Skip to main content

VMware Workspace ONE Integration

Deploy WPA-Enterprise WiFi profiles and EAP-TLS certificates to managed iOS, Android, Windows, macOS, and Chrome OS devices using VMware Workspace ONE UEM (Unified Endpoint Management) with SCEP integration.

Overview

The VMware Workspace ONE integration enables:

  • Multi-platform WiFi deployment across all major platforms
  • Certificate-based authentication (EAP-TLS) via SCEP
  • Unified endpoint management with single console
  • Conditional access based on device compliance
  • Zero-touch deployment with automated provisioning

Supported Platforms

PlatformWiFi ProfilesCertificatesManagement Level
iOS/iPadOS✓ Full support✓ SCEPSupervised and non-supervised
Android✓ Full support✓ SCEPWork profile, Fully managed
Windows 10/11✓ Full support✓ SCEPCorporate and BYOD
macOS✓ Full support✓ SCEPCorporate and BYOD
Chrome OS✓ Limited✓ ManualBrowser extension required
Linux✓ Limited✓ ManualAgent-based

Prerequisites

  • IronWifi account with WPA-Enterprise configured
  • VMware Workspace ONE UEM subscription
  • Workspace ONE Console access (Administrator role)
  • Devices enrolled in Workspace ONE
  • IronWifi SCEP service enabled

Architecture Overview

Managed Device → Workspace ONE UEM → WiFi Profile → IronWifi RADIUS

SCEP Proxy → IronWifi SCEP → Certificate

IronWifi SCEP Configuration

Step 1: Enable SCEP Service

  1. Log in to IronWifi Console
  2. Navigate to Account > PKI Infrastructure
  3. Enable SCEP service
  4. Configure certificate settings:
    • Key Size: 2048-bit or 4096-bit
    • Validity Period: 365 days (recommended)
    • Subject Format: CN={DeviceID} or CN={Username}
    • Subject Alt Name: DNS, Email, or UPN
  5. Note your SCEP URL: https://scep.ironwifi.com/your-org

Step 2: Configure SCEP Challenge

Static Challenge (Simple):

  • Set a single challenge password
  • Use for all enrollments
  • Store securely in Workspace ONE

Dynamic Challenge (Advanced):

  • Generate unique challenge per device
  • Enhanced security
  • Requires API integration

Step 3: Download Root Certificate

  1. In PKI settings, download Root CA certificate
  2. Save in PEM or DER format
  3. Upload to Workspace ONE for trust chain

Workspace ONE Console Configuration

Step 1: Upload Root CA Certificate

  1. Log in to Workspace ONE UEM Console
  2. Navigate to Resources > Certificates > List View
  3. Click Upload > CA Certificate
  4. Upload IronWifi root CA certificate
  5. Configure:
    • Name: IronWifi Root CA
    • Category: Certificate Authority
    • Allow User Trust: Yes (for iOS/macOS)
  6. Click Save

Step 2: Create SCEP Profile

  1. Go to Resources > Profiles & Baselines > Profiles
  2. Click Add > Add Profile
  3. Select platform (iOS, Android, Windows, macOS)
  4. Choose Device Profile or User Profile

Step 3: Configure SCEP Payload

General Settings:

  • Profile Name: IronWifi SCEP Certificate
  • Description: WiFi authentication certificate
  • Assignment Type: Auto, Optional, or Mandatory

SCEP Payload:

  1. Add Credentials payload
  2. Select SCEP as credential source
  3. Configure SCEP settings:
SettingValue
SCEP URLhttps://scep.ironwifi.com/your-org/pkiclient.exe
NameIronWifi Device Certificate
SubjectCN={DeviceUid} or CN={EnrollmentUser}
Subject Alt NameDNS:{DeviceUid} or RFC822Name:{EmailAddress}
Key Size2048
Key UsageDigital Signature, Key Encipherment
Challenge TypeStatic or Dynamic
Challenge Password{Your challenge from IronWifi}
Certificate AuthorityIronWifi Root CA (uploaded above)
Retries3
Retry Delay10 seconds
Key is ExtractableNo (recommended)

Step 4: Create WiFi Profile

  1. In the same or separate profile
  2. Add WiFi payload
  3. Configure network settings:

Basic Settings:

  • SSID: Your secure network name
  • Hidden Network: Yes/No
  • Auto Join: Enable
  • Security Type: WPA2/WPA3 Enterprise
  • Protocol: 802.1X

