- Getting started
- Changing BlackBerry UEM certificates
- Configuring BlackBerry UEM to send data through a proxy server
- Configuring connections through internal proxy servers
- Connecting to your company directories
- Connecting to an SMTP server to send email notifications
- Configuring single sign-on for BlackBerry UEM
- Obtaining an APNs certificate to manage iOS and macOS devices
- Controlling which devices can access Exchange ActiveSync
- Connecting BlackBerry UEM to Microsoft Azure
- Configuring BlackBerry UEM to support Android Enterprise devices
- Add an E-FOTA license
- Manage attestation for Samsung KNOX devices
- Manage attestation for Android devices and BlackBerry Dynamics apps using SafetyNet
- Manage attestation for Windows 10 devices
- Configuring BlackBerry UEM for DEP
- Setting up BlackBerry UEM Self-Service for users
- Configuring high availability for a BlackBerry UEM domain
- High availability for the components that manage BlackBerry OS devices
- Architecture: High availability for BlackBerry UEM
- Load-balancing data for BlackBerry 10 devices
- High availability and the BlackBerry Connectivity Node
- How BlackBerry UEM evaluates the health of components
- Install an additional BlackBerry UEM instance
- Configuring high availability for the management console
- Configuring database high availability using database mirroring
- Database high availability for components that manage BlackBerry OS devices
- Steps to configure database mirroring
- System requirements: Database mirroring
- Prerequisites: Configuring database mirroring
- Create and configure the mirror database
- Connect BlackBerry UEM to the mirror database
- Configuring a new mirror database
- Configuring TLS/SSL connections to Exchange ActiveSync when you enable the BlackBerry Secure Gateway
- Simplifying Windows 10 activations
- Migrating users, devices, groups, and other data from a source server
- Prerequisites: Migrating users, devices, groups, and other data from a source server
- Connect to a source server
- Considerations: Migrating IT policies, profiles, and groups from a source server
- Migrate IT policies, profiles, and groups from a source server
- Complete policy and profile migration from Good Control to BlackBerry UEM
- Considerations: Migrating users from a source server
- Migrate users from a source server
- Considerations: Migrating devices from a source server
- Migrate devices from a source server
- Migrating DEP devices
- Configuring BlackBerry UEM to support BlackBerry Dynamics apps
- Integrating BlackBerry UEM with Cisco ISE
- Requirements: Integrating BlackBerry UEM with Cisco ISE
- Create an administrator account that Cisco ISE can use
- Add the BlackBerry Web Services certificate to the Cisco ISE certificate store
- Connect BlackBerry UEM to Cisco ISE
- Example: Authorization policy rules for BlackBerry UEM
- Managing network access and device controls using Cisco ISE
- Monitoring BlackBerry UEM using SNMP tools
- BlackBerry Docs
- BlackBerry UEM 12.10
- Configuration
- Migrating users, devices, groups, and other data from a source server
- Connect to a source server
- Export the self-signed root certificate for the Good Control server
Export the self-signed root certificate for the Good Control server
Good Control
serverComplete the following task if the
Good Control
certificate has not been replaced
with a third-party certificate. BlackBerry UEM
inherently trusts certificates from third-party providers, so you do not need to export
the certificate from the Good Control
server
and import it in to BlackBerry UEM
.The following task is not browser-specific. For specific
instructions, see the documentation for the browser you are using.
- In a browser, navigate to the login screen of any of yourGood Controlservers. You may see a certificate error message because the CA that signed the certificate wasGood Control, and the browser does not recognize it as a well-known CA.
- To open the Certificate dialog, click the certificate icon in the URL field.
- ClickView certificateorCertificate informationto open theCertificate managementmenu.
- Click theCertification Pathtab.
- Select the root certificate. The root certificate is the first item in the Certificate hierarchy (for example, GD12345678 CA).
- ClickView Certificate.
- Click theDetailstab.
- ClickCopy to fileorExport.
- Select either theDER encoded binary X.509 (.CER)or theBase-64 encoded X.509 (.CER)format.
- Enter a location and file name for the certificate.
- ClickNextorSave.
- ClickFinish.