Kaspersky Secure Mobility Management

Deploying mobile device management systems

This section describes the deployment of mobile device management systems by using the iOS MDM and Kaspersky Endpoint Security protocols.

In this section

Scenario: Mobile Device Management deployment

Enabling Mobile Device Management

Deploying a management system using the iOS MDM protocol

Connecting KES devices to the Administration Server

Disabling Mobile Device Management

Page top
[Topic 64428]

Scenario: Mobile Device Management deployment

This section provides a scenario for configuring the Mobile Device Management feature in Kaspersky Security Center.

Prerequisites

Make sure that you have a license that grants access to the Mobile Device Management feature.

Stages

Deployment of the Mobile Device Management feature proceeds in stages:

  1. Preparing the ports

    Make sure that port 13292 is available on the Administration Server. This port is required for connecting mobile devices. Also, you may want to make port 17100 available. This port is only required for the activation proxy server for managed mobile devices; if managed mobile devices have internet access, you do not have to make this port available.

  2. Enabling Mobile Device Management

    You can enable Mobile Device Management when you are running the Administration Server quick start wizard or later.

  3. Specifying the external address of the Administration Server

    You can specify the external address when you run the Administration Server quick start wizard or later. If you did not select Mobile Device Management for installation and did not specify the address in the installation wizard, specify the external address in the installation package properties.

  4. Adding mobile devices to the Managed devices group

    Add the mobile devices to the Managed devices group so that you can manage these devices through policies. You can create a moving rule in one of the steps of the Administration Server quick start wizard. You can also create the moving rule later. If you do not create such a rule, you can add mobile devices to the Managed devices group manually.

    You can add mobile devices to the Managed devices group directly, or you can create a subgroup (or multiple subgroups) for them.

    At any time afterward, you can connect any new mobile device to the Administration Server using the Mobile device connection wizard.

  5. Creating a policy for mobile devices

    To manage mobile devices, create a policy (or multiple polices) for them in the group where these devices belong. You can change the settings of this policy at any time afterward.

Results

Upon completion of the scenario, you can manage Android and iOS devices by using Kaspersky Security Center. You can work with certificates of mobile devices and send commands to mobile devices.

Page top
[Topic 179492]

Enabling Mobile Device Management

Expand all | Collapse all

To manage mobile devices, you must enable Mobile Device Management. If you did not enable this feature in the quick start wizard of Kaspersky Security Center, you can enable it later. Mobile Device Management requires a license.

Enabling Mobile Device Management is only available on the primary Administration Server.

To enable Mobile Device Management:

  1. In the console tree, select the Mobile Device Management folder.
  2. In the workspace of the folder, click the Enable Mobile Device Management button. This button is only available if you have not enabled Mobile Device Management before.

    The Additional components page of the Administration Server quick start wizard is displayed.

  3. Select Enable Mobile Device Management in order to manage mobile devices.
  4. On the Select application activation method page, activate the application by using a key file or activation code.

    Management of mobile devices will not be possible until you activate the Mobile Device Management feature.

  5. On the Proxy server settings to gain access to the Internet page, select the Use proxy server check box if you want to use a proxy server when connecting to the internet. When this check box is selected, the fields become available for entering settings. Specify the settings for proxy server connection.
  6. On the Check for updates for plug-ins and installation packages page, select one of the following options:
    • Check whether plug-ins and installation packages are up to date

      Starting the check of up-to-date status. If the check detects outdated versions of some plug-ins or installation packages, the wizard prompts you to download up-to-date versions to replace the outdated ones.

    • Skip check

      Continuing work without checking whether plug-ins and installation packages are up-to-date. You can select this option if, for example, you have no internet access or if you want to proceed with the outdated version of the application for some reason.

      Skipping the check of updates for plug-ins may result in improper functioning of the application.

  7. On the Latest plug-in versions available page, download and install the latest versions of plug-ins in the language that your application version requires. Updating the plug-ins does not require a license.

    After you install the plug-ins and packages, the application checks whether all plug-ins required for proper functioning of mobile devices have been installed. If outdated versions of some plug-ins are detected, the wizard prompts you to download up-to-date versions to replace the outdated ones.

  8. On the Mobile device connection settings page, set up the Administration Server ports.

When the wizard completes, the following changes will be made:

  • The Kaspersky Endpoint Security for Android policy will be created.
  • The Kaspersky Device Management for iOS policy will be created.
  • Ports will be opened on the Administration Server for mobile devices.

