Lab 17: Productivity Integration
Objective and Tasks
Deploy and configure various productivity integration components for Workspace ONE UEM:
- Deploy Unified Access Gateway
- Configure the Secure Email Gateway Edge Service
- Configure the Omnissa Tunnel Edge Service
- Configure the Content Gateway Edge Service
Task 1: Deploy Unified Access Gateway
First we will build out the answer file in the form of an .ini file for the deployment of Unified Access Gateway
- On your ControlCenter server,
- Go to the Downloads folder
- select and open the uagdeploy folder
- observe the contents
- select and open the uagdeploy folder
- Go to the Downloads folder
-
In the uagdeploy folder
-
select the uag2-advanced.ini,
- Copy and Paste so that you have a backup of the original file
-
select the uag2-advanced.ini,
- In the uagdeploy folder
- select uag2-advanced
-
right-click
- In the Menu
- select Edit with Notepad++
- In the Menu
-
right-click
- select uag2-advanced
- In the NotePad++ application
- next to name
- change to UAG-WS1
- Next to source change
- next to name
source=\\horizon-01a\Software\UAG\2412\euc-unified-access-gateway-24.12.0.0-12815712361_OVF10.ova
- Next to target change it to:
target=vi://[email protected]:[email protected]/Region01A/host/Bangalore/esxi-01a.techseals.co
-
Scroll down in your NotePad++ window
- Next to ds=Local Disk 1
- change to ds=CorpLun-01b
- Next to #diskMode=thin
- remove the #
- change to diskMode=thin
- remove the #
- Change the following network settings to:
- netInternet=CorpDMZ01
- netManagementNetwork=CorpDMZ01
- netBackendNetwork=CorpDMZ01
- defaultGateway=172.16.20.1
- deploymentOption=onenic (default)
- ip0=172.16.20.10
- netmask0=255.255.255.0
- routes0=172.16.20.0/24 172.16.20.1
- Next to ds=Local Disk 1
-
Scroll Down
- Locate the entry "dns=192.168.0.10"
- Edit this entry to
dns=192.168.110.10
- Under [SSLCert]
- change pfxCerts=sslcerts.pfx to
pfxCerts=C:\certificates\wildcard_2025.pfx
- In the [SSLCertAdmin] section ,
- change pfxCerts=sslcerts.pfx to
pfxCerts=C:\certificates\wildcard_2025.pfx
-
In your Notepad++ window
-
Menu Bar
- SAVE THE .ini File
-
Menu Bar
Now our answer file is prepared, we will now deploy the Unified Access Gateway using a Powershell Script
-
On your ControlCenter server ,
- Launch the Windows powershell shortcut from the Start Menu
-
We will set the script execution is set to unrestricted.
- Execute the following command.
Set-ExecutionPolicy -scope currentuser unrestricted
When Prompted select Y
- Within the powershell interface
- type the following command
cd .\Downloads\uagdeploy
- Execute the following command
.\uagdeploy.ps1 -iniFile uag2-advanced.ini
- When you get a security warning type: R
- When you get a second security warning type: R
- When prompted to enter a root password for UAG-WS1,
- type:- Pa$$w0rd
- when prompted to confirm type Pa$$w0rd
- When prompted to
-
Enter an optional admin password for the RESP API management access for UAG:
- enter Pa$$w0rd
- When prompted to Re-Enter an optional admin password :
- enter Pa$$w0rd
- When prompted whether or not to join the customer experience program
- enter Yes
-
Enter the password for the specified [SSLcert] PFX certificate file wildcard_2025.pfx:
- enter Pa$$w0rd
-
Enter the password for the specified [SSLcertAdmin] PFX certificate file wildcard_2025.pfx:
- enter Pa$$w0rd
-
Enter an optional admin password for the RESP API management access for UAG:
- Below Fingerprint will be added to the known host file
- enter yes
- When prompted the password for [email protected]
- enter Pa$$w0rd
- Your virtual Appliance deployment will now start , it will take between 5 - 10min to deploy. Proceed to step 8
- Review the deployment once the setup has completed
- On your ControlCenter server
- On your Chrome Browser
- open a new Tab
- from the Bookmarks Bar
- select the UAG bookmark (this should resolve to uag-ws1.techseals.co)
- from the Bookmarks Bar
-
login to your UAG server by entering the following
- Admin Username : admin
-
Admin Password: Pa$$w0rd
- select SIGN IN
- open a new Tab
- On your Chrome Browser
- On your UAG Admin Console
- under Configure Manually
- click the SELECT button
- under Configure Manually
Task 2: Configure the Secure Email Gateway Edge Service
You configure a Secure Email Gateway edge service in the Workspace ONE UEM console and enable the Secure Email Gateway edge service from the Unified Access Gateway administration console.
