Workspace ONE UEM can request certificates from either internal or external certificate authorities (CA). Integrate with JCCH Gléas services to issue certificates for your Workspace ONE UEM EMM solution.

In order for Workspace ONE UEM to communicate with JCCH for certificate distribution, you must have a JCCH instance configured and ready to issue certificates. You can then configure Workspace ONE UEM to communicate with JCCH using basic authentication. Once communication is successfully established, you can define how to deploy certificates to devices. Below are some of the examples of how JCCH and Workspace ONE UEM can be deployed.

  • Workspace ONE UEM SaaS and JCCH Gléas is insalled on-premises.

    1. The device enrolls with Workspace ONE UEM.
    2. Workspace ONE UEM requests a certificate from the JCCH Gléas endpoint (optionally through the AirWatch Cloud Connector).
    3. The JCCH Gléas endpoint delivers the certificate to Workspace ONE UEM (optionally through the AirWatch Cloud Connector).
    4. Workspace ONE UEM delivers the certificate to the device as part of an EAS, VPN, or Wi-Fi profile.
    Note: If your JCCH Gléas endpoint is public-facing, then you must protect it with a public SSL certificate. If you use the AirWatch Cloud Connector, then configure it to trust the root certificate installed on your JCCH Gléas appliance.
  • Workspace ONE UEM and JCCH Gléas are both insalled on-premises.

    1. The device enrolls with Workspace ONE UEM.
    2. Workspace ONE UEM requests a certificate from the JCCH Gléas endpoint (optionally through the AirWatch Cloud Connector).
    3. The JCCH Gléas endpoint delivers the certificate to Workspace ONE UEM (optionally through the AirWatch Cloud Connector).
    4. Workspace ONE UEM delivers the certificate to the device as part of an EAS, VPN, or Wi-Fi profile.
    Note: If your JCCH Gléas endpoint is public-facing, then you must protect it with a public SSL certificate. If you use the AirWatch Cloud Connector, then configure it to trust the root certificate installed on your JCCH Gléas appliance.

Prerequisites

  • A JCCH instance that is configured for certificate deployment.
  • Workspace ONE UEM console version 9.5 or later.
  • If your JCCH appliance is public-facing, it must be protected with a Public SSL Certificate. If you are using VMware AirWatch Cloud Connector (ACC) for enterprise integration, then ACC needs to be configured to trust the root certificate installed on your JCCH appliance.

Procedure

  1. Generate a JCCH Gléas certificate.
  2. Configure JCCH Gléas as a certificate authority in Workspace ONE UEM console.
    1. Navigate to Devices > Certificates > Certificate Authorities.
    2. Click Add.
    3. Select JCCH Gléas from the Authority Type drop-down menu.
    4. Enter a unique name and description that identifies the JCCH certificate authority in the Certificate Authority and Description fields.
    5. In the Server URL field enter the URL of your JCCH instance.

      This is the web endpoint that Workspace ONE UEM will use to submit requests and issue certificates.

    6. Select the Upload button in the Client Certificate field and upload the new certificate from the location on your PC to which it has been saved.
    7. Click Save.
    8. Click Test Connection when complete to verify the test is successful. An error message appears indicating the problem if the connection fails.
  3. Define which certificate deploys to devices by setting up a request template in the Workspace ONE UEM console.
    1. Navigate to Devices > Certificates > Certificate Authorities.
    2. Select the Request Templates tab, select Add, and complete the menu items.
      Option Description
      Certificate Authority JCCH
      Profile ID Enter the identification that corresponds to the profile identity bound to the certificate.
      Product Code Enter the code bound to the certificate.
      Validity Period Enter the time period the certificate is valid.
      Automatic Certificate Renewal Select this checkbox if Workspace ONE UEM is going to automatically request the certificate to be renewed by JCCH when it expires.

      If you select this option, enter the number of days prior to expiration before Workspace ONE UEM automatically requests JCCH to reissue the certificate in the Auto Renewal Period (days) field. This requires the certificate profile on JCCH to have the Duplicated Certificates setting enabled.

