Configure a Per-App VPN Configuration for iOS Endpoints Using Workspace ONE (2024)

Configure a Per-App VPN Configuration for iOS Endpoints Using Workspace ONE

Updated on

Wed Nov 08 00:04:05 UTC 2023

Focus

Download PDF

Updated on

Wed Nov 08 00:04:05 UTC 2023

Focus

  1. Home
  2. GlobalProtect
  3. Mobile Device Management
  4. Manage the GlobalProtect App Using Workspace ONE
  5. Configure Workspace ONE for iOS Endpoints
  6. Configure a Per-App VPN Configuration for iOS Endpoints Using Workspace ONE

Download PDF

GlobalProtect

Table of Contents

Previous Configure a User-Initiated Remote Access VPN Configuration for iOS Endpoints Using Workspace ONE
Next Configure Workspace ONE for Windows 10 UWP Endpoints

You can enable access to internal resources from your managed mobile endpoints by configuring GlobalProtect VPN access using Workspace ONE. In a per-app VPN configuration, you can specify which managed apps can route traffic through the VPN tunnel. Unmanaged apps will continue to connect directly to the internet instead of through the VPN tunnel.

Use the following steps to configure a per-app VPN configuration for iOS endpoints using Workspace ONE:

  1. Download the GlobalProtect app for iOS:

    • Deploy the GlobalProtect Mobile App Using Workspace ONE.

    • Download the GlobalProtect app directly from the App Store.

  2. From the Workspace ONE console, modify an existing Apple iOS profile or add a new one.

    1. Select

      Devices

      Profiles & Resources

      Profiles

      , and then

      ADD

      a new profile.

    2. Select

      iOS

      from the platform list.

      Configure a Per-App VPN Configuration for iOS Endpoints Using Workspace ONE (1)

  3. Configure the

    General

    settings:

    1. Enter a

      Name

      for the profile.

    2. (

      Optional

      ) Enter a brief

      Description

      ofthe profile that indicates its purpose.

    3. (

      Optional

      ) Select the

      Deployment

      method,which indicates whether the profile will be removed automaticallyupon unenrollment—either

      Managed

      (the profileis removed) or

      Manual

      (the profile remainsinstalled until it is removed by the end user).

    4. (

      Optional

      ) Select an

      Assignment Type

      todetermine how the profile is deployed to endpoints. Select

      Auto

      todeploy the profile to all endpoints automatically,

      Optional

      toenable the end user to install the profile from the Self-ServicePortal (SSP) or to manually deploy the profile to individual endpoints,or

      Compliance

      to deploy the profile whenan end user violates a compliance policy applicable to the endpoint.

    5. (

      Optional

      ) Select whether or not you want to

      AllowRemoval

      of the profile by the end user. Select

      Always

      toenable the end user to manually remove the profile at any time,

      Never

      toprevent the end user from removing the profile, or

      WithAuthorization

      to enable the end user to remove the profilewith the authorization of the administrator. Choosing

      WithAuthorization

      adds a required Password.

    6. (

      Optional

      ) In the

      Managed By

      field, enterthe Organization Group with administrative access to the profile.

    7. (

      Optional

      ) In the

      Assigned Groups

      field,add the Smart Groups to which you want the profile added. This fieldincludes an option to create a new Smart Group, which can be configuredwith specs for minimum OS, device models, ownership categories,organization groups, and more.

    8. (

      Optional

      ) Indicate whether you want to includeany

      Exclusions

      to the assignment of thisprofile. If you select

      Yes

      , the

      ExcludedGroups

      field displays, enabling you to select the SmartGroups that you wish to exclude from the assignment of this profile.

    Configure a Per-App VPN Configuration for iOS Endpoints Using Workspace ONE (2)

  4. Configure the

    Credentials

    settings:

    All per-app VPN configurations require certificate-based authentication.

