Lab 6: Workspace ONE Integrations
Objective and Tasks
Configure multiple Workspace ONE UEM enterprise integrations:
- Install and Configure AirWatch Cloud Connector
- Configure Directory Services in Workspace ONE UEM
- Import a User Group
- Adding a Certificate Authority Integration Configuration
Task 1: Install and Configure AirWatch Cloud Connector
You will install AirWatch Cloud Connector on the WS1-Connector VM and connect it to your Workspace ONE deployment.
- Log in to the ControlCenter desktop VM.
- User name: administrator
- Password: Pa$$w0rd
- On the ControlCenter Desktop, double-click the Remote Desktops folder.
- In the Folder double-click WS1-Connector.RDP to connect to the server.
- Open the Workspace ONE UEM administration console.
- On the WS1-Connector Windows taskbar, click the Google Chrome icon.
- From the bookmarks bar, select Workspace ONE UEM. You can also enter https://techseals.awmdm.com in the address bar.
- Log in to Workspace ONE UEM.
- User name: studentadmin{labid}
- Password: Pa$$w0rd
- Note: If you get a pop-up to save the password just select Never
- On the Workspace ONE UEM console menu bar, verify that Student{labid} is selected from theOrganization Group drop-down menu.
- In the navigation pane on the left, select Groups & Settings > All Settings > System > Enterprise Integration > Cloud Connector.
- Next to Current Setting, click Override.
- Next to Enable AirWatch Cloud Connector, click Enabled. This should be selected by default.
- Click the Advanced tab.
- Scroll down and verify that Use External AWCM URL is selected.
- Scroll down to the bottom of the page, click Save, and wait for the certificate to be populated. Populating a certificate might take several minutes. The process concludes with a Saved Successfully message.
- Click the General tab and click Download AirWatch Cloud Connector Installer.
- In the dialog box, enter Pa$$w0rd as the password.
- Enter Pa$$w0rd again to confirm the password.
- Click Download.
- After the download finishes, click the File Explorer icon on the WS1-Connector Windows taskbar.
- Navigate to the Downloads folder.
- Right-click the AirWatch Cloud Connector Installer file and select Run as an administrator.
The AirWatch Cloud Connector installation wizard opens.
NOTE |
If you are prompted with a Windows security warning, click More Info and then click Run Anyway. |
- Click Next.
Installing the framework might take up to five minutes.
NOTE |
The AirWatch Cloud Connector installer might require the installation of Microsoft .NET Framework 4.8 or later. You might be required to restart the DC VM. When you log back in to the VM, the AirWatch Cloud Connector installer automatically opens. If it did not open, you must rerun the AirWatch Cloud Connector installer as an administrator. |
- Click I accept the terms in the license agreement and then click Next.
- Click Next. You do not need to change the installation path.
- Enter Pa$$w0rd in the Certificate Password text box.
- Click Next.
- Verify that the Outbound proxy? check box is deselected and click Next.
- Click Install.
- When the prompt says that TLS 1.2 registry keys were added, click OK.
- When the installation finishes, click Finish.
- If you receive a prompt to restart the server, click Yes. The server restart might take up to 5 minutes to complete.
- Reconnect to the WS1-Connector VM after it restarts.
- User name: administrator
- Password: Pa$$w0rd
- On the WS1-Connector Windows taskbar, click the Server Manager icon.
- From the menu bar, select Tools > Services.
- Verify that the AirWatch Cloud Connector service is running. The service might take up to 10 seconds to start.
- If necessary, right-click AirWatch Cloud Connector and select Start to manually start the service.
- If the service does not start, open File Explorer, navigate to C:\AirWatch\Logs\CloudConnector, and check the log file for errors.
NOTE |
You must set Startup Type to Automatic and not Automatic Delayed. Otherwise, the service does not start automatically. |
- Close the Services window.
- Close the Server Manager window.
- Return to the Workspace ONE UEM console in Google Chrome.
- If the Settings dialog box is closed, select Groups & Settings > All Settings > System > Enterprise Integration > Cloud Connector from the navigation pane on the left.
- Scroll down to the bottom of the Cloud Connector page and click Test Connection to verify connectivity.
- A successful connection returns a Reached Cloud Connector running version 24.6.0.16 at WS1-Connector (192.168.110.95) message.
- Close the Settings dialog box.
- Minimize the Remote Desktop Connection Manager window.
Task 2: Configure Directory Services in Workspace ONE UEM
You configure the Directory Services integration in the Workspace ONE UEM console to bind with the Domain Controller (DC).
- On the ControlCenter VM, log in to the Workspace ONE UEM console.
- User name: studentadmin{labid}
- Password: Pa$$w0rd
- On the menu bar, verify that Student{labid} is selected from the Organization Group drop- down menu.
- In the navigation pane on the left, select Groups & Settings > All Settings > System > Enterprise Integration > Directory Services.
