As of WWDC 2018 in June of this year, Apple confirmed that publicly-trusted Transport Layer Security (TLS) server authentication certificates issued after October 15, 2018 must meet their Certificate Transparency (CT) policy to be evaluated as trusted on Apple platforms.
Certificates that fail to comply will this policy will result in a failed TLS connection, which can break an app’s connection to Internet services or Safari’s ability to seamlessly connect. This could impact your MDM server connection for on-premise servers and Exchange or Tunnel servers that use TLS trust certificates.
This change was further confirmed to be enforced as part of Apple’s next round of beta OS releases with iOS 12.1.1. As a reminder, please remember to ensure your organizations TLS certificates and certificate authorities are adhering to the outlined policy.
If you are unsure or unable to ensure your TLS certificates meets this criterion, there are some resources that can assist which include reviewing Apple's Certificate Transparency policy here.
iOS 12.1.1 allows MDM to install a Certificate Transparency payload to disable this requirement for specific hosts or certificates. The Custom XML is provided below with the full component scheduled to be part of a future Workspace ONE release. Please review Apple’s Configuration Profile Reference for more information for generating the required SHA hashes to include.
<?xml version="1.0" encoding="UTF-8"?>
<string>Contains Certificate Transparency exceptions for domains or certs that do not use CT</string>
<string>A764D729-D96C-4881-80BA-3B22D08CXXXX</string> <!--Edit the four trailing XXXXs to a random four characters-->
Support Contact Information
The VMware Workspace ONE Team
Other Languages: 日本語