The primary purpose of this section is to configure Application Settings to maintain several particulars, such as Enterprise Certificates, Provisioning Certificates, Usage Settings
From the Settings section, click Application Settings from the left panel. By default, the Certificates tab is displayed. . The Application Settings Page includes five tabs:
The primary purpose to have certificates for iOS, Android, and Windows is to
In the certificates section, you can do the following:
Apple uses various authentication mechanisms to ensure the security of iOS apps. Apps are distributed to devices in various ways (through the Appstore, privately distributed by enterprises and distributed by a company/developer internally with their teams for testing).
There are three important components in the authentication mechanism of Apple,
Each of the certificates has a passphrase associated with them. You must provide the details of the certificate’s passphrase when you upload any certificates to Kony Management. The certificate section for iOS allows you to add two certificates and two provisioning profiles.
Using the distribution certificate, you can distribute your apps across your team. Using the push notifications certificate, notifications will be sent to your apps from Kony Management administrator console. Kony Management uses your Apple distribution certificate to authenticate your apps.
The iOS section view displays the following elements:
Feature | Description |
---|---|
Enterprise Distribution Certificate | Using this feature, you can add your Apple enterprise distribution certificate to the Kony Management server. To add the certificate, click +Add to select the certificate from its location and then click Open. The selected certificate with size in KB appears next to Enterprise Distribution Certificate label. |
Certificate Passphrase | Enter the password. While accessing, the certificate and the associated password must match. |
Use wildcard provisioning profile? | Select this if you want to use the Wildcard provisioning profile. |
Wildcard Provisioning Profile |
Using this feature, you can add your Apple wildcard provisioning profile to the Kony Management server. Click +Addto select the provisioning profile from its location and then click Open. Before uploading your app, you should have the distribution certificates for iOS. When the app is ready for publication, you can create the wildcard provisioning certificate. |
Push Certificate | Using this feature, you can add your Apple push certificate to the Kony Management server. Click +Add to select the certificate from its location and then click Open. The selected certificate with size in KB appears next to push certificate label. |
Push Certificate Pass Phrase | Enter the password. While accessing, the certificate and the associated password must match. |
Enterprise Store Provisioning Profile | Using this feature, you can add your Apple enterprise store provisioning profile to the Kony Management server. Click +Addto select the profile from its location and then click Open. The selected profile with size in KB appears next to enterprise store provisioning profile. |
From the iOS Certificates section, you must add two certificates (Distribution and Push) and the Enterprise Store provisioning profile. You can add a Wildcard provisioning profile, optionally. Ensure that you have all the required certificates from your Apple developer account before you start configuring the iOS certificates section.
To configure certificates for iOS, do the following:
Note: While accessing, the certificate and the associated password must match.
Note: Before uploading your app, you should have the distribution certificates for iOS. When the app is ready for publication, you can create wildcard provisioning certificate.
Important: The enterprise store app must be in conformance with the certificates uploaded. If the bundle ID prefix for the certificate is com.XXX.containerapp
, then the bundle ID of the enterprise store must be com.XXX.containerapp
. It cannot be com.YYY.containerapp
. If you change the certificates and update the prefix, then you must delete the enterprise store. You must also download on your device a new version of the enterprise store that reflects the updated certificates. For example, in our case, it should be com.YYY.containerapp
. If you fail to do so, app management features will not work.
Important: You can upload your own mobile provision files for child apps to use. If you use a provisioning profile with a bundle ID com.xxx.containerapp, wrapping will fail. Ensure that your child app bundle ID does not contain the text containerapp.
Under the Enterprise Store Certificates section, click Plus Add next to Push Certificate. The file explorer window opens.
Note: While accessing, the certificate and the associated password must match.
Once you add all the certificates and provisioning profiles, the Save button is enabled.
For the distribution certificate and the push certificate, a new Certificate Details button is enabled. Click Certificate Details to view the respective certificate details.
Provisioning is the process of preparing and configuring an app to launch on devices. During development, you can designate the devices that can launch. When you submit your app to the store, you just provision your app. Provisioning iOS apps involves the creation of certificates, production, and distribution of provisioning profiles.
Google uses various mechanisms to communicate and authenticate with Android apps. Apps are distributed to devices in various ways (through GooglePlay, privately distributed by enterprises, and distributed by a company/developer internally with their teams for testing).
