This is a follow-up from of my previous blogpost “Integrating Workspace ONE UEM with Workspace ONE Access”.
When the Workspace ONE Access and Workspace ONE UEM components are integrated, you can configure a Device Compliance authentication policy in Workspace ONE Access, based on Device Compliance rules you create in Workspace ONE UEM.
This offers an additional layer of security, with this method you are making sure only trusted endpoint devices, which meets your company device compliance rules, are allowed to authenticate and start applications in the Workspace ONE Access portal.
27 mei, 10-11 uur
Managing Windows 10 devices within the new hybrid workplace world with VMware Workspace ONE
If not done already, create a new device Compliance Policy in the Workspace ONE UEM Admin Console.
Go to the Devices, Compliance Policies, List View menu. Click Add.
In my case, I’m creating a new Compliance Policy for one of my Window 10 devices.
For this reason, I’m selecting Windows, Windows Desktop
Next, we are asked to choose from a variety of Compliance Policies. The complete list is listed here.
Some of the most common options are:
In our example, we are going to choose Firewall Status, to check if the Firewall IS NOT enabled/good on the device.
Of course, you are also able to choose multiple rules.
In the Actions Tab, we must specify an action that will take place, if the device doesn’t meet the compliance.
The complete list per OS type is found here.
Basically, the options are:
In our example, we are going for Notify, send email to the end-user that registered the device.
In the Assignments tab, we are going to push this Compliance Policy to the Smart Group in which the device is enrolled in the Organization Group (OG).
When done, click Finish & Activate.
The device Compliance Policy for the Firewall Status is successfully created!
In our example, we can see in the Devices, List View menu, that one of our devices didn’t meet the Compliance Policy…!
Indeed, it turned out the Firewall was switched off. As defined in the Compliance Policy Actions, I also got an email notification.
As you might have guessed, switching the firewall back on solved the problem!
As stated earlier, with the Workspace ONE UEM and Workspace ONE Access integration we can leverage the Compliance Policy within the Workspace ONE Access Authentication Policy settings.
Before we can configure the authentication policy, we are required to enable the Authentication Method with Device Compliance (With Workspace ONE UEM) first. In the Workspace ONE Access Admin Console, open the Identity & Access Management, Authentication Methods menu.
Scroll down and edit the Device Compliance (with Workspace ONE UEM) authentication method.
Enable the Device Compliance Adapter and hit Save.
Next, in the Identity Providers menu, edit the Built-in IDP and enable the Authentication Method.
Click SAVE. You will see the Built-in IDP is successfully updated.
We are now ready to create the authentication policy based on the device Compliance Policy we’ve created in Workspace ONE UEM!
Before we continue, it’s imported to note that the built-in identity provider authentication methods that can chain with Device Compliance (with Workspace ONE UEM) are:
In Workspace ONE Access, go to Identity & Access Management, Policies.
Add or edit the default policy. Specify in the Configuration for which network range and device type you want to create this policy. In my case, I’m editing the Web browser device type, with all network ranges.
Since I already configured the Certificate (cloud deployment) authentication policy in my previous blogpost, I can click the “+” sign and select the Device Compliance (with Workspace ONE UEM) authentication method as follow-up authentication.
The authentication policy is successfully configured and saved!
It’s time to test the end-user experience with this newly created policy!
Let’s first test from a device that doesn’t meet the device compliance (firewall is switched off)
As expected, we see an Access Denied error right after the certificate authentication.
When we take a closer look at the Workspace ONE Access audit event logs, we see the following error:
“Your device is currently in violation of your organization’s compliance policy”
Let’s now logon from a device that meets the device compliance.
And yes, we are able to log on!
This time, the Workspace ONE audit event logs show a successful device compliance!
This concludes the Device Compliance blogpost!
VMware Workspace ONE is een oplossing voor het faciliteren en beheren van de moderne digitale werkplek. Workspace ONE is een zogeheten “any/any/any” oplossing: het beveiligt alle applicaties op alle apparaten, zodat medewerkers op iedere locatie en elk tijdstip productief kunnen zijn.
Door de explosieve groei van het aantal applicaties, zoals cloudapplicaties (SaaS) en mobiele apps (op Android, iOS of ChromeOS) én de manier hoe medewerkers deze applicaties willen benaderen, is de traditionele aanpak van beheer -vaak gepaard met integratie van Microsoft Active Directory- geen goede oplossing meer.