Contents
- Deploying a management system using the iOS MDM protocol
- Deploying iOS MDM Server
- Configuring an iOS MDM Server installation package
- Installing iOS MDM Server using a remote installation task
- Local installation of iOS MDM Server on a device via an installation package
- Updating iOS MDM Server using a remote installation task or locally
- Deleting iOS MDM Server using a remote uninstallation task
- Viewing the list of installed iOS MDM Servers and configuring their settings
- Configuring an iOS MDM Server certificate
- Configuring a reserve iOS MDM Server certificate
- Receiving or renewing an APNs certificate
- Installing an APNs certificate on iOS MDM Server
- Configuring access to Apple Push Notification service
- iOS MDM Server events
- Obtaining iOS MDM Server diagnostic data
- Deploying iOS MDM Server
Deploying a management system using the iOS MDM protocol
iOS devices with basic control and supervised operating modes are managed using the iOS MDM protocol. To deploy a mobile management system using the iOS MDM protocol and connect iOS devices to Kaspersky Security Center, follow these steps:
- Deploy iOS MDM Server
- Receive an APNs certificate
- Install the APNs certificate on iOS MDM Server
- Connect iOS devices to Kaspersky Security Center
Deploying iOS MDM Server
iOS MDM Server is a component of Kaspersky Secure Mobility Management which allows iOS MDM devices to connect to Kaspersky Security Center and facilitates management of these devices through Apple Push Notifications (APNs) by installing dedicated device management profiles on them.
iOS MDM Server receives inbound connections from mobile devices through its TLS port (by default, port 443), which is managed by Kaspersky Security Center using Network Agent. Network Agent is installed locally on a device with an iOS MDM Server deployed.
The number of copies of iOS MDM Server to be installed can be selected either based on available hardware or on the total number of mobile devices covered.
Please keep in mind that the recommended maximum number of mobile devices to be managed through iOS MDM Server is 50,000. In order to reduce the load, the entire pool of devices can be distributed among several servers that have iOS MDM Server installed.
Page topConfiguring an iOS MDM Server installation package
Before you install iOS MDM Server, you need to configure the iOS MDM Server installation package properties.
The iOS MDM Server installation package is an archive that contains the files required for the installation of the iOS MDM Server depending on the package manager and architecture: kliosmdm-<architecture>-<version>-<package manager>_<language>.tar.gz
To configure an iOS MDM Server installation package:
- In the main window of Kaspersky Security Center We Console, select Operations > Repositories > Installation packages.
- In the window that opens, click the iOS MDM Server installation package you want to configure.
The installation package properties window opens.
- In the Settings tab, specify the iOS MDM Server properties.
- In the Connection settings group of settings, configure the following properties:
It is recommended to use the default values.
- iOS MDM external connection port. In this field, specify an external port for connecting mobile devices to the iOS MDM service.
External port 5223 is used by mobile devices for communication with the APNs server. Make sure that port 5223 is open in the Firewall for connecting with the address range 17.0.0.0/8.
Port 443 is used for connecting to iOS MDM Server by default. If port 443 is already in use by another service or application, it can be replaced with, for example, port 9443.
Port 2197 is used by iOS MDM Server to send notifications to the APNs server. APNs servers run in load-balancing mode. Mobile devices do not always connect to the same IP addresses to receive notifications. The 17.0.0.0/8 address range is reserved for Apple, and it is therefore recommended to specify this entire range as an allowed range in Firewall settings.
- Network Agent connection port. In this field, specify a port for connecting the iOS MDM service to Network Agent. The default port number is 9799.
- iOS MDM local connection port. In this field, specify a local port for connecting Network Agent to the iOS MDM service. The default port number is 9899.
- iOS MDM external connection port. In this field, specify an external port for connecting mobile devices to the iOS MDM service.
- In the iOS MDM Server address group of settings, specify the address of the workstation on which iOS MDM Server is to be installed. This address will be used for connecting managed mobile devices to the iOS MDM service. The workstation must be available for connection of iOS MDM devices.
Choose one of the following options:
- Use FQDN device name. The fully qualified domain name (FQDN) of the device will be used.
- Use specified address. Specify the specific address of the device manually.
Do not add the URL scheme and the port number in the address string. These values will be added automatically.
- In the Connection settings group of settings, configure the following properties:
- Click Save.
The iOS MDM Server installation package properties are configured. Now you can install iOS MDM Server with the specified settings.
Page topInstalling iOS MDM Server using a remote installation task
Kaspersky Security Center Web Console lets you install iOS MDM Server remotely using a remote installation task. This task is created and assigned to up to 1000 devices through a corresponding wizard. The wizard will help install iOS MDM Server in an administration group, on devices with specific IP addresses, or on a selection of managed devices.
Please note that you will not be able to specify the iOS MDM Server settings during the installation. The settings are configured in the iOS MDM Server installation package properties.
Before installing iOS MDM Server on a device, make sure the Kaspersky Mobile Devices Protection and Management and iOS MDM Server settings plug-ins are installed.
To install iOS MDM Server using a remote installation task:
- Install Network Agent on a workstation on which iOS MDM Server will be deployed.
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Mobile → iOS MDM Servers.
- Click Install.
The New task wizard starts. Proceed through the wizard using the Next button.