For Android applications, Kony Management uses the following components to communicate with the applications. Specifically, Kony Management uses the following:
Ensure that you have the following information before you configure the Android certificates:
The Android section view displays the following elements:
Feature | Description |
---|---|
Google ID | Enter your Google developer user name here. You must have a GCM key and a project in this user ID. |
GCM Key for Android | Enter the Google Cloud Messaging (GCM) Key. For more information on GCM for Android, click here. |
Project number (Sender ID) | Enter your Google project number or ID here. For more information on how to get your project number, click here. |
Key Store |
Using this feature, you can add your Key store to the Kony Management server. Click +Add to select the key store from its location and then click Open. |
Key Store Pass Phrase | Enter the required password to access the certificate. |
Certificate Alias |
Enter an alternative name for the certificate. The keystore protects each certificate with its individual password. For example, when you sign an Android application using the Key Store passphrase, you are asked to select a keystore first, and then asked to select a single alias from that keystore. After providing the passwords for both the keystore and the chosen alias, the app is signed and the public key (the certificate) for that alias is embedded into the APK. |
Certificate Pass Phrase | Enter the required password to access the certificate. While accessing, the certificate and the associated password must match. This button is enabled only when a certificate is uploaded to the Kony Management server. |
Certificate Details | Click this button to view the respective certificate details and associated error, if any. |
Google Maps Android API V2 Key | Enter your Google Maps Android API V2 key. For information on how to get Google Android API V2 key, click here. |
To configure certificates for Android, do the following:
The keystore protects each certificate with its individual password. For example, when you sign an Android application using the Key Store Passphrase, you must select a keystore first, and then select a single alias from that keystore. After providing the passwords for both the keystore and the chosen alias, the app is signed and the public key (the certificate) for that alias is embedded into the APK.
Google Maps Android API V2 Key: Enter the key value for your Google maps Android API.
Windows Phone 8.x devices require a Symantec Code Signing Certificate. Symantec is the only provider of code signing certificates for the Windows Phone Private Enterprise program. You can use this certificate to enable and distribute your windows applications within your organization. This certificate ensures that the windows applications are safe to download and for internal distribution in the company.
You must ensure that you have your Symantec enterprise certificate available before you configure this section. For more information on how to obtain this certificate, click here.
To set Certificates for Windows Phone 8.x, follow these steps:
For more information on how to obtain Windows Certificates, see the Pre-install guide.
An administrator can configure Kony Management suite to take a system level Two-way SSL certificate and securely bundle the Two-way SSL certificate with the Enterprise Store app.
Important: Two-way SSL feature does not work for the Enterprise Store and child apps for Apple iPad.
Note: If you want the two-way SSL to work on an iPhone, configure the Kony Fabric Identity service settings in the Authentication Settings page. Specifically, you must configure the Enable Reverse Proxy Basic Auth setting.
The SSL certificate is used to contact any server resource inside a customer's network that requires mutual authentication - for example, f5 load balancer. You must provide an x509 client side certificate (.p12 supported) for two-way SSL authentication, for the Enterprise Store to authenticate to a back-end. Mutual authentication through two-way SSL allows the client and the server to authorize each other so both parties are assured of each others identities.
See a sample reference for setting up the two-way SSL at https://support.f5.com/kb/en-us/solutions/public/15000/100/sol15137.html.
Note: Two-way SSL cert is also be shared with the child app if the Allow SSO option is selected during app deployment.
In the Application Settings page, an administrator can upload a two-way SSL certificate.
To upload an enterprise certificate for two-way SSL, follow these steps:
Important: The two-way SSL certificate name must not contain the dot character. For example, if the certificate name is client.one.p12, the Kony Management suite administrator console will not save the certificate.
Important: If you upload an incorrect two-way SSL certificate, a user log-in fails in the Enterprise Store.
The primary purpose of usage settings is to define rules about how a user can log in to web console and devices, session time-out, and invite new users. Usage Settings is divided into the following sections:
Online Login: This section covers various authentication mechanisms for the Kony Management administrator’s console and the Enterprise Store. In this section, you can enable the Captcha feature based on a number of failed attempts, lock a user (from the administrator console or the enterprise store)
Console Settings: In this section, you can configure the idle timeout period for a user in the administrator console.
Offline Login: Using this section, you can configure the maximum failed attempts while the device is offline. If the user exceeds the allowed number of offline login fail attempts, an enterprise wipe is triggered on the device.
Device Limit: Using this section, you can configure the number of devices users can enroll on their user name.
Local EMM User Password Settings: This section allows you to configure password settings for a local EMM user. You can do the following:
Using this section, you can configure imported groups and users settings. You can configure the following settings:
You can use the authentication mechanisms configured in the Authentication Settings page to configure Authentication types for various Kony Management suite interfaces. You can configure authentication for the following:
In this section, you can configure the usage of enterprise licenses. Various settings that you can configure in this section include log in settings, console settings, device limit, local user password settings, new user settings, and enterprise app license settings.
