Mobile Access for Smartphones and Tablets
Overview of Mobile Access for Smartphones and Tablets
To manage your users and their access to resources, make sure to:
Certificate Authentication for Handheld Devices
For handheld devices to connect to the gateway, these certificates must be properly configured:
- If the configured authentication methods is Personal Certificate, generate client certificates for users.
- A server certificate signed by a trusted third-party Certification Authority (for example, Entrust) is strongly recommended. If you have a third-party certificate, make sure the CA is trusted by the device. If you do not have a third-party certificate, a self-signed (ICA) certificate, is already configured on the server.
Managing Client Certificates
Check Point Mobile Apps for mobile devices can use certificate-only authentication or two-factor authentication with client certificates and username/password. The certificate is signed by the internal CA of the Security Management Server that manages the Mobile Access Security Gateway.
Manage client certificates on the page of the tab.
The page has two panes.
- In the pane:
- Create, edit, and revoke client certificates.
- See all certificates, their status, expiration date and enrollment key. By default, only the first 50 results show in the certificate list. Click to see more results.
- Search for specified certificates.
- Send certificate information to users.
- In the pane:
- Create and edit email templates for client certificate distribution.
- Preview email templates.
Creating Client Certificates
A Wizard helps you create and distribute client certificates to multiple users or a single user.
|
Note - If you use LDAP or AD, creating client certificates does not change the LDAP or AD server. If you get an error message regarding LDAP/AD write access, ignore it and close the window to continue.
|
To create and distribute certificates with the client certificate wizard:
- In the M tab, open the page.
- In the pane, select .
The wizard opens.
- In the page, select how to distribute the enrollment keys to users. You can select one or both options.
- Each user gets an email, based on the template you choose, that contains an enrollment key.
- - Select the email template that will be used. You can click to preview the selected template.
- - Select the gateway that users will connect to.
- - Select the mail server that will send the emails. You can click to view and change its details. In the field, set the email address that the email will come from.
- - Generate a file for your records that contains a list of all users and their enrollment keys. Click to select the path where a file will be saved.
- Optional: To change the expiration date of the enrollment key, edit the number of days in .
- Optional: Add a comment that will show next to the certificate in the certificate list on the page.
- Click .
The page opens.
- Click to add the users or groups that require certificates.
- Type text in the search field to search for a user or group.
- Select a type of group to narrow your search.
- When all included users or groups show in the list, click to create the certificates and send the emails.
- If more than 10 certificates are being generated, click to confirm that you want to continue.
A progress window shows. If errors occur, an error report opens.
- Click .
Revoking Certificates
If the status of a certificate is Pending Enrollment, after you revoke it, the certificate does not show in the list.
To revoke one or more certificates:
- Select the certificate or certificates from the list.
- Click .
- Click to confirm that you want to revoke the certificate or certificates.
After you revoke a certificate, it does not show in the list.
Creating Templates for Certificate Distribution
You can create multiple email templates to use to distribute certificate enrollment keys to users. When you create new certificates, the wizard prompts you to select which email template to use to distribute the enrollment keys.
In the template, you can insert:
- Predefined fields - Such as Username, Registration Key, Expiration Date
- Links - A link or QR code that users can go to or scan from their mobile devices. You can insert multiple links into an email template.
To create or edit an email template:
- In the M tab, open the page.
- To create a new template: In the pane, select
To edit a template: In the pane, double-click a template.
The opens.
- Enter a for the template.
- Optional: Enter a . Comments show in the Mail Template list on the page.
- Optional: Click to change the language of the email.
- Enter a for the email. Click to add a predefined field, such as a Username.
- In the message body add and format text. Click to add a predefined field, such as Username, Registration Key, or Expiration Date.
- Click to add a link or QR code and select the type of link to add.
For each link type, you select which elements will be added to the mail template:
- For users who already have a Check Point app installed. When users scan the CR code or go to the link, it creates the site and registers the certificate.