- In the New task settings window that opens:
- In the Task name field, specify a custom name for the task, if necessary (The default name is "Install iOS MDM Server").
- In the Devices to which the task will be assigned group of settings, choose Specify device addresses manually or import addresses from a list. You can specify DNS names, IP addresses, and IP subnets of devices to which you want to assign the task.
- At the Task scope step:
- Click Add devices.
- In the window that opens, in the drop-down list, choose the Select networked devices detected by Administration Server option.
- Select devices or a device selection.
- Click Add.
After you add the devices, they are displayed in the table.
- At the Installation packages step, specify the following settings:
- In the Select installation package field, select the configured iOS MDM Server installation package.
- In the Select Network Agent field, select the installed Network Agent.
- In the Force installation package download group of settings, select the Using Network Agent check box to distribute the files that are required for iOS MDM Server installation via Network Agent.
- In the Maximum number of concurrent downloads field, specify the maximum allowed number of devices to which Administration Server can simultaneously transmit the files.
- In the Maximum number of installation attempts field, specify the maximum number of times the installer will be allowed to run.
- Specify the additional settings:
- Click the Do not re-install application if it is already installed check box. The application will not be re-installed if it has already been installed on the device.
- Click the Verify operating system type before downloading check box. Before transmitting the files to devices, Kaspersky Security Center checks if the installation utility settings are applicable to the operating system of the device. If the settings are not applicable, Kaspersky Security Center does not transmit the files and does not attempt to install the application. For example, to install some application to devices of an administration group that includes devices running various operating systems, you can assign the installation task to the administration group, and then enable this option to skip devices that run an operating system other than the required one.
- At the next step of the wizard, you will be prompted to select the action that will be performed if installation process prompts to restart the operating system. Select the Do not restart the device option or skip this step, as it does not apply to Linux operating system.
- At the Select accounts to access devices step, choose the No account required (Network Agent installed) option. If this option is selected, you do not have to specify the account under which the application installer will be run. The task will run under the account under which the Administration Server service is running. If Network Agent has not been installed on devices, this option is unavailable.
- At the Finish task creation step, click the Finish button to create the task and close the wizard.
iOS MDM Server is installed using a remote installation task.
Page topLocal installation of iOS MDM Server on a device via an installation package
Kaspersky Security Center Web Console lets you install iOS MDM Server on a local device using an installation package, that is, without interactively inputting the installation settings.
Before installing iOS MDM Server on a device, make sure the Kaspersky Mobile Devices Protection and Management and iOS MDM Server settings plug-ins are installed.
To install and configure iOS MDM Server on a local device manually:
- Install iOS MDM Server:
- Read the End User License Agreement. Use the command below only if you understand and accept the terms of the End User License Agreement.
- Depending on your operating system, run one of the following commands to launch the installation file:
- For Debian:
apt install /<path>/kliosmdm_<version_number>_amd64.deb
- For Red Hat Enterprise Linux:
yum install /<path>/kliosmdm_<version_number>.x86_64.rpm -y
iOS MDM Server is installed. The installer offers to start the setup procedure by executing the postinstall.pl script.
- For Debian:
- Configure iOS MDM Server using one of the methods:
- Configuration with the postinstall settings specified by the interactive step-by-step wizard:
- Run the following command:
/opt/kaspersky/iosmdm/lib/bin/setup/postinstall.pl
- Run the following command:
- Configuration with the key arguments specified as postinstall settings:
- Run the following command:
opt/kaspersky/bin/postinstall.pl -- <
params
>
where
<
params
>
is one of the settings specified in the iOS MDM Server installation settings table below.
- Run the following command:
- Configuration with the postinstall settings specified by the interactive step-by-step wizard:
The names and possible values for the settings that can be configured when installing iOS MDM Server are listed in the table. You can specify these settings in any convenient order.
iOS MDM Server installation settings
Setting name |
Setting description |
Values |
---|---|---|
EULA_ACCEPTED |
Acceptance of the terms of the End User License Agreement. This setting is mandatory. |
|
DONT_USE_ANSWER_FILE |
Whether or not to use a TXT answer file with iOS MDM Server installation settings. The file is included in the installation package or stored on the Administration Server. You do not have to specify an additional path to the file. This setting is mandatory. |
|
CONNECTORPORT |
Local port for connecting the iOS MDM service to Network Agent. The default port number is 9799. This setting is optional. |
Numerical value - 9799 |
LOCALSERVERPORT |
Local port for connecting Network Agent to the iOS MDM service. The default port number is 9899. This setting is optional. |
Numerical value - 9899 |
EXTERNALSERVERPORT |
Port for connecting a device to iOS MDM Server. The default port number is 443. This setting is optional. |
Numerical value - 443 |
EXTERNAL_SERVER_URL |
External address of the device on which iOS MDM Server is to be installed. This address will be used for connecting managed mobile devices to the iOS MDM service. The device must be available for connection through iOS MDM. The address must not include the URL scheme and number of the port because these values will be added automatically. This setting is optional. |
Device FQDN - example.fqdn.com |
Example:
|
To install and configure iOS MDM Server in silent mode automatically using an answer file:
An answer file is a text file that contains a custom set of installation settings (variables and their corresponding values).
- Create an answer file (in TXT format) in the directory where the installation will be performed:
/tmp/answers.txt
. - Specify the required values in the answer file:
- EULA_ACCEPTED=1
Acceptance of the terms of the End User License Agreement.
