Configuring end points for Mobile Device Management
Any BMC Client Management agent can be configured to be a Mobile Device Manager. Each Mobile Device Manager has a dedicated HTTP endpoint, with default port number 1661. Depending on the underlying mobile devices platform, this endpoint may have different roles. For example, Apple devices directly connect to this HTTP endpoint once enrolled in order to get managed. On the opposite, Android devices never directly connect to BMC Client Management endpoints. They are managed via the Google servers. In both cases, the MDM dedicated endpoints can be used to enroll new mobile devices.
Because Mobile Device Managers have a dedicated HTTP endpoint, it must be possible to configure various aspects of that endpoint. The HTTP endpoint configuration includes the following elements:
- The server name and port
- The server SSL certificate
- The list of SSL certificate authorities that shall be trusted, in order to trust the server SSL certificate above
The server name and port make it possible to deduce the MDM HTTP endpoint URL. For instance, if the server name is mdm.mycorp.com and the server port is the default 1661, then the endpoint URL will be deduced as https://mdm.mycorp.com:1661 and the enrollment URL will be deduced as https://mdm.mycorp.com:1661/mdm. The server SSL certificate is the certificate sent by the server to any client that connect and perform a TLS handshake. It is the client’s responsibility to trust (or not) the server certificate.
The MDM HTTP endpoints are the starting points for the enrollment of mobile devices. Authorized end-users can browse to one such endpoint and start the enrollment of Apple and Android devices. As such, they connect using a Web browser and answer a few questions to get their mobile device enrolled in BMC Client Management. The connection via their Web browser must be trusted, or a warning will be issued. The server SSL certificates drives this trust. If the certificate issuer is trusted by the Web browser, then there will be no warning. Otherwise, SSL certificate authorities may need to be deployed and installed for the server SSL certificate to be trusted.
For Apple devices, the MDM HTTP endpoints are critical because the management of Apple devices requires those devices to always connect to the MDM HTTP endpoint they have been enrolled to. In other words, if the iPhone device_1 was enrolled using the MDM HTTP endpoint https://mdm.mycorp.com:1661, then it will always connect back to this URL upon reception of a notification indicating that a management command is awaiting this device. Therefore, it is very important that the Apple mobile devices trust the MDM HTTP endpoint server SSL certificate. To get this possible, the enrollment process automatically installs a list of trusted certificate authorities, required to trust the server certificate. Note that this list of additional certificate authorities can be empty if the server certificate is already trusted by the Apple devices. If not, it is important to configure this list, which is referred as the list of SSL certificates authorities that shall be trusted, in the above bullet points.
Before BMC Client Management version 24.1, the following parameters had to be configured using the MobileDeviceManagement module configuration (MobileDeviceManagement.ini):
- Configure the server name using the MobileDeviceManagement.ini file, [iOS] section, ServerName parameter.
- Configure the server port using the MobileDeviceManagement.ini file, [iOS] section, ServerPort parameter.
- Configure the server SSL certificate using the MobileDeviceManagement.ini file, [iOS] section, CertServer parameter.
- Configuring the additional SSL certificate authorities was not easy tough. Certificates had to be installed in the main agent configuration.
It is still possible to configure the server parameters from the above parameters, except that the section name is renamed from [iOS] to [MobileDeviceManagement] to better reflect that the MDM endpoint is both used for Apple and Android devices. However, the above configuration approach is not user friendly as it requires to set configuration file parameters either through direct access or through operational rules. It is also cumbersome to configure multiple endpoints. Finally, managing SSL certificates this way is not ideal, and detecting the certificates that are about to or that have expired is not simple. For all these reasons, it had been decided to improve the MDM HTTP endpoints configuration using a centralized approach, directly in the user interface (Java console only).
To configure the end points for mobile device management
- In the left pane select Mobile Device Management > Configuration > Server Configurations.
Right click Server Configurations and select Create Server Configuration.
- In the Properties dialog box, specify the following parameters.
- Specify a Name for the new configuration for the Mobile Device Manager.
- Specify a different Server Name for the Mobile Device Manager.
The default port is 1661. (Optional) Specify the notes for the new server end point configuration.
- Click OK.
The Mobile Device Manager server configuration is defined and configured.
The system also displays the server configuration in the left navigation pane.
After you select it, the system displays the general information is displayed in the General tab of the dialog box. The general information includes the data entered during the server configuration creation. It is now possible to continue the configuration. More specifically, it will be possible to register the SSL server certificate, and a list of SSL certificate authorities. Again, this list is not required if the server certificate is already trusted by the Web browsers (for the enrollment operation) and the Apple devices (for the enrollment and management operations).
To add a certificate for mobile device management
- Right click on the Certificates tab and select Add Certificate.
- In the Add Certificate pop-up box, specify the following parameters.
- Specify a Certificate Type for the new certificate.
- Specify a Certificate File for the new certificate.
- Specify a Private Key File for the new certificate.
Specify a secret Password for the new certificate.
- Click OK.
The server configuration certificate is displayed.
After importing the certificates, the system displays the certificates in the Certificates tab. Each entry includes the certificates count, in case certificates chains are imported. - Right click a certificate row and select View Certificate. The system displays the certificate details.
Standard operations are available for the server configurations, including the ability to delete, cut, copy and paste server configurations. These same operations are available at the certificate level where administrators can delete, cut, copy and paste certificates. Note that when a server configuration is copied and then pasted, the associated certificates are also copied and pasted to the new server configuration. These operations make it possible to easily clone configurations for testing purpose.
Mobile device management server configurations can be associated to one or more Mobile Device Managers. In this case, they automatically acquire and apply the server configuration. Note that assigning the same configuration to multiple Mobile Device Managers is only relevant if these servers must share the same configuration (including the server name). This is for example the case when such servers are behind a load balancer. The server configuration assignment can be done by selecting and configuring the Mobile Device Manager.
In the above image above, one device has been selected as Mobile Device Manager. However, it is not assigned to any mobile device management server configuration. In this case, the Mobile Device Manager continues to configure the various elements using its MobileDeviceManagement.ini configuration files. A server configuration can be assigned or unassigned at any time, in which case the information is notified directly to the device so it can perform the required reconfiguration operations.
To assign a server configuration to the Mobile Device Manager using the context menu
- Right click the relevant Mobile Device Manager row and select Assign Server Configuration.
- In the Select the Server Configuration popup box, select the desired server configuration and click OK. The configuration is assigned, and the device is automatically notified.
To rectify the error and activate the configuration using the context menu
Right click the relevant Mobile Device Manager row and select Activate Server Configuration.
The server configuration activation now performs additional verifications. For example, the Apple requirements are verified.
The system notifies the verification information to the Mobile Device Manager. Because the configuration is now active, the reconfiguration is done using its content. The Mobile Device Manager log file indicates this:
'2023/12/12 16:06:12 MobileDeviceManagement I [24232] We are assigned to server configuration 'MyCorp Test Configuration.'
You can also assign a Mobile Device Manager and a server configuration while adding a mobile device
- In the left pane select Mobile Device Management > Mobile Device Manager.
- Right click Mobile Device Manager and select Add Device.
The displays. - In the Add a new Mobile Device Manager pop-up box, select the relevant configuration or retain the default No Server Configuration entry otherwise.
Where to go from here
Viewing-information-about-managed-mobile-devices
Managing-configuration-profiles-for-managed-mobile-devices