Certificate and IPSec VPN settings to configure all assigned devices.
- Navigate to from the Workspace ONE UEM console main menu.
- Select Add.
- Select the applicable device platform to open the Add a New Profile screen.
- Configure the General settings for the profile. The General settings determine how the profile is deployed and who receives it and other overall settings.
- Select Credentials from the profile options at left and then select Configure.
- Select Defined Certificate Authority from the Credential Source drop-down menu.
- Select the external CA created previously from the Certificate Authority drop-down menu.
- Select the certificate template created previously from the Certificate Template drop-down menu.
- Select VPN from the profile options at left and then select Configure.
Credentials profile settings must be configured before the VPN profile settings because the VPN configuration refers to the credential that was just configure. Also, some of the configuration settings described here are not applicable to all device platforms.
- Configure the following VPN profile settings.
Setting |
Description |
Connection Type |
IPSec (Cisco) |
Connection Name |
Enter a name that helps identify this specific VPN. |
Server |
Enter the URL that users connect to for establishing their VPN connection. |
Account |
If your VPN has been configured to apply user credentials in addition to a certificate for authentication, then specify an account to pass to the VPN endpoint. To pass Workspace ONE UEM User Account names to the VPN endpoint, use the {EnrollmentUser} lookup value. |
Machine Authentication |
Certificate |
Identity Certificate |
Select the credential configured for the certificate. |
Include User PIN |
Ensure this is not selected. Unselect this option. |
Enable VPN On Demand |
Ensure this is not selected. Unselect this option. |
- Select Save or Save & Publish to push the profile to a device.
What to do next
You can confirm that the VPN certificate is operational by pushing a profile to the device and testing whether or not the device is able to connect and sync to the configured ASA firewall.
If the device is not connecting and shows a message that the certificate cannot be authenticated or the account cannot connect to the ASA firewall, then there is a problem in the configuration.