- - Select one client type that users will have installed.
C - An app that creates a secure container on the mobile device to give users access to internal websites, file shares, and Exchange servers.
- A full L3 tunnel app that gives users network access to all mobile applications.
- - Direct users to download a Check Point App for their mobile devices.
- C - An app that creates a secure container on the mobile device to give users access to internal websites, file shares, and Exchange servers.
- A full L3 tunnel app that gives users network access to all mobile applications.
- - Send users to a URL that you enter.
- - Enter the complete URL of the site.
- - Enter the text to show on the HTML link.
- Click .
- Optional: Click to see a preview of how the email will look.
- Click .
Cloning a Template
Clone an email template to create a template that is similar to one that already exists.
To create a clone of an email template:
- Select a template from the template list in the page.
- Click .
- A new copy of the selected template opens for you to edit.
Managing Mobile Settings
For Check Point Mobile, many settings that affect the user experience on mobile devices come from the . Each Mobile Access user group has an assigned Mobile Profile. By default, all users get the Default Profile.
The settings in the Mobile Profile include:
- Passcode Settings
- Mail, Calendar, and Contacts availability
- Settings for offline content
- Where contacts come from
Manage the Mobile Profiles in tab > .
- In the pane:
- See all Mobile Profiles.
- Create, edit, delete, clone, and rename Mobile Profiles.
- In the pane:
- Create rules to assign Mobile Profiles to user groups.
- Search for a user or group within the policy rules.
Creating and Editing Mobile Profiles
Create and edit Mobile Profiles to meet the security requirements of your organization and the needs of different users. Assign Mobile Profiles to user groups in the Mobile Profile Policy. The Mobile Profile Policy applies to Check Point Mobile App users.
To create or edit a Mobile Profile:
- In the tab > pane:
- To create a new Mobile Profile, click .
- To edit a Mobile Profile, select the profile and click .
The Mobile Profile opens.
- In the area, configure:
- - After users authenticate with the authentication method configured in > > , configure how long they stay authenticated to the gateway.
- - Select to protect the Business Secure Container area of the mobile device with a passcode.
- - Select a passcode profile to use. The profile includes the passcode complexity, length, expiration, and number of failed attempts allowed.
- - If username and password authentication is used, store the authentication credentials on the device. Then users are only prompted for their passcode not also for their username and password.
- - Create a log if a jail-broken device connects to the gateway.
- - Block devices that are jail-broken from connecting to the gateway.
- In the area, select which Exchange features are available on devices:
- In the area, configure what data is saved and for how long when the Check Point App cannot reach the gateway.
- -
- When selected, data is always saved to the disk and encrypted, according to policy.
- When cleared, data is saved temporarily in the RAM.
- - Select the length of time from which emails are saved.
- - Select which parts of the email are saved in the offline cache.
- - Select which parts of the calendar are saved: the length of time in the past and length of time in the future.
- - Select which parts of the calendar entry are saved in the offline cache.
- - Synchronize contacts so they are available offline.
- In the Contacts area, select which additional contacts to show on the device:
Passcode Profiles
A passcode lock protects the Business Secure Container in mobile devices. In each Mobile Profile, configure which Passcode Profile it uses. The profile includes the passcode requirements, expiration, and number of failed attempts allowed. The default passcode profiles are Normal, Permissive, and Restrictive. You can edit the default profiles and create new profiles.
To edit a Passcode Profile:
- In the tab > > , select a Passcode Profile and click .
To create a new Passcode Profile:
A Passcode Profile includes these settings:
- - The complexity requirements. When you configure this, remember that users usually have a small on-screen keyboard.
- - Users create a simple password of 4 numbers.
- -Select from the requirements below.
- - Enter the minimum number of characters.
- - Show an alphanumeric keyboard and require at least one character to be a letter.
- - Enter the number of characters that must be a special character.
