Article Summary
Share feedback
Thanks for sharing your feedback!
Bypassing user permissions for SWG
- Configure System Extensions Payload. Under system extensions payload please add the following:
- Team ID = 924635PD62
- Extensions bundle ID = com.safervpn.osx.smb.proxy
- Code requirement = anchor apple generic and identifier "com.safervpn.osx.smb" and (certificate leaf[field.1.2.840.113635.100.6.1.9] /* exists */ or certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = "924635PD62")
- Deploy Perimeter 81 Proxy Configuration
- Deploy the following proxy configuration file (.plist file) utilizing the MDM software.
Download the Proxy list file
- Deploy the following proxy configuration file (.plist file) utilizing the MDM software.
- Modify the PKG file name and deploy the software
- After downloading, please locate and rename PKG to include the “_mdm”suffix. This will install the client certificate as part of the post-installation process of the PKG.For example:If the downloaded file was named “Perimeter81_8.0.4.116.pkg”, first download it, then rename the .PKG to “Perimeter81_8.0.4.116_mdm.pkg"
- After downloading, please locate and rename PKG to include the “_mdm”suffix. This will install the client certificate as part of the post-installation process of the PKG.
- Distribute the file through the MDM while making sure the MDM runs with admin privileges.
Was this article helpful?