See also:

Scenario: Mobile Device Management deployment

Page top
[Topic 148239]

Deploying a management system using the iOS MDM protocol

Kaspersky Endpoint Security lets you manage mobile devices running iOS. iOS MDM devices are iOS mobile devices that are connected to an iOS MDM Server and managed by an Administration Server.

Mobile devices are connected to an iOS MDM Server through the following steps:

  1. The administrator installs the iOS MDM Server.
  2. The administrator gets an Apple Push Notification Service (APNs) certificate.

    The APNs certificate lets Administration Server connect to the APNs server to send push notifications to iOS MDM devices.

  3. The administrator installs the APNs certificate on the iOS MDM Server.
  4. The administrator creates an iOS MDM profile for the user of the iOS mobile device.

    The iOS MDM profile contains a collection of settings for connecting iOS mobile devices to the Administration Server.

After the iOS MDM profile is installed and the iOS MDM device is synchronized with the Administration Server, the device is displayed in the Mobile devices folder, which is a subfolder of the Mobile Device Management folder in the console tree.

In this section

iOS MDM Server deployment scenarios

Simplified deployment scheme

Deployment scheme involving Kerberos constrained delegation (KCD)

Enabling support of Kerberos Constrained Delegation

Installing iOS MDM Server

Receiving an APNs certificate

Renewing an APNs certificate

Configuring a reserve iOS MDM Server certificate

Installing an APNs certificate on an iOS MDM Server

Configuring access to Apple Push Notification service

Page top
[Topic 64664]

iOS MDM Server deployment scenarios

The number of copies of iOS MDM Server to be installed can be selected either based on available hardware or on the total number of mobile devices covered.

Please keep in mind that the recommended maximum number of mobile devices for a single installation of Kaspersky Device Management for iOS is 50,000 at most. In order to reduce the load, the entire pool of devices can be distributed among several servers that have iOS MDM Server installed.

Authentication of iOS MDM devices is performed through user certificates (any profile installed on a device contains the certificate of the device owner). Thus, two deployment schemes are possible for an iOS MDM Server:

Page top
[Topic 92514]

Simplified deployment scheme

When deploying an iOS MDM Server under the simplified scheme, mobile devices connect to the iOS MDM web service directly. In this case, user certificates issued by Administration Server can only be applied for devices authentication. Integration with Public Key Infrastructure (PKI) is impossible for user certificates.

Page top
[Topic 92515]

Deployment scheme involving Kerberos constrained delegation (KCD)

The deployment scheme with Kerberos constrained delegation (KCD) requires the Administration Server and the iOS MDM Server to be located on the internal network of the organization.

This deployment scheme provides for the following:

  • Integration with Microsoft Forefront TMG
  • Use of KCD for authentication of mobile devices
  • Integration with the PKI for applying user certificates

When using this deployment scheme, you must do the following:

  • In Administration Console, in the settings of the iOS MDM web service, select the Ensure compatibility with Kerberos constrained delegation check box.
  • As the certificate for the iOS MDM web service, specify the customized certificate that was defined when the iOS MDM web service was published on TMG.
  • User certificates for iOS devices must be issued by the Certificate Authority (CA) of the domain. If the domain contains multiple root CAs, user certificates must be issued by the CA that was specified when the iOS MDM web service was published on TMG.

    You can ensure that the user certificate is in compliance with the this CA-issuance requirement by using one of the following methods:

    • Specify the user certificate in the New iOS MDM profile wizard and in the Certificate installation wizard.
    • Integrate the Administration Server with the domain's PKI and define the corresponding setting in the rules for issuance of certificates:
      1. In the console tree, expand the Mobile Device Management folder and select the Certificates subfolder.
      2. In the workspace of the Certificates folder, click the Configure certificate issuance rules button to open the Certificate issuance rules window.
      3. In the Integration with PKI section, configure integration with the Public Key Infrastructure.
      4. In the Issuance of mobile certificates section, specify the source of certificates.

Below is an example of setup of Kerberos Constrained Delegation (KCD) with the following assumptions:

  • The iOS MDM web service is running on port 443.
  • The name of the device with TMG is tmg.mydom.local.
  • The name of device with the iOS MDM web service is iosmdm.mydom.local.
  • The name of external publishing of the iOS MDM web service is iosmdm.mydom.global.

