Use Omnissa Workspace ONE to Deploy Imprivata MDA

The following sections detail how to:

  • Add Imprivata Mobile Device Access to the Workspace ONE Unified Endpoint Management (UEM) through the Google Play Store.

  • Deploy Imprivata MDA to the users across your organization.

  • Optionally, deploy Imprivata MDA for use with Workspace ONE Launcher Check in and Check out.

Prerequisites

User Group Assignment

Creating user groups is outside the scope of this topic. If you have not created users groups in the Workspace ONE UEM console, do so before continuing. They are required to assign the required Workspace ONE policies.

NOTE: For more information on creating user groups, see the Omnissa documentation.

Android Profile Restrictions

Imprivata MDA requires one of the following restrictions payloads:

  • Deploy the device with a Restrictions profile having the Allow Modifying Applications in Settings option enabled.

  • Do not deploy any restrictions to a device.

    For more information on restrictions profiles and their settings, see the Omnissa documentation.

Workspace ONE Launcher Support

To deploy Imprivata Mobile Device Access to devices running the Workspace ONE Launcher, verify that you are using version 4.x.

To verify the version:

  1. In the Workspace ONE UEM console, click Devices > Device Settings.

    The Settings screen appears.

  2. Click Android > Service Applications.

The AirWatch Launcher Version field specifies the version that is currently deployed.

Critical Alarm Sending Apps and Lock Task Mode

It is recommended that Imprivata MDA be the only app on the device that is running in Lock Task mode. However, when the Imprivata MDA app is configured to run with Lock Task mode, other apps that send Critical Alarms will not be able to show a Critical Alarm over the Imprivata MDA lock screen.

The apps that send Critical Alarm notifications should be added to the allowlist in the following places:

  • In the Imprivata Admin Console, by adding the app packages to the Allow lock screen notifications list in Mobile Policy.

  • In your MDM configuration, by allowing the apps for Lock Task mode.

In Omnissa Workspace ONE, for proper Lock Task configuration for the app sending Critical Alarm notifications, the app should be allowlisted in all Lock Task profiles where the Imprivata MDA app is allowlisted.

For example, if a device is enrolled to Workspace ONE with the Workspace ONE launcher, the apps sending alarm notifications should be allowlisted in the Lock Task payload, as well as the ExtraLockTaskPackages custom XML payload.

Adding Imprivata MDA to Workspace ONE UEM

NOTE:

The deployment steps in this topic may change in future, as Omnissa makes changes to the Workspace One UEM console.

For current information, see the Workspace ONE documentation.

See the Imprivata MDA AppConfig Reference for supported MDM AppConfig keys.

The recommended way to add Imprivata MDA is from the Google Play Store.

To add Imprivata MDA:

  1. In the Workspace ONE UEM console, click Resources > Apps > Native.

    The List View screen appears.

  2. Click Public, and then click Add Application.

    The Add Application screen appears.

  3. From the Platform list, select Android.

  4. In the Name field, enter "Imprivata Mobile Device Access", and then click Next.

  5. Under Apps, click Imprivata Mobile Device Access, and then click Select.

    Imprivata MDA should be the first app that appears on the left.

    The Edit Application - Imprivata Mobile Device Access screen appears. No values need to be configured here.

  6. Click Save and Assign.

    You are redirected to the Workspace ONE UEM console to assign the app. For more information, see Assigning Imprivata MDA.

    NOTE: Clicking Cancel does not cancel the upload. If you click Cancel, Imprivata MDA is added to the Workspace ONE UEM and remains available to be assigned at another time.

Assigning Imprivata MDA

Assigning Imprivata Mobile Device Access requires that you:

  • Specify the user groups that are to receive the app.

  • Configure Imprivata Mobile Device Access required settings.

To assign users:

  1. On the Distribution screen, name the assignment.

  2. In the Assignment Groups field, enter the name of the user group or smart group.

  3. Configure how to deploy Imprivata MDA:

    • Auto — Deploys and installs Imprivata MDA to the device upon enrollment.

      If the device is already enrolled, the system prompts users to install it. This setting is typically used in production environments.

    • On Demand – Deploys Imprivata MDA to the device only. Users must manually install it.
  4. From menu on the left, click Application Configuration, and then enable Managed Access and Send Configuration.

  5. In the OneSign server address field, enter the IP address of an Imprivata appliance.

  6. In the Device Serial Number field, enter "{Device SerialNumber}".

    Imprivata MDA requires access to the device ID to report on individual login and device activity. The first time it is launched on the device, Imprivata MDA attempts to obtain the device serial number and build device ID.

  7. Click Create.

  8. Click Save, and then click Publish.

    The assignment appears in the Details View.

Deploying Imprivata Mobile Device Access

How you deploy Imprivata Mobile Device Access to your users depends on whether the devices are configured to use the native system launcher or the Workspace ONE launcher.

All of the Imprivata Mobile Device Access functionality is available in either deployment type. Choosing one deployment type over the other is based on the level of access your organization wants users to have on the mobile device.

Consider the following:

  • Native system launcher—The native system launcher gives users greater access to the device.

    For example, users can change system settings, customize the home screen, and generally manage the device as if it were there own.

  • Workspace ONE Launcher—The Workspace ONE Launcher gives you greater control of the device by limiting what users can access.

    For example, you can define a specific set of apps that are available to users, while preventing access to system settings and other functionality.

NOTE: For more information about the Workspace ONE Launcher, see the Omnissa documentation.

Scenarios

The following table provides a summary of the scenarios and best practices for using Workspace ONE to deploy Imprivata MDA.

See the Imprivata MDA AppConfig Reference for supported MDM AppConfig keys.

Deployment Scenario Guidance
Without Workspace ONE Launcher
  • Deploy with Lock Task mode.

Workspace ONE Launcher, not in shared mode
  • Deploy Launcher without Lock Task mode

  • Deploy with Countdown to Lock mode

  • Deploy with SkipCOSU profile

  • Deploy with Android native screen lock

Workspace ONE Launcher in shared mode
  • Deploy with Check In/Check Out details

  • Deploy Launcher without Lock Task mode

  • Choose whether to deploy with Countdown to Lock, or not:

    • If yes, deploy the Android native screen lock

    • If no, there is no need for Android screen lock

  • Deploy with SkipCOSU profile

Workspace ONE Launcher Check In and Check Out

This is optional.

Workspace ONE includes features for shared device checkout. This section explains how to link Imprivata MDA with Workspace ONE, so that the checkout features are synchronized between the two systems.

A checkout in Imprivata MDA — via a proximity card tap, for example — assigns the device to the user in your MDM. This triggers any user-assigned apps or policies for the device.