Configure single sign-on for BlackBerry UEM
BlackBerry UEM
If you connect
BlackBerry UEM
to Microsoft Active
Directory
, you can configure single sign-on authentication to allow administrators or users to bypass the login webpage and access the management console or BlackBerry UEM Self-Service
directly. When administrators or users log in to Windows
, the browser uses their credentials to authenticate them with UEM
automatically. Windows
login information can include Active
Directory
credentials or derived credentials (for example, from CAC readers or digital tokens).
This feature is not supported by
UEM Cloud
.- Do the following to configure constrained delegation for theActive Directoryaccount thatUEMuses for the directory connection:
- Use theWindows ServerADSI Edit tool or setspn command-line tool to add the following SPNs forUEMto theActive Directoryaccount:HTTP/<host_FQDN_or_pool_name>(for example, HTTP/domain123.example.com)BASPLUGIN111/<host_FQDN_or_pool_name>(for example, BASPLUGIN111/domain123.example.com)
- InMicrosoft Active Directory Users and Computers, in theMicrosoft Active Directoryaccount properties, on theDelegationtab, enableTrust this user for delegation to specified services onlyandUse Kerberos only.
- Add the SPNs to the list of services.
- If you enable single sign-on for multipleActive Directoryconnections, verify that there are no trust relationships between theActive Directoryforests.
- In theUEMmanagement console, on the menu bar, clickSettings > External integration > Company directory.
- In theConfigured directory connectionssection, click anActive Directoryconnection.
- On theAuthenticationtab, select theEnable Windows single sign-oncheck box.
- ClickSave.
- ClickSaveagain.
- ClickClose.
- Restart theUEMservices on each computer that hosts aUEMinstance.
- Instruct administrators and users to use the following URLs:
- Management console: https://<host_FQDN_or_pool_name>:<port>/admin/index.jsp?tenant=<tenant_ID>&redirect=no
- UEM Self-Service: https://<host_FQDN_or_pool_name>:<port>/mydevice/index.jsp?tenant=<tenant_ID>&redirect=no
If you integrate UEM with Entra ID, theUEMconsole URLs change to the following ("&redirect=no" is removed from the end of the URL):- Management console: https://<server_name>:<port>/admin/index.jsp?tenant=<tenant_ID>
- Self-service console: https://<server_name>:<port>/mydevice/index.jsp?tenant=<tenant_ID>
Single sign-on authentication takes precedence over other authentication methods. If your organization's security standards require that administrators or users use another authentication method, the single sign-on method can be circumvented by appending ?sso=n to the end of the URLs above. - Instruct administrators andUEM Self-Serviceusers to configure their browsers to support single sign-on forUEM:
- Microsoft Edge: The management console andUEM Self-ServiceURLs must be assigned to the local intranet zone. Enable IntegratedWindowsAuthentication.
- Mozilla Firefox: In the about:config list, Add https://,<host_FQDN_or_pool_name>to the "network.negotiate-auth.trusted-uris" preference.
- Google Chrome: The management console andUEM Self-ServiceURLs must be assigned to the local intranet zone.