Service Principal Name for http/iosmdm.mydom.local

In the domain, you have to register the service principal name (SPN) for the device with the iOS MDM web service (iosmdm.mydom.local):

setspn -a http/iosmdm.mydom.local iosmdm

Configuring the domain properties of the device with TMG (tmg.mydom.local)

To delegate traffic, trust the device with TMG (tmg.mydom.local) to the service that is defined by the SPN (http/iosmdm.mydom.local).

To trust the device with TMG to the service defined by the SPN (http/iosmdm.mydom.local), the administrator must perform the following actions:

  1. In the Microsoft Management Console snap-in named "Active Directory Users and Computers", select the device with TMG installed (tmg.mydom.local).
  2. In the device properties, on the Delegation tab, set the Trust this computer for delegation to specified service only toggle to Use any authentication protocol.
  3. Add the SPN (http/iosmdm.mydom.local) to the Services to which this account can present delegated credentials list.

Special (customized) certificate for the published web service (iosmdm.mydom.global)

You have to issue a special (customized) certificate for the iOS MDM web service on the FQDN iosmdm.mydom.global and specify that it replaces the default certificate in the settings of iOS MDM web service in Administration Console.

Please note that the certificate container (file with the p12 or pfx extension) must also contain a chain of root certificates (public keys).

Publishing the iOS MDM web service on TMG

On TMG, for traffic that goes from a mobile device to port 443 of iosmdm.mydom.global, you have to configure KCD on the SPN (http/iosmdm.mydom.local), using the certificate issued for the FQDN (iosmdm.mydom.global). Please note that publishing, and the published web service must share the same server certificate.

See also:

Integration with Public Key Infrastructure

Enabling support of Kerberos Constrained Delegation

Page top
[Topic 92516]

Enabling support of Kerberos Constrained Delegation

The application supports usage of Kerberos Constrained Delegation.

To enable support of Kerberos Constrained Delegation:

  1. In the console tree, open the Mobile Device Management folder.
  2. In the Mobile Device Management folder in the console tree, select the Mobile Device Servers subfolder.
  3. In the workspace of the Mobile Device Servers folder, select an iOS MDM Server.
  4. In the context menu of the iOS MDM Server, select Properties.
  5. In the properties window of the iOS MDM Server, select the Settings section.
  6. In the Settings section, select the Ensure compatibility with Kerberos constrained delegation check box.
  7. Click OK.

See also:

Scenario: Mobile Device Management deployment

Page top
[Topic 89288]

Installing iOS MDM Server

To install iOS MDM Server on a client device:

  1. In the Mobile Device Management folder of the console tree, select the Mobile Device Servers subfolder.
  2. Click the Install iOS MDM Server button.

    The iOS MDM Server Deployment wizard starts. Proceed through the wizard by using the Next button.

  3. At the Select installation package step of the wizard, select the iOS MDM Server installation package that you want to install.

    If there is no suitable package in the list, click the New button and create the required package.

  4. If necessary, at the Selecting Network Agent installation package for combined installation step of the wizard, keep the Install Network Agent together with this application check box, and then select the Network Agent version that you want to install.

    is needed for the iOS MDM Server to connect to Kaspersky Security Center. You can skip this step if Network Agent is already installed on the device where you plan to install the iOS MDM Server.

  5. At the Connection settings step of the wizard, in the External port for connection to iOS MDM field, specify an external port for connecting mobile devices to the iOS MDM service.

    External port 5223 is used by mobile devices for communication with the APNs server. Make sure that port 5223 is open in the firewall for connection with the address range 17.0.0.0/8.

    Port 443 is used for connection to iOS MDM Server by default. If port 443 is already in use by another service or application, it can be replaced with, for example, port 9443.

    The iOS MDM Server uses external port 2197 to send notifications to the APNs server.

    APNs servers run in load-balancing mode. Mobile devices do not always connect to the same IP addresses to receive notifications. The 17.0.0.0/8 address range is reserved for Apple, and it is therefore recommended to specify this entire range as an allowed range in Firewall settings.

  6. If you want to configure interaction ports for application components manually, select the Set up local ports manually option, and then specify values for the following settings:
    • Port for connection to Network Agent

      In this field, specify a port for connecting the iOS MDM service to Network Agent. The default port number is 9799.

