locked
Windows Phone 8.1 MDM Enrollment error 0x80070057 RRS feed

  • Question

  • Hi All, 

    Can someone help me with enrollment problem? I'll stuck with enrollment, and trying for a few weeks.... :(

    I'm have ROOT certificate (self-signed) -> MDMServer (issued by ROOT) for enrollment to device

    My issuer certificate stored in local computer store.

    I'm using BouncyCastle for create certificate:

            private CertResponse GenerateSignedCertificate(CertificationRequestInfo requestInfo)
            {
                var publicKeyStructure = RsaPublicKeyStructure.GetInstance(requestInfo.SubjectPublicKeyInfo.GetPublicKey());
                var subjectPublicKey = new RsaKeyParameters(false, publicKeyStructure.Modulus, publicKeyStructure.PublicExponent);
    
                X509Store store = new X509Store(StoreName.My, StoreLocation.LocalMachine);
                store.Open(OpenFlags.MaxAllowed);
                var issuerCertificate = store.Certificates.Find(X509FindType.FindBySubjectDistinguishedName, "CN=MDMServer", true).Cast<X509Certificate2>().First();
    
                var issuerName = issuerCertificate.Subject;
                var issuerSerialNumber = new BigInteger(issuerCertificate.GetSerialNumber());
                var issuerKeyPair = DotNetUtilities.GetRsaKeyPair((RSACryptoServiceProvider)issuerCertificate.PrivateKey);
    
                var randomGenerator = new CryptoApiRandomGenerator();
                var random = new SecureRandom(randomGenerator);
    
                var serialNumber = BigIntegers.CreateRandomInRange(
                           BigInteger.One,
                           BigInteger.ValueOf(Int64.MaxValue),
                           random);
    
                var certificateGenerator = new X509V3CertificateGenerator();
    
                //var issuerDN = new X509Name(issuerName);
                certificateGenerator.SetIssuerDN(new X509Name(issuerName, new Core.PrintableStringEntryConverter()));
    
                certificateGenerator.SetSerialNumber(serialNumber);
                certificateGenerator.SetSignatureAlgorithm(signatureAlgorithm);
    
                certificateGenerator.SetSubjectDN(new X509Name("CN=MSMDMDevice", new Core.PrintableStringEntryConverter()));
                certificateGenerator.SetPublicKey(subjectPublicKey);
    
                certificateGenerator.AddExtension(X509Extensions.KeyUsage, false, new KeyUsage(KeyUsage.DigitalSignature | KeyUsage.KeyEncipherment));
                certificateGenerator.AddExtension(X509Extensions.ExtendedKeyUsage, false, new ExtendedKeyUsage(new ArrayList() { KeyPurposeID.IdKPClientAuth, new DerObjectIdentifier("1.3.6.1.4.1.311.65.2.1") }.ToArray()));
    
                var notBefore = DateTime.UtcNow.Date;
                var notAfter = notBefore.AddYears(1);
    
                certificateGenerator.SetNotBefore(notBefore);
                certificateGenerator.SetNotAfter(notAfter);
    
                certificateGenerator.AddExtension(X509Extensions.AuthorityKeyIdentifier, false, new AuthorityKeyIdentifierStructure(DotNetUtilities.FromX509Certificate(issuerCertificate)));
                certificateGenerator.AddExtension(X509Extensions.SubjectKeyIdentifier, false, new SubjectKeyIdentifierStructure(subjectPublicKey));
    
                var certificate = certificateGenerator.Generate(issuerKeyPair.Private, random);
    
                certificate.Verify(issuerKeyPair.Public);
                certificate.Verify(rootKeyPair.Public);
                var msCert = DotNetUtilities.ToX509Certificate(certificate);
    
                string issuerBase64 = Convert.ToBase64String(issuerCertificate.Export(X509ContentType.Cert), Base64FormattingOptions.None);
                string issuerSerial = issuerCertificate.GetCertHashString();//.GetSerialNumberString();
    
                string certBase64 = Convert.ToBase64String(msCert.Export(X509ContentType.Cert), Base64FormattingOptions.None);
                string certSerial = msCert.GetCertHashString();//.GetSerialNumberString();
    
                System.IO.File.WriteAllText(@"d:\utils\openssl\certs\enroll-" + msCert.GetSerialNumberString() + ".cer", ExportToPEM(msCert));
    
                return new CertResponse(issuerBase64, issuerSerial, certBase64, certSerial);
            }

