Skip to main content

Authentication Types

No Authentication

If the No Authentication type is configured by the administrator, device authentication will not be required during enrollment. As a result, devices can be easily enrolled directly into the SureMDM Web Console.

To configure the devices without authentication, follow these steps:

  1. On the SureMDM Web Console, navigate to Settings > Account Settings > Device Enrollment Settings > Device Enrollment Rules.

  2. Choose No Authentication from the Device Authentication Type drop-down list and click Apply.

note

Prompt for User Name and Email ID on Device - Enable this option to prompt users to provide their name during the device enrollment process. This name will be displayed under the Device User Name and E-mail column in the Device Grid.

Basic Authentication

When administrators want to configure the Basic Authentication type, the credentials must be configured for the devices to authenticate before enrolling in the SureMDM Web Console.

To configure credentials to enroll the devices in the SureMDM Console, follow these steps:

  1. On the SureMDM Web Console, navigate to Settings > Account Settings > Device Enrollment Settings > Device Enrollment Rules.

  2. Configure the following settings:

    • Device Authentication Type: Choose the Require Password from the Device Authentication Type drop-down list.
    • Enter Password: Enter a desired password.
    • Show Password: Select this option to show the password (alphanumeric characters) entered in Enter Password field.
note
  • Prompt for User Name and Email ID on Device - Enable this option to prompt users to provide their name during the device enrollment process. This name will be displayed under the Device User Name and E-mail column in the Device Grid.
  • Bypass Password Authentication During QR Enrollment - Enable this option to Bypass Password prompt during device enrollment process using QR code approach. This requires devices enrolled with SureMDM agent version 27.22.16 or later for Android, 4.74 or later for iOS, 5.6.4 or later for macOS and 6.07.0 or later for Windows.
    • For Windows, Password Authentication will be bypassed for both QR Code Enrollment and the Customized (wrapped) SureMDM Agent.
  • Bypass Enrollment Authentication for Apple User Enrollment - When enabled, devices will bypass the enrollment authentication configured in SureMDM and instead authenticate using Managed Apple ID credentials. For federated Apple accounts, authentication will follow the identity management settings configured in Apple Business Manager (ABM). Applies for iOS and macOS devices only.

OAuth Authentication

SureMDM allows Active Directory authentication for enterprises with an Active Directory domain account. It is a convenient way for administrators to manage a large number of enrolled devices.

note

This feature is supported only on Android, Windows, macOS, and iOS.

To set up OAuth authentication as ADFS on SureMDM, follow these steps:

  1. On the SureMDM Web Console, navigate to Settings > Account Settings > Device Enrollment Settings > Device Enrollment Rules.

  2. Configure OAuth Authentication as ADFS settings and click Apply.

SettingsDescription
Advanced Device Authentication
  • If selected, the password prompt will appear on the server side for authentication.
  • If not selected, the password prompt will appear on the device side for authentication.
  • Device Authentication TypeChoose OAuth Authentication from the Device Authentication Type drop-down list.
    Auth Endpoint & Token EndpointEnter the Auth Endpoint and Token Endpoint.
    Client IDClick Generate to get the Client ID.
    Note: Client ID has to be generated only for ADFS server. For Azure AD, GSuite, and others there are pre-generated Client ID's.
    Client Secret (EMM Only)Copy the Client Secret from the server machine.
    note
    • Bypass Enrollment Authentication for Apple User Enrollment - When enabled, devices will bypass the enrollment authentication configured in SureMDM and instead authenticate using Managed Apple ID credentials. For federated Apple accounts, authentication will follow the identity management settings configured in Apple Business Manager (ABM). Applies for iOS and macOS devices only.

    SAML (Security Assertion Markup Language)

    SureMDM supports device enrollment using SAML authentication. This section describes how to configure SureMDM using SAML-based authentication for device enrollment with ADFS as an identity provider.

    note

    This feature is supported only on Android, Windows, macOS, and iOS.

    Following steps are involved in SAML Authentication

    • Install Open SSL Tool and Generate Certificates

    • Obtain ADFS Service URL

    • Obtain Federation Service Identifier

    • Configure SAML

    • Add SureMDM as a SAML Service Provider

    • Enroll SureMDM Agent

    note
    • Bypass Enrollment Authentication for Apple User Enrollment - When enabled, devices will bypass the enrollment authentication configured in SureMDM and instead authenticate using Managed Apple ID credentials. For federated Apple accounts, authentication will follow the identity management settings configured in Apple Business Manager (ABM). Applies for iOS and macOS devices only.

    Install Open SSL Tool and Generate Certificate

    SAML setup requires the generation of a certificate with a public and private key. Use the OpenSSL tool for this generation.

    To install the OpenSSL tool on a Windows machine, follow these steps:

    note

    Admins can skip this section if OpenSSL tool is already installed.