- - Enter the number of days after which user's passcodes expires and must be replaced.
- - Select to let users access the Business Secure Container for a specified period of time without re- entering their passcode. Enter the quantity of time in minutes.
- - Select to lock users out after a specified number of failed attempts. After the failed attempts, users must re-authenticate. If the authentication method includes username and password, users must enter them. If the authentication is certificate-only, users need a new certificate.
- - When selected, users cannot use a passcode that is the same as earlier passcodes. Select the number of earlier passcodes that users cannot use.
ESOD Bypass for Mobile Apps
Hand-held devices cannot run Endpoint Security on Demand (ESOD) components. By default, ESOD is disabled for smartphones and tablets.
If your organization has ESOD enabled, mobile apps cannot access ESOD enforced applications.
|
Note - Mobile apps are not recognized by their HTTP User-Agent header.
|
To change the ESOD setting on the Security Gateway:
- On the Security Gateway run:
cvpnd_settings set MobileAppBypassESODforApps "true" or "false" - true - Bypasses ESOD for mobile apps (default).
- false - Does not bypass ESOD.
- Restart the Mobile Access services:
cvpnrestart - If you use a cluster, copy the
$CVPNDIR/conf/cvpnd.C file to all cluster members and restart the services on each.
System Specific Configuration
This section describes system specific configuration required for iPhones, iPads, and Android devices. In some instances, end-user configuration is also required.
iPhone and iPad Configuration
Connecting iPhone/iPad Clients to ActiveSync Applications
When you allow access to an ActiveSync application, users see the Mail Setup item and can install the ActiveSync profile. This gives users access to their corporate email.
The next procedure is for end users to configure on their devices. For all end user configuration procedures, see Instructions for End Users.
To connect to corporate email:
- Sign in to the Mobile Access site.
- Tap Mail Setup.
- Do the on-screen instructions.
Getting Logs from iPhones or iPads
To resolve issues with client devices, tell the users to send you the logs. The iPhone or iPad must have an email account set up.
The next procedure is for end users to configure on their devices. For all end user configuration procedures, see Instructions for End Users.
To configure logs:
- Tap .
Before login, this is on the top right. After login, this is on the bottom right.
- Tap on the navigation bar.
If you do not have an email account configured on the iPhone, a message shows that one must be configured. After this is done, you must open Check Point Mobile Access again.
When an email account is configured, the email page opens. The logs are attached.
|
Note - The email account that the iPhone uses to send the email is the default account. This might not be your organization's ActiveSync account.
|
If the iPhone is not configured for a destination email address for logs, the email that opens has an empty field. You can enter the destination address now, or set up a default destination address for Check Point Mobile logs.
To set up a default destination address:
- Tap .
- Scroll down to the icon and tap it.
- In the global settings, enter the address in .
Disabling Client SSO
Single Sign On (SSO) lets users in a session connect to the Mobile Access gateway, without authenticating when the client starts. If a user cannot access the gateway while SSO is enabled, disable it.
The next procedure is for end users to configure on their devices. For all end user configuration procedures, see Instructions for End Users.
To disable SSO on a client:
- Tap .
- Scroll down to the icon and tap it.
- In the global settings, tap the > switch.
Android Configurations
Browsing to Servers with Untrusted Server Certificates
When browsing from the Android app to a server with an untrusted server certificate, you are denied access and you get this message:
"Some resources on this page reside on an untrusted host."
In some cases, such as in a staging or demo environment, you can enable browsing to servers with untrusted certificates.
|
Important - Disabling the server certificate validation in the client app is forbidden for production setups since it allows any 3rd-party to intercept the SSL traffic.
|
The next procedure is for end users to configure on their devices. For all end user configuration procedures, see Instructions for End Users.
To disable the server certificate validation for Web applications:
- Launch the Check Point Mobile app.
- Log in to the site.
- Press the menu button and tap .
