Home > Citrix, XenMobile > How To: #XenMobile #MDM 8.5 Deployment Part 1 and 2: Installation – via @AdamInTheCloud

How To: #XenMobile #MDM 8.5 Deployment Part 1 and 2: Installation – via @AdamInTheCloud

Wow, it’s like Adam read my mind, I’m doing the same kind of blog post series but for a XenMobile MAM deployment! Will post part 2 of the MAM series later tonight (once it’s done, waiting on some StoreFront issues to solve and I’m getting there!)

But in the meantime have a look at this great series by Adam! Great job Adam!!!

How To: XenMobile MDM 8.5 Deployment Part 1: Installation

n late 2012 Citrix announced they had purchased a 7-year-old startup company called Zenprise that was a hot player in the mobile device security market. Up until that time, Citrix was positioning for that sector with its CloudGateway Enterprise product and focusing mostly on apps and data management..not really the device. Zenprise helped them flesh out their offering, which is now known as “XenMobile”. Although it’s gone through a few iterations it has finally reached a final “form” if you will of three editions: MDM, App, and Enterprise.

The purpose of this article series will be to walk through the installation and basic setup of the MDM (Mobile Device Management) Edition which focuses almost exclusively on managing the device, and not necessarily so much the data or apps. Although it is capable of application pushes and the like… a feature comparison can be found on Citrix’ website HERE. I encourage you to view that. One major difference to note is MDM does not sandbox apps/data, but App Edition does, and Enterprise Edition can.

In researching this product for some internal training we are currently going through it became pretty apparent there is very little information out there on it, and if there is its unfortunately outdated because the product has been rapidly evolving over the first half of the year. In this series of blog articles I will go over how to deploy a single instance of XenMobile 8.5 MDM on an internal network, configure basic policies and rules, and apply them to your devices.

If you would like to read the other parts in this article series please go to:

This, unfortunately is the most boring part of MDM which is the install…but I would be remiss by not going over it for some of you that “have to see” it. So lets get to it so we can get on to the more exciting stuff!

First: Pre-req’s. All of this is straight from eDocs, I’m not reinventing the wheel here.

  • MDM 8.5 needs to go on a 2008 R2 or 2012 server.
  • Setup an active directory service account and make it a local admin on the MDM server
  • Disable IPv6 (not via registry, just uncheck the box)
  • UAC disabled
  • Firewall disabled (this is my preference..I disable server firewalls but you’re welcome to do as you wish)
  • Your service account needs permissions creator/owner/read/write on your SQL server. I will not be using PostgreSQL.
  • SQL 2005/2008/R2/2012 in your environment (Reference Architecture recommends SQL for production deployments, not PostgreSQL. See HERE)
  • Java SE 7 Update 11 (dk-7u4-windows-x64.exe) installed on the server
  • Java Cryptography Extension (JCE) USJP 7 on the serverExternal DNS record such as mobile.mydomain.com
    • To install the Java Cryptography Extension
      • Install Java SE 7u11
      • Open the JCE zip file and copy local_policy.jar and US_export_policy.jar to your computer desktop.
      • Navigate to the folder /java/jdk1.7.0_x/jre/lib/security and copy the files from Step 2 to this folder.
  • Obtain an Apple….

Continue reading part 1 here and part 2 here!

//Richard

  1. September 8, 2013 at 20:14

    Thanks for the trackback, Richard. This will ultimately be about a 7 part series on MDM. Part 3 coming soon and then more to follow! Thank you for the kind words.

  1. No trackbacks yet.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: