Prepare to enroll devices and deliver resources
Before proceeding, be sure to complete all tasks described in Onboarding and resource setup.
Endpoint Management supports various enrollment options. This article covers the basic setup required to enable all supported devices to enroll. The following diagram summarizes the basic setup.
For a list of supported devices, see Supported device operating systems.
Set up an Apple Push Notification service (APNs) certificate for iOS devices
Endpoint Management requires an Apple Push Notification service (APNs) certificate from Apple to enroll and manage iOS devices. Endpoint Management also requires an APNs certificate if you plan to use push notifications for Secure Mail for iOS.
To obtain a certificate from Apple requires an Apple ID and developer account. For details, see the Apple Developer Program website.
To obtain an APNs certificate and import it into Endpoint Management, see APNs certificates.
For more information about Endpoint Management and APNs, see Push Notifications for Secure Mail for iOS.
Set up Firebase Cloud Messaging (FCM) for Android devices
Firebase Cloud Messaging (FCM) controls how and when Android devices connect to the Endpoint Management service. Any security action or deployment command triggers a push notification to prompt users to reconnect to Endpoint Management.
FCM setup requires that you configure your Google account. To create Google Play credentials, see Manage your developer account information. You also use Google Play to add, buy, and approve apps for deployment to the Android Enterprise workspace on a device. You can use Google Play to deploy your private Android apps, public apps, and third-party apps.
To set up FCM, see Firebase Cloud Messaging.
Set up Endpoint Management AutoDiscovery Service
As of December 31, 2018, the AutoDiscovery Service URL
discovery.mdm.zenprise.comis replaced with
ads.xm.cloud.com. For more information, see the Citrix support article https://support.citrix.com/article/CTX202044.
Autodiscovery is an important part of many Endpoint Management deployments. Autodiscovery simplifies the enrollment process for users. They can use their network user names and Active Directory passwords to enroll their devices. They don’t need to enter details about Endpoint Management. Users enter their user name in user principal name (UPN) format; for example,
firstname.lastname@example.org. The Endpoint Management AutoDiscovery Service enables you to create or edit an autodiscovery record without assistance from Citrix support.
AutoDiscovery is recommended for high security environments. AutoDiscovery supports certificate pinning, which prevents man-in-the-middle attacks. Certificate pinning ensures that the certificate signed by your enterprise is used when Citrix clients communicate with Endpoint Management. For information about certificate pinning, see Certificate pinning.
To access the Endpoint Management AutoDiscovery Service, navigate to https://tools.xm.cloud.com and then click Request AutoDiscovery.
On the AutoDiscovery Service page, claim a domain. Click Add Domain.
In the dialog box that opens, enter the domain name of your Endpoint Management environment and then click Next.
The next screen provides instructions on verifying that you own the domain.
Copy the DNS token provided in the Endpoint Management Tools Portal.
Create a DNS TXT record in the zone file for your domain in your domain hosting provider portal.
To create a DNS TXT record, log in to the Domain Hosting Provider portal for the domain you added in the previous step. You can edit your Domain Name Server Records and add a custom TXT record.
Paste the Domain Token in your DNS TXT record and save your Domain name Server record.
Back in the Endpoint Management Tools Portal, click Done to start the DNS check.
The system detects your DNS TXT record. Alternatively, you can click I’ll update later, and the record is saved. The DNS check doesn’t start until you select the record that has a status of “Waiting” and then click DNS Check.
This check ideally takes about an hour, but it can take up to two days to return a response. To see the status change, you might need to leave the portal and return.
After you claim your domain, you provide information about the AutoDiscovery Service. Right-click the domain record for which you want to request autodiscovery and then click Add ADS.
Enter the requested information and then click Next. If you are unsure about your instance name, add a default instance of zdm.
In the preceding screenshot, “WorxHome” refers to the app that’s now named Secure Hub.
Enter the following information for Secure Hub and then click Next.
User ID Type: Select the type of ID with which users sign on as either E-mail address or UPN.
Use UPN when the user’s User Principal Name is the same as their email address. Both methods use the domain entered to find the server address. If you choose E-mail address, users are prompted to enter their user name and password. If you choose UPN, users are prompted to enter their password.
HTTPS Port: Enter the port used to access Secure Hub over HTTPS. Typically, the HTTPS port is 443.
iOS Enrollment Port: Enter the port used to access Secure Hub for iOS enrollment. Typically, this port is 8443.
Required Trusted CA for Endpoint Management: Indicate whether a trusted certificate is required to access Endpoint Management or not. This option can be OFF or ON. Currently, the ability to upload a certificate for this feature does not exist. If you want to use this feature, call Citrix Support and request that them to set up autodiscovery. To learn more about certificate pinning, see the section on certificate pinning in Secure Hub. To read about the ports required for certificate pinning to work, see the support article on Endpoint Management Port Requirements for ADS Connectivity.