Feature | Description |
---|---|
Log-in Settings |
|
Require Captcha | The feature allows you to configure the captcha settings. By default, the option is set to Yes. If the selected option is No, then After How Many Failed Attempts field is removed. |
After How Many Failed Attempts | Select the number of failed attempts a user can have. A Captcha feature will be activated to determine whether a user is human after a user exceeds the number of failed log-in attempts. |
Lock User After | Select the number of attempts a user can have to log in to the application. A user will be locked after exceeding the allowed number of log-in attempts. This will control access to Enterprise Appstore. However, if the user is locked by the external authentication provider, user will still not be able to log in. |
Trigger Enterprise Wipe Device After | Select the number of attempts a user can have to log in to the application. After a user exceeds the allowed number of login attempts, all enterprise data will be wiped from the device. After the enterprise wipe, the device will be in the Suspended mode. For Android devices, apps along with app data is removed. App data is removed before uninstalling the app. |
Enable SCEP Enrollment | Configure the feature to Yes if you want to enable SCEP enrollment on Android devices. When you select Yes, Validate Client Certificate option is enabled. |
Validate client Certificate (OCSP Revocation Checking) | By default, the setting is set to No. If you want to validate the client certificate, select Yes. The OCSP URL field is enabled. For more information on OCSP URL configuration, click here. |
OCSP URL | Enter the OCSP URL in the field to validate the client certificate. |
Notify User Before SCEP CA expire | Select the number of days from the list. Based on this setting, users will be informed for the specified number of days about the certificate expiration before the certificate expire date. |
Console settings | |
Console Idle Timeout Period | Select the timeout period for the console in minutes. After the limit is reached, the user must log in online to access the administrator console again. |
Offline Login | |
Maximum Failed Attempts Offline | Select the number of attempts a user can have to login offline to enterprise store. After the limit is reached, the User must log in online to access enterprise store again. For Android devices, if the user exceeds the maximum number of allowed attempts, enterprise wipe will be initiated on the device. |
Trigger Enterprise Wipe on Device after Failed Attempts Offline | Select the number of attempts a user can have to log in to the application. After a user exceeds the allowed number of login attempts, apps along with app data is removed. App data is removed before uninstalling the app. This is applicable only for Android devices. |
Device Limit | |
Maximum number of Devices Per User |
Admin can limit the number of devices per user to be |
Local EMM User Password Settings | |
Reset Password on First Log-in | Configure this to Yes to force a user to reset the password on the first log in. This feature is not applicable on the Management console. The Reset password feature is applicable for the enterprise store and the self-service console. |
Complexity of Password |
Select the complexity of the password from the list. Options are Any, Numeric, Alphanumeric, Alphabetic, and Complex. When you select Complex, the following fields appear.
|
Minimum Length of Password | Select the minimum length of the password from the list. |
Expires in | Select an option from the list. Options are Never and Custom. When you select Custom, a new field Days is available. Enter the number of days after which, the password must expire. |
Unique Password Required Before Reuse | Using this field, you can restrict the reuse of a password. The user will not be allowed to reuse a password before a specific period. The available range is from one to ten. |
New User Settings | |
Overwrite Local User with Imported User | By default, this option is set to No If you want to overwrite a local user with the first imported user, click Yes. It will overwrite only if the user name is present in the local directory. |
Overwrite Local Group with Imported Group | By default, this option is set to No. If you want to overwrite a local group with the first imported group, click Yes. It will overwrite only if the group name is present in the local directory. |
Sync Groups for AD Users After Login | By default, this option is set to Yes. If you do not want to sync groups for active directory users after login, select No. |
Create/Import Users Without Email |
By default, this option is configured to No. If configured to Yes, users can be created/imported into the EMM server without an email ID from both Active Directory and locally.
For a user imported without an email address:
|
You must be very cautious when enabling the Create/Import Users Without Email feature. For a super administrator, if the email address is empty (because the Create/Import Users Without Email feature is set to Yes), then the super administrator will not receive email notifications for the following:
A user with limited administrator permissions will not get Reset password information notifications. |
|
Enterprise App Licenses | |
Enable Enterprise App Licenses | By default, this is set to No. Configuring this to Yes will enable restricting enterprise app distribution through licenses. |
Using the captcha feature, you can enforce extra security in the user log-in process. You can specify the number of failed attempts after which you can lock a user, wipe a device, etc.
To enable Captcha settings while logging into the management administrator console and the Enterprise store, follow the steps below:
Under Login Settings, for the Require Captcha field, select Yes. New fields appear.
From the Display Captcha after list, select the number of allowed failed login attempts. For example, 3.
To lock the user after the allowed number of failed login attempts, from Lock User list, select an option. For example, Custom. A field appears next to the list. Provide a value from 1 to 30.
From the Trigger Enterprise Wipe on Device after field, select Custom. A field appears next to the list. Provide a value from 1 to 30.