    Starting with iOS 12, if you want to use client certificatesfor GlobalProtect client authentication, you must deploy the clientcertificates as part of the VPN profile that is pushed from theMDM server. If you deploy client certificates from the MDM serverusing any other method, the certificates cannot be used by the GlobalProtectapp.

    • To pull client certificates from Workspace ONE users:

      1. Set the

        Credential Source

        to

        UserCertificate

        .

      2. Select the

        S/MIME Signing Certificate

        (default).

      Configure a Per-App VPN Configuration for iOS Endpoints Using Workspace ONE (3)

    • To upload a client certificate manually:

      1. Setthe

        Credential Source

        to

        Upload

        .

      2. Enter a

        Credential Name

        .

      3. Click

        UPLOAD

        to locate and selectthe certificate that you want to upload.

      4. After you select a certificate, click

        SAVE

        .

      Configure a Per-App VPN Configuration for iOS Endpoints Using Workspace ONE (4)

    • To use a predefined certificate authority and template:

      1. Set the

        Credential Source

        to

        DefinedCertificate Authority

        .

      2. Select the

        Certificate Authority

        fromwhich you want obtain certificates.

      3. Select the

        Certificate Template

        forthe certificate authority.

      Configure a Per-App VPN Configuration for iOS Endpoints Using Workspace ONE (5)

  5. Configure the

    VPN

    settings:

    1. Enter the

      Connection Name

      that theendpoint displays.

    2. Select the network

      Connection Type

      :

      • For GlobalProtect app 4.1.x and earlier releases, select

        PaloAlto Networks GlobalProtect

        .

      • For GlobalProtect app 5.0 and later releases, select

        Custom

        .

    3. (

      Optional

      ) If you set the

      Connection Type

      to

      Custom

      ,enter the bundle ID (

      com.paloaltonetworks.globalprotect.vpn

      )in the

      Identifier

      field to identify the GlobalProtectapp.

      Configure a Per-App VPN Configuration for iOS Endpoints Using Workspace ONE (6)

    4. In the

      Server

      field, enter the hostnameor IP address of the GlobalProtect portal to which users connect.

    5. (

      Optional

      ) Enter the username of the VPN

      Account

      orclick the add (

      +

      ) button to view supportedlookup values that you can insert.

    6. (

      Optional

      ) In the

      Disconnect on idle

      field,specify the amount of time (in seconds) at which an endpoint logsout of the GlobalProtect app after the app stops routing trafficthrough the VPN tunnel.

    7. Enable

      Per App VPN Rules

      to routeall traffic for managed apps through the GlobalProtect VPN tunnel.

      • Enable GlobalProtect to

        Connect Automatically

        tospecified

        Safari Domains

        . You can add multiple

        SafariDomains

        by clicking the add (

        +

        ) button.
      • Set the

        Provider Type

        to indicatehow traffic will be tunneled—either at the application layer orthe IP layer. Use PacketTunnel.

        Configure a Per-App VPN Configuration for iOS Endpoints Using Workspace ONE (7)

    8. In the Authentication area, set the user

      Authentication

      methodto

      Certificate

      .

      All per-app VPNconfigurations require certificate-based authentication.

    9. When prompted, select the

      Identity Certificate

      thatGlobalProtect will use to authenticate users. The

      IdentityCertificate

      is the same certificate that you configuredin the

      Credentials

      settings.

      Configure a Per-App VPN Configuration for iOS Endpoints Using Workspace ONE (8)

    10. (

      Optional

      ) Select the

      Proxy

      typeand configure the relevant settings.

  6. (

    Optional

    ) (

    starting with GlobalProtectapp 5.0

    ) If your GlobalProtect deployment requires HIP integrationwith MDM, specify the unique device identifier (UDID) attribute.

    GlobalProtect supports integration with MDM to obtain mobiledevice attributes from the MDM server for use in HIP-based policyenforcement. In order for the MDM integration to work, the GlobalProtectapp must present the UDID of the endpoint to the GlobalProtect gateway.The UDID attribute enables the GlobalProtect app to retrieve anduse UDID information in MDM-based deployments. If you remove the UDIDattribute from the profile, you can no longer use the MDM integration.The GlobalProtect app generates a new UDID, but it cannot be usedfor the integration.

    • If you are using the

      Palo Alto Networks GlobalProtect

      network

      ConnectionType

      , go to the

      VPN

      settingsand enable

      Vendor Keys

      in the Vendor Configurationarea. Set the

      Key

      to

      mobile_id

      andthe

      Value

      to

      {DeviceUid}

      .

      Configure a Per-App VPN Configuration for iOS Endpoints Using Workspace ONE (9)

    • If you are using the

      Custom

      network

      ConnectionType

      , go to the

      VPN

      settingsand

      ADD

      Custom Data

      in theConnection Info area. Set the

      Key

      to

      mobile_id

      andthe

      Value

      to

      {DeviceUid}

      .

      Configure a Per-App VPN Configuration for iOS Endpoints Using Workspace ONE (10)

  7. SAVE & PUBLISH

    your changes.

  8. Configure per-app VPN settings for a new managed appor modify the settings for an existing managed app.

    After configuring the settings for the app and enablingper-app VPN, you can publish the app to a group of users and enablethe app to send traffic through the GlobalProtect VPN tunnel.

    1. Select

      APPS & BOOKS

      Applications

      Native

      Public

      .

    2. To add a new app, select

      ADD APPLICATION

      .To modify the settings for an existing app, locate the app in the listof Public apps (List View) and then select the edit (Configure a Per-App VPN Configuration for iOS Endpoints Using Workspace ONE (11)) iconin the actions menu next to the row.

      Configure a Per-App VPN Configuration for iOS Endpoints Using Workspace ONE (12)

    3. In the

      Managed By

      field, selectthe organization group that will manage this app.

    4. Set the

      Platform

      to

      Apple iOS

      .

    5. Select your preferred

      Source

      for locatingthe app:

      Configure a Per-App VPN Configuration for iOS Endpoints Using Workspace ONE (13)

    6. Click

      NEXT

      .

      If you chose to search the App Store, you must also

      SELECT

      theapp from the list of search results.

      Configure a Per-App VPN Configuration for iOS Endpoints Using Workspace ONE (14)

    7. On the Add Application dialog, ensure that the app

      Name

      is correct. This is the name that will appear in the Workspace ONE App Catalog.

    8. (

      Optional

      ) Assign the app to pre-defined or custom

      Categories

      for ease-of-access in the Workspace ONE App Catalog.

      Configure a Per-App VPN Configuration for iOS Endpoints Using Workspace ONE (15)

    9. SAVE & ASSIGN

      the new app.

    10. Select the newly added app from the list of Publicapps (List View).

    11. From the

      Applications

      Details View

      , click

      ASSIGN

      atthe top-right corner of the screen.

      Configure a Per-App VPN Configuration for iOS Endpoints Using Workspace ONE (16)

    12. Select

      Assignments

      and thenclick

      ADD ASSIGNMENT

      to add the Smart Groupsthat will have access to this app.

      1. In the

        Select Assignment Groups

        field,select the Smart Groups that you want to grant access to this app.

      2. Select the

        App Delivery Method

        . Ifyou select

        AUTO

        , the app is automaticallydeployed to the specified Smart Groups. If you select

        ONDEMAND

        , the app must be deployed manually.

      3. Set the

        Managed Access

        option to

        ENABLED

        .This option gives users access to the app based on the managementpolicies that you apply.

      4. Configure the remaining settings as needed.

      5. ADD

        the new assignment.

      Configure a Per-App VPN Configuration for iOS Endpoints Using Workspace ONE (17)

    13. (

      Optional

      ) To exclude certain Smart Groupsfrom accessing the app, select

      Exclusions

      andthen select the Smart Groups that you want to exclude from the

      Exclusion

      field.