A summary page displays all the information you entered in the preceding steps. Verify that the data is correct then click Save.
At this point, you can enroll all supported devices. Proceed to the next section to prepare to deliver resources to devices.
Continue your Endpoint Management configuration
After you complete the basic setup for device enrollment, how you configure Endpoint Management varies widely based on your use cases. For example:
- What are your security requirements and how do you want to balance those requirements with user experience?
- Which device platforms do you support?
- Do your users own their devices or use corporate-owned devices?
- What device policies do you need to push to devices?
- What types of apps do you provide users?
This section helps you navigate through the many configuration choices by directing you to articles in this documentation set.
As you complete configuration in third-party sites, make note of the information and its location, for reference when you configure Endpoint Management console settings.
Security and authentication
Endpoint Management uses certificates to create secure connections and authenticate users. Citrix provides wildcard certificates for your Endpoint Management instance.
Recommended background reading:
For a discussion of authentication components and recommended configurations by security level, see the “Advanced concepts” article, Authentication.
See also, Security and user experience.
For an overview of the authentication components used during Endpoint Management operations, see Certificates and authentication.
You can choose from the following types of authentication. Configuring authentication includes tasks in the Endpoint Management and Citrix Gateway consoles.
- Domain or domain plus security token authentication
- Client certificate or certificate plus domain authentication
To deliver certificates to users, configure:
For other authentication options, see other articles under Certificates and authentication.
You configure device enrollment modes to allow users to enroll their devices in Endpoint Management. Endpoint Management offers seven modes, each with its own level of security and steps users must take to enroll their devices.
- For information about Endpoint Management enrollment options, see Configure enrollment modes.
Azure Active Directory enrollment is supported for iOS, Android, and Windows 10 devices. For information about configuring Azure as your identity provider (IdP), see Single sign in with Azure Active Directory.
Other enrollment options:
- Deploy devices through Apple DEP
- Bulk enrollment of Apple devices
- Create an Android Enterprise administrator account. For details, see Android Enterprise. Or, see Legacy Android Enterprise for G Suite Customers.
- Samsung Knox Bulk Enrollment
- Bulk enrollment of Windows devices
- Configure G Suite for Chrome OS device enrollment from your G Suite account. For details, see Chrome OS.
- Workspace hub device management
You can send notifications for enrollment. For information, see Notifications. You can also use notifications for automated actions and standard messages sent to users.
For more information about enrollment, see Device management and articles under that node.
Device policies and management
Device (MDM) policies
Some policies are common across multiple platforms and some policies are platform-specific.
You can filter device policy lists in the Endpoint Management console. For example, you can filter by platform to see a list of policies most often used for that platform. For information, see Device policies.
Prepare apps for deployment
For information about the apps supported by Endpoint Management, see Add apps.
You can manage iOS app licensing by using the Apple iOS Volume Purchase Program (VPP). For information, see iOS Volume Purchase Program.
You can use Endpoint Management to deploy iBooks that you obtain through the Apple Volume Purchase Program (VPP). For information, see Add media.
You can connect Citrix Endpoint Management to Microsoft Store for Business. For information, see Deploy Microsoft Store for Business apps from Endpoint Management.
Citrix provides mobile productivity apps, including Secure Mail and Secure Web. For information, see About mobile productivity apps.
- As an alternative to Secure Mail, you can deliver native mail to devices. For a general discussion of email choices, see Email strategy. See also:
Citrix Secure Mail, Citrix Secure Web, and Citrix Files offer the option of opening the MDX container to allow users to transfer docs and data to Microsoft Office 365 apps. You manage this capability for iOS and Android platforms through the open-in policies on the Endpoint Management console. See Allowing Secure Interaction with Office 365 Apps and Office device policy.
For general information about app policies, see App Policies and Use Case Scenario.
The MDX Service and MDX Toolkit are app wrapping technologies that prepare enterprise apps for secure deployment with Endpoint Management.
For information about Endpoint Management MDX Service, our cloud tool, see Endpoint Management MDX Service.
For information about Endpoint Management MDX Toolkit, the traditional MDX wrapping process, see MDX Toolkit.
For more information about apps, see other articles under Add apps.
The Role-Based Access Control (RBAC) feature in Endpoint Management lets you assign predefined roles, or sets of permissions, to users and groups. These permissions control the level of access users have to system functions. For information, see Configure roles with RBAC.
You create automated actions in Endpoint Management to specify the action to take in reaction to events, certain settings, or the presence of apps on user devices. For information, see Automated actions.