Iphone OTA Enrollment Configuration
Iphone OTA Enrollment Configuration
Over-the-Air Enrollment
and Configuration
2. Certificate Enrollment
After the user is authenticated, iPhone generates a certificate enrollment request using
the SCEP protocol. This SCEP enrollment request talks directly to the enterprise Certificate
Authority (CA), and enables iPhone to receive the identity certificate from the CA in
response.
3. Device Configuration
Once an identity certificate is installed, iPhone is able to receive a encyrpted configura-
tion profile over-the-air. This encrypted configuration profile can only be installed on the
device it was intended for and can contain settings for iPhone to connect to corporate
services (Exchange, VPN, Wi-Fi, etc.)
User Scenario
The following example shows how iPhone connects to a typical over-the-air enrollment and configuration deployment.
1 The user enters the URL of the profile service in Safari on iPhone (or taps a URL sent by the administrator via SMS), and is presented a login
webpage. The user enters their username and password. The users is authenticated using either basic HTTP authentication or via existing
directory services.
2 Once the user is authenticated, an enrollment profile is sent to the user. The user is prompted to install the profile. Once the initial enrollment
profile is installed, iPhone responds back to the certificate authority with information necessary to deliver an identity certificate to the device.
3 That identity certificate enables the device to receive device settings via an encrypted configuration profile. This exchange is automated. No
additional interaction from the user is required.
Infrastructure Setup
To implement this process you will need to create an infrastructure which can support the authentication, enrollment, and profile
delivery process. The deployment and integration of three primary enterprise services is involved.
Directory Services
User authentication can be as simple as basic HTTP authentication, or you can integrate with your existing directory services.
Regardless of the services used, you will need to provide a web-based authentication method for your users to request enrollment.
Certificate Services
The process of enrollment requires deployment of standard x.509 identity certificates to iPhone users. You’ll need a CA (certificate
authority) to issue the device credentials using the Simple Certificate Enrollment Protocol (SCEP). Cisco IOS and Microsoft Server 2003,
with the add-on for certificate services both support SCEP. There are also a number of hosted PKI services that support SCEP, such as
Verisign, Entrust, and RSA.
Profile Services
To implement this process you will need to develop a profile service, which is an HTTP-based service that manages iPhone connections
throughout the process, generates configuration profiles for the user, and verifies user credentials along the way. There are a few key
functions that the profile service needs to provide:
• Host a user-accessible website to support the HTTPS session
• Authenticate incoming user requests using a web-based authentication method (basic, or integrated with directory services)
• Generate the necessary configuration profiles (XML format) depending on the phase of the process
• Sign and encrypt configuration profiles using public key cryptography
• Track the user through the steps in the process (via timestamp and logging methods)
• Manage connections to the certificate authority or directory services
The following three diagrams describe the individual steps in each phase that need to be in place for a typical over-the-air enrollment
and configuration implementation.
3
Firewall Firewall
Directory Service
Device
Information Request
1 The user enters the URL of the profile service in Safari on iPhone (or taps a URL sent via SMS), and is presented a login webpage. The user
enters their username and password.
2 The users is authenticated using either basic HTTP authentication or via existing directory services.
3 Once the user is authenticated, a configuration profile is sent to the user. This profile includes a request for device attributes including the
device identifier (iPhone or iPod Touch), OS version, Device ID, IMEI, and ICCID. For a sample configuration profile for this phase, see “Server
Response” on page 81 of the Enterprise Deployment Guide.
Firewall Firewall
Directory Service
1 4
SCEP
1 Once the configuration profile from Phase 1 is installed, the device automatically responds to the server. The response from the device includes
device attributes and a pre-shared key (challenge). The challenge can be used to verify the identity of the user through the next phase of the
process. The response is signed using the device’s built in identity (Apple issued certificate) and sent to the server using HTTP Post.
2 Once the profile service receives the device response, a second configuration profile with the SCEP payload is delivered to the device. For a sample
configuration profile for this phase, see “Server Response With SCEP Specifications” on page 82 of the Enterprise Deployment Guide.
3 The profile is installed automatically, no user intervention required. The SCEP payload contains instructions for the device to generate a certificate
signing request and get a certificate using SCEP.
4 Once the request is verified, the CA then issues the certificate for the device.
4
Firewall Firewall
Directory Service
Encrypted Profile
1 Once the device certificate is received, the device generates a response back to the profile service which is signed with the new certificate
(again, via HTTP post). The response includes device attributes (product identifier, OS version, Device ID, IMEI, and ICCID). This information
provides a confirmation to the server, at the time of request, and can be used to ensure devices are up to date with the latest OS version
before delivering a configuration profile.
2 The profile service then responds with an encrypted .mobileconfig file. This configuration profile can contain policies, settings, credentials,
or additional SCEP requests.
3 The profile is received by the device and installed automatically (no user intervention is required).
© 2009 Apple Inc. All rights reserved. Apple, the Apple logo, iPod, and Safari are trademarks of Apple Inc., registered in the U.S. and other countries. iPhone is a trademark of Apple Inc. Other product
and company names mentioned herein may be trademarks of their respective companies. Product specifications are subject to change without notice. This material is provided for information purposes
only; Apple assumes no liability related to its use. June 2009 L410437A