    • Local port to connect to iOS MDM service

      In this field, specify a local port for connecting Network Agent to the iOS MDM service. The default port number is 9899.

    It is recommended to use default values.

  7. Under iOS MDM Server address, specify the address of the client device on which iOS MDM Server is to be installed.

    This address will be used for connecting managed mobile devices to the iOS MDM service. The client device must be available for connection of iOS MDM devices.

    You can specify the address of a client device in any of the following formats:

    • Use device FQDN

      The fully qualified domain name (FQDN) of the device will be used.

    • Use this address

      Specify the specific address of the device manually.

    Please avoid adding the URL scheme and the port number in the address string: these values will be added automatically.

  8. At the Select devices for installation step of the wizard, select the devices on which you want to install the iOS MDM Server.
  9. At the Move to list of managed devices step of the wizard, select whether you want to move the devices to any administration group after Network Agent installation.

    This option is applicable if you selected one or more unassigned devices at the previous step. If you selected only managed devices, skip this step.

  10. Define other settings of the wizard. For detailed information about the remote installation of apps, please refer to Kaspersky Security Center help.

When the wizard finishes, iOS MDM Server is installed on the selected devices. The iOS MDM Server is displayed in the Mobile Device Management folder in the console tree.

The wizard proceeds to the Install APNs certificate step. If you do not want to manage the certificate right now, you can create a certificate or install an already existing certificate later.

Page top
[Topic 64668]

Receiving an APNs certificate

If you already have an APNs certificate, please consider renewing it instead of creating a new one. When you replace the existing APNs certificate with a newly created one, the Administration Server loses the ability to manage the currently connected iOS mobile devices.

When the Certificate Signing Request (CSR) is created at the first step of the APNs Certificate Wizard, its private key is stored in the RAM of your device. Therefore, all the steps of the wizard must be completed within a single session of the application.

To receive an APNs certificate:

  1. In the Mobile Device Management folder of the console tree, select the Mobile Device Servers subfolder.
  2. In the workspace of the Mobile Device Servers folder, select an iOS MDM Server.
  3. In the context menu of the iOS MDM Server, select Properties.

    This opens the properties window of the iOS MDM Server.

  4. In the properties window of the iOS MDM Server, select the Certificates section.
  5. In the Certificates section, in the Apple Push Notification certificate group of settings, click the Request new button.

    The Request new APNs certificate wizard starts.

  6. Create a Certificate Signing Request (hereinafter referred to as CSR):
    1. Click the Create CSR button.
    2. In the Create CSR window that opens, specify a name for your request, the names of your company and department, your city, region, and country.
    3. Click the Save button and specify a name for the file to which your CSR will be saved.

    The private key of the certificate is saved in the device memory.

  7. Use your CompanyAccount to send the file with the CSR you have created to Kaspersky to be signed.

    Signing of your CSR will only be available after you upload to CompanyAccount portal a key that allows using Mobile Device Management.

    After your online request is processed, you will receive a CSR file signed by Kaspersky.

  8. Send the signed CSR file to Apple Inc. website, using a random Apple ID.

    We recommend that you avoid using a personal Apple ID. Create a dedicated Apple ID to make it your corporate ID. After you have created an Apple ID, link it with the organization's mailbox, not a mailbox of an employee.

    After your CSR is processed in Apple Inc., you will receive the public key of the APNs certificate. Save the file on disk.

  9. Export the APNs certificate together with the private key created when generating the CSR, in PFX file format:
    1. In the Request new APNs certificate wizard, click the Complete CSR button.
    2. In the Open window, choose a file with the public key of the certificate received from Apple Inc. as the result of CSR processing, and then click the Open button.

      The certificate export process starts.

    3. In the next window, enter the private key password and click OK.

      This password will be used for the APNs certificate installation on the iOS MDM Server.

    4. In the Save APNs certificate window that opens, specify a file name for APNs certificate, choose a folder, and then click Save.

The private and public keys of the certificate are combined, and the APNs certificate is saved in PFX format. After this, you can install the APNs certificate on the iOS MDM Server.

See also:

Renewing an APNs certificate

Page top
[Topic 64900]

Renewing an APNs certificate

To renew an APNs certificate:

  1. In the Mobile Device Management folder of the console tree, select the Mobile Device Servers subfolder.
  2. In the workspace of the Mobile Device Servers folder, select an iOS MDM Server.
  3. In the context menu of the iOS MDM Server, select Properties.