802.1X Settings:

  • EAP Type: EAP-TLS (for certificate authentication)
  • Identity: Certificate (use SCEP payload)
  • Use Per-Connection Password: No
  • Trusted Certificates: IronWifi Root CA
  • Trusted Server Names: radius.ironwifi.com (or your RADIUS server)
  • Inner Authentication: None (for EAP-TLS)

Alternative: PEAP-MSCHAPv2

  • EAP Type: PEAP
  • Inner Authentication: MSCHAPv2
  • Username: {EnrollmentUser} or {EmailAddress}
  • Password: Use Identity Certificate or prompt

Step 5: Assign Profile to Smart Groups

  1. Click Assignment tab
  2. Add Assignment Groups:
    • Assigned Groups: Select smart groups or organization groups
    • Exclude Groups: Exclude if needed
  3. Set deployment options:
    • Push Mode: Auto (install automatically)
    • Removal: Remove on unenrollment

Step 6: Publish Profile

  1. Review all settings
  2. Click Save & Publish
  3. Profile deploys to assigned devices
  4. Monitor deployment status

Platform-Specific Configuration

iOS/iPadOS

Supervised Devices:

Additional capabilities available:
- Force WiFi profile (cannot be removed)
- Network selection priority
- Disable MAC address randomization
- Captive network handling

SCEP Profile Settings:

  • Allow all apps to access: No
  • Allow export from keychain: No
  • Use as Digital Signature: Yes
  • Use for Key Encipherment: Yes

WiFi Profile Settings:

  • Enable IPSec: Optional
  • Setup modes: System, Login Window, System + Login Window
  • Priority: Set to preferred network

Android Enterprise

Fully Managed Devices:

Full control over device WiFi settings
System-wide WiFi profile application
Prevent user modification of WiFi settings

Work Profile:

WiFi profile scoped to work profile
Personal profile uses separate WiFi
May require separate credentials

Configuration:

  • WiFi Hidden Network: Configure hidden SSID behavior
  • Proxy: Configure proxy settings if needed
  • IP Settings: DHCP or Static
  • Connection Priority: Auto-connect priority level

Windows 10/11

Domain-Joined:

Integration with Active Directory
Computer certificate authentication
Pre-login WiFi access

BYOD:

User certificate authentication
Limited to user session
Profile per user

Workspace ONE Tunnel (Optional):

  • Per-app VPN with WiFi
  • Split tunneling configuration
  • Conditional access enforcement

Native WiFi Profile:

  • Connection Type: ESS (Infrastructure)
  • Authentication: WPA2/WPA3-Enterprise
  • Encryption: AES
  • Single Sign On: Enable for seamless auth
  • FIPS Mode: Enable if required

macOS

Configuration Similar to iOS:

  • User vs System: Choose authentication level
  • Login Window: Enable for pre-login WiFi
  • Auto Join: Enable preferred network
  • Keychain: Certificate stored in System Keychain

System Extensions:

  • May require Network Extension approval
  • Configure System Extensions policy
  • User approval may be needed

Chrome OS

Limited Support:

  • Use Chrome OS Browser Extension
  • Configure via Enterprise policy
  • Manual certificate import may be needed
  • Consider Google Admin Console for full support

Certificate Management

Certificate Lifecycle

1. Enrollment:

Device receives profile → SCEP request → Certificate issued

Certificate stored in secure storage

WiFi authenticates with certificate

2. Renewal:

  • Configure renewal threshold (e.g., 30 days before expiry)
  • Automatic SCEP renewal via Workspace ONE
  • Monitor renewal success in UEM Console

3. Revocation:

  • Device unenrolled → Certificate marked for revocation
  • Revoke in IronWifi Console
  • Certificate added to CRL
  • Device cannot authenticate

Certificate Templates

Create reusable SCEP templates:

  1. Employee Certificate Template

    • Validity: 365 days
    • Subject: CN={EnrollmentUser}
    • Key Size: 2048
    • Auto-renewal: 30 days before expiry
  2. Device Certificate Template

    • Validity: 730 days
    • Subject: CN={DeviceUid}
    • Key Size: 2048
    • Auto-renewal: 60 days before expiry
  3. Contractor Certificate Template

    • Validity: 90 days
    • Subject: CN={EmailAddress}
    • Key Size: 2048
    • Auto-renewal: Disabled

Smart Groups and Targeting

Organization Groups (OG)

Hierarchical structure for management:

Company Root
├── Corporate Devices
│ ├── Executives
│ ├── Sales Team
│ └── IT Department
├── BYOD Devices
│ ├── iOS Devices
│ └── Android Devices
└── Contractors

Smart Groups

Dynamic groups based on criteria:

1. Platform-Based:

  • iOS Devices: Platform = iOS
  • Android Corporate: Platform = Android AND Ownership = Corporate

2. Compliance-Based:

  • Compliant Devices: Compliance Status = Compliant
  • Non-Compliant: Compliance Status = Non-Compliant

3. User-Based:

  • Specific departments: User Group = Engineering
  • Locations: Location = Headquarters

4. Custom Attributes:

  • VIP Users: Custom Attribute = VIP
  • Specific device models: Model = iPhone 14 Pro

Conditional Access

Compliance Policies

Create compliance requirements:

Device Compliance:

  1. Navigate to Devices > Compliance Policies
  2. Create policy with rules:
    • OS Version: Minimum required
    • Encryption: Required
    • Jailbreak/Root: Not allowed
    • Passcode: Required
  3. Non-compliant action: Block WiFi profile deployment

Integration with IronWifi

RADIUS Attributes:

  • Pass compliance status as RADIUS attribute
  • IronWifi checks compliance before auth
  • Non-compliant devices denied or placed in guest VLAN

Directory Services:

  • Sync Workspace ONE groups to IronWifi
  • Use group membership for RADIUS policies
  • Dynamic VLAN assignment based on group

Deployment Strategies

1. Staged Rollout

Stage 1: IT Pilot (Week 1)

  • Deploy to IT team (50-100 devices)
  • Test all platforms and scenarios
  • Gather feedback and refine

Stage 2: Department Pilot (Week 2-3)

  • Roll out to one or two departments
  • Monitor for issues
  • Provide user support

Stage 3: Company-Wide (Week 4+)

  • Deploy to all assigned groups
  • Monitor compliance and connectivity
  • Iterate based on metrics

2. Zero-Touch Provisioning

iOS (Apple DEP/ABM):

  1. Devices purchased through Apple Business Manager
  2. Assigned to Workspace ONE
  3. User activates device
  4. Workspace ONE enrolls automatically
  5. WiFi profile installs immediately

Android (Zero-Touch Enrollment):

  1. Purchase from zero-touch reseller
  2. Assign to Workspace ONE configuration
  3. Device powers on, enrolls automatically
  4. WiFi configures without user action

Windows (Autopilot):

  1. Register devices in Autopilot
  2. Link to Workspace ONE
  3. User signs in with work account
  4. Device enrolls and configures WiFi

3. Self-Service Enrollment

Workspace ONE Intelligent Hub:

  1. User installs Intelligent Hub app
  2. Enters enrollment credentials
  3. Accepts device management
  4. WiFi profile installs automatically

User Experience:

  • Minimal user interaction required
  • WiFi "just works" after enrollment
  • Self-service troubleshooting via Hub

Advanced Features

Workspace ONE Intelligence

Analytics:

  • WiFi connectivity metrics
  • Authentication success rates
  • Certificate deployment status
  • User experience scoring

Automation:

  • Auto-remediation for failed profiles
  • Proactive certificate renewal
  • Automated compliance checks

Reporting:

  • Custom dashboards
  • Executive reports
  • Trend analysis

Workspace ONE Access

Identity Integration:

  • Single sign-on to WiFi
  • Multi-factor authentication
  • Conditional access policies
  • User behavior analytics

Integration with IronWifi:

  1. Configure Workspace ONE Access as SAML IdP
  2. IronWifi uses Access for authentication
  3. Seamless user experience
  4. Enhanced security

Workspace ONE Assist

Remote Support:

  • Remote troubleshooting of WiFi issues
  • View device network settings
  • Push profile updates remotely
  • Real-time diagnostics

Monitoring and Troubleshooting

Workspace ONE Console Monitoring

Dashboard Widgets:

  1. Certificate Deployment Status

    • Successful: X devices
    • Pending: Y devices
    • Failed: Z devices
  2. WiFi Profile Compliance

    • Profile installed: X%
    • Pending install: Y%
    • Failed: Z%
  3. Network Connectivity

    • Connected devices: X
    • Last seen: Timestamp
    • Connection duration: Hours

IronWifi Monitoring

Authentication Logs:

