Reverting to Using Legacy Deployment Implementation
If needed, you can revert to the legacy registration mechanism by disabling the Deployment Keys feature (
).
How search works in the Security Help Center:
Log In to the Cisco Security Documentation Portal
Managed iOS Cisco Security Connector: Secure Access Setup Guide Manage Device Deployment Reverting to Using Legacy Deployment Implementation
Last updated: Aug 29, 2025
If needed, you can revert to the legacy registration mechanism by disabling the Deployment Keys feature ( Connect > End User Connectivity > Internet Security).
After disabling the Deployment Keys feature, devices that are currently using the last activated deployment key will continue to be protected by Secure Access. However, new devices will not be able to register with the deactivated deployment key.
To revert to the legacy registration mechanism, download the updated .mobileconfig file, which will no longer include the deployment key. New devices can now register using the legacy method.