    This opens the properties window of the iOS MDM Server.

  4. In the properties window of the iOS MDM Server, select the Certificates section.
  5. In the Certificates section, in the Apple Push Notification certificate group of settings click the Renew button.

    The Renew APNs certificate wizard starts.

  6. Create a Certificate Signing Request (hereinafter referred to as CSR):
    1. Click the Create CSR button.
    2. In the Create CSR window that opens, specify a name for your request, the names of your company and department, your city, region, and country.
    3. Click the Save button and specify a name for the file to which your CSR will be saved.

    The private key of the certificate is saved in the device memory.

  7. Use your CompanyAccount to send the file with the CSR you have created to Kaspersky to be signed.

    Signing of your CSR will only be available after you upload to CompanyAccount portal a key that allows using Mobile Device Management.

    After your online request is processed, you will receive a CSR file signed by Kaspersky.

  8. Send the signed CSR file to Apple Inc. website, using a random Apple ID.

    We recommend that you avoid using a personal Apple ID. Create a dedicated Apple ID to make it your corporate ID. After you have created an Apple ID, link it with the organization's mailbox, not a mailbox of an employee.

    After your CSR is processed in Apple Inc., you will receive the public key of the APNs certificate. Save the file on disk.

  9. Request the public key of the certificate. To do this, perform the following actions:
    1. Proceed to Apple Push Certificates portal. To log in to the portal, use the Apple Id received at the initial request of the certificate.
    2. In the list of certificates, select the certificate whose APSP name (in "APSP: <number>" format) matches the APSP name of the certificate used by iOS MDM Server and click the Renew button.

      The APNs certificate is renewed.

    3. Save the certificate created on the portal.
  10. Export the APNs certificate together with the private key created when generating the CSR, in PFX file format:
    1. In the Renew APNs certificate wizard, click the Complete CSR button.
    2. In the Open window, choose a file with the public key of the certificate, received from Apple Inc. as the result of CSR processing, and click the Open button.

      The certificate export process will start.

    3. In the next window, enter the private key password and click OK.

      This password will be used for the APNs certificate installation on the iOS MDM Server.

    4. In the Renew APNs certificate window that opens, specify a file name for APNs certificate, choose a folder, and then click Save.

The private and public keys of the certificate are combined, and the APNs certificate is saved in PFX format.

See also:

Receiving an APNs certificate

Page top
[Topic 159855]

Configuring a reserve iOS MDM Server certificate

The iOS MDM Server functionality enables you to issue a reserve certificate. This certificate is intended for use in iOS MDM profiles, to ensure seamless switching of managed iOS devices after the iOS MDM Server certificate expires.

If your iOS MDM Server uses a default certificate issued by Kaspersky, you can issue a reserve certificate (or specify your own custom certificate as reserve) before the iOS MDM Server certificate expires. By default, the reserve certificate is automatically issued 60 days before the iOS MDM Server certificate expiration. The reserve iOS MDM Server certificate becomes the main certificate immediately after the iOS MDM Server certificate expiration. The public key is distributed to all managed devices through configuration profiles, so you do not have to transmit it manually.

To issue an iOS MDM Server reserve certificate or specify a custom reserve certificate:

  1. In the console tree, in the Mobile Device Management folder, select the Mobile Device Servers subfolder.
  2. In the list of Mobile Device Servers, select the relevant iOS MDM Server, and on the right pane, click the Configure iOS MDM Server button.
  3. In the iOS MDM Server settings window that opens, select the Certificates section.
  4. In the Reserve certificate block of settings, do one of the following:
    • If you plan to continue using a self-signed certificate (that is, the one issued by Kaspersky):
      1. Click the Issue button.
      2. In the Activation date window that opens, select one of the two options for the date when the reserve certificate must be applied:
        • If you want to apply the reserve certificate at the time of expiration of the current certificate, select the When current certificate expires option.
        • If you want to apply the reserve certificate before the current certificate expires, select the After specified period (days) option. In the entry field next to this option, specify the duration of the period after which the reserve certificate must replace the current certificate.

        The validity period of the reserve certificate that you specify cannot exceed the validity term of the current iOS MDM Server certificate.

      3. Click the OK button.

      The reserve iOS MDM Server certificate is issued.

    • If you plan to use a custom certificate issued by your certification authority:
      1. Click the Add button.
      2. In the File Explorer window that opens, specify a certificate file in the PEM, PFX, or P12 format, which is stored on your device, and then click the Open button.

      Your custom certificate is specified as the reserve iOS MDM Server certificate.

You have a reserve iOS MDM Server certificate specified. The details of the reserve certificate are displayed in the Reserve certificate block of settings (certificate name, issuer name, expiration date, and the date the reserve certificate must be applied, if any).

See also:

Adding a configuration profile

Page top
[Topic 210607]

Installing an APNs certificate on an iOS MDM Server

After you receive the APNs certificate, you must install it on the iOS MDM Server.

To install the APNs certificate on the iOS MDM Server:

  1. In the Mobile Device Management folder of the console tree, select the Mobile Device Servers subfolder.
  2. In the workspace of the Mobile Device Servers folder, select an iOS MDM Server.
  3. In the context menu of the iOS MDM Server, select Properties.

    This opens the properties window of the iOS MDM Server.

  4. In the properties window of the iOS MDM Server, select the Certificates section.
  5. In the Certificates section, in the Apple Push Notification certificate group of settings click the Install button.
  6. Select the PFX file that contains the APNs certificate.
  7. Enter the password of the private key specified when exporting the APNs certificate.

The APNs certificate will be installed on the iOS MDM Server. The certificate details will be displayed in the properties window of the iOS MDM Server, in the Certificates section.

Page top
[Topic 64666]

Configuring access to Apple Push Notification service

To ensure a proper functioning of the iOS MDM web service and timely responses of mobile devices to the administrator's commands, you need to specify an Apple Push Notification Service certificate (hereinafter referred to as APNs certificate) in the iOS MDM Server settings.

Interacting with Apple Push Notification (hereinafter referred to as APNs), the iOS MDM web service connects to the external address api.push.apple.com through port 2197 (outbound). Therefore, the iOS MDM web service requires access to port TCP 2197 for the range of addresses 17.0.0.0/8. From the iOS device side is access to port TCP 5223 for the range of addresses 17.0.0.0/8.

If you intend to access APNs from the iOS MDM web service side through a proxy server, you must perform the following actions on the device with the iOS MDM web service installed:

  1. Add the following strings to the registry:
    • For 32-bit operating systems:

    HKEY_LOCAL_MACHINE\SOFTWARE\KasperskyLab\Components\34\Connectors\KLIOSMDM\1.0.0.0\Conset

    "ApnProxyHost"="<Proxy Host Name>"

    "ApnProxyPort"="<Proxy Port>"

    "ApnProxyLogin"="<Proxy Login>"

    "ApnProxyPwd"="<Proxy Password>"

    • For 64-bit operating systems:

    HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\KasperskyLab\Components\34\Connectors\KLIOSMDM\1.0.0.0\Conset

    "ApnProxyHost"="<Proxy Host Name>"

    "ApnProxyPort"="<Proxy Port>"

    "ApnProxyLogin"="<Proxy Login>"

    "ApnProxyPwd"="<Proxy Password>"

  2. Restart the iOS MDM web service.

See also:

Receiving an APNs certificate

Page top
[Topic 92518]

Connecting KES devices to the Administration Server

Depending on the method used for connection of devices to the Administration Server, two deployment schemes are possible:

  • Scheme of deployment with direct connection of devices to the Administration Server
  • Scheme of deployment involving Forefront Threat Management Gateway (TMG)

In this section

Direct connection of devices to the Administration Server

Scheme for connecting KES devices to the Server involving Kerberos constrained delegation (KCD)

Using Firebase Cloud Messaging

Page top
[Topic 92520]

Direct connection of devices to the Administration Server

KES devices can connect directly to port 13292 of the Administration Server.

Depending on the method used for authentication, two options are possible for connection of KES devices to the Administration Server:

  • Connecting devices with a user certificate
  • Connecting devices without a user certificate

Connecting a device with a user certificate

When connecting a device with a user certificate, that device is associated with the user account to which the corresponding certificate has been assigned through Administration Server tools.

In this case, two-way SSL authentication (mutual authentication) will be used. Both the Administration Server and the device will be authenticated with certificates.

Connecting a device without a user certificate

When connecting a device without a user certificate, that device is associated with none of the user's accounts on the Administration Server. However, when the device receives any certificate, the device will be associated with the user to which the corresponding certificate has been assigned through Administration Server tools.