- Verify that Current Setting is set to Override.
- Click Skip wizard and configure manually.
- On the Server tab, configure your server information. Leave the default value for any setting not specified here.
Option | Action |
Directory Type | Select LDAP - Active Directory from the drop-down menu. |
DNS SRV | Click Disabled. |
Server | Enter controlcenter.techseals.co in the text box. |
Encryption Type | Click None. |
Port | Enter in the 389 text box. |
Protocol Version | Enter in the 3 text box. |
Use Service Account Credentials | Click Disabled. |
Bind Authentication Type | Click GSS-NEGOTIATE. |
Bind Username | Enter administrator in the text box. |
Bind Password | Enter Pa$$w0rd in the text box. |
Domain | Delete defaultDomain and enter techseals.co in the text box. |
Server | The text box autofills controlcenter.techseals.co after you configure the Domain text box. |
- Click Test Connection to verify connectivity. A Connection successful message appears.
- Click x in the upper-right corner to close the Text Connection dialog box.
- Click Save.
- Click the User tab and configure the settings.
- Under Base DN, click the plus (+) sign icon next to the text box. The Available Base DNs drop-down menu appears.
- From the Available Base DN drop-down menu, select DC=techseals,DC=co.
- Click Save.
- Click the Group tab and configure the settings.
- Under Base DN, click the plus (+) sign icon next to the text box. The Available Base DNs drop-down menu appears.
- From the Available Base DNs drop-down menu, select DC=techseals,DC=co.
- Click in the Settings dialog box to close the Available Base DNs drop-down menu.
- Delete organizationalUnit and enter Container in the Organizational Unit Object Class text box.
- Click the Advanced to display additional controls.
- Select the Auto Sync Default and Auto Merge Default check boxes.
Enabling these settings automatically adds or removes users in Workspace ONE UEM configured user groups based on their membership in your directory service and automatically applies synchronization changes without requiring an administrator's approval.
- Scroll down to the Attribute and Mapping Value columns.
NOTE |
These columns show the mapping between the Workspace ONE UEM user attributes on the left and your directory service attributes on the right. By default, these attributes are those values most commonly used in the Active Directory. You update these mapping values to reflect the values used for your own integration. |
- Click the Edit (pencil) icon next to the Organizational Unit text box.
- Delete ou and enter cn in the Organizational Unit text box.
- Click Save.
- Scroll down and click Test Connection to verify the configuration.
NOTE |
You might have to refresh the page and attempt the test connection after the page has refreshed. |
- Close the Test Connection dialog box.
- Close the Settings dialog box.
Task 3: Import a User Group
You use the Workspace ONE UEM console to import a user group.
- On the menu bar, verify that Student{labid} is selected from the Organization Group drop- down menu.
- In the navigation pane on the left, select Accounts > Users Groups > List View.
- From the Add drop-down menu, select Add User Group.
- Next to External type, click Organizational Unit.
- Verify that DC=techseals,DC=co is entered in the Group Base DN text box. The attribute must not contain any spaces.
- In the Search Text text box, enter users and click Search. The page refreshes and displays additional items.
- Select Users from the Group Name search result list.
- Leave the default values for the other settings and click Save.
The page refreshes and you are back to the User Groups list view page. You now see the new user group called Users.
NOTE |
When you import a user group, you add your existing directory service groups into the Workspace ONE UEM console. The addition does not immediately create the Workspace ONE UEM user accounts for each of your directory service accounts. However, it does ensure that the Workspace ONE UEM recognizes them as belonging to a configured group, which you can use as a means of restricting who can enroll. |
- Select the Users check box.
- From the More Actions drop-down menu, select Add Missing Users. A dialog box appears asking if you wish to continue.
- To process the request, click OK.
- Click Refresh and verify that the number in the Users column is greater than 0.
- Click the Edit (pencil) icon next to the Users group name. The Edit User Group page dialog box appears.
- Next to Add Group Members Automatically, click Enabled.
- Click Save.
You have successfully imported the Active Directory users into the Workspace ONE UEM console.
Task 4: Adding a Certificate Authority Integration Configuration
You review the certificate authority (CA) integration configured for the lab environment.
- On the menu bar, verify that Student{labid} is selected from the Organization Group drop- down menu.
- In the navigation pane on the left, select Groups & Settings > All Settings > System > Enterprise Integration > Certificate Authorities.
- Click on + ADD.
- In the Certificate Authority - Add/Edit fill in the following
- Name: Techseals
- Authority Type: Microsoft ADCS
- Protocol: ADCS
- Server Hostname: controlcenter
- Authority Name: techseals-CONTROLCENTER-CA
- Authentication: Service Account
- Username: Administrator
- Password: Pa$$w0rd
- Click TEST CONNECTION. You should get Test is Successful in green at the top.
- Click SAVE
- You should now see your Techseals certificate authority listed in the Certificate Authorities.
0 Comments
Add your comment