XenMobile

SCEP device policy

This policy allows you to configure iOS and macOS devices to retrieve a certificate using Simple Certificate Enrollment Protocol (SCEP) from an external SCEP server. If you want to deliver a certificate to the device using SCEP from a PKI that is connected to XenMobile, you should create a PKI entity and a PKI provider in distributed mode. For details, seePKI Entities.

To add or configure this policy, go toConfigure > Device Policies. For more information, seeDevice policies.

iOS settings

Image of Device Policies configuration screen

  • URL base:Type the address of the SCEP server to define where SCEP requests are sent, over HTTP or HTTPS. The private key isn’t sent with the Certificate Signing Request (CSR), so it may be safe to send the request unencrypted. If, however, the one-time password is allowed to be reused, you should use HTTPS to protect the password. This step is required.
  • Instance name:Type any string that the SCEP server recognizes. For example, it could be a domain name like example.org. If a CA has multiple CA certificates, you can use this field to distinguish the required domain. This step is required.
  • Subject X.500 name (RFC 2253):Type the representation of a X.500 name represented as an array of Object Identifier (OID) and value. For example, /C=US/O=Apple Inc./CN=foo/1.2.5.3=bar, which would translate to: [ [ [“C”, “US”] ], [ [“O”, “Apple Inc.”] ], …, [ [“1.2.5.3”, “bar” ] ] ]. You can represent OIDs as dotted numbers with shortcuts for country (C), locality (L), state (ST), organization (O), organizational unit (OU), and common name (CN).
  • Subject alternative names type:In the list, click an alternative name type. The SCEP policy can specify an optional alternative name type that provides values required by the CA for issuing a certificate. You can specifyNone,RFC 822 name,DNS name, orURI.
  • Maximum retries:Type the number of times a device should retry when the SCEP server sends a PENDING response. The default is3.
  • Retry delay:Type the number of seconds to wait between subsequent retries. The first retry is attempted without delay. The default is10.
  • Challenge password:Enter a pre-shared secret.
  • Key size (bits):Select2048or higher as the key size in bits.
  • Use as digital signature:Specify whether you want the certificate to be used as a digital signature. If someone is using the certificate to verify a digital signature, such as verifying whether a certificate was issued by a CA, the SCEP server would verify that the certificate can be used in this manner prior to using the public key to decrypt the hash.
  • Use for key encipherment:Specify whether you want the certificate to be used for key encipherment. If a server is using the public key in a certificate provided by a client to verify that a piece of data was encrypted using the private key, the server would first check to see whether the certificate can be used for key encipherment. If not, the operation fails.
  • SHA1/MD5 fingerprint (hexadecimal string):If your CA uses HTTP, use this field to provide the fingerprint of the CA certificate, which the device uses to confirm authenticity of the CA response during enrollment. You can enter a SHA1 or MD5 fingerprint, or you can select a certificate to import its signature.

  • Policy settings
    • 删除政策:Choose a method for scheduling policy removal. Available options areSelect dateandDuration until removal (in hours)
      • Select date:Click the calendar to select the specific date for removal.
      • Duration until removal (in hours):Type a number, in hours, until policy removal occurs. Only available for iOS 6.0 and later.

macOS settings

Image of Device Policies configuration screen

  • URL base:Type the address of the SCEP server to define where SCEP requests are sent, over HTTP or HTTPS. The private key isn’t sent with the Certificate Signing Request (CSR), so it may be safe to send the request unencrypted. If, however, the one-time password is allowed to be reused, you should use HTTPS to protect the password. This step is required.
  • Instance name:Type any string that the SCEP server recognizes. For example, it could be a domain name like example.org. If a CA has multiple CA certificates, you can use this field to distinguish the required domain. This step is required.
  • Subject X.500 name (RFC 2253):Type the representation of a X.500 name represented as an array of Object Identifier (OID) and value. For example, /C=US/O=Apple Inc./CN=foo/1.2.5.3=bar, which would translate to: [ [ [“C”, “US”] ], [ [“O”, “Apple Inc.”] ], …, [ [“1.2.5.3”, “bar” ] ] ]. You can represent OIDs as dotted numbers with shortcuts for country (C), locality (L), state (ST), organization (O), organizational unit (OU), and common name (CN).
  • Subject alternative names type:In the list, click an alternative name type. The SCEP policy can specify an optional alternative name type that provides values required by the CA for issuing a certificate. You can specifyNone,RFC 822 name,DNS name, orURI.
  • Maximum retries:Type the number of times a device should retry when the SCEP server sends a PENDING response. The default is3.
  • Retry delay:Type the number of seconds to wait between subsequent retries. The first retry is attempted without delay. The default is10.
  • Challenge password:Type a pre-shared secret.
  • Key size (bits):Select2048or higher as the key size in bits.
  • Use as digital signature:Specify whether you want the certificate to be used as a digital signature. If someone is using the certificate to verify a digital signature, such as verifying whether a certificate was issued by a CA, the SCEP server would verify that the certificate can be used in this manner prior to using the public key to decrypt the hash.
  • Use for key encipherment:Specify whether you want the certificate to be used for key encipherment. If a server is using the public key in a certificate provided by a client to verify that a piece of data was encrypted using the private key, the server would first check to see whether the certificate can be used for key encipherment. If not, the operation fails.
  • SHA1/MD5 fingerprint (hexadecimal string):If your CA uses HTTP, use this field to provide the fingerprint of the CA certificate, which the device uses to confirm authenticity of the CA response during enrollment. You can enter a SHA1 or MD5 fingerprint, or you can select a certificate to import its signature.

  • Policy settings
    • 删除政策:Choose a method for scheduling policy removal. Available options areSelect dateandDuration until removal (in hours)
      • Select date:Click the calendar to select the specific date for removal.
      • Duration until removal (in hours):Type a number, in hours, until policy removal occurs.
    • Allow user to remove policy:You can select when users can remove the policy from their device. SelectAlways,Passcode required, orNeverfrom the menu. If you selectPasscode required, type a passcode in theRemoval passcodefield.
    • Profile scope:Select whether this policy applies to aUseror an entireSystem. The default isUser. This option is available only on macOS 10.7 and later.
SCEP device policy