When connecting that device to the Administration Server, one-way SSL authentication will be applied, which means that only the Administration Server is authenticated with the certificate. After the device retrieves the user certificate, the type of authentication will change to two-way SSL authentication (2-way SSL authentication, mutual authentication).

Page top
[Topic 92521]

Scheme for connecting KES devices to the Server involving Kerberos constrained delegation (KCD)

The scheme for connecting KES devices to the Administration Server involving Kerberos constrained delegation (KCD) provides for the following:

  • Integration with Microsoft Forefront TMG.
  • Use of Kerberos Constrained Delegation (hereinafter referred to as KCD) for authentication of mobile devices.
  • Integration with Public Key Infrastructure (hereinafter referred to as PKI) for applying user certificates.

When using this connection scheme, please note the following:

  • The type of connection of KES devices to TMG must be "two-way SSL authentication", that is, a device must connect to TMG through its proprietary user certificate. To do this, you need to integrate the user certificate into the installation package of Kaspersky Endpoint Security for Android, which has been installed on the device. This KES package must be created by the Administration Server specifically for this device (user).
  • You must specify the special (customized) certificate instead of the default server certificate for the mobile protocol:
    1. In the Administration Server properties window, in the Settings section, select the Open port for mobile devices check box and select Add certificate in the drop-down list.
    2. In the window that opens, specify the same certificate that was set on TMG when the point of access to the mobile protocol was published on the Administration Server.
  • User certificates for KES devices must be issued by the Certificate Authority (CA) of the domain. Keep in mind that if the domain includes multiple root CAs, user certificates must be issued by the CA, which has been set in the publication on TMG.

    You can make sure the user certificate is in compliance with the above-described requirement, using one of the following methods:

    • Specify the special user certificate in the New package wizard and in the Certificate installation wizard.
    • Integrate the Administration Server with the domain's PKI and define the corresponding setting in the rules for issuance of certificates:
      1. In the console tree, expand the Mobile Device Management folder and select the Certificates subfolder.
      2. In the workspace of the Certificates folder, click the Configure certificate issuance rules button to open the Certificate issuance rules window.
      3. In the Integration with PKI section, configure integration with the Public Key Infrastructure.
      4. In the Issuance of mobile certificates section, specify the source of certificates.

Below is an example of setup of Kerberos Constrained Delegation (KCD) with the following assumptions:

  • Point of access to the mobile protocol on the Administration Server is set up on port 13292.
  • The name of the device with TMG is tmg.mydom.local.
  • The name of the device with Administration Server is ksc.mydom.local.
  • Name of the external publishing of the point of access to the mobile protocol is kes4mob.mydom.global.

Domain account for Administration Server

You must create a domain account (for example, KSCMobileSrvcUsr) under which the Administration Server service will run. You can specify an account for the Administration Server service when installing the Administration Server or through the klsrvswch utility. The klsrvswch utility is located in the installation folder of Administration Server.

A domain account must be specified by the following reasons:

  • The feature for management of KES devices is an integral part of Administration Server.
  • To ensure a proper functioning of Kerberos Constrained Delegation (KCD), the receive side (i.e., the Administration Server) must run under a domain account.

Service Principal Name for http/kes4mob.mydom.local

In the domain, under the KSCMobileSrvcUsr account, add an SPN for publishing the mobile protocol service on port 13292 of the device with Administration Server. For the kes4mob.mydom.local device with Administration Server, this will appear as follows:

setspn -a http/kes4mob.mydom.local:13292 mydom\KSCMobileSrvcUsr

Configuring the domain properties of the device with TMG (tmg.mydom.local)

To delegate traffic, you must trust the device with TMG (tmg.mydom.local) to the service defined by the SPN (http/kes4mob.mydom.local:13292).

To trust the device with TMG to the service defined by the SPN (http/kes4mob.mydom.local:13292), the administrator must perform the following actions:

  1. In the Microsoft Management Console snap-in named "Active Directory Users and Computers", select the device with TMG installed (tmg.mydom.local).
  2. In the device properties, on the Delegation tab, set the Trust this computer for delegation to specified service only toggle to Use any authentication protocol.
  3. In the Services to which this account can present delegated credentials list, add the SPN http/kes4mob.mydom.local:13292.

