I'm very happy to announce that Zenprise has added their data to our Comparison of MDM Providers. We are now at 800 boxes with / ticks.
As this feature has grown, we've seeing some areas where we can improve the chart. Please visit MDM Comparison 2.0 Beta to see where we are going, and contribute your suggestions.
Has your company built a great app? But you don't want it on the app store? In-house App Deployment is for you. There are two ways to go:
Several companies make a living building private app catalogs for businesses (like this mobile application development company). These sites typically require an enterprise subscription to Apple's iOS Developer Program.
Do It Yourself
(I haven't done all these steps myself. Hopefully some of you can fill in whatever gaps exist.)
Once you have established your iOS Developer Enterprise Program, everything you need to know is listed under the Provisioning Portal.
The rough steps for in-house app distribution are:
- Identify internal development resources
- Establish a cross-functional team to establish security, design & look and feel guidelines
- Download Xcode from AppStore or via free iOS Developer Program
- Build an app in Xcode
- Sign up for the iOS Enterprise Developer Program (not the standard program)
iOS Developer Enterprise Program
Requires DUNS number
Enrolling employee must have binding authority to enter into contracts
This employee becomes the Team Agent
Legal contact at your company to verify enrolling employee & their binding authority
Budget 10 - 15 business days for enrollment
From Apple's iOS Provisioning Portal
- Create App ID (performed by Team Agent)
- Register development devices (Team Agent)
- Create Development Provisioning Profile (Team Agent)
- Create Developer code signing Certificate
- Add Provisioning Profile & Developer Certificate in Xcode
Note that with iOS 4, provisioning profiles are read only at boot. So here is what will happen: MDM will install both profile and app, but then the app will seem to disappear. The system is simply hiding the app because it is not aware of the provisioning profile. Just reboot the device to have the app function.
EoIS member Haruhiko Nishi has released a prototype system for managing iOS devices as Open Source. The code works through an ActiveSync connection to your device, which can manage some restrictions and policies. There's a bit of discussion in our forum about this already.
The demo is quite interesting. See our forums for the URL. Thanks, Hanishi!
A huge THANK YOU to mobilEcho and all the attendees at last night's meetup shindig. The entire industry was represented: education, enterprise, developers, MDM, MAM, MFM, and your MOM. And as you can see from the photo above, even the bartender got into the spirit.
Let's do this again next year, shall we?
(Photo by Arek Dreyer. Thanks Arek!)
Yesterday's announcements bring up several questions regarding enterprise use of iOS 5.
- Can enterprises pre-load configurations and certificates to allow "PC Free" deployments?
- Do Over-The-Air software updates depend on iCloud for data backup and restore?
- User cy2k asks: What, if any, changes are there to MDM and mobileconfig.
- Can iCloud be disabled or restricted using MDM?
- Who holds the private keys to the iCloud?
- Can there be "private" iClouds for sensitive information?
- Is there the ability to record an iMessage conversation?
Add your thoughts and further questions below.
(A reminder about this site's policy: We aim to bring together all players in this community and therefore will not publish information covered by non-disclosure agreements. But we'll try to compile the best information available publicly.)
iCloud is Apple's announced cloud service.
In addition to Address Book, calendar, mail, iBooks, music, and photos, iCloud supports a number of innovative features.
Just looking at the WWDC Keynote, iCloud appears to be the file system that's been missing from iOS since the beginning. Files are sync'd wirelessly and in the background to all devices. (Sounds like Dropbox.)
IT appears Apps needs to be updated to work with iCloud, using iCloud storage APIs. Works on all iOS devices, and Macs and PCs too.
No word on security yet, or on enterprise sharing features. (Likely this is consumer-only at the beginning.)
5 GB base storage for mail and documents (does not count purchased music, apps, or books). More storage is probably available at an additional fee.
iCloud is in Beta now, shipping with iOS 5 this fall.
I'm here at WWDC, where there are several fantastic announcements for the enterprise community.
- No iTunes activation required ("PC Free")
- Over the Air OS Updates
- Delta updates will be much smaller
- S/MIME encrypted mail
- Improved Mail offline support
- BBM-like messaging: "iMessage" to all iOS devices. Includes delivery & read receipts.
- iPad 2 AirPlay integration displays fullscreen wireless to Apple TV, etc.
- Daily backups to iCloud over WiFi
Coming this fall. will support all iOS Devices which are currently supported.
More information coming (at least, the information not under NDA).
What is your favorite feature?
Any iOS administrator with a real deployment in operation can tell you this: Today's MDM solutions are only a fraction of the puzzle. In the real world, a complete solution is much more complicated.
