

# Configure Omnissa Workspace ONE for Connector for SCEP
<a name="connector-for-scep-omnissa"></a>

You can use Amazon Private CA as an external certificate authority (CA) with the Omnissa Workspace ONE UEM (Unified Endpoint Management) system. This guide provides instructions on how to configure Omnissa Workspace ONE after you create a SCEP connector in Amazon.

## Prerequisites
<a name="prerequisites"></a>

Before you create a SCEP connector for Omnissa Workspace ONE, you must complete the following prerequisites:
+ Create a private CA in the Amazon console. For more information, see [Create a private CA in Amazon Private CA](create-CA.md).
+ Create a general purpose SCEP connector. For more information, see [Create a connector](connector-for-scep-getting-started.md#gs-create-connector-for-scep-console).
+ Have an active Omnissa Workspace ONE environment admin account with an Organization Group ID.
+ If you are enrolling an Apple device, configure the Apple Push Notification Service (APNs) for MDM. For more information, see [APNs Certificates](https://docs.omnissa.com/bundle/WorkspaceONE-UEM-Console-BasicsVSaaS/page/APNsCertificates.html) in the Omnissa documentation.

## Step 1: Define a certificate authority and template in Omnissa Workspace ONE
<a name="step-1-define-certificate-authority-and-template"></a>

After creating a private CA and SCEP connector in the Amazon console, define the certificate authority and template in Omnissa Workspace ONE.

**Add Amazon Private CA as a certificate authority**

1. From the **System** menu, choose **Enterprise Integration** and then choose **Certificate Authorities**.

1. Choose **\$1 ADD** and provide the following information:
   + **Name**: Amazon-Private-CA.
   + **Description**: Amazon Private CA for device certificate issuance.
   + **Authority Type**: Select **Generic SCEP**.
   + **SCEP URL**: Enter the SCEP URL from Amazon Private CA.
   + **Challenge Type**: Select **STATIC**.
   + **Static Challenge**: Enter the SCEP static challenge password from the Connector for SCEP configuration in the Amazon console.
   + Enter the **Retry Timeout** and **Max Retries** values.

1. Save the configuration.

**Create a certificate template**

1. From the **System** menu, choose **Enterprise Integration**, choose **Certificate Authorities**, and then choose **Templates**.

1. Choose **Add Templates** and provide the following information:
   + **Template Name**: Device-Cert-Template.
   + **Certificate Authority**: Choose **Amazon-Private-CA**.
   + **Subject Name**: This is a customizable field. You can choose variable values from a list of attributes. For example, CN=\$1DeviceReportedName\$1, O=\$1DevicePlatform\$1, OU=\$1CustomAttribute1\$1
   + **Private Key Length**: 2048 bits.
   + **Private Key Type**: Select **Signing** and **Encryption** as required
   + **Automatic Renewal**: Enabled/Disabled (Based on your needs).

1. Save the template.

## Step 2: Set up an Omnissa Workspace ONE UEM profile configuration
<a name="step-2-set-up-workspace-one-uem-profile-configuration"></a>

Create a profile in Omnissa Workspace ONE UEM that directs devices to Connector for SCEP to issue a certificate.

**Create a SCEP device profile for certificate distribution**

1. From the **Resources** menu, choose **Profiles & Baselines**, and then choose **Profiles**.

1. Choose **Add** then **Add Profile**

1. Select the device platform (**Android**, **iOS**, **macOS**, **Windows**).

1. Set the **Management type** and **Context** as appropriate.

1. Set the **Name**: Device-Cert-Profile.

1. Scroll to **SCEP Payload**.

1. Select **SCEP** and then choose **\$1Add**.

1. Use the following configuration:
   + **SCEP**:
     + For **Credential Source** select **Defined Certificate Authority** (Default).
     + For **Certificate Authority** select **Amazon-Private-CA**
     + For **Certificate Template** select the **Device-Cert-Template** defined in Step 1.

1. Choose **Next** and in the **Assignment** section select the right smart group from the list (assignment group for the device).

1. Select **Assignment type** as **Auto** to enable auto-renewal.

1. Save and publish the profile.

**Note**  
For more information, see [SCEP](https://docs.omnissa.com/bundle/CertificateAuthorityIntegrationsV2302/page/SCEP.html) in the Omnissa documentation.

## Step 3: Enroll devices in Omnissa Workspace ONE
<a name="step-3-enroll-devices-in-workspace-one-uem"></a>

**Create or verify a smart group**

1. From **Groups & Settings** choose **Groups** and then choose **Assignment Groups**.

1. Create or edit the POC-Devices smart group:
   + **Name**: POC-Devices.
   + **Device Type**: Select **All** or a specific platform (Android or iOS, for example).
   + **Criteria**: Use **UserGroup**, **Platform and OS**, **OEM and Model** to specify the criteria to group the target devices.
   + **Ownership**: Select **Any** for personal or corporate devices.

1. Save and verify the target devices appear in the **Preview** tab.

### Manual device enrollment
<a name="manual-device-enrollment"></a>

Android  
+ Download the **Workspace ONE Intelligent Hub** app from Google Play.
+ Open the app and enter the enrollment URL or scan a QR code.
+ Log in and follow the prompts to enroll as an MDM-managed device.

iOS/macOS  
+ On the device, open **Safari** and navigate to the enrollment URL (https://<WorkspaceONEUEMHostname>/enroll, for example).
+ Log in with user credentials.
+ Download and install the **Workspace ONE Intelligent Hub** app from the App Store.
+ Follow prompts to install the MDM profile in **Settings** > **General** > **VPN & Device Management** > **Profile** > **Install**.

Windows  
+ Download the **Workspace ONE Intelligent Hub** from the Workspace ONE server or Microsoft Store.
+ Enroll via the Hub using the enrollment URL and credentials.

Assign enrolled devices to the POC-Devices Smart Group in **Devices** > **List View** > **More Actions** > **Assign to Smart Group**.

For more information, see [Automated Device Enrollment](https://docs.omnissa.com/bundle/Apple-Business-ManagerVSaaS/page/AppleBusinessManagerDeviceEnrollment.html) in the Omnissa documentation.

**Verify enrollment**

1. In the Omnissa Workspace ONE UEM Console, go to **Devices** and then **List View**.

1. Confirm that your enrolled devices appear with the status set to **Enrolled**.

1. Verify devices are in the POC-Devices smart group in the **Groups** tab of the **Device Details**.

## Step 4: Issue a certificate
<a name="step-4-certificate-issuance"></a>

**Trigger issuing a certificate**

1. In **Devices** **List View**, select the enrolled device.

1. Choose on the **Query** button to prompt a check-in.

1. The Device-Cert-Profile should issue a certifcate via Amazon Private CA.

**Verify certificate installation**

Android  
Choose **Settings**, then **Security**, then **Trusted Credentials**, and then **User** to verify the certificate.

iOS  
Go to **Settings**, then choose **General**, then **VPN & Device Management**, and then **Configuration Profile**. Verify that the certificate from AWS-Private-CA is present.

macOS  
Open **Keychain Access** and then **System Keychain** and verify the certificate.

Windows  
Open **certmgr.msc**, then **Personal**, and then **Certificates** to verify the certificate.

## Troubleshooting
<a name="troubleshooting"></a>

SCEP Errors ("22013 - The SCEP server returned an invalid response" for example)  
+ Verify the SCEP URL and static challenge password in Workspace ONE match Amazon Private CA.
+ Test SCEP endpoint connectivity: curl <SCEP\$1URL>.
+ Check Amazon CloudTrail logs for Amazon Private CA errors (`IssueCertificate` failures, for example).

APNs issues (iOS/macOS)  
+ Make sure the APNs certificate is valid and assigned to the correct Organization Group.
+ Test APNs connectivity: telnet [gateway.push.apple.com](http://gateway.push.apple.com/) 2195.

Profile installation failures  
+ Confirm devices are in the correct Smart Group (**Devices**, then **List View**, and then **Groups**).
+ Force a profile sync: **More Actions**, then **Send**, and then **Profile List**.

Logs  
+ Android: Use **Logcat** or Workspace ONE logs.
+ iOS/macOS: log show --predicate 'process == "mdmclient"' --last 1h (via Xcode/Apple Configurator).
+ Windows: **Event Viewer**, then **Applications and Services Logs** and then **Microsoft-Windows-DeviceManagement**.
+ Workspace ONE UEM: **Monitor**, then **Reports & Analytics**, then **Events**, and then **Device Events**.

For detailed Connector for SCEP monitoring in Amazon, see [https://docs.aws.amazon.com/privateca/latest/userguide/c4scep-monitoring-overview.html](https://docs.aws.amazon.com/privateca/latest/userguide/c4scep-monitoring-overview.html).

## Security considerations
<a name="security-considerations"></a>
+ Store SCEP URLs and secrets securely. For more information, see the [Amazon Secrets Manager service](https://docs.aws.amazon.com/secretsmanager/).
+ Restrict smart group criteria to target devices only.
+ Regularly renew Apple Push Notifications (APNs) certificates (valid for 1 year).
+ Set short certificate validity periods for proof of concept projects to minimize risk.
+ For personal devices, make sure cleanup removes all profiles and certificates.

For information about how to configure Omnissa Workspace ONE UEM and CA integration using a SCEP connector, see the [SCEP in Omnissa Workspace ONE](https://docs.omnissa.com/bundle/CertificateAuthorityIntegrationsV2302/page/SCEP.html#:~:text=The%20exception%20to%20this%20requirement,Enable%20or%20disable%20the%20proxy.) documentation.