      Enable Certificate Revocation Select this checkbox if you want Workspace ONE UEM to be able to revoke certificates.
    3. Click Save.
  4. Configure Workspace ONE UEM profiles (payloads). Once Crendential profile is created, you can create additional payloads that the JCCH certificate can use, such as Exchange ActiveSync (EAS), VPN, or Wi-Fi services.
    1. Navigate to Devices > Profiles > List View.
    2. Click Add.
    3. Select the applicable platform for the device type.
    4. Specify General profile parameters.
    5. Select Credentials from the payload options.
    6. Click Configure.
    7. Select Defined Certificate Authority from the Credential Source drop-down menu.
    8. Select the external JCCH CA you created from the Certificate Authority drop-down menu.
    9. Select the request template for JCCH you created from the Certificate Template drop-down menu.
      Saving and publishing the profile would deploy a certificate to the device. However, if you plan on using the certificate on the device for Wi-Fi, VPN, or email purposes, then you should also configure the respective payload in the same profile to leverage the certificate being deployed.
  5. (Optional) If you are using AirWatch Cloud Connector and the JCCH appliance is not public-facing, then you need to ensure the AirWatch Cloud Connector configuration trusts the appliance.
    1. Open the JCCH console certificate and view the Certificate Path tab.
      1. If multiple certificates are listed, they will need to be separated and added to the appropriate stores.
      2. The remaining steps address adding the root certificate to the Trust Root Store.
    2. Open MMC by searching for it using Windows Search and launching the mmc.exe file.
    3. Navigate to File > Add/Remove Snap-in. The Add or Remove Snap-ins screen displays.
    4. Select the Certificates snap-in in the left pane and select Add.
    5. Select Computer account as Snap-in source. Select Next.
    6. Select Local computer and then select Finish.
    7. Select OK.
    8. Expand the newly added Certificates tree.
    9. Expand the Trusted Root Certification Authorities folder.
    10. Right-click the Certificates folder here and select All Tasks > Import.
    11. Proceed through the Certificate Import Wizard. You will be prompted to Browse and select the file of the root certificate used to generate the EJBCA Console certificate. Select Next.
    12. Select Place all certs in the following store and then select Next.
    13. Click Finish.
    14. Select all other intermediate and child certificates to add them to their associated stores within the Certificates tree.

What to do next

Review some tips and troubleshooting steps for the integration.

  • Verify ability to perform certificate authentication without Workspace ONE UEM.

    Remove Workspace ONE UEM from the configuration and manually configure a device to connect to your network server using certificate authentication. This should work outside of Workspace ONE UEM and until this works properly, Workspace ONE UEM will not be able to configure a device to connect with a certificate.

  • Verify ability to perform certificate authentication with Workspace ONE UEM.

    You can confirm that the certificate is usable by pushing a profile to the device and testing whether or not the device is able to connect and sync to the configured EAS, VPN, or Wi-Fi access-point. If the device is not connecting and shows a message that the certificate cannot be authenticated or the account cannot connect then there is a problem in the configuration. Below are some helpful troubleshooting checks.

  • If SSL TLS errors are received while creating a template.
    • This error can occur when you attempt two tasks.
      • Create a Workspace ONE UEM certificate template byselecting the Retrieve Profiles button or
      • Retrieve a certificate from the Workspace ONE UEM console from the SecureAuth certificate authority.
    • The troubleshooting technique that usually resolves this problem is adding the required server certificate chain in the console servers trusted root key store.
  • If the Workspace ONE UEM certificate profile fails to install on the device.
    • Inform Workspace ONE UEM Professional Services of the error and request they:
      • Turn on Verbose Mode to capture additional data.
      • Retrieve web console log.
    • Workspace ONE UEM analyzes the log and works with customer to resolve the problem.
  • If the certificate is not populated in the View XML option of the profile.
    • Confirm that lookup values configured on the JCCH certificate profile match the look up values in the Workspace ONE UEM console request emplate.
    • Confirm that lookup values in Workspace ONE UEM request template are actually populated in the user information being pulled from AD.
    • Confirm you are pointing to the right profile in JCCH.