Physical Device Management, specifically imaging and deployment, is the biggest pain point today. For iOS it is all manual work: iTunes, cables, mouse clicks, etc. Alternatives are desperately needed if today's pilots will scale.
Policy Management is a relatively mature space, as these things go. There are quite a few vendors, such as MobileIron, AirWatch, and Casper Suite. Although these vendors often bleed into other domains, they focus on policy management.
Application Management is a pretty sparse field. Companies such as Apperian and AppCentral allow for hosted enterprise app catalogs, but these are disconnected from other management services. MDM providers can offer private app catalogs as well, but these don't offer update services.
The big players today want to own the entire space, one-size-fits-all. They are thinking of what RIM did with BES. But this strategy ends up with a mobile environment without many options for the user. And like it or not, user choice is one of the foundations of the iOS platform. (Think of the App Store with nearly 400,000 apps.)
Instead, I believe we would be better off with a small set of standards that encourage independence and interoperability. Let each company make its choice for file or app or policy management. Encourage innovation and differentiation.
And how does this look?
Automatic Provisioning: I think many of us share the same dream: A newly provisioned device should automatically install certificates, policies, apps, configurations and documents appropriate for that user. Wouldn't that be nice? I don't think it would even be difficult, technically. Apple would need to integrate MDM enrollment into device registration. (Easy for me to say, right?)
Pluggable App Policies: MDM systems are pretty good today for setting up device restrictions, imagine if they were able to reach into application configurations. This is already done for SSL VPNs, where a configuration profile can pass policies to Cisco, Juniper and F5 iOS VPN clients. mobilEcho has a similar model for centralized configuration through their own server. The only way to extend this to the huge number of apps is to create a standard way of plugging into MDM consoles. App developers could, if they wanted to be included, develop their own console plug-in to this spec. Their app would then query the OS for installed MDM profiles and then request an config from the MDM server.
Policy-based Access Controls: File management on iOS is today just way too leaky. Any app can implement "Open In..." with a single line of Objective-C. But "Open In" simply makes another copy somewhere else. This is a policy and version control nightmare. So how many copies of that P&L statement do you want around? Imagine if a consortium of app developers agreed on a standard for policy-based file management. A push is already on for such a standard. I look forward to hearing more about it.
Next week will be a big one for us: How will iOS 5, iCloud, and Lion change this landscape? Stay tuned.
Ryan Faas has an in Computerworld on what to expect from WWDC 2011.
He doesn't mention one thing to expect... drinks Wednesday night!. Join us at 7:30 PM on, at the Tunnel Top Bar, 601 Bush Street. This is sponsored by Group Logic (buying the drinks) and Tekserve (my employer) for the EiOS community.
I hope to see you there.
- Access file servers from iPad as easily as from your Windows or Mac laptop
- Secure (encrypt) the data at rest and data in motion
- Manage over the air (OTA) the configuration of mobilEcho
The mobilEcho Solution
- Server – software that runs on Windows to proxy the file access of the iPad apps based on existing Access Control Lists (ACLs)
- Protocol – designed specifically for mobile users with limited bandwidth, high performance expectations and to encrypt traffic at all times
- App – that provides Windows Explorer / Mac Finder like navigation of file servers, preview and open in encryption of all files and configuration data and
- Management – governs mobilEcho app behavior with configuration templates for each Active Directory (AD) User or Group
- Download and install the mobilEcho server software available from Group Logic
- Define configuration "Profiles" for AD Users and/or Groups that need file access
- Download to the iPad the mobilEcho app which is free from the App Store
- Configure mobilEcho over the air based on your Active Directory Group Membership
- Browse files and folders on the server
- Preview files and open in other apps for editing
- Save files created or edited on the iPad to the server
- Store files locally for offline use
- Enhance mobile user productivity
- Access existing files (content) on storage your organization controls and manages
- Avoid paying for redundant cloud storage
- Maintain security and governance of your organization's information
- Empower remote management of files on mobile devices
If you shoot me an E-mail I'll make sure to save one in your size.
See you there.
(This article originally appeared in the blog iOS4Business, by Mathieu Bernier.)
When you’re working on an iPhone/iPad deployment project you will always come to the point where your customer or yourself asks, "How can I secure remote access to my company?"
The first answer that comes to mind is "Configure a VPN tunnel." But an underestimated way to secure the access to your internal assets is through the use of Access Point Names, or APNs.
What is an APN?
APNs are gateways typically hosted by your mobile phone carrier, allowing your mobile to browse Internet using the mobile network. In general, APNs are shared between users and you don’t even know that your phone uses this gateway to access Internet. But if you’re a big company and you prefer to have your own private APN hosted by your carrier, you can rent one for all your devices.
