Register an iOS Device Through a Generic MDM System

Note: “Generic” refers to any Mobile Device Management (MDM) system that is NOT Meraki, MobileIron, Airwatch, or Apple.

By downloading an XML file from Secure Access and updating it to support your iOS device's serial number, then adding this XML file to your “generic” MDM system, your MDM system is able to push configuration information to both Cisco Security Connector (CSC) and Secure Access so that your iOS device is registered with Secure Access. The result is that your iOS device is protected by Secure Access.

For information about configuring your specific MDM system, see your MDM system’s documentation.

Anonymization

Secure Access provides you with the option of anonymizing mobile devices for reporting and administration purposes. When you anonymize a mobile device, its label is hidden and replaced by your device's serial number. The label name is anonymized in both the Secure Access dashboard and in the CSC app UI. For information about how to anonymize your device, see Anonymize Devices.

Prerequisites

  • The Cisco Security Connector requirements
  • Configure your MDM system as required so that it is able to push configuration information to both CSC and Secure Access. For information about configuring your specific MDM system, see your MDM documentation. For support, contact your MDM's support. For support, contact your MDM's support on deploying the Apple DNS Proxy Provider profile.
  • Full admin access to the Secure Access dashboard. See Manage Accounts.

Procedure

  1. In Secure Access, navigate to Connect > End User Connectivity and click Internet Security. Click the iOS tab.
622
  1. Under the MDM Managed Devices section, click Download.
  2. In the Configure Managed iOS Clients window, click Download.
634
  1. Add the administrator's email address to which the problem report will be sent when an issue occurs and click Download.
    This email address is where diagnostic reports are sent when a user clicks the I icon from within the iOS device. Once set, this email address is automatically added when managing an MDM.
580
  1. In the downloaded XML file, update the line {SERIAL_NUMBER} with the iOS device's serial number. This can be achieved in one of two ways:
  • Automatically—If your MDM system has its own variable and syntax for the variable {SERIAL_NUMBER}, replace this variable with your MDM's variable.
  • Manually—Open the downloaded XML file and update the line {SERIAL_NUMBER} with the device's serial number. For example, 1234567890.
    Repeat this process for each iOS device—you must download and manually update an XML file for each device you want to register.
  1. Add this updated XML file to your MDM.
    For information about configuring your specific MDM system, see your MDM system’s documentation.

If successful, your mobile device registers with Secure Access and is listed at Resources > Roaming Devices > Mobile Operating Systems. CSC on your mobile device updates to connect to Secure Access so that your iOS device is protected by Secure Access.

1399

If you have anonymized your device (see Anonymize Devices), Secure Access hides the device's true label name by replacing it with the device's serial number. Existing active devices anonymize with 24 hours. New devices anonymize immediately.

910

As no changes can be made in Secure Access to the actual provisioned device, these mobile devices are simply listed in Secure Access as identities; however, you can now use Secure Access to apply policies to these mobile device identities. For more information, see Apply a DNS Policy to Your Mobile Device.

Verify That Your is Device is Protected by Secure Access

  1. On your mobile device, in the Cisco Security Connector app, tap the Status icon and confirm that it shows Protected by Secure Access.
  2. For protection details, tap Protected by Secure Access.

Workspace ONE Registration < Register an iOS Device Through a Generic MDM System > Apply an Access Policy to Your Mobile Device