• warning: Creating default object from empty value in /var/sites/e/enterpriseios.com/public_html/modules/taxonomy/taxonomy.pages.inc on line 33.
  • strict warning: Only variables should be passed by reference in /var/sites/e/enterpriseios.com/public_html/sites/all/modules/contrib/captcha/captcha.inc on line 61.
  • strict warning: Only variables should be passed by reference in /var/sites/e/enterpriseios.com/public_html/sites/all/modules/contrib/captcha/captcha.inc on line 61.
  • strict warning: Only variables should be passed by reference in /var/sites/e/enterpriseios.com/public_html/sites/all/modules/contrib/captcha/captcha.inc on line 61.
  • strict warning: Declaration of views_handler_field_user_name::init() should be compatible with views_handler_field_user::init(&$view, $data) in /var/sites/e/enterpriseios.com/public_html/sites/all/modules/contrib/views/modules/user/views_handler_field_user_name.inc on line 61.

Using Mobile Safari "device identity certificates"

jpref's picture
Your rating: None (2 votes)

We have deployed a certificate to devices that is generated on the Microsoft CA through a SCEP request. When browsing on safari on an ios device, no prompt when using MFA request through ADFS is done. Is there any way to have the browser call to the device identity certificate store where these are sitting. Thanks.

iOS and Root/Intermediate Certficates + iCloud

SeanP1971's picture
Your rating: None (1 vote)

I was wondering if anybody has any information around how certificates are handled in iOS and what iCloud retains?

In our environment we have an MDM solution which deploys certificate based ActiveSync and VPN profiles as well as other policies. We also have to manually install our internal root/intermediate certificates on the device which are required for the in-house iOS web apps and the Active Directory chain of trust over the MDM automated VPN.

Two things -

1) We discovered that in some cases one or two of the profiles would fail to install and after much troubleshooting it appeared to be solved by doing the following workaround steps -
Installing the manual certificates, re-booting the device, removing them cleanly, rebooting again and re-enroll the device to successfully bring down the profiles.
It also seems to suggest that the iCloud backup retains remnants of the certificates even when they are not present which comes down to the device or a new device but not sure how? e.g. If it's a fresh new device it was always work 100%.

2) Are you aware of what tools can be used to deploy these certificates over the air automatically?

Any advice greatly appreciated.

OS X Maverick and Configurator

iP4YN3's picture
Your rating: None (2 votes)

Hi All (First Post),

i'm switfly moving in to the world of MDM management for iPads at our school. i have processed and deployed over 200 iPads to year 9 students, all Supervised by our Mac Mini.

Now that OS X Maverick is out we want to keep our system up to date and grab a chance of getting iWork Apps for free.

I am aware that each iPad holds a Certificate for the supervised profile and identifies it self with the Apple configurator.

My question: if i upgrade to OS X Mav. will this list of supervised iPads be lost? and if so would the certificates on each iPad hold enough matching information to continue the iPad/Configurator (hardware/software) relationship?

Many Thanks


Recent Activity