The big advantage is that when you use a private APN, the VPN tunnel is configured between the APN gateway and your VPN gateway. That takes away the battery problem you can encounter with traditionnal VPN deployments.
That’s the basic configuration offered by your provider. Usualy you can deploy more secured and scalable architecture, with redundancy, MPLS links if you have one etc… These APNs are usualy RADIUS compatible so you can, on your side, restrict access to your network only to devices registered in your fleet.
There are three main disadvantages using APN :
- First, the price. The rent is starting around 900 euros/month in France for a no-failover, simple configuration.
- You need to rent an APN in each country where you want to deploy your fleet.
- All your 3G data traffic is going to be redirected on your own network, in and out, so you need to make sure that your infrastructure can support this traffic growth.
(This article originally appeared in the blog iOS4Business, by Mathieu Bernier.)
VPN On-Demand is the Holy Grail, for Apple. When you ask an Apple representative for a VPN solution, what you get in return is: VPN On-Demand. So, let’s discover what’s behind that door with a short procedure using iPhone Configuration Utility.
(I won’t cover the configuration of the VPN gateway in this article. You need to make sure that your VPN gateway is properly configured to accept Certificates authenticated connections.)
I. The Concept
The first thing you need to know about VPN On-Demand (VPoD) is : it’s a very simple concept.
- It allows administrators to define a Hosts Domain realm behind which all hosts must be accessed via a VPN connection.
- Whenever an application try to access one of the server behind that realm, the iOS device automaticaly starts the VPN tunnel.
That’s VPN "On-Demand".
In order to make VPN On-Demand work properly, you need :
- A compatible VPN gateway (Cisco, or any Cisco IPSec compatible third-party gateway, F5 SSL, JunOS Pulse etc …)
- An enterprise Certificate Authority
- The Authority CA Certificate
- A personnal certificate delivered by the Certificates Authority
The first thing you need to do is to import the CA Certificate and your personal Certificate in the iOS configuration profile.
It’s fairly easy to do that.
- Open the iPhone Configuration Utility on your desktop
- Go to "Certificates"
- Click on "Configure"
- You need to get your personal Certificate and (if you use a company-wide Certificate Authority) the CA Certificate of your authority. First, import your personal certificate. Enter the password of your choice (remember it !) and click OK.
- Do the same for the CA Certificate. It should not ask you for a password this time.
- Now you have imported both certificates in your profile.
IV. "On-Demand" Configuration
A few settings are required to configure the VPN On-Demand in the profile.
- Go to VPN
- Enter the VPN gateway and authentication settings values.
- Choose _Certificate_ as the authentication method for the device. Then select your personal certificate you imported earlier.
- Enable _VPN On-Demand_ option and add a new realm in the list
Screen shot 2011-05-23 at 6.31.06 AM.png
In this example we created a realm "*.intranet.mycompany.com" with an action set to "Always establish". So now, any application trying to access a server behind "intranet.mycompany.com" will automaticaly setup a VPN tunnel to access it.
Upload the profile to your device, and then you are ready.
Simple as it looks like.
About This Site
- Comparison of MDM Providers (614,785)
- Complete List of iOS User-Agent Strings (251,921)
- How to get remote viewing/control of the IPAD screen via internet or preferably 3G? (166,268)
- Apple Configurator vs. MDM (120,253)
- Mobile Device Management (80,427)
- Apple Profile Manager (69,237)
- AirWatch (65,118)
- Gartner Magic Quadrant for MDM (2014, 2012, 2011) (64,384)
- Batch Apple ID Creator (63,119)
- iOS Devices (58,340)
Comparison of MDM Providers
Story comment by ammararajpoot 4 hours ago
Forum topic comment by aroobarajpoot 6 hours ago
Forum topic comment by usher.br 1 day ago
Forum topic comment by Juhis 1 day ago
Mobile Management Provider changed by bugfrisch 1 day ago
Story added by Aaron Freimark 3 days ago
Story added by Aaron Freimark 3 days ago
Forum topic comment by swkim 3 days ago
Forum topic comment by usher.br 3 days ago
Forum topic comment by peterjli 3 days ago
Forum topic added by Chrisp55 3 days ago
Forum topic comment by jesselvella 3 days ago
Forum topic comment by andycidau 3 days ago
Forum topic added by shopper150 1 week ago
Mobile Management Provider changed by Rene 1 week ago
Forum topic added by Weeksy 1 week ago
Forum topic comment by jbourdon 1 week ago