Special (customized) certificate for the publishing (kes4mob.mydom.global)

To publish the mobile protocol of Administration Server, you must issue a special (customized) certificate for the FQDN kes4mob.mydom.global and specify it instead of the default server certificate in the settings of the mobile protocol of Administration Server in Administration Console. To do this, in the properties window of the Administration Server, in the Settings section select the Open port for mobile devices check box and then select Add certificate in the drop-down list.

Please note that the server certificate container (file with the p12 or pfx extension) must also contain a chain of root certificates (public keys).

Configuring publication on TMG

On TMG, for traffic that goes from the mobile device side to port 13292 of kes4mob.mydom.global, you have to configure KCD on the SPN (http/kes4mob.mydom.local:13292), using the server certificate issued for the FQND kes4mob.mydom.global. Please note that publishing and the published access point (port 13292 of the Administration Server) must share the same server certificate.

See also:

Integration with Public Key Infrastructure

Page top
[Topic 92523]

Using Firebase Cloud Messaging

To ensure timely delivery of commands to KES devices managed by the Android operating system, Kaspersky Security Center uses the mechanism of push notifications. Push notifications are exchanged between KES devices and Administration Server through Firebase Cloud Messaging (hereinafter referred to as FCM). In Kaspersky Security Center Administration Console, you can specify the Firebase Cloud Messaging settings to connect KES devices to the service.

To retrieve the settings of Firebase Cloud Messaging, you must have a Google account.

To enable the use of FCM:

  1. In Administration Console, select the Mobile Device Management node, and the Mobile devices folder.
  2. In the context menu of the Mobile devices folder, select Properties.
  3. In the folder properties, select the Google Firebase Cloud Messaging settings section.
  4. In the Sender ID field, specify the FCM Sender ID.
  5. In the Private key file (in JSON format) field, select the private key file.

At the next synchronization with Administration Server, KES devices managed by Android operating systems will be connected to Firebase Cloud Messaging.

You can edit the Firebase Cloud Messaging settings by clicking the Reset settings button.

When you switch to a different Firebase project, you need to wait 10 minutes for FCM to resume.

FCM service runs in the following address ranges:

  • From the KES device's side, access is required to ports 443 (HTTPS), 5228 (HTTPS), 5229 (HTTPS), and 5230 (HTTPS) of the following addresses:
    • google.com
    • fcm.googleapis.com
    • android.apis.google.com
    • All of the IP addresses listed in Google's ASN of 15169
  • From the Administration Server side, access is required to port 443 (HTTPS) of the following addresses:
    • fcm.googleapis.com
    • All of the IP addresses listed in Google's ASN of 15169

If the proxy server settings (Advanced / Configuring Internet access) have been specified in the Administration Server properties in Administration Console, they will be used for interaction with FCM.

Configuring FCM: getting the Sender ID and private key file

To configure FCM:

  1. Register on the Google portal.
  2. Go to the Firebase console.
  3. Do one of the following:
    • To create a new project, click Create a project and follow the instructions on the screen.
    • Open an existing project.
  4. Click the gear icon and choose Project settings.

    The Project settings window opens.

  5. Select the Cloud Messaging tab.
  6. Retrieve the relevant Sender ID from the Sender ID field in the Firebase Cloud Messaging API (V1) section.
  7. Select the Service accounts tab and click Generate new private key.
  8. In the window that opens, click Generate key to generate and download a private key file.

Firebase Cloud Messaging is now configured.

Page top
[Topic 92525]

Disabling Mobile Device Management

Disabling Mobile Device Management is only available on the primary Administration Server.

To disable Mobile Device Management:

  1. In the console tree, select the Mobile Device Management folder.
  2. In the workspace of this folder, click the Add iOS mobile device link.

    The Additional components page of the Administration Server quick start wizard is displayed.

  3. Select Do not enable Mobile Device Management if you do not want to manage mobile devices any longer.
  4. Click OK.

Previously connected mobile devices will not be able to connect to Administration Server. The port for mobile device connection and the port for mobile device activation will be closed automatically.

Policies that were created for Kaspersky Endpoint Security for Android and Kaspersky Device Management for iOS will not be deleted. The certificate issuance rules will not be modified. The plug-ins that have been installed will not be removed. The moving rule for mobile devices will not be deleted.

After you re-enable Mobile Device Management on managed mobile devices, you may have to reinstall mobile apps that are required for mobile device management.

See also:

Scenario: Mobile Device Management deployment

Page top
[Topic 148249]