- KLIOSMDM_AUTOINSTALL=1
Using a TXT answer file with iOS MDM Server installation settings.
- EXTERNALSERVERPORT=443
Port for connecting a device to iOS MDM Server.
- CONNECTORPORT=9799
Local port for connecting the iOS MDM service to Network Agent.
- LOCALSERVERPORT=9899
Local port for connecting Network Agent to the iOS MDM service.
- EXTERNAL_SERVER_URL=example.fqdn.com
External address of the device on which iOS MDM Server is to be installed.
- EULA_ACCEPTED=1
- Set the value of the KLAUTOANSWERS environment variable by entering the full name of the answer file (including the path), for example:
export KLAUTOANSWERS=/tmp/answers.txt
. - Launch the iOS MDM Server installation.
iOS MDM Server is installed and configured in silent mode automatically using an answer file.
Page topUpdating iOS MDM Server using a remote installation task or locally
Kaspersky Security Center Web Console lets you update iOS MDM Server using a remote installation task or locally on a device.
Please note that you will not be able to specify the iOS MDM Server settings during the update. The settings are configured in the iOS MDM Server installation package properties.
To update iOS MDM Server using a remote installation task:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Mobile → iOS MDM Servers.
- Click Update.
The New task wizard starts. Proceed through the wizard using the Next button.
- In the New task settings window that opens:
- In the Task name field, specify a custom name for the task, if necessary (The default name is Update iOS MDM Server).
- In the Devices to which the task will be assigned group of settings, the device on which iOS MDM Server is installed will be displayed.
- At the Installation packages step, specify the following settings:
- In the Select installation package field, select the configured iOS MDM Server installation package.
- In the Force installation package download group of settings, select the Using Network Agent check box to distribute the files that are required to update iOS MDM Server via Network Agent.
- In the Maximum number of concurrent downloads field, specify the maximum allowed number of client devices to which Administration Server can simultaneously transmit the files.
- In the Maximum number of installation attempts field, specify the maximum number of times the installer will be allowed to run.
- Specify the additional settings:
- Click the Do not re-install application if it is already installed check box. The application will not be re-installed if it has already been installed on this device.
- Click the Verify operating system type before downloading check box. Before transmitting the files to devices, Kaspersky Security Center checks if the installation utility settings are applicable to the operating system of the device. If the settings are not applicable, Kaspersky Security Center does not transmit the files and does not attempt to install the application. For example, to install some application on devices of an administration group that includes devices running various operating systems, you can assign the installation task to the administration group, and then enable this option to skip devices that run an operating system other than the required one.
- At the next step of the wizard, you will be asked to select the action that will be performed if the application installation prompts you to restart the operating system. Select the Do not restart the device option or skip this step, as it does not apply to the Linux operating system.
- At the Select accounts to access devices step, choose the No account required (Network Agent installed) option. If this option is selected, you do not have to specify the account under which the application installer will be run. The task will run under the account under which the Administration Server service is running. If Network Agent has not been installed on devices, this option is unavailable.
- At the Finish task creation step, click the Finish button to create the task and close the wizard.
iOS MDM Server is updated using the remote installation task.
To update iOS MDM Server locally, follow the steps described for Local installation of iOS MDM Server on a device via installation package using the newer version of the installation package.
Page topDeleting iOS MDM Server using a remote uninstallation task
Kaspersky Security Center Web Console lets you delete iOS MDM Server remotely using a remote uninstallation task.
Before deleting iOS MDM Server, make sure the iOS MDM Server installation package has been created and added to the Administration Server repository (Operations > Repositories > Installation packages).
To delete iOS MDM Server:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Mobile → iOS MDM Servers.
- Select the iOS MDM Server that you want to uninstall, and then click Delete.
The New task wizard starts. Follow the wizard steps as described in the Kaspersky Security Center Help.
Viewing the list of installed iOS MDM Servers and configuring their settings
Kaspersky Security Center Web Console lets you view the list of installed iOS MDM Servers and access their settings.
To view the installed iOS MDM Servers:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Mobile → iOS MDM Servers.
- In the list of installed iOS MDM Servers that opens:
- To install iOS MDM Server, click Install.
- To update iOS MDM Server, click Update.
- To delete iOS MDM Server, click Delete.
- To view or configure the iOS MDM Server settings, do one of the following:
- Select the check box next to the iOS MDM Server whose settings you want view or configure, and then click Modify settings.
The Application settings tab of the iOS MDM Server settings window opens.
- Click the name of the iOS MDM Server whose settings you want view or configure.
In the iOS MDM Server settings window that opens, navigate to the Application settings tab.
- Select the check box next to the iOS MDM Server whose settings you want view or configure, and then click Modify settings.
To view or configure the iOS MDM Server settings:
- Navigate to the Application settings tab of the iOS MDM Server settings window using the instructions above.
- In the General section, you can view the general iOS MDM Server properties.
- Name. The iOS MDM Server custom name.
- Version. The version of the installed iOS MDM Server.
- Modified. The date and time of the latest iOS MDM Server update or modification.
- Host name. The name of the device on which iOS MDM Server is installed.
- Host path. The path to iOS MDM Server on the device on which it is installed.
You cannot modify the settings in this section.
- In the APNs proxy server section, you can specify the following settings for Apple Push Notification Service (APNs):
- Address. APNs proxy server address.
- Port. APNs proxy server port.
- User name. APNs proxy user name.
- Password. APNs proxy password.
If you intend to access APNs from the iOS MDM service through a proxy server, the Use proxy server to connect to APNs option must be enabled.
For detailed information on APNs proxy server, refer to the Configuring access to Apple Push Notification service section.
- In the Certificates section, you can manage the certificates required for the operation of iOS MDM Server.
- Apple Push Notification service (APNs) certificate. The APNs certificate is signed by Apple and lets you use Apple Push Notification. Through Apple Push Notification, an iOS MDM Server can manage iOS devices. For detailed information on the APNs certificate, refer to the Receiving or renewing an APNs certificate section.
- iOS MDM Server certificate. The iOS MDM Server certificate is used to establish the connection and verify trust between iOS devices and iOS MDM Server.
- iOS MDM Server reserve certificate. The iOS MDM Server reserve certificate ensures seamless switching of iOS devices after the main iOS MDM Server certificate expires. For detailed information on the iOS MDM Server reserve certificate, refer to the Configuring a reserve iOS MDM Server certificate section.
- iOS MDM Server root certificate. The iOS MDM Server root certificate is used to issue client certificates to authenticate on iOS MDM Server.
- In the Connection settings section, you can view and configure the settings for mobile device connection to iOS MDM Server.
- In the Synchronization block of settings, you can enable or disable the synchronization of managed devices with iOS MDM Server and specify the Synchronization period (min).
- In the Local access point block of settings, you can specify the Network Agent connection port (a port for connecting iOS devices to Network Agent) and iOS MDM local connection port (a local port for connecting Network Agent to the iOS MDM service). For detailed information on these values, refer to the Configuring an iOS MDM Server installation package section.
- In the External access point block of settings, you can specify the iOS MDM external connection port (external port for connecting mobile devices to the iOS MDM service).
- In the iOS MDM installation profile block of settings, you can configure the installation profile properties. You can specify Profile name (a mandatory field), Company, and Profile description.
Please note that the settings in this section are applied to newly connected iOS MDM devices or to previously connected iOS MDM devices when their mobile certificates are renewed.
- In the Configuration profiles section, you can view and manage configuration profiles, which are used to centrally define the settings of managed iOS devices and restrict the features of these devices. For detailed information on managing configuration profiles, refer to the Adding a configuration profile, Installing a configuration profile on a device, and Removing a configuration profile from a device sections.
- In the General section, you can view the general iOS MDM Server properties.
Configuring an iOS MDM Server certificate
The iOS MDM server certificate is used to establish a connection and verify trust between the iOS MDM device and iOS MDM Server.
The iOS MDM Server certificate is issued by Kaspersky Security Center automatically upon the initial deployment of iOS MDM Server and installed on a device where iOS MDM Server is deployed. If you want to use a certificate issued by your certification authority, you need to specify a custom certificate file that will be used as an iOS MDM Server certificate.
If you specify a custom iOS MDM Server certificate, the Issue button for the iOS MDM Server reserve certificate will become unavailable. You need to specify the reserve certificate manually by clicking Install.
To specify a custom iOS MDM Server certificate:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Mobile → iOS MDM Servers. In the list of iOS MDM Servers that opens, click the iOS MDM Server whose settings you want to configure.
- In the iOS MDM Server settings window, select Application settings.
- Select the Certificates tab.
- In the iOS MDM Server certificate block of settings, click Install.
- In the File Explorer window that opens, specify a certificate file in PEM, PFX, or P12 format, and then click Open.
Make sure the certificate you install complies with the following security requirements:
- Common Name (CN) is specified;
- a correct Subject Alternative Name (SAN) of DNS is specified and matches the iOS MDM Server connection address;
- a correct certificate publisher is specified;
- a correct certificate expiration date is specified;
- the certificate chain is complete;
- Extended Key Usage (EKU) is XKU_SSL_SERVER (1.3.6.1.5.5.7.3.1 serverAuth);
- the root certificate is the same as the root certificate of the current certificate;
- the RSA key size in the certificate chain is at least 2048 bits;
- the RSA key size of the root certificate is at least 4096 bits;
- the hash algorithm in the certificate chain is from the SHA-2 family.
- In the Installing certificate window that opens, enter the certificate password, and then click Install.
- Click Save.
Your custom certificate is specified as the iOS MDM Server certificate. The certificate details are displayed in the iOS MDM Server certificate block of settings.
Page topConfiguring a reserve iOS MDM Server certificate
The iOS MDM Server functionality lets you issue a reserve certificate. This certificate is intended for use in device management profiles to ensure seamless switching of managed iOS devices after the iOS MDM Server certificate expires.
If your iOS MDM Server uses a default certificate issued by Kaspersky, you can issue a reserve certificate (or specify your own custom certificate as a reserve one) before the iOS MDM Server certificate expires. By default, the reserve certificate is automatically issued 60 days before the iOS MDM Server certificate expires. The reserve iOS MDM Server certificate becomes the main certificate immediately after the iOS MDM Server certificate expires. The public key is distributed to all managed devices through configuration profiles, so you do not have to transmit it manually.
Please note that the reserve iOS MDM Server certificate is not issued automatically if you use an iOS MDM Server custom certificate. If you use a custom certificate, we recommend that you specify a reserve certificate when installing iOS MDM Server or no later than 30 days before the expiration of the existing iOS MDM Server certificate.
If the certificate expires and no reserve has been specified, the connection between iOS MDM Server and iOS MDM devices will be lost. In this case, to reconnect devices, you must specify a new certificate and reinstall device management profiles on each of the managed devices.
To issue a reserve iOS MDM Server certificate or specify a custom reserve certificate:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Mobile → iOS MDM Servers. In the list of iOS MDM Servers that opens, click the iOS MDM Server whose settings you want to configure.
- In the iOS MDM Server settings window, select Application settings.
- Select the Certificates tab.
- In the iOS MDM Server reserve certificate block of settings, do one of the following:
- If you plan to continue using a self-signed certificate (the one issued by Kaspersky):
- Click Issue.
If you have a custom iOS MDM Server certificate specified, the Issue button for the iOS MDM Server reserve certificate will be unavailable. You need to specify the reserve certificate manually by clicking Install.
- In the Apply iOS MDM Server reserve certificate window that opens, select one of the two options for the date when the reserve certificate should be applied:
- If you want to apply the reserve certificate when the current certificate expires, select the After the current certificate expires option.
- If you want to apply the reserve certificate before the current certificate expires, select the After specified period (days) option. In the entry field next to this option, specify the duration of the period after which the reserve certificate must replace the current certificate.
The validity period of the reserve certificate that you specify cannot exceed the validity period of the current iOS MDM Server certificate.
- Click OK.
The self-signed reserve iOS MDM Server certificate is issued and specified as the reserve iOS MDM Server certificate.
Please note that when you specify the date when the reserve certificate should be applied, the certificate will be issued before you save the changes in the Certificates section. If you want to issue a new reserve certificate, open the iOS MDM Server settings again, remove the previously issued reserve certificate by clicking Delete, and issue a new reserve certificate by following the instructions above.
- Click Issue.
- If you plan to use a custom certificate issued by your certification authority:
- Click Install.
- In the File Explorer window that opens, specify a certificate file in PEM, PFX, or P12 format, and then click Open.
Make sure the certificate you install complies with the following security requirements:
- a correct Subject Alternative Name (SAN) of DNS is specified and matches the iOS MDM Server connection address;
- a correct certificate publisher is specified;
- a correct certificate expiration date is specified;
- the certificate chain is complete;
- Extended Key Usage (EKU) is XKU_SSL_SERVER (1.3.6.1.5.5.7.3.1 serverAuth);
- the root certificate is the same as the root certificate of the current certificate;
- the RSA key size in the certificate chain is at least 2048 bits;
- the RSA key size of the root certificate is at least 4096 bits;
- the hash algorithm in the certificate chain is from the SHA-2 family.
- In the Installing certificate window that opens, enter the certificate password, and then click Install.
- Click Save.
Your custom certificate is specified as the reserve iOS MDM Server certificate.
Please note that when you specify the date when the reserve certificate should be applied, the certificate will be issued before you save the changes in the Certificates section. If you want to issue a new reserve certificate, open the iOS MDM Server settings again, remove the previously issued reserve certificate by clicking Delete, and issue a new reserve certificate by following the instructions above.
- If you plan to continue using a self-signed certificate (the one issued by Kaspersky):
You have a specified reserve iOS MDM Server certificate. The reserve certificate details are displayed in the iOS MDM Server reserve certificate block of settings.
Page topReceiving or renewing an APNs certificate
To ensure proper functioning of the iOS MDM service and timely responses of mobile devices to the administrator's commands, you need to specify an Apple Push Notification service certificate (APNs certificate) in the iOS MDM Server settings.
If you already have an APNs certificate, please consider renewing it instead of receiving a new one. When you replace the existing APNs certificate with a newly created one, Administration Server can no longer manage the previously connected iOS MDM devices.
To issue or renew an APNs certificate:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Mobile → iOS MDM Servers. In the list of iOS MDM Servers that opens, click the iOS MDM Server whose settings you want to configure.
- In the iOS MDM Server settings window, select Application settings.
- Select the Certificates tab.
- In the Apple Push Notification service (APNs) certificate block of settings, click Issue or renew.
The APNs certificate wizard opens. Click Start and then proceed through the wizard using the Back and Next buttons.
When the Certificate Signing Request (CSR) is created at the first step of the wizard, its private key is stored in the RAM of your device. Accordingly, all the steps of the wizard must be completed without interruption within a single session.
Step 1. Create a Certificate Signing Request (CSR)
To create a CSR:
- Specify the required information for generating a request file: Common Name (CN), Organization Name (O), Organization Unit Name (OU), City (L), Region (S), Country (C).
- Click Save.
After you save the changes, a CSR file will be generated, and the private key of the certificate will be saved in the device memory.
Step 2. Sign the CSR file
At this step, send the CSR file that you received in the previous step of the wizard to Kaspersky for signing:
- Click Go to Kaspersky CompanyAccount.
- Send the created CSR file to Kaspersky to be signed.
Please note that you will be able to sign the CSR file only after you upload a key that lets you use the Mobile Device Management solution.
- After your request is successfully processed, you will receive a CSR file signed by Kaspersky.
- Save the received file.
Step 3. Receive the APNs certificate public key
At this step, do one of the following if you want to issue a new certificate or renew an existing one:
To issue a new certificate:
- Click Go to Apple portal.
- Log in to the Apple portal with a corporate Apple ID.
We recommend that you avoid using a personal Apple ID. Create a dedicated Apple ID to make it your corporate ID. After you have created an Apple ID, link it with the organization's mailbox, not a mailbox of an employee.
- Upload a signed CSR file.
The file will be used to generate the public key of the APNs certificate.
- After your CSR is processed by Apple, you will receive the public key of the APNs certificate.
Save the received file.
To renew a certificate:
- Click Go to Apple portal.
- Log in to the Apple portal with a corporate Apple ID.
We recommend that you avoid using a personal Apple ID. Create a dedicated Apple ID to make it your corporate ID. After you have created an Apple ID, link it with the organization's mailbox, not a mailbox of an employee.
- Specify the certificate you want to renew.
- Upload a signed CSR file.
The file will be used to generate the public key of the APNs certificate.
- After your CSR is processed by Apple, you will receive the public key of the APNs certificate.
Save the received file.
Step 4. Specify the APNs certificate public key
At this step, upload the public key file received from Apple in the previous step of the wizard:
- Click Select.
- In the File Explorer window that opens, specify a certificate file in PEM, PFX, or P12 format, and then click Open.
Step 5. Specify the APNs certificate private key password
At this step, enter the certificate name and private key password:
- In the Certificate name field, specify a custom name for the certificate.
- In the Private key password field, specify the private key password for the certificate.
This password will be used to install the APNs certificate on iOS MDM Server.
- In the Confirm password, enter the password again.
Step 6. Complete the CSR
At this step, the APNs certificate is generated and ready to be installed on iOS MDM Server.
- To complete the CSR, click Download APNs certificate to save the created certificate.
- Click Done to exit the wizard.
The private and public keys of the certificate are combined, and the APNs certificate is saved in PEM format.
Now you can install the generated APNs certificate on iOS MDM Server.
Page topInstalling an APNs certificate on iOS MDM Server
After the APNs certificate is received, you can install it on iOS MDM Server.
To install the APNs certificate on iOS MDM Server:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Mobile → iOS MDM Servers. In the list of iOS MDM Servers that opens, click the iOS MDM Server whose settings you want to configure.
- In the iOS MDM Server settings window, select Application settings.
- Select the Certificates tab.
- In the Apple Push Notification service (APNs) certificate block of settings:
- Click Install.
- In the File Explorer window that opens, specify a certificate file in PEM format, and then click Open.
Make sure the certificate you install complies with the following security requirements:
- Common Name (CN) is specified;
- a correct APNs topic is specified;
- a correct certificate publisher is specified;
- a correct certificate expiration date is specified.
- In the Installing certificate window that opens, enter the private key password specified when receiving the APNs certificate, and then click Install.
The APNs certificate will be installed on iOS MDM Server. The certificate details will be displayed in the Apple Push Notification service (APNs) certificate block of settings.
Page topConfiguring access to Apple Push Notification service
To ensure proper functioning of the iOS MDM service and timely responses from mobile devices to the administrator's commands, you need to specify an Apple Push Notification Service certificate (APNs certificate) in the iOS MDM Server settings.
When interacting with Apple Push Notification service (APNs), the iOS MDM service connects to the external address api.push.apple.com through port 2197 (outbound). Therefore, the iOS MDM service requires access to port TCP 2197 for the range of addresses 17.0.0.0/8. From the iOS device, this interaction requires access to port TCP 5223 for the range of addresses 17.0.0.0/8.
If you intend to access APNs from the iOS MDM service through a proxy server, you must enable the use of a proxy server for connecting to APNs.
To enable the use of a proxy server to connect to APNs:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Mobile → iOS MDM Servers. In the list of iOS MDM Servers that opens, click the iOS MDM Server whose settings you want to configure.
- In the iOS MDM Server settings window, select Application settings.
- Select the APNs proxy server tab.
- In the window that opens, enable the Use proxy server to connect to APNs toggle switch.
- Configure the following settings:
- In the Address field, specify the APNs proxy server address.
- In the Port field, specify the APNs proxy server port.
- In the User name field, specify the APNs proxy user name.
- In the Password field, specify the APNs proxy password.
- Click Save.
Proxy server is now used to connect to APNs.
Page topiOS MDM Server events
Kaspersky Security Center Web Console lets you view the events related to iOS MDM Server. The events have different severity levels: Information, Warning, Critical, Functional failure.
For each event that can be generated by iOS MDM Server, you can specify notification and storage settings on the Event configuration tab of the iOS MDM Server settings. We recommend that you configure the settings for each event type after deploying iOS MDM Server to limit the displayed number of events and reduce the event list loading time.
If you want to configure notification settings for all events at once, configure general notification settings in the Administration Server properties. For detailed information on notifications, refer to the Kaspersky Security Center Help.
To view iOS MDM Server events:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Mobile → iOS MDM Servers. In the list of iOS MDM Servers that opens, click the iOS MDM Server whose events you want to view.
- In the iOS MDM Server settings window, select Application settings.
- Select the Events tab.
The iOS MDM Server events are displayed.
For detailed information on viewing events in Kaspersky Security Center Web Console, refer to the Kaspersky Security Center Help.