Click Save. A success message appears.
Important: The captcha is displayed only when login attempts fail (based on login settings) to a device-user enrolled with the EMM server. For a user not enrolled with the EMM server, the captcha is not displayed. In such scenario, the system displays the generic warning message that the device is enrolled with another user.
Simple Certificate Enrollment Protocol (SCEP) helps a user to request their digital certificate electronically to authenticate their identity.
To configure SCEP Enrollment settings, follow the steps below:
Using the console idle timeout feature, you can force a user to log in to Kony Management administrator console after a specified time period.
To configure Console Idle Timeout period settings for the management administrator console, follow the steps below:
To configure Console offline login period settings for the management administrator console, follow the steps below:
Note: After the limit is reached, the user must log in online to access the Enterprise Store again.
Note: This feature is available only on Android devices.
To configure the number of devices allowed for a user to enroll, follow the steps below:
To configure local Kony Management user password, follow the steps below:
In this example, we will create a complex password that needs to be reset at the first login, which expires in 30 days and the number of unique passwords before using an old password is three.
To configure New User settings, follow the steps below:
To configure Authentication Source, follow the steps below:
Once set, your respective login screen will take you to the configured authentication page.
To configure Enterprise App Licenses, follow the steps below:
Error Messages tab contains various pre-defined error message areas, where an administrator can enter appropriate messages that can be shown to an end user when an error occurs. The Administrator is expected to specify the messages for each of these situations.
The Error Messages tab includes the following sections:
Direct and offline app launch Messages
Network Permission Error Messages
Device Storage Error Messages
Clip Board Error Messages
Cut Copy and Paste operation is not allowed.
Application Features Error Messages
Phone Features Error Messages
Direct and Offline App Launch
If an app that uses SQLite database is not encrypted, the app is prone to security threats when the device is lost, rooted, or jailbroken. To ensure that the SQLite database is secure, the database is encrypted with a key for security. An encryption key helps an app protect the security of digital data.
Prior to Kony Management 3.5 release, an administrator could generate an encryption key directly, and the user could specify the key. However, with the 3.5 release, Kony Management assumes the task of generating a unique encryption key for each app installed on any device. This change helps an administrator to automate and schedule encryption key generation.
When a new key is generated, all wrap and sign child apps are re-wrapped, including the enterprise store, and a user must upgrade all apps. If the schedule is left blank, the PKI key pairs are generated when the administrator provides the app signing certificates. These PKI key pairs continue to be used unless the administrator generates a new PKI key pair using the Generate Now button.
The Encryption Key tab has the following fields:
The VPP Apps tab is used to configure VPP settings for iOS 7+ devices.
To create a VPP, the admin must register to Apple’s VPP and procure a token. A VPP Program Facilitator can obtain a token by logging into the appropriate VPP website.
Currently, Kony Management supports Apple's VPP for Business customers only through Managed distribution method.
To configure VPP settings, follow these steps:
An Apple ID that is used for creating a VPP is different from a Developer Apple ID or an Apple Device ID. A user should have a separate Apple ID to create a VPP. Developer IDs are either individual or corporate. These IDs are not supported to create a VPP.
For Business customers, the Token is generated by logging into https://vpp.itunes.apple.com/
Each token is valid for one year from the time it is generated.
Once the sync completed, the VPP apps page is updated in the App Management > VPP Apps page.
The Message Templates tab displays a list of all messages (Push and Email) that an administrator can send to users.
The Message Template tab displays the following fields:
Email messages can be of two types:
Push Messages are always plain text only.
Important: Do not modify the placeholders as fetching data required could fail. Ensure that you verify the changes to the HTML template before finalizing the template.
The system provides pre-defined message templates for all known situations that help an administrator to create custom messages. Message templates have placeholders of various nouns from App Management. An administrator can also modify these message templates if required.
The Admin can edit pre-defined templates. The placeholder tags must not modified, but can be shifted from one place to another. If tags are modified, the system can not fetch the data for that tag. Ensure that you only modify tags labels if required.
For example:
Tag Labels | Placeholders |
---|---|
To edit a template, follow these steps:
Admin can preview and test HTML emails before sending them out to users.
To send a test mail, follow these steps:
This feature helps you enable or disable message-template notifications to users. If you send notifications, you can customize the audience for these notifications. You can customize sending options for each message templates based on the required audience. Messages can be specific to affected users, administrators, or all users.
The Sending Options window displays the following fields:
To configure Sending Options,
An administrator can not delete pre-defined templates.
Rev | Author | Edits |
4.1 | PK | PK |
4.2 | PK | PK |
4.3 | PL | PK |
Copyright © 2018 Kony, Inc. All rights reserved. |