When you work with Afaria, you`ll sooner (iOS) or later (Android, WP) come in contact with certificates. To be more specific, with device (iOS) and user (all platforms) certificates. To make it as easy as possible to get those certificates available to the devices and users, an MDM solution makes use of SCEP. SCPE in the Microsoft world is called NDES, and is available with their CA. If you install everything following the official documentation, you`ll end up having
- A working environment (yeah)
- Most probably a certificate issue, as your users and devices get a certificate named IPSec (Offline request).
This default certificate is what Microsoft thinks fulfills most use cases of SCEP (sorry, NDES) and basically they are right. A device or user can use this certificate without problems for most of the scenarios. Most importantly, users can use it to authenticate themselves against services. It may be that
- your security area does not like the name
- the lifetime does not meet the requirement: its 2 years as given by Microsoft
- it is missing some functionality
- wrong algorithm or key length
- or something else
All of the above points are valid and can invalidate the use of the default configuration. Which leaves you to the question: how to solve this?
To make Afaria get back from the CA a valid certificate based on a custom template, it only takes two steps:
- Create a template
- Assign template to NDES (SCEP)
With SCEP, Afaria is only consuming a service offered by CA. How the CA is treating the request, depends 100% on the CA. Therefore, no additional configuration is needed on the consuming service: Afaria. As a result of this, three steps are necessary to make Afaria get back a custom certificate: