Skip to main content

Check out Interactive Visual Stories to gain hands-on experience with the SSE product features. Click here.

Skyhigh Security

Access Private Applications from iOS Device

 

Skyhigh Private Access allows you to extend protection to mobile devices using Skyhigh Web Security Gateway Service (WGCS), based on Cloud Application Control policies. After you set up mobile devices, device redirects HTTP/HTTPS (standard ports 80 and 443 only) traffic to WGCS for filtering. Settings that WGCS uses to filter HTTP/HTTPS traffic are configured in Cloud Application Control policies.

The iOS device always sends traffic (both private applications and Internet) traffic to SSE cloud even if you select the Redirect only private access traffic to cloud option. For more information about traffic redirection settings, see Redirect Only Private Access Traffic.

You can create VPN on the iOS devices in the following ways: 

  • Using MDM solution and push it directly to the iOS devices
  • Manually create VPN by uploading user identity(.p12) file to the Skyhigh Client app.
  •  Skyhigh Client app supports both iPhone and iPad (Minimum supported version is iOS 13.0)
  •  HTTP/HTTPS traffic redirection on standard ports only is supported. 

Set Up iOS Device to Access Private Applications

You will need to complete the following steps to set up iOS devices to access private applications:

Step 1: Generate Certificate Authority(CA) and User Identity(.p12) certificates

Create self-signed CA file and use the same file to generate the User Identity files and sign those. Follow any one method given below to generate certificates.

▼ Generate Certificate using OpenSSL

You can generate the certificate using the OpenSSL commands. The following is a sample instructions on how to create a CA certificate and identity certificate using OpenSSL:

Note: You can choose your convenient approach to generate a certificate. However, you should include all the parameters shown in the below sample.

  1. Create a config file. Make sure to include all the parameters in the config file as specified in the sample ca_config file. 
  2. Create CA certificate and key.

openssl req -x509 -nodes -newkey rsa:4096 -keyout key.pem -sha384 -days 3650 -out root-CA.pem -config ca_ext_file

  1. Create an extfile. Make sure to include all the parameters in the extfile as specified in the sample client config
  2. Generate the client key and certificate signing request (CSR).

openssl genrsa -out ShankKey.pem 4096
openssl req -new -key ShankKey.pem -sha384 -out ShankCert.csr -config client_config

  1. Generate the client certificate.

openssl x509 -req -days 3650 -sha384 -in ShankCert.csr -CA root-CA.pem -CAkey key.pem -CAcreateserial -out skyhigh_emp_1.pem -extfile client_config -extensions ext

  1. Generate client identity certificate (.p12 file). 

openssl pkcs12 -export -inkey ShankKey.pem -in skyhigh_emp_1.pem -name "skyhigh_emp_1" -certfile root-CA.pem -caname "skyhigh_ca" -out skyhigh_emp_1.p12 -password pass:ztna

Note: make sure CN in p12 should match the name of the p12 file and subjectAltName in client_config file (eg: CN= skyhigh_emp_1, DNS = skyhigh_emp_1 , skyhigh_emp_1.p12) 
make sure  "-caname "skyhigh_ca"  matches the CN = skyhigh_ca in ca_ext_file

 

▼ Generate Certificates using XCA tool

You can generate the certificate using the XCA tool. 

  1. Download and install the XCA 2.4.0 tool
  2. Create a New Database, go to File  > New Database, and enter the password to save it.

Picture1.png

  1. Click the Certificates tab. 

Picture2.png

  1. Click New Certificate

Picture3.png

  1. Select Create a self signed certificate as the signing option. 

12.png

  1. Select Signature algorithm as SHA384

Picture5.png

  1. Select Template for the new certificate as [default] CA.

Picture6.png

  1. Click Apply extensions and Apply subject.

Picture7.png

  1. Click the Subject tab.

Picture8.png

  1. Enter Internal Name and commonName.

Picture9.png

  1. Click Generate a new key.

Picture10.png

  1. Select keytype as RSA and Keysize as 4096 bit.

Picture11_1.png

  1. Click Create.

Picture12.png

Key created message window appears. 

Picture13.png

  1. Go to the Extension tab and retain all the settings as is.

Picture14.png 

  1. Go to the Key Usage tab and retain all the settings as is.

Picture15.png

  1. Go to the Netscape tab and remove any selected options.

Picture16.png

  1. Go to the Advanced tab and review all the information. 

Picture17.png

  1. Click OK to create the CA certificate.

Picture18.png

  1. Click the Certificates tab. 

Picture2.png

  1. Select the recently created root_CA certificate.

Screenshot 2023-12-12.png

  1. Click New Certificate

Screenshot 2023-12-12_1.png

  1. Select the previously created CA(root_CA) certificate as the signing option. 

Picture21.png

  1. Select Signature algorithm as SHA384

Picture23.png

  1. Select the template for the new certificate as [default] TLS_client or [default] HTTPS_client.

Picture24.png

  1. Click Apply extensions and Apply subject.

Picture25.png

  1. Click the Subject tab, enter Internal Name and commonName.

Picture26.png

  1. Click Generate a new key.

Picture27.png

  1. Select keytype as RSA and Keysize as 4096 bit.

Picture28.png

  1. Click Create.

Picture29.png

Key created message window appears. 

Picture30.png

  1. Go to the Extension tab. Select x509v3 basic Constraints type as Not defined and uncheck the Critical option. 

Picture31.png

  1. Select Key identifier as x509v3 Authority key Identifier.

Picture32.png

  1. Click Edit in the Select X509v3 Subject Alternative Name option.

Picture33.png

  1. Enable the Copy Common Name setting and click Apply

NOTE: If Copy common name is not available, then manually enter the DNS:user1”(user1 as the common name of the client certificate added in step 26) in the X509v3 Subject Alternative Name field.

Picture33_1.png

Picture34.png

  1. Go to Key Usage tab, select options from the list as per below image. 

Picture35.png

  1. Go to the Netscape tab and remove any selected options.

Picture16.png

  1. Go to the Advanced tab and review all the information. 

Picture37.png

  1. Click OK to create the CA certificate.

Picture38.png

  1. Select CA certificate and click Export.

38.png

  1. Select File Location and Export Format as PEM + Key (*.pem) for CA certificate. Click OK to save the file.

Picture41.png

  1. Select Client certificate(user1) and click Export.

39.png

  1. Select File Location and Export Format as PEM + Key (*.pem) for client certificate. Click OK to save the file.

Picture42.png

  1. Select Client certificate(user1) and click Export

39.png

  1. Select File Location and Export Format as PKCS #12 chain (*.pfx) for the client certificate. Click OK to save the file.

 Picture43.png

  1. Enter the Password and select Ok to save the file.

Picture44.png

  1. Go to the file location and open CA and Client file in any text editor. Verify only certificate part is available in the file. remove extra information, if any. 

Picture45.png

Picture46.png

  1. Rename Client file (user1) .pfx file as .p12 file.

Picture47.png

 

Step 2 : Upload CA certificate generated in the Step 1 to the Skyhigh Security UI

 Upload CA certificate generated in the Step 1 to the Skyhigh Security UI

Note: After this step, wait for 30-40 mins before connecting VPN

  1. Go to Settings > Infrastructure > Web Gateway Setup 

Screenshot (359).png

  1. Click Configure on the Skyhigh Mobile Cloud Security setting

Screenshot (360).png

  1. Click Upload and select the custom CA certificate.

Note: supported certificate formats are DER, PEM, CRT, and CER.

Screenshot (362).png

  1. Specify the User name and an optional User Group in the User Identity certificates and click 

Screenshot (363).png

  1. Click Save

Screenshot (363_1.png

  1. Click Upload & Test and upload the User identity file with format as .cer, .crt, .pem or .der to validate the CA and user Identity file.

Screenshot (365).png

  1. Click Save to save the configuration. 

Screenshot (366).png

  1. Click Publish to apply the changes. 
Step 3:  Download and install iOS Skyhigh Client app from the Appstore

Download and install iOS Skyhigh Client app from the Appstore.
2024-01-23_10-44-39.png

Step 4:  Download and Install Skyhigh Security Certificate in Mobile

Download the certificate using the link and share this certificate to install in the mobile device. 

  1. Download this certifcate in the mobile device
  2. Once it is downloaded, it will be available in Settings > Generic > VPN & Device management

clipboard_eb4be0da97d0442f92f7ea14819b9d219.png

  1. Select the certificate and click Install.

clipboard_edc7f2e9d062bdcec940032942c38bcc4.png

  1. Enter the passcode and click Install to install the certifcate.

clipboard_e0c1f32fb15e242120cb66f52630fa7db.png

  1. After install, go to Settings > General > About > Certifcate Trust Settings

clipboard_ebad77077b1b37ca42a469ea8e006b1e9.png

  1. Ensure that the certificate is installed and switch on the certificate and click continue to enable it.

clipboard_eeaf06991e359db47a2e0f0a4249a2663.png

Step 5:  Download Tenant Customer CA from the Skyhigh UI
  1. Go to Policy > Web Policy > Feature Configuration

Screenshot (368).png

  1. Select HTTPS connections > Customer CA.

Screenshot (370).png

  1. Select Customer CA and click export to download the Customer CA file.

Screenshot (371)_1.png

  1. Share this Customer CA certificate to user if selecting Manual VPN config. 
Step 6: Configure VPN profile
Manual Configuration: 
Install the Tenant customer CA in the iOS device

Note: The iOS device should have a passcode to install and trust a CA certificate.