NOTE |
Because of the restrictive lab network, the deployed Unified Access Gateway instance is unreachable from the external network. As a result, it is not a functioning connection. Running a test connection on the Email Configuration page in the Workspace ONE UEM console is expected to fail. This task only demonstrates the procedures to follow when you plan to deploy a Secure Email Gateway edge service with Unified Access Gateway in a production environment. |
- Log in to the ControlCenter VM.
- User name: administrator
- Password: Pa$$w0rd
- If the Workspace ONE UEM console is logged out due to inactivity, sign in to the Workspace ONE UEM administration console.
- Log in to Workspace ONE UEM.
- User name: studentadmin{labid}
- Password: Pa$$w0rd
- In the navigation pane on the left, select Email > Email Settings > Configuration.
- Click Configure.
- The Add Email Configuration wizard appears.
- Configure the settings on the Platform page.
- Next to Deployment Model, verify that Proxy is selected.
- From the Email Type drop-down menu, verify that Exchange is selected.
- From the Exchange version drop-down menu, select Exchange Office 365.
- Click Next.
- Configure the settings on the Deployment page.
- Enter Techseals SEG in the Friendly Name text box.
- Enter https://seg.techseals.co:443 in the External URL and Port text box.
- The URL resolves to https://seg.techseals.co:443/segconsole/management.ashx automatically.
- Enter 443 in the Listener Port text box.
- Next to terminate SSL on SEG, verify that Enable is selected.
- Next to SEG Server SSL Certificate, click Upload Locally. (This means the certificate will be uploaded to the UAG)
- Under Email Server Settings, enter https://mail.office365.com:443 in the Email Server URL and Port text box.
- Under Security Settings and Cluster Settings, verify that Disable is selected for all settings.
- Click Next.
- On the Profiles page, click Next.
- You skip creating Exchange ActiveSync profiles for now.
- On the Summary page, click Finish.
- The details for the Secure Email Gateway appear on the Email Configuration page.
- Copy the value next to MEM Config GUID.
- From the ControlCenter Windows Start menu, open Notepad++ and paste the MEM Config GUID value into a new note.
- Open Chrome and open a new tab.
- On the bookmarks bar, click UAG.
- If necessary, log in to the Unified Access Gateway administration console.
- User name: admin
- Password: Pa$$w0rd
- Under Configure Manually, click Select.
- Turn on the Edge Service Settings toggle to display the available edge services.
- Click the settings icon next to Secure Email Gateway Settings. The Secure Email Gateway Settings dialog box appears.
NOTE |
The settings icon resembles a gear. |
- Turn on the Enable Secure Email Gateway Settings toggle to enable the Secure Email Gateway edge service.
- Configure the settings for the Secure Email Gateway edge service.
- Enter https://as1605.awmdm.com in the API Server URL text box.
- Enter studentadmin{labid} in the API Server Username text box.
- Enter Pa$$w0rd in the API Server Password text box.
- Enter seg.techseals.co in the Secure Email Gateway Hostname text box. You do not include https:// in this entry.
- Open Notepad++ and copy the MEM Config GUID value that you pasted in an earlier step.
- Return to the Unified Access Gateway console.
- In the MEM Config GUID text box, paste the MEM Config GUID value that you copied from Notepad++.
- Turn on the Add SSL Certificate toggle.
- Next to SSL Certificate, click Select.
- and select the wildcard_2025.pfx from C:\certificate .
- Click Open.
- Enter Pa$$w0rd in the Password text box.
- Leave the Alias text box blank.
- Click Save.
- After saving, the Secure Email Gateway edge service might take up to 5 minutes to activate.
Task 3: Configure the Omnissa Tunnel Edge Service
You configure the Omnissa Tunnel configuration in the Workspace ONE UEM console to enable the Omnissa Tunnel edge service from the Unified Access Gateway administration console.
NOTE |
Because of the restrictive lab network, the deployed Unified Access Gateway instance is unreachable from the external network. As a result, it is not a functioning connection. Running a test connection on the Omnissa Tunnel page in the Workspace ONE UEM console is expected to fail. This task only demonstrates the procedures to follow when you plan to deploy a Omnissa Tunnel edge service with Unified Access Gateway in a production an environment. |
- Return to the Workspace ONE UEM administration console in Chrome.
- If prompted, log in to Workspace ONE UEM.
- User name: studentadmin{labid}
- Password: Pa$$w0rd
- In the navigation pane on the left, select Groups & Settings > All Settings > System > Enterprise Integration > Omnissa Tunnel.