      Configure a Per-App VPN Configuration for iOS Endpoints Using Workspace ONE (18)

    14. SAVE & PUBLISH

      the configurationto the assigned Smart Groups.

"); adBlockNotification.append($( "Thanks for visiting https://docs.paloaltonetworks.com. To improve your experience when accessing content across our site, please add the domain to the allow list on your ad blocker application." )); let adBlockNotificationClose = $("x"); adBlockNotification.prepend(adBlockNotificationClose) $('body').append(adBlockNotification); setTimeout(function (e) { adBlockNotification.addClass('open'); }, 10); adBlockNotificationClose.on('click', function (e) { adBlockNotification.removeClass('open'); }) } }, 5000)

Previous Configure a User-Initiated Remote Access VPN Configuration for iOS Endpoints Using Workspace ONE
Next Configure Workspace ONE for Windows 10 UWP Endpoints

Recommended For You

{{ if(( raw.pantechdoctype != "techdocsAuthoredContentPage" && raw.objecttype != "Knowledge" && raw.pancommonsourcename != "TD pan.dev Docs")) { }} {{ if (raw.panbooktype) { }} {{ if (raw.panbooktype.indexOf('PANW Yellow Theme') != -1){ }}

{{ } else if (raw.panbooktype.indexOf('PANW Green Theme') != -1){ }}

{{ } else if (raw.panbooktype.indexOf('PANW Blue Theme') != -1){ }}

{{ } else { }}

{{ } }} {{ } else { }}

{{ } }} {{ } else { }} {{ if (raw.pantechdoctype == "pdf"){ }}

{{ } else if (raw.objecttype == "Knowledge") { }}

{{ } else if (raw.pancommonsourcename == "TD pan.dev Docs") { }}

{{ } else if (raw.pancommonsourcename == "LIVEcommunity Public") { }}

{{ } else { }}

{{ } }} {{ } }}

{{ if (raw.pancommonsourcename == "LIVEcommunity Public") { }}

{{ if (raw.pantechdoctype == "pdf"){ }}

{{ } }}

{{ } else { }}

{{ if (raw.pantechdoctype == "pdf"){ }}

{{ } }}

{{ } }}

{{ if (raw.pancommonsourcename != "TD pan.dev Docs"){ }} {{ if (raw.pandevdocsosversion){ }} {{ } else { }} {{ if ((_.size(raw.panosversion)>0) && !(_.isNull(raw.panconversationid )) && (!(_.isEmpty(raw.panconversationid ))) && !(_.isNull(raw.otherversions ))) { }} (See other versions) {{ } }} {{ } }} {{ } }}

{{ } }}{{ if (raw.pantechdoctype == "bookDetailPage"){ }}

{{ } }}{{ if (raw.pantechdoctype == "bookLandingPage"){ }}

{{ } }}{{ if (raw.pantechdoctype == "productLanding"){ }}

{{ } }}{{ if (raw.pantechdoctype == "techdocsAuthoredContentPage"){ }}

{{ } }}{{ if (raw.pantechdoctype == "pdf"){ }}

{{ } }}

© 2024 Palo Alto Networks, Inc. All rights reserved.

Configure a Per-App VPN Configuration for iOS Endpoints Using Workspace ONE (2024)

References

Top Articles
Latest Posts
Article information

Author: Moshe Kshlerin

Last Updated:

Views: 6630

Rating: 4.7 / 5 (77 voted)

Reviews: 84% of readers found this page helpful

Author information

Name: Moshe Kshlerin

Birthday: 1994-01-25

Address: Suite 609 315 Lupita Unions, Ronnieburgh, MI 62697

Phone: +2424755286529

Job: District Education Designer

Hobby: Yoga, Gunsmithing, Singing, 3D printing, Nordic skating, Soapmaking, Juggling

Introduction: My name is Moshe Kshlerin, I am a gleaming, attractive, outstanding, pleasant, delightful, outstanding, famous person who loves writing and wants to share my knowledge and understanding with you.