This section explains how to install EMM Windows Components using Kony EMM Windows Components installer. Go to the next section if you manually installed EMM Windows components.
For Kony Management Suite to work on the Windows platform, you must install the following:
The EMM Windows Components installer installs all the above components except the Windows App Wrapping.
To install the required components for the Windows Server for the Kony Management Suite, follow these steps:
Note: To allow communication between the Windows Server 2008/2012 and your corporate email exchange server (to enable block and unblock email access on enrolled devices), Kony Exchange service should be configured. Using this service, you can also restrict email clients that can be used on enrolled devices.
Service Name: Enter the exchange service name.
Time Period (in hours) for GUID Generation (1-24): Enter the time period for the GUID generation.
Maximum No. of PowerShell Sessions (0-30): Enter the maximum number of poweshell sessions allowed.
Service Queue Size: Enter the size of allowed queue service.
Logging: Select Yes if logging is required.
Is Service Secure: Select Yes, if the service is secure.
Note: As mentioned in http://technet.microsoft.com/en-us/library/dd261866.aspx, a machine that supports GPMC must be in the domain in which SCMDM 2008 server is installed.
To support Windows Mobile 6.x devices on EMM, the Group Policy service must be installed on the machine that supports group policy management. This machine should be accessible to the SCMDM 2008 machine. It need not have a public IP and can remain within the corporate domain.
Group Policy Service Name: Enter the group policy service name.
MDM Instance: Enter details of the MDM instance.
Group Policy Service Port: Enter the group policy service port details.
Windows 6.x Service URL: Enter the Windows 6.x service URL details.
Policy Server Callback URL: Enter the policy server callback URL details.
Group Policy Service Hostname: Enter the group policy service hostname details.
Service Queue Size: Enter the size of allowed queue service.
Is This Service Secure: Select Yes if the service is secure.
Note: If the service is secure (https), select Yes. Select No if the service is not secure (http).
Logging: Select Yes if logging is required.
Note: To enable EMM to support iOS devices, certificate distribution through, Simple Certificate Enrollment Protocol (SCEP) Server is mandatory.This must be done before the EMM installation begins. A certificate authority (CA) must also be set to sign certificates distributed by the SCEP Server.
Allow Administrator Interaction: Select Yes to allow administrator interaction.
Ignore Unicode: Select Yes to ignore unicode.
Overwrite Existing CA in DS: Select Yes to overwrite existing CA in DS.
Overwrite Existing Database: Select Yes to overwrite the existing database.
Overwrite Existing Key: Select Yes to overwrite the existing key.
CA Type: Details of the CA type appear.
CA Common Name: Enter the CA common name.
CA Distinguished Name Suffix: Enter the distinguished name suffix of the CA.
Crypto Provider Name: Enter the name of the crypto provider.
Database Directory: Select the database directory.
Ensure that the database directory you provide is not used by any other service. Once the CA role is installed, the directory will be locked by the Active Directory Certificate Services.
Hash Algorithm Name: Enter the hash algorithm function name.
Key Length: Enter the length of the hash algorithm key.
Log Directory: Select the location for the log directory.
Ensure that the database log directory you provide is not used by any other service. Once the CA role is installed, the directory will be locked by the Active Directory Certificate Services.
Validity Period: Enter the validity period of the CA.
Username: Enter your username for your CA type provider account.
Password: Enter your password for your CA type provider account.
NDES Service Account Group Name: Enter the NDES service account group name.
Service Account Name (domain/account): Enter the service account name.
Note: In case the server is a standalone computer, enter the computer name.
Service Account Password: Enter your NDES service account password.
Encryption Provider Name: Enter your NDES encryption provider name.
City: Enter your city.
Country (ISO 3166-1 alpha-2-code): Enter your country.
Department: Enter your department details.
Email: Enter your email address.
Name: Enter your name.
State: Enter the state name.
Signing Provider Name: Enter the signing provider name.
Log in Username: Enter your log in username.
Log in User Password: Enter your log in password.
Encryption Key Length: Enter the length of the encryption key.
Signing Key Length: Enter the length of the signing key.
Note: All components are installed one by one. You might see several notifications before the final install complete page.
Note: If a Status confirmation page appears, click Yes to open the SCEP URL in a browser.
Component | Version |
---|---|
Visual Studio | Visual studio 2013 express edition with update 3 (Prerequisite for Windows app wrapping) |
Microsoft Silverlight Runtime | Microsoft Silverlight Runtime 5.0 (Prerequisite for Windows app wrapping) |
Microsoft Silverlight | Microsoft Silverlight SDK 5.0 (Prerequisite for Windows app wrapping) |
Cygwin | Latest Cygwin (32 bit) version. (Prerequisite for Windows app wrapping) |
Windows Phone Enterprise apps must be signed for app management and app wrapping. You must install Visual Studio to manage Windows phone app wrapping.
See the Visual Studio website for more information on how to install and configure Visual Studio.
To manage enterprise apps, you need the Windows phone app wrapping feature to function. You must install Microsoft Silverlight Runtime to manage Windows phone app wrapping.
See the Microsoft Silverlight Runtime website for more information on how to install Microsoft Silverlight Runtime.
To manage enterprise apps, you need Windows phone app wrapping feature to function. You must install Microsoft Silverlight SDK to manage Windows phone app wrapping.
See the Microsoft Silverlight SDK website for more information on how to install and configure Microsoft Silverlight SDK.
Cygwin is a large collection of GNU and Open Source tools that provide features similar to a Linux distribution on Windows. To manage Windows phone app wrapping, install Cygwin. With Cygwin, user binaries are copied to the Windows machine. To manage enterprise apps, you need Windows phone app wrapping feature to function.
Important: You should be familiar with Linux commands to work with Cygwin.
See the Cygwin website for more information on how to install and setup Cygwin.
Important: You must install Cygwin along with openSSH, openSSL, Dos2Unix, Winzip, Unzip, and Curl components.
To configure Cygwin for enterprise application wrapping based on your system settings, follow these steps:
C:\cygwin64\bin
in the Variable Value field. C:\cygwin64\bin
in the Variable Value field.Important: For Windows wrapping, directory path should be less than 260 characters. If the path is more than 260 characters, the signing process will fail during application wrapping
To configure the SSH server, follow these steps:
Navigate to your Cygwin installation folder (for example, c/cygwin).
ssh-host-config,
and press enter. An alert Should StrictModes be used? (yes/no)
appears. Yes
and press enter. An alert Should privilege separation be used? (yes/no)
appears. Yes
and press enter. An alert you want to install sshd as a service. (yes/no)
appears. Yes
and press enter. The system prompt Enter the value of CYGWIN for the daemon: []
appears. ntsec tty
and press enter. An alert Do you want to use a different name? (yes/no)
appears. No
and press enter. The system prompt Please enter the password for user <username>)
appears. Reenter:
prompt appears. chmod +r /etc/passwd
: Provides read permissions to password file.
chmod u+w /etc/passwd
: Provides write permissions to user.
chmod +r /etc/group
: Provides read permissions to a group file.
chmod u+w /etc/group
: Provides write permissions to user.
chmod 755 /var
: Provides all permissions to var folder.
touch /var/log/sshd.log
: Creates a new empty file sshd.log.
chmod 644 /var/log/sshd.log
: Owner can write and other users can only read the log file.
chown system /etc/ssh*
: Changes owner for ssh* files to system.
chown system /var/empty
: Changes owner for /car/empty folder to system.
mkgroup -l > ..\etc\empty
: This will print /etc/group file to /etc/empty file.
mkpasswd -l > ..\etc\passwd
: This will print /etc/passwd file to /etc/passwd.
chmod a+x /etc/sshd_config
: This will provide read and write permission to the sshd_config file. Important: If the openssh you are using is version 6.7, perform the following steps:
Open /etc/sshd_config
Add the following line towards the end of the file:
KexAlgorithms diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1
net start sshd
. The SSHD service will start successfully. passwd <username>
. Copyright © 2018 Kony, Inc. All rights reserved. |