    I'll save generated certificate to local computer for testing and viewing... 

    and wap-provisioningdoc:

    <wap-provisioningdoc version=""1.1"">
                                      <characteristic type=""CertificateStore"">
                                          <characteristic type=""Root"">
                                              <characteristic type=""System"">
                                                  <characteristic type=""{0}"">
                                                      <parm name=""EncodedCertificate"" value=""{1}"" />
                                                  </characteristic>
                                              </characteristic>
                                          </characteristic>
                                      </characteristic>
                                      <characteristic type=""CertificateStore"">
                                          <characteristic type=""My"">
                                              <characteristic type=""User"">
                                                  <characteristic type=""{2}"">
                                                      <parm name=""EncodedCertificate"" value=""{3}"" />
                                                  </characteristic>
                                                  <characteristic type=""PrivateKeyContainer"" />
                                              </characteristic>
                                              <characteristic type=""WSTEP"">
                                                  <characteristic type=""Renew"">
                                                      <parm name=""ROBOSupport"" value=""true"" datatype=""boolean"" />
                                                       <parm name=""RenewPeriod"" value=""60"" datatype=""integer"" />
                                                      <parm name=""RetryInterval"" value=""4"" datatype=""integer"" />
                                                  </characteristic>
                                              </characteristic>
                                          </characteristic>
                                      </characteristic>
                                      <characteristic type=""APPLICATION"">
                                          <parm name=""APPID"" value=""w7"" />
                                          <parm name=""PROVIDER-ID"" value=""MDMServer"" />
                                          <parm name=""NAME"" value=""InITWeTrust"" />
                                          <parm name=""ADDR"" value=""{4}/EnrollmentServer/WindowsPhone.svc"" />
                                          <parm name=""CONNRETRYFREQ"" value=""6"" />
                                          <parm name=""INITIALBACKOFFTIME"" value=""30000"" />
                                          <parm name=""MAXBACKOFFTIME"" value=""120000"" />
                                          <parm name=""BACKCOMPATRETRYDISABLED"" />
                                          <parm name=""DEFAULTENCODING"" value=""application/vnd.syncml.dm+xml"" />
                                          <parm name=""SSLCLIENTCERTSEARCHCRITERIA"" value=""Subject=CN%3dMSMDMDevice&amp;Stores=My%5CUser"" />
                                          <characteristic type=""APPAUTH"">
                                              <parm name=""AAUTHLEVEL"" value=""CLIENT"" />
                                              <parm name=""AAUTHTYPE"" value=""DIGEST"" />
                                              <parm name=""AAUTHSECRET"" value=""password1"" />
                                              <parm name=""AAUTHDATA"" value=""ZHVtbXk="" />
                                          </characteristic>
                                          <characteristic type=""APPAUTH"">
                                              <parm name=""AAUTHLEVEL"" value=""APPSRV"" />
                                              <parm name=""AAUTHTYPE"" value=""BASIC"" />
                                              <parm name=""AAUTHNAME"" value=""testclient"" />
                                              <parm name=""AAUTHSECRET"" value=""password2"" />
                                          </characteristic>
                                      </characteristic>
                                      <characteristic type=""DMClient"">
                                          <characteristic type=""Provider"">
                                              <characteristic type=""MDMServer"">
                                                  <characteristic type=""Poll"">
                                                      <parm name=""NumberOfFirstRetries"" value=""8"" datatype=""integer"" />
                                                      <parm name=""IntervalForFirstSetOfRetries"" value=""15"" datatype=""integer"" />
                                                      <parm name=""NumberOfSecondRetries"" value=""5"" datatype=""integer"" />
                                                      <parm name=""IntervalForSecondSetOfRetries"" value=""3"" datatype=""integer"" />
                                                      <parm name=""NumberOfRemainingScheduledRetries"" value=""0"" datatype=""integer"" />
                                                      <parm name=""IntervalForRemainingScheduledRetries"" value=""1560"" datatype=""integer"" />
                                                      <parm name=""PollOnLogin"" value=""true"" datatype=""boolean"" />
                                                  </characteristic>
                                                  <parm name=""EntDeviceName"" value=""Administrator_Windows"" datatype=""string"" />
                                              </characteristic>
                                          </characteristic>
                                      </characteristic>
                                  </wap-provisioningdoc>


    Device call Discover.svc -> Policy.svc -> Enrollment.svc and got error 0x80070057

    Issuer certificate key usage:

    * DigitalSignature
    * KeyEncipherment
    * KeyCertSign
    * Server Auth
    * Client Auth
    * 1.3.6.1.4.1.311.65.2.1, 1.3.6.1.4.1.311.65.1.1, 1.3.6.1.4.1.311.21.5
    * BasicConstraints(0)
    * CRL Distribution = [0]

    Device Enrollment certificate usage:

    * DigitalSignature
    * KeyEncipherment
    * ClientAuth
    * 1.3.6.1.4.1.311.65.2.1

    Enrollment certificate CommonName in PRINTABLE_STRING:

             |  |        |     ; 2.5.4.3 Common Name (CN)
    0067:    |  |        13 0b                      ; PRINTABLE_STRING (b Bytes)
    0069:    |  |           4d 53 4d 44 4d 44 65 76  69 63 65                 ; MSMDMDevice
             |  |              ; "MSMDMDevice"


    Enrollment certificate issuer CommonName in certificate is UTF8 (tried PRINTABLE_STRING)

    Response to client

    <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" xmlns:a="http://www.w3.org/2005/08/addressing" xmlns:u="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd">
                                                           <s:Header>
                                                             <Action s:mustUnderstand="1" >http://schemas.microsoft.com/windows/pki/2009/01/enrollment/RSTRC/wstep</Action>
                                                             <a:RelatesTo>urn:uuid:0d5a1441-5891-453b-becf-a2e5f6ea3749</a:RelatesTo>
                                                             <o:Security s:mustUnderstand="1" xmlns:o="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd">
                                                               <u:Timestamp u:Id="_0">
                                                                 <u:Created>2015-09-17T04:15:46.776Z</u:Created>
                                                                 <u:Expires>2015-09-17T04:20:46.776Z</u:Expires>
                                                               </u:Timestamp>
                                                             </o:Security>
                                                           </s:Header>
                                                           <s:Body>
                                                             <RequestSecurityTokenResponseCollection xmlns="http://docs.oasis-open.org/ws-sx/ws-trust/200512">
                                                               <RequestSecurityTokenResponse>
                                                                 <TokenType>http://schemas.microsoft.com/5.0.0.0/ConfigurationManager/Enrollment/DeviceEnrollmentToken</TokenType>
                                                                   <RequestedSecurityToken>
                                                                     <BinarySecurityToken
                                                                       ValueType="http://schemas.microsoft.com/5.0.0.0/ConfigurationManager/Enrollment/DeviceEnrollmentProvisionDoc"
                                                                       EncodingType="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd#base64binary" xmlns="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd"><wap-provisioningdoc version="1.1">
                                  <characteristic type="CertificateStore">
                                      <characteristic type="Root">
                                          <characteristic type="System">
                                              <characteristic type="A5C23CA024F608D95E77F235A91AE1E17F86F0BC">
                                                  <parm name="EncodedCertificate" value="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" />
                                              </characteristic>
                                          </characteristic>
                                      </characteristic>
                                  </characteristic>
                                  <characteristic type="CertificateStore">
                                      <characteristic type="My">
                                          <characteristic type="User">
                                              <characteristic type="A0F30DC9A876DA143581BE18C9BC51E7244A2969">
                                                  <parm name="EncodedCertificate" value="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" />
                                              </characteristic>
                                              <characteristic type="PrivateKeyContainer" />
                                          </characteristic>
                                          <characteristic type="WSTEP">
                                              <characteristic type="Renew">
                                                  <parm name="ROBOSupport" value="true" datatype="boolean" />
                                                   <parm name="RenewPeriod" value="60" datatype="integer" />
                                                  <parm name="RetryInterval" value="4" datatype="integer" />
                                              </characteristic>
                                          </characteristic>
                                      </characteristic>
                                  </characteristic>
                                  <characteristic type="APPLICATION">
                                      <parm name="APPID" value="w7" />
                                      <parm name="PROVIDER-ID" value="MDMServer" />
                                      <parm name="NAME" value="InITWeTrust" />
                                      <parm name="ADDR" value="https://enterpriseenrollment.initwetrust.ru/EnrollmentServer/WindowsPhone.svc" />
                                      <parm name="CONNRETRYFREQ" value="6" />
                                      <parm name="INITIALBACKOFFTIME" value="30000" />
                                      <parm name="MAXBACKOFFTIME" value="120000" />
                                      <parm name="BACKCOMPATRETRYDISABLED" />
                                      <parm name="DEFAULTENCODING" value="application/vnd.syncml.dm+xml" />
                                      <parm name="SSLCLIENTCERTSEARCHCRITERIA" value="Subject=CN%3dMSMDMDevice&amp;Stores=My%5CUser" />
                                      <characteristic type="APPAUTH">
                                          <parm name="AAUTHLEVEL" value="CLIENT" />
                                          <parm name="AAUTHTYPE" value="DIGEST" />
                                          <parm name="AAUTHSECRET" value="password1" />
                                          <parm name="AAUTHDATA" value="ZHVtbXk=" />
                                      </characteristic>
                                      <characteristic type="APPAUTH">
                                          <parm name="AAUTHLEVEL" value="APPSRV" />
                                          <parm name="AAUTHTYPE" value="BASIC" />
                                          <parm name="AAUTHNAME" value="testclient" />
                                          <parm name="AAUTHSECRET" value="password2" />
                                      </characteristic>
                                  </characteristic>
                                  <characteristic type="DMClient">
                                      <characteristic type="Provider">
                                          <characteristic type="MDMServer">
                                              <characteristic type="Poll">
                                                  <parm name="NumberOfFirstRetries" value="8" datatype="integer" />
                                                  <parm name="IntervalForFirstSetOfRetries" value="15" datatype="integer" />
                                                  <parm name="NumberOfSecondRetries" value="5" datatype="integer" />
                                                  <parm name="IntervalForSecondSetOfRetries" value="3" datatype="integer" />
                                                  <parm name="NumberOfRemainingScheduledRetries" value="0" datatype="integer" />
                                                  <parm name="IntervalForRemainingScheduledRetries" value="1560" datatype="integer" />
                                                  <parm name="PollOnLogin" value="true" datatype="boolean" />
                                              </characteristic>
                                              <parm name="EntDeviceName" value="Administrator_Windows" datatype="string" />
                                          </characteristic>
                                      </characteristic>
                                  </characteristic>
                              </wap-provisioningdoc></BinarySecurityToken>
                                                                   </RequestedSecurityToken>
                                                                 <RequestID xmlns="http://schemas.microsoft.com/windows/pki/2009/01/enrollment">0</RequestID>
                                                               </RequestSecurityTokenResponse>
                                                             </RequestSecurityTokenResponseCollection>
                                                           </s:Body>
                                                         </s:Envelope>


