Integrating Jamf with JoinNow for ACME Based Issuance
Introduction
SecureW2’s ACME service can cryptographically prove a device is a genuine Apple Product, and confirm its Serial Number using Apple Managed Device Attestation (MDA). MDA is what allows JoinNow Connector to validate a device’s identity and cross-reference it with your MDM to ensure only trusted devices can enroll for certificates.
Traditional SCEP implementations only require a pre-shared key for certificate issuance. With ACME, organizations can ensure that only trusted, managed devices obtain and maintain certificates that are used to access critical resources. This guide describes the steps to integrate Jamf MDM with JoinNow’s Cloud Connector to allow devices, such as macOS, iOS, iPadOS, and tvOS, to enroll for digital certificates via an ACME (Automated Certificate Management Environment) Client Certificate Enrollment token.
Prerequisites
The following are the prerequisites to set-up ACME based enrollment:
- iOS devices that support ACME protocol.(version 16 and above)
- Subscription to Jamf Portal.
- JoinNow active subscription along with Enterprise Enrollment and Attestation (EEA).
Setting up ACME with JoinNow
To set-up ACME based enrollment in SecureW2, the following high-level steps are required:
- Creating an Intermediate CA
- Creating a Certificate Template
- Creating Key Attestation Provider
- Creating ACME API Gateway
- Creating an Identity Lookup Provider
- Creating Policies Management
Creating an Intermediate CA
It is recommended to have a new intermediate CA for enrolling devices using ACME Gateway integration with Jamf for easy management.
To create a new intermediate CA:
- From your JoinNow Management Portal, go to PKI > Certificate Authorities.
- Click Add Certificate Authority.
- In the Basic section, from the Generate CA For drop-down list, select the Device and User Authentication option to authenticate devices and users.
- From the Type drop-down list, select Intermediate CA.
- From the Certificate Authority drop-down list, select the default Root CA that comes with your organization.
- For the Common Name field, enter a name. It is recommended to include “ACME” in the name.
- Click Save.
Creating a Certificate Template for Jamf
A certificate template determines how information is encoded in the certificate to be issued by the Certificate Authority. It will consist of a list of certificate attributes and how the information must be encoded in the attribute values.
It is recommended to create a separate template for each MDM platform for easier identification of different values being passed. To create an Jamf Certificate Template:
- Navigate to PKI > Certificate Authorities.
- Click Add Certificate Template.
- In the Basic section, for the Name field, enter the name of the certificate template.
- Subject field can be configured to source values from the Jamf. To use the attributes sent from Jamf, enter CN=${/csr/subject/commonname}
- In the Display Description field, enter a suitable description for the certificate template.
- In the Validity Period field, type the validity period of the certificate (based on the requirement).
- From the Signature Algorithm drop-down list, select the signature algorithm for the certificate signing request. The option available is SHA-256.
- In the SAN section:
- In the Other Name field, enter ${/csr/san/othername}
- In the RFC822 field, enter ${/csr/san/rfc822name}
- In the DNS field, enter ${/csr/san/dnsname}
- In the Extended Key Usage section, from the Use Certificate For list, select Client Authentication.
- Click Save.
Creating a Key Attestation Provider
A Key Attestation Provider in JoinNow helps set-up device attestation services for iOS devices. To create an Key Attestation Provider:
- Log in to JoinNow Management Portal.
- Navigate to Identity Management > Key Attestation Provider.
- Click Add Key Attestation Provider.
- In the Name field, enter a name for your Key Attestation Provider
- In the Display Description field, enter a description (Optional).
- From the Type drop-down, select Apple.
- Click Save.
Creating an API Gateway in JoinNow
To generate an API Gateway from JoinNow:
- Navigate to Identity Management > API Gateways.
- Click Add API Gateway.
- In the Name field, enter a name for your API Token.
- In the Display Description field, enter a description (Optional).
- From the Type drop-down, select ACME Client Certificate Enrollment Token.
- From the Vendor drop-down, select Jamf.
- Click Save. A .mobileconfig file is downloaded.
Creating an Identity Lookup Provider in JoinNow
To create an Identity Lookup Provider for Jamf ACME based enrollment:
- Navigate to Identity Management > Identity Providers.
- Click Add Identity Provider.
