XenMobile: - Establishment of + certificate-based authentication with LDAP certificate is mandatory (Two-Factor)

5:25 PM
XenMobile: - Establishment of + certificate-based authentication with LDAP certificate is mandatory (Two-Factor) -

This post is relevant to the Nike (8.6) and au above the outlet XenMobile Enterprise Edition

  • Construction Manager devices: -8.6.33292
  • AppController - 2.9.0_111000
  • Netscaler construction: - NS10.1 : Build 0.1316.e.nc

prerequisites for this configuration is that the CA is configured and the settings on the MDM server are made to provide user certs to the device. This configuration will require additional NSG to be configured for HDX applications to work with receiver

In AppController> Settings> Deployment> Edit Add the NetScaler Gateway

  • type Set Logon certificate + domain
  • does not require passwords to be cleared
  • external URL should be set to the NSG URL
  • Settings StoreFront
    • Allow Storefront aggregate AppController Apps: - Set to YES
    • authentication server: - Set NO

on the Netscaler, Netscaler Gateway> virtual Servers (prerequisite NSG is already added and configured)> Open the NSG

Add the root certificate of the CA as CA

Click the Link authentication and LDAP policy and certification policy and give them the same priority tab

If politics certificate is not already created, you can go ahead and create here

Give it a name certificatePolicy in this case and set the authentication type ERCSW

Click New on the server

Give it a name and user name field, select "SubjectAltName: PrincipalName"

Two factor must be set to oN. Click Create

Back in the "Create an authentication strategy" server should now show the certificate we created in the previous step

Next click on the expressions called "customer is different geographic reg ..." drop and scroll right to the bottom and select "TrueValue" and click "Add term"

this should add "ns_true" in expressions window. Click Create

Ensure that the priorities on authentication policies are the same

Back Click on the "certificates" tab and select "SSL Settings"

Check the "authentication customer "and to" client certificate - required "and click OK and OK

Then we need to add additional NSG using the same IP address to work on port 4443 for HDX applications to work

Netscaler> gateway NetScaler> Select the NSG is stocked above and select add and change the port to 4443, giving it a NetScaler_Gateway2 and add the server certificate

Go to the tab authentication and ensure "Enable authentication" is checked (do not add an authentication policy)

Click on the published applications and Add "Secure ticket Authority" Storefront URL of

Click Create and close. Create and close the virtual server

If you open the new Vserver (created above) and click the Applications tab Published. STA servers will be displayed as UP

Then we need to change the port on StoreFront to 4443

Log into the StoreFront server> Netscaler gateway

Click Change general settings

Attach the Netscaler URL gateway with port 4443

Add the URL Callback with port 4443

Click OK and restart the IIS service. HDX apps must be successfully able to start using the receiver with certificate is mandatory for worxhome

Using this method admins can provide additional security layer using certificate authentication for mobile applications to provide seamless integration of HDX applications behind the NetScaler

Previous
Next Post »
0 Komentar