  1. Navigate to Reports > Authentication
  2. Filter by:
    • Certificate-based auth
    • Success/failure status
    • Device type
    • Time range
  3. Export for analysis

Certificate Status:

  1. View issued certificates
  2. Monitor expiration dates
  3. Track renewal status
  4. Identify revoked certificates

Troubleshooting Common Issues

1. Certificate Not Deploying

Symptoms:

  • SCEP payload shows failed status
  • Certificate not in device keychain
  • Error in Workspace ONE logs

Resolution:

  1. Verify SCEP URL is accessible from device
  2. Check challenge password is correct
  3. Review firewall rules (allow HTTPS to SCEP endpoint)
  4. Validate certificate template settings
  5. Check device connectivity to internet
  6. Review detailed error logs in UEM Console

2. WiFi Not Connecting

Symptoms:

  • Certificate installed but WiFi fails
  • Authentication rejected by RADIUS
  • Intermittent connectivity

Resolution:

  1. Verify certificate is valid (not expired)
  2. Check SSID and security settings match
  3. Confirm RADIUS server is reachable
  4. Review trusted server names configuration
  5. Check IronWifi authentication logs for errors
  6. Test with manual WiFi configuration

3. Profile Installation Fails

Symptoms:

  • Profile stuck in "Pending" status
  • Installation error on device
  • Profile not appearing

Resolution:

  1. Check device enrollment status
  2. Verify device is in assigned smart group
  3. Review assignment rules and exclusions
  4. Force device check-in
  5. Check for conflicting profiles
  6. Review device-side error logs

4. iOS Trust Issues

Symptoms:

  • "Certificate not trusted" error
  • Manual trust prompt appears
  • WiFi connection fails with cert error

Resolution:

  1. Install root CA certificate in separate profile
  2. Mark CA certificate as trusted for WiFi
  3. Deploy CA profile before SCEP profile
  4. For supervised devices, force trust
  5. Verify certificate chain is complete

5. Android Work Profile Issues

Symptoms:

  • WiFi only works in work apps
  • Personal apps cannot access WiFi
  • Profile conflicts

Resolution:

  1. Verify profile is assigned to work profile
  2. Check if system-wide WiFi is intended
  3. For fully managed, use device-wide profile
  4. Review Android Enterprise enrollment type
  5. Check work profile status

Diagnostic Tools

Workspace ONE Console Tools:

  • Device Timeline: View all device events
  • Logs: Download detailed logs
  • Command: Send diagnostic commands
  • Samples: Collect device diagnostics

Device-Side Tools:

  • Workspace ONE Intelligent Hub: View profile status
  • Device Settings: Check certificate installation
  • Network Diagnostics: Test connectivity
  • Console Logs: Review system logs

Security Best Practices

1. Certificate Security

Recommendations:

  • Use 2048-bit minimum key size (4096-bit for high security)
  • Set appropriate validity periods (365 days standard)
  • Disable certificate export from keychain
  • Enable certificate revocation checking
  • Rotate CA certificates periodically
  • Use hardware-backed keystores where available

2. Profile Security

Settings:

  • Mark profiles as non-removable (supervised iOS)
  • Encrypt profile payloads in transit
  • Use device-level profiles when possible
  • Require passcode for profile installation
  • Enable tamper detection

3. Network Security

Configuration:

  • Use WPA3-Enterprise where supported
  • Require certificate validation
  • Configure trusted server names
  • Implement RADIUS accounting
  • Use VLAN segmentation
  • Monitor for rogue access points

4. Access Control

Policies:

  • Implement least privilege access
  • Use compliance-based conditional access
  • Require MFA for sensitive groups
  • Regularly audit profile assignments
  • Review and rotate credentials
  • Log all administrative actions

5. Data Protection

Measures:

  • Encrypt WiFi credentials in profiles
  • Use separate profiles for different security zones
  • Implement data loss prevention policies
  • Enable remote wipe capabilities
  • Regular security audits

Multi-Tenancy and MSP Use Cases

Managed Service Provider (MSP) Setup

Multi-Tenant Architecture:

MSP Workspace ONE Tenant
├── Customer A Organization Group
│ └── IronWifi RADIUS for Customer A
├── Customer B Organization Group
│ └── IronWifi RADIUS for Customer B
└── Customer C Organization Group
└── IronWifi RADIUS for Customer C

Configuration:

  1. Create separate OGs per customer
  2. Configure unique SCEP URLs per customer
  3. Isolated WiFi profiles per customer
  4. Separate smart groups and policies
  5. Customer-specific reporting

Best Practices:

  • Use naming conventions (e.g., "CustomerA_WiFi")
  • Document configurations per customer
  • Separate admin roles per customer
  • Regular compliance audits
  • Automated reporting per customer

Cost Considerations

Workspace ONE Licensing

EditionFeaturesBest For
Workspace ONE StandardBasic UEM, Email, VPNSmall business
Workspace ONE Advanced+Intelligence, AutomationEnterprise
Workspace ONE Enterprise+Access, Assist, Carbon BlackLarge enterprise

IronWifi Costs

  • SCEP Service: May require add-on subscription
  • API Access: Included in standard plans
  • RADIUS Infrastructure: Based on locations/users
  • Support: Standard vs. Premium support

Total Cost of Ownership

Factors:

  • Per-device licensing (Workspace ONE)
  • Infrastructure (RADIUS servers)
  • Administrative overhead
  • Support and training
  • Certificate management

ROI Considerations:

  • Reduced helpdesk tickets
  • Improved security posture
  • Automated provisioning savings
  • Reduced password-related incidents
  • Compliance benefits

Migration Strategies

From Manual WiFi Configuration

Migration Plan:

  1. Assessment (Week 1)

    • Document current WiFi settings
    • Identify all SSIDs in use
    • List device inventory
  2. Pilot Setup (Week 2-3)

    • Configure Workspace ONE profiles
    • Test with pilot group
    • Gather feedback
  3. Rollout (Week 4+)

    • Deploy profiles to all users
    • Provide migration instructions
    • Sunset manual configurations

User Communication:

  • Notify users of upcoming change
  • Provide migration date and process
  • Offer support during transition
  • FAQ document for common issues

From Another MDM

Migration Steps:

  1. Parallel Setup

    • Configure Workspace ONE alongside existing MDM
    • Test profile parity
    • Validate certificate deployment
  2. Device Migration

    • Unenroll from old MDM
    • Enroll in Workspace ONE
    • Verify WiFi connectivity
  3. Cutover

    • Scheduled maintenance window
    • Migrate users in batches
    • Monitor for issues
    • Provide support

Data Considerations:

  • Export device inventory from old MDM
  • Map policies to Workspace ONE equivalent
  • Backup existing configurations
  • Plan for certificate reissuance

Integration with Other Systems

Directory Services

Active Directory:

  • Sync users and groups from AD
  • Use AD credentials for WiFi (PEAP)
  • GPO integration for Windows devices

Azure AD:

  • SSO via Azure AD
  • Conditional Access policies
  • Dynamic group membership

LDAP:

  • Custom LDAP directory integration
  • Attribute-based policies
  • Group-based access control

Identity Providers

SAML Integration:

  • Workspace ONE Access as IdP
  • Third-party IdP (Okta, OneLogin)
  • SSO for captive portal

OAuth/OIDC:

  • Modern authentication protocols
  • Mobile app authentication
  • API access control

SIEM and Logging

Log Export:

  • Forward Workspace ONE logs to SIEM
  • IronWifi authentication logs to SIEM
  • Correlation for security analytics

Supported SIEM:

  • Splunk
  • LogRhythm
  • ArcSight
  • QRadar
  • Azure Sentinel

Compliance and Audit

Compliance Frameworks

Supported Standards:

  • HIPAA: Healthcare data protection
  • PCI DSS: Payment card security
  • SOX: Financial reporting
  • GDPR: Data privacy
  • NIST: Cybersecurity framework

Workspace ONE Features:

  • Compliance policies enforcement
  • Audit logging
  • Certificate tracking
  • Device attestation
  • Automated reporting

Audit Reports

Available Reports:

  1. Device Compliance Report

    • Compliant vs. non-compliant devices
    • Compliance trend over time
    • Non-compliance reasons
  2. Certificate Report

    • Issued certificates
    • Expiration dates
    • Renewal status
    • Revoked certificates
  3. Profile Deployment Report

    • Installation success rate
    • Pending installations
    • Failures with reasons
    • Removal tracking
  4. Authentication Report (from IronWifi)

    • Successful authentications
    • Failed attempts
    • User/device activity
    • Network access logs

Support Resources

VMware Resources

IronWifi Resources

Training

  • VMware Workspace ONE certification courses
  • IronWifi implementation webinars
  • Partner training programs
  • YouTube tutorials and walkthroughs