Hi there,
We are using a managed Jamf Cloud instance and are looking at enrolling our iOS devices into our Jamf Cloud MDM using user-initiated enrolment.
During this enrolment, the step following authentication prompts the user to install a Trust Profile containing the built in JSS Built-in Certificate Authority certificate, which is self signed. This is (We believe?) then used to sign configuration profiles that are pushed to these devices, as well as the MDM profile. Once the JSS Built-in Certificate Authority certificate is installed, the MDM profile is pushed down, and has a green "verified" tag as it has been signed by the newly installed JSS Built-in Certificate Authority cert.
Our problem is that since the JSS Built-in Certificate Authority cert is self-signed, it is showing as "unverified" (in scary red letters) when it is first presented.
On our Jamf Cloud server, we see the following option in Global Management > User-Initiated Enrolment:
Use a third-party signing certificate
Ensure that the certificate signs configuration profiles sent to computers and mobile devices, and appears as verified to users during user-initiated enrollment.
This gives us the option to upload a .p12 certificate which will presumably be bundled into the Trust Profile during the user-initiated enrolment.
Our question is: Can we use a certificate signed by a trusted third party in this way so that the certificate in the Trust Profile is labelled as "Verified" (in reassuring, non-threatening green letters)?
Just wondering if anyone here has any experience with this - we are unsure what type of certificate would be required here. Is it just a basic/standard SSL certificate, should we use a code signing certificate, are there any special considerations/values required when generating the certificate, are there any additional steps required to ensure that this new certificate signs the configuration profiles, etc.
Any clarity or guidance on this would be immensely appreciated!!