To enable identity and be searchable in Umbrella, configure your Mobile Device Manager to share identity information.
Identity can be any of the following based on what you choose to share with Umbrella:
- User email address
- Device serial number
- Any other unique device identifier
After you push the identities to Umbrella, they will be listed in the Umbrella dashboard.
You can select user devices or use the user ID to search for them. To enable User Identities for Android clients, follow these steps.
- Cisco Meraki Systems Manager
- Microsoft Intune
- Samsung Knox
- VMWare WorkspaceOne
- Access User Identities on the Umbrella Dashboard
The key for User Identity in Meraki is umbrella_user_identity.
By default, the Type is a text field. Instead of choosing text, you can opt for the variables provided by Meraki SM.
For setting up a user identity value, choose a type.
If a user identity is selected, the field looks as shown below:
Once the configuration is pushed to the device, Meraki SM replaces the variable with the corresponding value.
You can choose the key for user identity.
The Value type can either be a string or a variable.
Choose the value type as a variable so that configuration values can be selected from the options provided.
Choose any of the options from the list. Once the configuration is pushed to the device, MS Intune replaces the variable with the corresponding value.
Click LookUp for the Select Lookup Item and choose the appropriate variable for the identity.
After you select the appropriate variable for the identity, the page appears.
The Value can either be typed into the text box or you can be chosen from the Select Lookup Item tab.
Click LookUp for the Select Lookup Item, and then choose the appropriate variable for the identity.
After you select the appropriate variable for the identity, the below screen appears.
After the user identity is shared with the umbrella dashboard, you can select these identities in the policy configuration flow. On the identity page, you can choose either a single identity or all the mobile devices.
As users start using the mobile device, you can monitor user activity through the Activity Search report.
You can filter logs for the Android devices by selecting Android Devices.
You can see the user activity for the Allowed and Blocked.
Updated 3 months ago