- Basics
- About Knox
- Knox licenses
- Knox white paper
- Sign up for Samsung Knox
- Latest release notes
- General Knox FAQ
- General Knox KBAs
- Submit a support ticket
- User Acceptance Testing
- For IT admins
- Knox Admin Portal
- Knox Suite
- Knox Platform for Enterprise
- Introduction
- How-to videos
- Before you begin
- Get started with UEMs
- Introduction
- Blackberry UEM
- Citrix Endpoint Management
- FAMOC
- IBM MaaS360
- Microsoft Intune
- MobileIron Cloud
- MobileIron Core
- Samsung Knox Manage
- SOTI MobiControl
- VMware Workspace ONE UEM
- Knox Service Plugin
- Release notes
- Migrate to Android 11
- FAQs
- Troubleshoot
- KBAs
- Knox Mobile Enrollment
- Knox Configure
- Mobile
- Wearables
- Shared Device
- FAQ
- KBAs
- Knox Capture
- Introduction
- How it works
- How-to videos
- IT admins: Get started
- Getting started with Knox Capture
- Step 1: Launch Knox Capture
- Step 2: Create a scanning profile
- Step 3: Select apps and activities
- Step 4: Configure the scanner
- Step 5: Set keystroke output rules
- Step 6: Test apps in your configuration
- Step 7: Share your configuration
- Step 8: Deploy Knox Capture in Managed mode
- End users: Get started
- Features
- Release notes
- FAQ
- KBAs
- Troubleshoot
- Knox Asset Intelligence
- Knox Manage
- Introduction
- How-to videos
- Get started
- Video: Getting started with Knox Manage
- Integration with Managed Service Provider
- Access Knox Manage
- Configure basic environments
- Create user accounts
- Create groups
- Create organization
- Set up devices and profiles
- Create a new profile
- Assign profiles to groups and organizations
- Enroll devices
- Shared Android device quickstart
- Non-shared Android device enrollment quickstart
- Android Management API device enrollment quickstart
- Apple User Enrollment quickstart
- View device information
- Apply profiles to organizations
- Set up Knox Manage deployment with a Knox Suite license
- Manage Chromebooks
- Manage Android devices with the Android Management API
- Manage Shared iPads
- Configure
- Licenses
- Organization
- Users
- Sync user information
- Groups
- Devices
- Content
- Applications
- Profile
- Knox E-FOTA
- Certificates
- Advanced settings
- Monitor
- Kiosk devices
- Knox Remote Support
- Active Directory
- Microsoft Exchange
- Mobile Admin
- Appendix
- Release notes
- Features
- FAQ
- KBAs
- Knox E-FOTA
- Introduction
- How-to videos
- Get started
- Features
- EMM integration
- Appendix
- Release notes
- FAQ
- KBAs
- Troubleshoot
- Knox E-FOTA On-Premises
- Legacy Knox E-FOTA products
- Knox Guard
- Introduction
- How-to video
- Get started
- Using Knox Guard
- Dashboard
- Manage devices
- Device management
- Accept or reject devices
- Upload devices
- Delete devices
- Complete device management
- Send notifications
- Enable or disable SIM control
- Download devices as CSV
- View device log
- View device deletion log
- Start and stop blinking reminder
- Lock and unlock devices
- Update lock message
- Send relock timestamp
- Turn on/off relock reminder
- Manage policies
- Manage licenses
- Manage resellers
- Manage admins and roles
- Activity log
- Knox Deployment App
- Release notes
- FAQ
- KBAs
- Support
- Knox Guard REST API
- Samsung Care+ for Business
- For Knox Partners
- Knox Deployment Program
- Knox MSP Program
How to upload certificates for VPN with KSP in Knox Manage
Environment
- Knox Manage (KM)
- Knox Service Plugin (KSP)
- Android Enterprise (AE)
Prerequisites
User and CA certificates according to your security requirements for VPN remote access.
Overview
Knox Service Plugin provides the option of installing your certificates for VPN connection silently in the device keystore. This article will explain how to prepare and upload certificate data correctly with KSP.
How to upload certificates for VPN with KSP in Knox Manage?
Normally, in VPN configs you need to provide the VPN client with a user certificate. This may be signed by a CA and if it's not a public CA, then you also need to add the CA.
How to install CA cert (pem encoded X509 certificate) with KSP
- Open your pem file with an editor.
- Copy the whole contents except the 1st (-----BEGIN CERTIFICATE-----) line and last (-----END CERTIFICATE-----) line and paste the result to the Certificate data field in KSP config. Enter your CA alias.
- The Certificate type field should be: CA.
- The Certificate usage field should be: For VPN & Apps.
- The Private key password field should be blank.
- Select Store presence > Pricing & Distribution.
- Navigate to KSP Config > DO/PO policy > Certificate management policies (Premium) and select Install Certificate in keystore(s) silently.
How to install user cert (.pfx\.p12) with KSP
For installation, ensure you have bundled the required certificate as below:
openssl pkcs12 -export -inkey private/<your_private_key>.key.pem -in certs/<user_cert>.crt.pem -name "KNOX VPN Cert" -out p12/samsung.knox-vpn.p12
On a Linux machine, open terminal and execute the following command. Then, execute the remaining steps:
base64 p12/samsung.knox-vpn.p12 > p12/samsung.knox-vpn.pem
- Copy whole contents of the samsung.knox-vpn.pem file and paste the result to the Certificate data field in KSP config.
- The Certificate type field should be: Other.
- The Certificate usage field should be: For VPN & Apps.
- The Private key password field should have an actual password if the user cert has been exported with a password and be blank for certs that have no passwords.
- Navigate to KSP Config > DO/PO policy > Certificate management policies (Premium) and select Install Certificate in keystore(s) silently.