More

    Introducing Certificate Management for Windows 10 and iOS

    Share On

    We are elated to launch the Certificate Management feature on Scalefusion MDM. Now, IT admins can automate the provisioning of digital certificates/identities to authenticate devices without any end-user intervention via the Scalefusion dashboard.

    Certification Management for Win & iOS
    Certification Management for Win & iOS

    Digital Certificates: An overview 

    Digital certificates are an imperative component of the public key infrastructure of a network. They serve as a digital identity that is used for authentication of a device or an endpoint and helps in attesting the security of the same, especially when the devices are connected to unknown networks. Deployment of digital certificates on the device inventory is critical for enterprise security. Certificate management ensures monitoring and facilitation of the certificate status on any endpoint- including laptops, computers and mobile devices. 

    IT teams are burdened with several tasks ranging from device provisioning, supporting remote working to ensuring device security and compliance of the entire enterprise device inventory. Without an MDM solution, IT administrators have to individually provision devices with business apps and resources, enforcing access control and security policies on each, manually. Scalefusion MDM helps the IT teams to take over device provisioning and management over the air. 

    To further enhance IT operations, Scalefusion now enables IT teams to manage certificates on iOS and Windows 10 devices from the Scalefusion dashboard, replacing the cumbersome process of individual certificate deployment and management.

    Types of certificates supported by Scalefusion Certificate Management:

    The types of certificates that can be uploaded, deployed and managed on Scalefusion are as follows:

    • Identity Certificate- used by apps and browsers for user identification and certificate-based authentication
    • CA Certificate- used to verify the trust of the certificate presented
    • Chained Certificate- ordered list of certificates of the above-mentioned certificate types

    How does it work?

    IT teams can upload certificates on the Scalefusion dashboard and deploy them on iOS and Windows 10 device profiles or devices. These certificates can then be installed on the devices without any end-user intervention.

    Scalefusion supports certificates of two formats- PKCS12(.p12) and PKCS1(cer, pem). 

    On iOS devices, IT admins can deploy certificate-based Enterprise Wi-Fi configurations to enable employees to quickly plug and work when they enter enterprise networks. You can read more about it here.

    IT admins can upload, publish, unpublish or delete certificates from the Scalefuson dashboard. They can also quickly glance through the certificate information that displays details such as by whom it was issued, the expiration date, and key usage.

    IT admins can push certificates while provisioning the unboxed devices as well as the devices already enrolled in Scalefusion. When a new employee receives an unboxed device that is provisioned using Zero-touch, the certificates for authentication and access control are installed on the first boot along with the device profile. 

    Get started on streamlining certificate management on Windows 10 and iOS devices with Scalefusion. Explore our help docs to learn more.

    Renuka Shahane
    Renuka Shahane
    Renuka Shahane is an avid reader who loves writing about technology. She is an engineering graduate with 10+ years of experience in content creation, content strategy and PR for web-based startups.

    Latest Articles

    Who Verifies Your Identity Online? Understanding Identity Providers

    Hey You! The eternal Pink Floyd song! Decades later, a similar question beckons us online in a world outside that musical masterpiece. It goes...

    From Onboarding to Offboarding: User Lifecycle Management Explained

    It’s always exciting for organizations when their business scales well, and with that, there’s an increase in their employee base. This also means onboarding...

    Multi-Factor Authentication (MFA): The Extra Layer of Security for Your Accounts

    Ever thought of the risks associated with accessing sensitive data using just a single set of credentials? Enter user ID. Enter password. And voila!...

    Latest From Author

    What is Mobile Application Management: All You Need to Know

    Apps are the bedrock of smartphones, tablets, and now, even laptops and desktops. Without apps, modern devices are defunct. And that applies to both...

    Beyond Mobile: The Power of EMM for Holistic IT Management

    Keeping track of multiple devices is key, especially if you manage remote teams with a constant influx of smartphones, tablets, and laptops. Without any...

    Unlocking Workplace Agility Online: How Mobile Tech Drives Digital Transformation

    When you integrate digital technology into all aspects of your business, you transform the traditional ways you operate your business and deliver value and...

    More from the blog

    From Onboarding to Offboarding: User Lifecycle Management Explained

    It’s always exciting for organizations when their business scales well, and with that, there’s an increase in their employee...

    Multi-Factor Authentication (MFA): The Extra Layer of Security for...

    Ever thought of the risks associated with accessing sensitive data using just a single set of credentials? Enter user...

    What is Identity and Access Management? Who Gets Access...

    Imagine a situation where a stolen password exposes critical corporate information to bad actors. Your IT and security teams...