- Enable .
|
Note - HTTP (non-SSL) requests are always blocked even when this attribute is disabled.
|
Session Timeout for Android Devices
For Androids, idle timeout cannot be modified or enforced by the device or the gateway.
The only timeout setting that applies to the device is the active session timeout. It is configured in SmartDashboard: option. This setting indicates the maximum session length. When this period is reached, the user must log in again. For example, if re-authentication is set to 120 minutes, a user will need to log in again after 2 hours in an active session.
Getting Logs from Android Clients
To resolve issues with client devices, tell the users to send you the logs.
The next procedure is for end users to configure on their devices. For all end user configuration procedures, see Instructions for End Users.
To enable logs:
- Open the Check Point application.
- Tap .
- Press the button on the device.
- Tap and then .
- Enter the email address of the system administrator.
- Tap .
To send logs:
- Open the Check Point application.
- Tap .
- Press the button on the device.
- Tap .
- Select a way to send the logs.
Instructions for End Users
Give these instructions to end users to configure their mobile devices to work with Mobile Access.
iPhone/iPad End User Configuration
Do these procedures on your iPhone/iPad so you can work with Mobile Access.
Before you start, make sure that your administrator gives you:
- The name of the site you will connect to.
- The required Registration key (also called Activation key).
|
Important - Do only the procedures that your network administrator has instructed you to do.
|
To connect to the corporate site:
- Get the Check Point Mobile app from the App Store.
- When prompted, enter the:
- Site Name
- Registration key
To connect to corporate email:
- Sign in to the Mobile Access site.
- Tap Mail Setup.
- Do the on-screen instructions.
- When asked for the password, enter the Exchange password.
To configure logs:
- Tap .
Before login, this is on the top right. After login, this is on the bottom right.
- Tap on the navigation bar.
If you do not have an email account configured on the iPhone, a message shows that one must be configured. After this is done, you must open Check Point Mobile Access again.
When an email account is configured, the email page opens. The logs are attached.
|
Note - The email account that the iPhone uses to send the email is the default account. This might not be your organization's ActiveSync account.
|
If the iPhone is not configured for a destination email address for logs, the email that opens has an empty field. You can enter the destination address now, or set up a default destination address for Check Point Mobile logs.
To set up a default destination address:
- Tap .
- Scroll down to the icon and tap it.
- In the global settings, enter the address in .
To disable SSO on a client:
- Tap .
- Scroll down to the icon and tap it.
- In the global settings, tap the > switch.
Android End User Configuration
Do these procedures on your Android device so you can work with Mobile Access.
Before you start, make sure that your administrator gives you:
- The name of the site you will connect to.
- The required Registration key (also called Activation key).
|
Important - Do only the procedures that your network administrator has instructed you to do.
|
To connect to the corporate site:
- Get the Check Point Mobile app from the Android Market.
- When prompted, enter the:
- Site Name
- Registration key
To enable logs:
- Open the Check Point application.
- Tap .
- Press the button on the device.
- Tap and then .
- Enter the email address of the system administrator.
- Tap .
To send logs:
- Open the Check Point application.
- Tap .
- Press the button on the device.
- Tap .
- Select a way to send the logs.
To disable the server certificate validation for Web applications:
- Launch the Check Point Mobile app.
- Log in to the site.
- Press the menu button and tap .
- Enable .
To transfer the client certificate to the 3rd party mail client:
- Launch the Check Point Mobile app.
- Log in to the site.
- Press the menu button and tap .
- From the option, tap . The Export Certificate window opens.
If the Export Certificate option is disabled, contact the system administrator.
- Select the certificate format appropriate for your mail client: P12 or PFX.
- Select the location to save the certificate.
The default path is /sdcard (for devices that have an SD card) or an external resource folder (for devices that do not have an SD card). - Tap to save the certificate to the selected location.
A window shows: Export succeeded. Certificate password is: _______
- You can copy the password to the clipboard. You will need the password when you import the certificate to the third party mail app.