The table below shows the events of iOS MDM Server that have the Information severity level.
iOS MDM Server information events
Event type display name |
Event type |
Default storage term |
---|---|---|
General information about mobile device requested |
DEVICEINFORMATION_COMMAND_SUCCESSFUL |
30 days |
Security information requested |
SECURITYINFO_COMMAND_SUCCESSFUL |
30 days |
New mobile device connected |
NEW_DEVICE_CONNECTED |
30 days |
List of profiles requested |
PROFILELIST_COMMAND_SUCCESSFUL |
30 days |
Profile installed |
INSTALLPROFILE_COMMAND_SUCCESSFUL |
30 days |
Profile deleted |
REMOVEPROFILE_COMMAND_SUCCESSFUL |
30 days |
List of provisioning profiles requested |
PROVISIONINGPROFILELIST_COMMAND_SUCCESSFUL |
30 days |
Provisioning profile installed |
INSTALLPROVISIONINGPROFILE_COMMAND_SUCCESSFUL |
30 days |
Provisioning profile deleted |
REMOVEPROVISIONINGPROFILE_COMMAND_SUCCESSFUL |
30 days |
List of installed certificates requested |
CERTIFICATELIST_COMMAND_SUCCESSFUL |
30 days |
List of installed apps requested |
INSTALLEDAPPLICATIONLIST_COMMAND_SUCCESSFUL |
30 days |
List of managed apps requested |
MANAGEDAPPLICATIONLIST_COMMAND_SUCCESSFUL |
30 days |
App installation requested |
INSTALLAPPLICATION_COMMAND_SUCCESSFUL |
30 days |
App configuration applied |
APPCONFIG_APPLIED_SUCCESSFUL |
30 days |
Managed app deleted |
REMOVEAPPLICATION_COMMAND_SUCCESSFUL |
30 days |
App redemption code set |
APPLYREDEMPTIONCODE_COMMAND_SUCCESSFUL |
30 days |
Mobile device locked |
DEVICELOCK_COMMAND_SUCCESSFUL |
30 days |
Password reset |
CLEARPASSCODE_COMMAND_SUCCESSFULL |
30 days |
Data from mobile device wiped |
ERASEDEVICE_COMMAND_SUCCESSFUL |
30 days |
Operating system update scheduled |
SCHEDULEOSUPDATE_COMMAND_SUCCESSFULL |
30 days |
Roaming settings applied |
SETROAMINGSETTINGS_COMMAND_SUCCESSFUL |
30 days |
Bluetooth settings applied |
SETBLUETOOTHSETTINGS_COMMAND_SUCCESSFUL |
30 days |
Lost Mode enabled |
ENABLE_LOST_MODE_COMMAND_SUCCESSFUL |
30 days |
Sound played in Lost Mode |
PLAY_LOST_MODE_SOUND_COMMAND_SUCCESSFUL |
30 days |
Mobile device location received |
GET_DEVICE_LOCATION_COMMAND_SUCCESSFUL |
30 days |
Lost Mode disabled |
DISABLE_LOST_MODE_COMMAND_SUCCESFUL |
30 days |
Activation lock bypass code received |
GET_ACTIVATION_LOCK_BYPASS_CODE_COMMAND_SUCCESSFUL |
30 days |
Compliance Control check started |
COMPLIANCE_CONTROL_CHEKING_RULES_STARTED |
30 days |
Compliance Control check completed |
COMPLIANCE_CONTROL_CHEKING_RULES_COMPLETED |
30 days |
Compliance Control response started |
COMPLIANCE_CONTROL_ACTION_STARTED |
30 days |
Compliance Control response completed |
COMPLIANCE_CONTROL_ACTION_COMPLETED |
30 days |
The table below shows the events of iOS MDM Server that have the Warning severity level.
iOS MDM Server warning events
Event type display name |
Event type |
Default storage term |
---|---|---|
Attempt to connect locked mobile device detected |
INACTICE_DEVICE_TRY_CONNECTED |
30 days |
Device management profile deleted |
MDM_PROFILE_WAS_REMOVED |
30 days |
Attempt to reuse user certificate detected |
CLIENT_CERT_ALREADY_IN_USE |
30 days |
Non-compliance with Compliance Control criterion detected |
COMPLIANCE_CONTROL_CONDITIONS_MATCH_DETECTED |
30 days |
Failed to perform Compliance Control response |
COMPLIANCE_CONTROL_ACTION_FAILED |
30 days |
Inactive mobile device detected |
FOUND_INACTIVE_DEVICE |
30 days |
Redemption code is required |
NEED_REDEMPTION_CODE |
30 days |
Device management profile deleted from mobile device |
UMDM_PROFILE_WAS_REMOVED |
30 days |
The table below shows the events of iOS MDM Server that have the Functional failure severity level.
