Manage Deployment Key Compromise
If you determine that a key has been compromised, take action to protect your network's integrity and security. Compromised keys can pose significant risks, as they may allow unauthorized access to your network.
This section outlines the necessary actions to be taken to ensure network security and continuity, including deactivating compromised keys, understanding the effects on existing clients, and steps for activating and distributing a new key for secure device registration.
Procedure
1 |
Deactivate the Compromised Key: Deactivate the compromised key. This action prevents any further device registrations using the deactivated key, ensuring that your network remains secure. To deactivate a deployment key, perform the following steps:
|
||
2 |
Activate the new deployment key: To facilitate the registration of new devices, you must activate a different deployment key. This new key will replace the compromised one and will be used for future device registrations. |
||
3 |
Download a new profile: After the new key is activated, download a new profile, specifically the Android configuration file. This file contains the updated information, including the new active deployment key. |
||
4 |
Distribute the new profile to new devices: Distribute the updated Android configuration profile to any new devices that need to connect to your network. This ensures that they have the correct and secure credentials to register and operate within your network environment. |
||
5 |
Update the Android configuration file for registered Devices: Devices that are already registered and require an update to the Android configuration file will automatically receive changes once the configuration is updated in the mobile device manager (MDM). |