Advanced Gateway Configuration for Handheld Devices
You can customize client authentication, device requirements, certificate details, and ActiveSync behavior. Use the CLI commands explained here to change the configuration file:
$CVPNDIR/conf/cvpnd.C
|
Note - Disable Link Translation Domain on Mobile Access gateways before you connect to them with the Android client.
|
To apply changes:
Restart the Mobile Access services: cvpnrestart
If you use a cluster, copy the $CVPNDIR/conf/cvpnd.C file to all cluster members and restart the services on each.
To set Mobile Access attributes:
cvpnd_settings set <attribute_name> "<value>"
To get the current value of an attribute:
cvpnd_settings get <attribute_name>
|
|
|
Attribute
|
Description
|
ActiveSyncAllowed (true)
|
If access to ActiveSync applications is allowed.
|
ActiveSyncExchangeServerAuthenticationMethod (basic)
|
Method of forwarding authentication from the Mobile Access gateway to the internal Exchange server.
Valid values: basic , digest , ntlm
|
MobileAppAllowActiveSyncProfileConfig (true)
|
Make the automatic ActiveSync Profile configuration for iPhones and iPads available to users. If true, only users with authorization to access ActiveSync applications see this feature. If false, no user sees this feature.
|
MobileAppMinRequiredClientOSVersion (3.1)
|
Minimum operating system version for iPhones and iPads. If a client fails this requirement, user sees
Your OS version must be upgraded
|
MobileAppAndroidMinRequiredClientOSVersion (2.1)
|
Minimum operating system version for Android. If a client fails this requirement, user sees
Your OS version must be upgraded
|
MobileAppMinRecommendedClientOSVersion (3.1)
|
Recommended operating system version for iPhones and iPads. If a client fails this recommendation, user sees a message but usage continues. Note: value must be equal to or greater than value, or Mobile Access will not start.
|
MobileAppAndroidMinRecommendedClientOSVersion (2.1)
|
Recommended operating system version for Android. If a client fails this recommendation, user sees a message but usage continues. Note: value must be equal to or greater than value, or Mobile Access will not start.
|
MobileAppMinRequiredClientAppVersion (1.3)
|
Minimum App version required for iPhones and iPads. If a client fails this requirement, user sees
Application Update Required
|
MobileAppAndroidMinRequiredClientAppVersion (1.0)
|
Minimum App version required for Android. If a client fails this requirement, user sees
Application Update Required
|
MobileAppMinRecommendedClientAppVersion (1.3)
|
Recommended App version for iPhones and iPads. If a client fails this recommendation, user sees a message but usage continues. Note: value must be equal to or greater than value, or Mobile Access will not start.
|
MobileAppAndroidMinRecommendedClientAppVersion (1.0)
|
Recommended App version for Android. If a client fails this recommendation, user sees a message but usage continues. Note: value must be equal to or greater than value, or Mobile Access will not start.
|
MobileAppMinClientOSVersionForProfileConfig (3.1)
|
Minimum operating system version for iPhone and iPad to configure ActiveSync with the app.
If you want data encryption, change this value from the default to 4.0 . Make sure the ActiveSync policy (configured on the Exchange server) enforces data encryption.
|
MobileAppAndroidMinClientOSVersionForProfileConfig (2.1)
|
Minimum operating system version for Android to configure ActiveSync with the app. If you want data encryption, change this value from the default to 3.0 . Make sure the ActiveSync policy (configured on the Exchange server) enforces data encryption.
|
MobileAppBypassESODforApps (false)
|
When true, mobile apps are allowed access to MAB applications whose protection level requires ESOD compliance.
Mobile apps can always access the MAB portal.
|
MobileAppAllowClientCertExport (false)
|
When true, allows mobile app clients to export their client certificates to other apps and devices. See Using 3rd Party Android Mail Clients.
|
|
|