- Enter a Name and Description for the IDP in the respective fields.
- From the Type drop-down list, select Jamf Identity Lookup.
- Click Save.
- Click on the Configuration tab.
- In the Provider URL field, enter the Jamf URL of your organization.
- In the Username field, enter your Jamf username.
- In the Password field, enter your Jamf Password.
- Click Validate to validate your connection with Jamf.
- Set up required attributes in the Attribute Mapping tab.
- Create required groups in the Groups tab.
- Click Update.
Policy Management in JoinNow
Policy Management allows us to create specific Lookup policies, roles for user and device groups, which can be used in SecureW2 to create custom certificate enrollment policies.
Creating an Account Lookup Policy
Account Lookup Policy can be mapped along with the Jamf Identity Lookup provider created earlier for device lookup.
From the JoinNow Management Portal:
- Go to Policy Management > Account Lookup Policies.
- Click Add Account Lookup Policy.
- In the Basic tab, enter a Name and Description in respective fields.
- Click Save. The page refreshes and the Settings tab is displayed. Click on the Settings tab.
- From the Provider drop-down, select the Jamf Lookup IDP created in the previous step.
- From the Lookup Type drop-down, select Custom.
- From the Identity drop-down, select Computer Identity.
- Lookup Purpose – Purpose of Account Lookup:
- Certificate Issuance – To lookup user/device account during Enrollment
- RADIUS Authentication – To lookup user/device account during RADIUS Authentication
- Click Update.
Creating a Policy Engine Workflow
- Go to Policy Management > Policy Engine Workflows.
- Click Add Policy Engine Workflows.
- In the Basic section, In Name field, enter a name for the policy.
- In the Description field, enter a description for the policy.
- Click Save. The page refreshes and automatically selects the Conditions tab.
- In the Conditions section, click the Identity Provider drop-down and select the Identity Lookup Provider you created in the earlier section.
- Click Update.
Creating a Device Role Policy
Device Role Policy helps in mapping the attestation provider in JoinNow for device attestation.
- From the JoinNow Management Portal, go to Policy Management > Device Roles Policies.
- Click Add Device Role Policy.
- In the Basic tab, for Name, enter a name. For Description, enter a description.
- Click Save. The page refreshes and the Conditions tab opens. Click on the Conditions tab.
- From the Identity drop-down, select the Key Attestation Provider created in section.
- Click Update.
Creating an Enrollment Policy
- From the JoinNow Management Portal, go to Policy Management > Enrollment Policies.
- Click Add Enrollment Policy.
- In the Basic tab, for Name, enter a name.
For Description, enter a description. - Click Save. The page refreshes and displays the Conditions and Settings tab.
- In the Conditions section, for Role, select the user role policy you created in the Creating a Policy Engine Workflow section.
- For Device Role, select the device role created in Creating a Device Role Policy section.
- Click on the Settings tab.
- From the Use Certificate Authority drop-down, select the Certificate Authority created for ACME.
- From the Use Certificate Template drop-down, choose the Certificate Template created for ACME.
- Click Update.
Configuring ACME Certificate in Jamf
Log in to the Jamf MDM portal.
- Navigate to Devices > Configuration Profiles.
NOTE: Devices refer to creating configuration profiles of iOS Mobile devices and iPad. For mac OS, upload Mobileconfig via Computers > Configuration Profiles.
- Click + New.
- Click on ACME Certificate.
- Click + Add.
- In the ACME directory URL field, enter the “Directory URL” value from the .mobileconfig file downloaded in 3.4 Creating an API Gateway in JoinNow section.
- In the Client Identifier field, enter the value corresponding to “ClientIdentifier” in the .mobileconfig file.
- In the Key Size field, enter “384”.
- From the Key Type drop-down list, select ECSECPrimeRandom.
- For theHardware Bound toggle switch, select True.
- In the Subject field, enter the value corresponding to “Subject” in the .mobileconfig file. The value must be added as”/CN=value” format.
- Configure further settings as required and click Save.
Schedule a Demo
Sign up for a quick demonstration and see how SecureW2 can make your organization simpler, faster, and more secure.
Schedule NowPricing Information
Our solutions scale to fit you. We have affordable options for organizations of any size. Click here to see our pricing.
Check Pricing