    My web-server certificate is third certificate issued by ROOT (self-signed)

    I'll tried add to device ROOT Certificate and MDMServer certificate, checking by 'Certificate' app by Microsoft.

    my ROOT certificate (self-signed) is placed in Trusted Root certificates and MDMServer in Intermediate

    Windows Phone log:

    [MDM Enroll Start] emailaddress: ggg@initwetrust.ru; servername: ; password: Given; domainusername: NULL. 
    Sending empty discovery request to server (EnterpriseEnrollment.initwetrust.ru). 
    Pinging server (EnterpriseEnrollment.initwetrust.ru). 
    We have been asked to redirect server. 
    Successfully discovered server (EnterpriseEnrollment.initwetrust.ru). 
    Processing successful response from discovery enpoint callback. 
    GetEndpointsFromResponse() uses authentication mode (OnPremise). 
    OnPremise authentication mode is used. 
    Policy service URL (https://enterpriseenrollment.initwetrust.ru/EnrollmentServer/EnrollmentPolicy.svc) and  enrollment service URL (https://enterpriseenrollment.initwetrust.ru/EnrollmentServer/EnrollmentService.svc) are used. 
    GetPolicyFromResponse() uses hash algorithm (1.3.14.3.2.29). 
    Function NCryptOpenKey failed with result (0x80090016). 
    Soap Request Message: ...
    Soap Response Message: ...
    Enrollment succeeded with server (enterpriseenrollment.initwetrust.ru). 
    [MDM Cert Installer Start] Install cert in app container. 
    [MDM Cert Installer] Uninstalling enrollment cert for OMADM session. 
    [MDM Cert Installer End] Success 
    [MDM Enroll End] Error HRESULT: 0x80070057 



    • Edited by Alexey.U Thursday, September 17, 2015 1:45 PM
    Thursday, September 17, 2015 1:17 PM

All replies

  • Tried add SubjectAlternateName (with enterpriseenrollment.domain.name) to MDMServer certificate... did not help...
    Thursday, September 17, 2015 2:02 PM