Skip to main content

Check out Interactive Visual Stories to gain hands-on experience with the SSE product features. Click here.

Skyhigh Security

Configure Managed Devices through Certificates

To configure Managed Devices through certificates:

  1. Log in to Skyhigh CASB and go to Policy > Access Control > Device Management.
  2. Under Establish Domain tab, enter the original domain as device.
    clipboard_e6cf65c732c8156fbb05e844356f6dd83.png
  3. Under the Device Certificates tab, configure the following:
  •  Activate the checkbox Enable Certificate Checks.
  • Upload the root certificate of the client device. If the single root certificate is uploaded, then the Maximum chain depth is 1.
  • The multiple certificates are uploaded when the customer environment has more than one certificate through multiple MDM's. For details on using multiple CA certificates, see Multiple Certificate Authorities.
    clipboard_e99675f7c684089652df588ec15d53458.png
  1. The root certificates have to be concatenated by preserving both the BEGIN and END of both certificates and upload it as a single certificate file in the Skyhigh CASB. In this case, the maximum chain depth is 3.
  2. Click Save Changes. 

Configuring Access Controls

NOTE: It is important to understand the limitations of the service provider and its associated applications that are supported by the reverse proxy. For example, Office 365 applications are not supported by Reverse Proxy but only the browser-based applications work for reverse proxy. 

Configure the following access controls to cover the most common O365 use case:

  • An unmanaged device (no certificate), using a native application gets blocked with a block message (rule 1 block unmanaged). For example, the OneDrive app on Windows.
  • A managed device (with certificate), using a native application gets into O365 direct and no reverse proxy, it is possible to set up a sync (rule 1 redirect managed). For example, the OneDrive app on Windows.
  • An Unmanaged device (no certificate), using Chrome (browser-based app) will get into O365 and redirected through a reverse proxy (rule 2 proxy unmanaged), where downloads are blocked. (rule 4 block access)
  • A managed device (with certificate), using Chrome (browser-based app) will get in O365 directly and there will be no reverse proxy controls. (rule 2 - redirect managed)
    clipboard_e4eed9afce67020bd8b96d8368dfc5332.png

Validate Office 365 Device Management

To verify the outcome of the managed device through certificates, perform the following validation scenarios:

Validate Managed Device

  1. From the trusted device, install the client certificate.

NOTE: If you are using Windows, make sure the certificate is stored in the user store and not in the machine store. If you open certmgr.msc, then you can see the certificate in the Current User > Personal folder.
clipboard_e4965a625c61560129cb0af33c08f5e11.png

If you see the certificate in the Local Computer store, then this is the wrong place.
clipboard_e8fd7ffe9e56a109b67601678c424f753.png

  1. Log in to Office 365. (https://login.microsoftonline.com)
  2. Log in with your demo SSO Office 365 account (CSP initiated). You are redirected to IDP for authentication.
  3. Once authenticated, you are redirected to the Office 365 Homepage.
  4. You are prompted to provide a client certificate, this validates your device is managed.
  5. If you are able to download a document, then your managed device has successfully passed through a certificate.

Validate Unmanaged Device

  1. From the trusted device, install the client certificate.
  2. Login to Office 365. (https://login.microsoftonline.com)
  3. Log in with your demo SSO Office 365 account (CSP initiated). You are redirected to IDP for authentication.
  4. Once authenticated, you are redirected to the Office 365 Homepage and you do not see any client certificate. 
  5. You cannot download any document as the downloads option is blocked. This shows your unmanaged device.
  • Was this article helpful?