Deploying a BYOD Policy for Microsoft Intune Managed Devices
This example shows how to use policies to enable security based on device identity, device posture, or user identity in a bring your own device (BYOD) environment for an enterprise that uses Microsoft Intune® for mobile device management (MDM).
Requirements
The following Component Version Information table lists version information for the solution components shown in this example.
Component |
Version |
Ivanti Connect Secure |
Release 9.1r2 or later is required. |
Microsoft Intune MDM |
Release version 2002 is used in this example. Any version that supports the device ID and device attributes you plan to query is compatible. |
Supported Devices
•Google Android 10.0 and later
•iPhone iOS 10.0 and later
Configuring the Microsoft Intune MDM Service
When the user installs the MDM application on the device and completes enrollment, the MDM pushes the device certificate to the device. After enrollment, the MDM maintains a database record that includes information about the enrollee—attributes related to device identity, user identity, and posture assessment against MDM policies.
The following Microsoft Intune Device Attributes table describes these attributes. In this solution, these attributes are used in ICS role mapping that is the basis for network access and resource access policies. When you configure role-mapping rules, you specify the normalized attribute name.
Intune Attribute |
Normalized Name |
Description |
Data Type |
complianceState |
isCompliant |
True or false (string) based on whether device is compliant or non-compliant. |
Boolean |
isManaged |
isEnrolled |
True or false (indicating whether the client is managed by Intune or not). |
Boolean |
macAddress |
macAddress |
MAC address of the device. |
String |
serialNumber |
serialNumber |
Serial number of the device. Applies to iOS Devices only. |
String |
udid |
UDID |
The device unique identifier. Unique Device Identifier (UDID), which is a sequence of 40 letters and numbers that is specific to iOS devices. |
String |
meid |
MEID |
MEID is 56 bits long (14 hex digits). It consists of three fields, including an 8-bit regional code (RR), a 24-bit manufacturer code, and a 24-bit manufacturer-assigned serial number. |
String |
osVersion |
osVersion |
OS Version of the device. |
String |
model |
Model |
Model of the device. |
String |
manufacturer |
manufacturer |
Device Manufacturer. |
String |
azureDeviceId |
deviceId |
The device Id of the device after it has work place joined with Azure Active Directory. |
String |
lastContactTimeUtc |
lastSeen |
The date time when the device last checked in with the Intune management service endpoint. |
String The format is MM/DD/YYYY HH:MM:SS |
Refer to third-party documentation for complete information and configuration details.
To configure the MDM:
1.Enroll devices in the MDM using the methods supported by the MDM.
2.Create a profile. The profile determines many MDM management options. The following configurations are key to this solution:
- Create trusted certificate profiles in Intune. For detailed steps, refer to the procedure in the Microsoft Intune document.
- Create and assign SCEP certificate profiles in Intune. For detailed steps, refer to the procedure in Microsoft Intune document.
- Create VPN profile in Intune. For detailed steps, refer to the procedures in Microsoft Intune document.
Configuring ICS with Microsoft Intune
Microsoft Intune is an MDM server which provides the device compliance status for the mobile devices. ICS retrieves the device attributes from Microsoft Intune and uses it for compliance assessments and role assignment. This feature integrates Microsoft Intune and ICS for providing compliance check and onboarding of devices.
In 9.1R15, Support to Intune Government cloud is available as a preview feature. Will be implemented in the future releases.
To configure Microsoft Intune MDM server:
1.Select Authentication > Auth. Servers > New MDM Server.
2.Enter the server name, select Microsoft Intune as MDM.
- Enter the Azure AD Tenant ID.
- Enter the Web application ID or Client ID that is registered in Azure AD.
- Enter the Client Secret key registered in the Azure AD.
- Enter the Timeout duration in seconds. Default is 15 seconds.
To obtain Tenant ID, Client ID, Client Secret Key, see Viewing Client ID, Tenant ID, and Client Secret.
3.Provide the Device Identifiers parameters like Device Identity, ID template, and ID type.
From 9.1R15, the ID type allows to use Intune device identifier as the Device ID .
4.Click Save changes.
5.Select Users > User Realms and select the Device Attribute server for Microsoft Intune.
6.Select Role Mapping tab of the user realm to create role mapping rules. Configure the role mapping rules based on the Microsoft Intune supported device attributes.
The following table demonstrates Microsoft Intune Role Mapping Attributes.
Role Mapping Attribute Name |
Microsoft Intune Attribute Name |
Description |
Data Type |
deviceid |
azureDeviceId |
The device Id of the device after it has work place joined with Azure Active Directory. |
String |
isCompliant |
complianceState |
True or false (string) based on whether device is compliant or non-compliant. |
Boolean |
isEnrolled |
isManaged |
True or false (indicating whether the client is managed by Intune or not). |
Boolean |
lastSeen |
lastContactTimeutc |
The date time when the device last checked in with the Intune management service endpoint. |
String The format is MM/DD/YYYY HH:MM:SS |
macAddress |
macAddress |
MAC address of the device. |
String |
manufacturer |
manufacturer |
Device Manufacturer. |
String |
meid |
meid |
MEID is 56 bits long (14 hex digits). It consists of three fields, including an 8-bit regional code (RR), a 24-bit manufacturer code, and a 24-bit manufacturer-assigned serial number. |
String |
model |
model |
Model of the device. |
String |
osVersion |
osVersion |
OS Version of the device. |
String |
serialNumber |
serialNumber |
Serial number of the device. Applies to iOS Devices only. |
String |
UDID |
udid |
The device unique identifier. Unique Device Identifier (UDID), which is a sequence of 40 letters and numbers that is specific to iOS devices. |
String |
UUID |
uuid |
Universal unique device identifier. |
String |
IntuneDeviceId |
deviceid |
Unique Device ID for enrolling into Intune and used to uniquely identify the device. |
String |
Configuring the Microsoft Intune MDM Server
Microsoft Intune acts as the Mobile Device Management (MDM) Server for ICS solution. ICS users have to register their mobile devices with Microsoft Intune. As part of registration, the relevant Profiles get automatically provisioned to mobile device.
To configure the Microsoft Intune MDM:
1.Enroll the devices with the MDM server.
2.Create an enterprise WiFi profile.
•Configure ICS with a role and realm for the user. Microsoft Intune provides the user with a link to provision the created policy and then pushes the profile information. ICS does the role assignment and either allows or denies based on the device assessment.
3.Create Azure Active Directory (AAD) web application.
4.Go to portal.azure.com, click on the Azure Active Directory on the left of the screen, click on the App registrations and then click on New application registration.
5.Enter the application name, select Web app/API as application type, and enter the IP address/FQDN for sign-on-URL and click Create.
The Application Registration page appears if the registration is successful.
6.Click the application, then select the required permissions and click Add.
7.Click Grant Permission.
8.Select Microsoft Intune API.
9.Under Application Permissions, select Get device and compliance information from Microsoft Intune.
10.(Optional) You must add the following delegated permissions for Microsoft Graph API.
•Sign in and read user profile
•Sign Users in
•View users’ email address
•View users’ basic profile
From 9.1R15, Graph API is changed from windows.net to Microsoft.com. To use Intune, add permission for client app on Azure portal as indicated.
11.(Optional) Add the following delegated permissions for Azure Active Directory.
•Sign in and read user profile
•Read all users' basic profiles
•Access the directory as the signed-in user.
Viewing Client ID, Tenant ID, and Client Secret
The Client ID/Application ID is created automatically once the AAD web application/API is created. You can view the client ID/application ID from the application properties page.
Every organization in Microsoft cloud is called tenant and it is organization specific. Each Tenant will be having a unique Tenant ID. Select the web application/API and click Endpoints tab and then you can copy the tenant ID.
To create the secret key, click the Web Application/API and then click Keys.