    1. Go to the below link and download Win64 OpenSSL v1.1.1a Light by clicking on the EXE link.

      https://slproweb.com/products/Win32OpenSSL.html

    2. Double-click the OpenSSL file using default settings to complete the installation.

    3. Go to the Location where OpenSSL is installed.

      Example: C:\Program Files\OpenSSL-Win64

    4. Press CTRL+Right Mouse button to launch the command prompt.

    5. Type the following command in the prompt and press Enter:

    set OPENSSL_CONF=c:\OpenSSL-Win32\bin\openssl.cfg
    1. Restart the computer.
    note

    This step is mandatory.

    1. Go to the location where OpenSSL is installed, open the bin folder, and then launch the OpenSSL application.

    Generate Certificate

    To generate a certificate, follow these steps:

    1. Run the below commands in the Command prompt:
    req -x509 -nodes -sha256 -days 2048 -subj "/CN=suremdm.42gears.com" -newkey rsa:2048 -keyout "ssocert.key" -out "ssocert.crt"
    pkcs12 -export -in "ssocert.crt" -inkey ssocert.key -CSP "Microsoft Enhanced RSA and AES Cryptographic Provider" -out "ssocert.pfx" -password pass:{{YOURPASSWORD WIHTOUT BRACES}}
    x509 -inform pem -in "ssocert.crt" -outform der -out "ssocert.cer"

    A certificate will be generated and saved at path C:\Program Files\OpenSSL-Win64\bin. Ensure the below-mentioned files are present here:

    • ssocert.pfx

    • ssocert.crt

    • ssocert.cer

    Obtain ADFS Service URL

    To obtain the ADFS Service URL, follow these steps:

    1. Log in to the Windows Server machine hosting Active Directory and ADFS.

    2. In ADFS Console (Server Manager > ADFS > Tools > AD FS Management), expand Service and click End Point.

    note

    Please make a note of the URL Path for SAML 2.0

    1. Prefix the paths with the machine name and save it.
    note

    The saved path will be required in later steps.

    Obtain Federation Service Identifier

    To obtain the Federation Service URL, follow these steps:

    1. In the AD FS Console, right-click Service and select Edit Federation Service Properties.
    note

    Please note down the URL mentioned in the Federation Service Identifier field.

    Configure SAML

    To enable SAML-based enrollment in SureMDM, follow these steps:

    1. On the SureMDM Web Console, navigate to Settings > Account Settings > Device Enrollment Settings > Device Enrollment Rules.

    2. Configure SAML Authentication settings and click Save.

    SettingsDescription
    Advanced Device Authentication
  • If selected, the password prompt will appear on the server side for authentication.
  • If not selected, the password prompt will appear on the device side for authentication.
  • Device Authentication TypeChoose OAuth Authentication from the Device Authentication Type drop-down list.
    SSO TypeChoose the SSO Type from the following:
  • ADFS
  • Azure AD
  • Okta
  • OneLogin
  • PingOne
  • Google Workspace (formerly G Suite)
  • Service IdentifierEnter the Service Identifier from Obtain Federation Service Identifier
    Sign On Service UrlEnter the Sign On Service Url from Obtain ADFS Service URL.
    Upload CertificateLogout Service UrlEnter the Sign On Service Url from Obtain ADFS Service URL.
    Upload CertificateBrowse ssocert.pfx file generated and provide password used at the time of certificate generation. Refer to the steps in Generate Certificates.

    Add SureMDM as a SAML Service Provider in ADFS

    To add SureMDM as a SAML service provider in ADFS, follow these steps:

    1. Access Remote Desktop Connection/ Login into ADFS Server.

    2. Launch the AD FS Console from Server Manager, then click Tools and select AD FS Management.

    3. Click Relying Party Trusts and then click Add Relying Party Trust.

    4. Select Claims aware and click Start.

    5. Select Enter data about relying party manually and click Next.

    6. Enter the Display Name as SureMDM and click Next.

    7. In the Configure Certificate section, browse the certificate (ssocert.cer). Refer to Generate Certificate.

    8. Check Enable support for the SAML 2.0 WebSSO protocol and enter URL.

    9. Enter urn:42gears:suremdm:SAML2ServiceProvider in Relying party trust identifiers field.

    10. Select Permit everyone or select a specific group based on your requirements.

    11. Click Next > Close.

    12. In the main AD FS Console, right-click SureMDM and select Properties.

    13. Select the Signature Tab and click Add.

    14. Select the certificate (ssocert.cer. Refer Generate Certificate) and click Apply.

    15. Select the Endpoints tab and click Add SAML.

    16. Select Endpoint type as SAML Assertion Consumer and Trusted URL.

    17. Click OK.

    18. In the Edit Claim Issuance Policy prompt, click Add Rule.

    19. Click Next.

    20. In the Claim rule name field, enter SureMDM, select Attribute store as Active Directory and add the following mappings and click Finish.

    21. Click OK.

    Enroll SureMDM Agent

    Refer to the steps under Scan QR Code to enroll the SureMDM Agent.

    Once the user has scanned the QR code, the user will be redirected to the ADFS /Azure AD portal/ GSuite/Other login pages. Enter the appropriate login credentials. On successful configuration, the SureMDM Agent Home Screen will show the status as Online, and in the SureMDM Web Console, the device will be listed under the Unapproved option.