  1. Export the Tenant customer CA to device using Airdrop or mail
  2. Once Tenant Customer CA is downloaded, it will be available in the device settings
  3. Go to device Settings > General > VPN & Device mangement.

clipboard_e531b135936fbe73ef526bc26399fd162.png

  1. Click the certificate and tap install.

clipboard_e30c51550a7b79b175feaa3c73727ccf1.png
 

  1. Enter the passcode and click install to install the certificate.

clipboard_ea54caf915fc98ef9dd60f53969c349ce.png

  1. Profile installed message confirms that certificate is installed correctly.

clipboard_e563331e2e235bb912d2378a1a8b99dff.png

  1. Go to settings > General > About > Certificate Trust settings, verify the Tenant Customer CA and enable the certificate switch. 

clipboard_eb1b344ca685d75b3dda930e51d1a1d96.png

  1. Click continue to trust the certificate.
Upload User Identity(.p12) file.

The .p12 file is a password protected file, so admin has to share the password to the user. Long press and save the file on your device.

Note: Make sure to upload the .p12 file to the Skyhigh Client app. Don't install this file directly.

  1. Open the installed app
  2. Read the disclaimer and select I agree to use data as specified in Terms.
  3. Tap Proceed.
  4. Tap Browse & Upload to upload the .p12 file.

      Search for the .p12 file and select it to complete the upload process.

  1. Enter the password and tap Continue.

      The Skyhigh Client app asks for permission to add VPN configuration on your phone.

  1. Tap Allow.
  2.  Enter the iPhone passcode.
  3. Tap Get Started.

Prompts you to enter login credentials.

  1.  Enter your corporate username and password.

After successful authentication, you can use the Skyhigh Client or enter the full URL of the private application in an external browser to access private applications.

Note: To disable VPN, go to Settings > General > VPN > Disable VPN.

MDM configuration: 

Admin pushes VPN Configuration and Tenant Customer CA certificate using MDM, users should ensure that the configuration exists on the iOS device.

You can use the VMware, Microsoft Intune, or Ivanti Neurons MDM solution to manage your users' iOS devices. For configuring details, see

  1. Create VPN configuration(.mobileconfig file)
  1. Download Apple Configurator from the Mac Appstore
  2. Click on File > New Profile
  3. Navigate to General and add any name.

clipboard_e55a5417e6f246e8f22aa8a759f8783fb.png

  1. Navigate to Certificates and click Configure.

clipboard_e7b0347c262954a9929990d2eefcf0165.png

  1. Select User Identity(.p12) file generated and enter the password.

clipboard_e7204a1ef36ede18bce150f123dd33c72.png

  1. Rename Tenant Customer CA(certificate_authority.pem) downloaded from the Skyhigh tenant to certificate_authority.crt
  2. Click  + icon in Certificates and select Tenant Customer CA(certificate_authority.crt) file.

clipboard_ede38e7c9490257b2cb9eae0b284f804b.png

  1. Navigate to VPN settings and click Configure.

clipboard_e0da9fa17747f2654f6fd946b0cfe0c0f.png

  1. Enter the values as mentioned below
  • Connection Name: Any random name
  • Connection Type: IKEv2
  • Server: pa-vpn.mcafee-cloud.com
  • Remote Identifier: vpn.mcafee-cloud.com
  • Local Identifier:  Copy the common name of User identity file appeared in Certificates(Eg: “user2”
    clipboard_e58f1701aa8046aa3014639ff2918428f.png
  •  Machine Authentication: Select Certificate in the drop down

  • Identity Certificate: Select the user identity(.p12) file
    clipboard_ec6c9c3b9331b0bfb72723211d0ba8f0f.png

  • Select Enable EAP
    clipboard_e06b6c0a285832bae6d7603d3669fb1dc.png

  • EAP Authentication: Select Certificate in drop down

Note: When you create a mobileconfig file, it adds the following key value pair which causes certificate installation failure. Delete this key pair to make the certificate work.

Open the .mobileconfig file in any TextEdit and delete the below key and values.

<key>DNS</key>
<dict>
<key>SupplementalMatchDomainsNoSearch</key>
<integer>0</integer>
</dict>

  1. Push this VPN configuration to device using MDM
  2. Use Skyhigh Client app
    1. Ensure VPN configuration exists in Settings > General VPN.
    2. Ensure Tenant Customer CA certificate is enabled in Settings > General > About > Certificate Trust settings.
    3. Open the Skyhigh Client app
    4. Read the disclaimer and select I agree to use data as specified in Terms.
    5. Tap Proceed.
    6. Select Open VPN Settings.
    7. Go to Settings > General > VPN and enable the VPN config which admin had pushed. Wait until VPN state shows Connected.
    8. Navigate back to Skyhigh Client app and tap Get Started
      Prompts you to enter login credentials.
    9. Enter your corporate username and password.
      After successful authentication, you can use the Skyhigh Client or enter the full URL of the private application in an external browser to access private applications.

Note: To disable VPN, go to Settings > General > VPN > Disable VPN.

  • Was this article helpful?