- The New Tunnel Configuration wizard appears.
- Click NEW. Configure the settings under Deployment Details.
- Next to Deployment Type, click Basic.
- Enter Tunnel for the name
- Enter tunnel.techseals.co in the Hostname text box.
- Enter 2020 in the Port text box.
- Leave the default values for the other settings and click Save. The Tunnel Configuration page appears.
- Return to the Unified Access Gateway administration console in Chrome.
- If the Unified Access Gateway console was closed at any point, open a new tab in Chrome and click UAG on the bookmarks bar.
- If prompted, log in to Unified Access Gateway.
- User name: admin
- Password: Pa$$w0rd
- Under Configure Manually, click Select.
- Turn on the Edge Service Settings toggle to display the available edge services.
- Click the settings icon next to Tunnel Settings. The settings icon resembles a gear.
- Turn on the Enable or disable Tunnel Settings toggle to enable the Tunnel edge service.
- Configure the Omnissa Tunnel edge service settings.
Option | Action |
API Server URL | Enter https://as1605.awmdm.com in the text box. |
API Server Username | Enter studentadmin{labid} in the text box. |
API Server Password | Enter Pa$$w0rd in the text box. |
Organization Group ID | Enter student{labid} in the text box. |
Tunnel Server Hostname | Enter tunnel.techseals.co in the text box. |
- Click Save.
After saving, the Omnissa Tunnel edge service might take up to 5 minutes to activate.
Task 4: Configure the Content Gateway Edge Service
You configure a Content Gateway configuration in the Workspace ONE UEM console and enable the Content Gateway edge service from the Unified Access Gateway console.
NOTE |
Because of the restrictive lab network, the deployed Unified Access Gateway instance is unreachable from the external network. As a result, it is not a functioning connection. Running a test connection on the Content Gateway page in the Workspace ONE UEM console is expected to fail. This task only demonstrates the procedures to follow when you plan to deploy a Content Gateway edge service with Unified Access Gateway in a production an environment. |
- Return to the Workspace ONE UEM administration console in Chrome.
- If prompted, log in to Workspace ONE UEM.
- User name: studentadmin{labid}
- Password: Pa$$w0rd
- In the navigation pane on the left, select Groups & Settings > All Settings > System > Enterprise Integration > Content Gateway.
- Next to Current Setting, click Override.
- Next to Enable the Content Gateway, click Enabled.
- Click Save.
- Enter 1234 as your administrator security PIN.
- Click Add.
NOTE |
The Add button might not appear on this page. Refreshing the page should make it appear. |
- Configure the settings on the Content Gateway Configuration page.
Option | Action |
Installation Type | Verify that Unified Access Gateway is selected. |
Choose Configuration Type | Verify that Basic is selected. |
Name | Enter Content Gateway in the text box. |
Content Gateway Endpoint Address | Enter https://content.techseals.co in the text box. |
Content Gateway Endpoint Port | Enter 8443 in the text box. |
Ignore SSL Errors (not recommended) | Verify that Disabled is selected. |
Enable Cross-domain KCD Authentication | Verify that Disable is selected. |
- Click Save.
- The Content Gateway configuration now appears on the Content Gateway page of the Settings dialog box.
- Scroll to the right and copy the Content Gateway Configuration GUID value for the new Content Gateway.
- From the ControlCenter Start menu, open Notepad++ and paste the Content Gateway Configuration GUID value to a new note.
- Return to the Unified Access Gateway administration console in Chrome.
- If the Unified Access Gateway console was closed at any point, open a new tab in Chrome and click UAG on the bookmarks bar.
- If prompted, log in to Unified Access Gateway.
- User name: admin
- Password: Pa$$w0rd
- Under Configure Manually, click Select.
- Turn on the Edge Service Settings toggle to display the available edge services.
- Click the settings icon next to Content Gateway Settings. The settings icon resembles a gear.
- Turn on the Enable or disable Content Gateway Settings toggle to enable the Workspace ONE Content Gateway edge service.
- Configure the Content Gateway edge service settings.
Option | Action |
API Server URL | Enter https://as1605.awmdm.com in the text box. |
API Server Username | Enter studentadmin{labid} in the text box. |
API Server Password | Enter Pa$$w0rd in the text box. |
Content Gateway Hostname | Enter content.techseals.co in the text box. |
Content Gateway Configuration GUID | Paste the Content Gateway Configuration GUID value from Notepad++. |
- Click Save.
After saving, the Content Gateway edge service might take up to 5 minutes to activate.
0 Comments
Add your comment