iOS MDM Server functional failure events
Event type display name |
Event type |
Default storage term |
---|---|---|
Failed to request general information about mobile device |
DEVICEINFORMATION_COMMAND_FAILED |
30 days |
Failed to request security information |
SECURITYINFO_COMMAND_FAILED |
30 days |
Failed to request list of profiles |
PROFILELIST_COMMAND_FAILED |
30 days |
Failed to install profile |
INSTALLPROFILE_COMMAND_FAILED |
30 days |
Failed to delete profile |
REMOVEPROFILE_COMMAND_FAILED |
30 days |
Failed to request list of provisioning profiles |
PROVISIONINGPROFILELIST_COMMAND_FAILED |
30 days |
Failed to install provisioning profile |
INSTALLPROVISIONINGPROFILE_COMMAND_FAILED |
30 days |
Failed to delete provisioning profile |
REMOVEPROVISIONINGPROFILE_COMMAND_FAILED |
30 days |
Failed to request list of installed certificates |
CERTIFICATELIST_COMMAND_FAILED |
30 days |
Failed to request list of installed apps |
INSTALLEDAPPLICATIONLIST_COMMAND_FAILED |
30 days |
Failed to request list of managed apps |
MANAGEDAPPLICATIONLIST_COMMAND_FAILED |
30 days |
Failed to request app installation |
INSTALLAPPLICATION_COMMAND_FAILED |
30 days |
Failed to apply app configuration |
APPCONFIG_APPLIED_FAILED |
30 days |
Failed to delete managed app |
REMOVEAPPLICATION_COMMAND_FAILED |
30 days |
Failed to set app redemption code |
APPLYREDEMPTIONCODE_COMMAND_FAILED |
30 days |
Failed to lock mobile device |
DEVICELOCK_COMMAND_FAILED |
30 days |
Failed to reset password |
CLEARPASSCODE_COMMAND_FAILED |
30 days |
Failed to wipe data from mobile device |
ERASEDEVICE_COMMAND_FAILED |
30 days |
Failed to schedule operating system update |
SCHEDULEOSUPDATE_COMMAND_FAILED |
30 days |
Failed to apply roaming settings |
SETROAMINGSETTINGS_COMMAND_FAILED |
30 days |
Failed to apply Bluetooth settings |
SETBLUETOOTHSETTINGS_COMMAND_FAILED |
30 days |
Failed to enable Lost Mode |
ENABLE_LOST_MODE_COMMAND_FAILED |
30 days |
Failed to play sound in Lost Mode |
PLAY_LOST_MODE_SOUND_COMMAND_FAILED |
30 days |
Failed to receive mobile device location |
GET_DEVICE_LOCATION_COMMAND_FAILED |
30 days |
Failed to disable Lost Mode |
DISABLE_LOST_MODE_COMMAND_FAILED |
30 days |
Failed to receive activation lock bypass code |
GET_ACTIVATION_LOCK_BYPASS_CODE_COMMAND_FAILED |
30 days |
Error in app operation |
PRODUCT_FAILURE |
30 days |
Command result contains incorrect data |
MALFORMED_COMMAND |
30 days |
Failed to send message |
SEND_PUSH_NOTIFICATION_FAILED |
30 days |
Failed to send command (Compliance Control) |
SEND_COMMAND_FAILED |
30 days |
Failed to find device |
DEVICE_NOT_FOUND |
30 days |
Obtaining iOS MDM Server diagnostic data
When creating a request to Kaspersky Technical Support, you may be asked to create and attach a trace file. Trace files are used by Technical Support for diagnostic purposes. They contain all steps of application command execution written in the file, which allows to detect the step on which an error occurs.
We recommend that you obtain the traces of iOS MDM Server together with the traces of Network Agent, as they contain the iOS MDM Server connector details.
There are several tracing levels for iOS MDM Server:
- 0 - CRITICAL
- 1 - ERROR
- 2 - MESSAGE
- 3 - DEBUG
Ask a support engineer which tracing level to set. If the Technical Support engineer has not specified the trace level, we recommend obtaining level 2 traces.
To enable the iOS MDM Server tracing and create trace files:
- Open the iOS MSM Server settings file
/var/opt/kaspersky/iosmdm/settings.ini
. - Specify the values required to enable tracing. We recommend that you specify the following default values:
- LogCommEnabled=1
Enabling or disabling the tracing of the iOS MDM Server and connector communication library.
- LogSettingsEnabled=1
Enabling or disabling the tracing of the iOS MDM Server and connector settings library.
- LogCommVerboseLevel=2
The tracing level of the iOS MDM Server and connector communication library.
- LogSettingsVerboseLevel=2
The tracing level of the iOS MDM Server and connector settings library.
- LogVerboseLevel=2
The tracing level of iOS MDM Server.
- LogFolder=/var/opt/kaspersky/iosmdm
The directory for writing trace files.
- LogCommEnabled=1
- Restart the iOS MDM Server and Network Agent services by running the following commands:
systemctl restart klnagent
systemctl restart kliosmdm
The iOS MDM Server tracing is enabled. Trace files are created in the directory that you specified as the LogFolder value: klcon_comm.log, klcon_settings.log, klsrv.log, klsrv_comm.log, klsrv_settings.log.
To disable the iOS MDM Server tracing:
- Open the iOS MSM Server settings file
/var/opt/kaspersky/iosmdm/settings.ini
. - Modify the file by deleting the strings that have been created to enable tracing:
- LogCommEnabled=1
- LogSettingsEnabled=1
- LogCommVerboseLevel=2
- LogSettingsVerboseLevel=2
- LogVerboseLevel=2
- LogFolder=/var/opt/kaspersky/iosmdm
- Restart the iOS MDM Server and Network Agent services by running the following commands:
systemctl restart klnagent
systemctl restart kliosmdm
The iOS MDM Server tracing is disabled.
Page top