As before, this is an app-level wipe, not a device wipe. We’ve also made improvements to how quickly admin-led remote wipes are executed-they now happen within seconds. Outlook for Android enforces passwords including length and complexity requirements, storage encryption and will monitor screen-unlock attempts to prevent un-authorized access. Outlook will guide users through this process with a step-by-step walkthrough.ĭevices that do not support these security settings will not be able to connect to an account. It will also encourage storage encryption if it is not enabled. Further, Google provides controls that allow Outlook to honor additional Office 365 and Exchange policies regarding password length and complexity requirements and the number of allowable screen-unlock attempts before wiping the phone. On Android devices, Outlook will enforce screen lock rules. Outlook for iOS enforces simple passcode. Therefore, iOS devices will be encrypted whether the Office 365 or Exchange policy requires this or not. These devices are shipped with built-in encryption, which Outlook uses once the passcode is enabled to encrypt all the data Outlook stores locally on the device. Outlook for iOS only runs on iOS 8.0 or later. Until the passcode is setup, the user will be unable to access Outlook. In the event a passcode is not set, it will prompt users to set one up in iOS settings. On iOS devices, Outlook will check to make sure a passcode is properly set. How this works on iOS and Android devices varies slightly, based on the available controls provided by Apple and Google. If your company email policy requires that devices have a password in order to sync mail, Outlook will enforce this at the device level. Outlook now implements password enforcement using Exchange ActiveSync. While our first release focused on bringing a great end-user experience to market, we are also well underway building the IT controls that our business customers require. Today, we are happy to share some of the features we’ve added over the past two weeks. We promised to deliver updates to Outlook every few weeks and we’ve been listening closely to your feedback. We’ve heard from many of you that enjoy how Outlook brings together the core tools you need to get things done-your email, calendar, contacts and files-helping you get more done even on the smallest screen. There are lot of old post´s out there.Just over two weeks ago, we delivered the first version of Outlook for iOS and Android devices. In order to avoid the error, the "Identifier"/bundleId key/value pair has to be wrapped in a dictionary, itself the value of a key named "App". I figured it out! I'm either misreading it or Apple left out a little detail in their configuration profile reference. Sep 24 17:51:57 Test-iPad mc_mobile_tunnel : (Error) MC: Failed to parse profile data. US Sugg: The payload “Test Profile” is invalid. US Desc: The profile “Test Profile” is invalid. Sugg : The payload “Test Profile” is invalid. ![]() Signed by : Apple Configurator (58:55:CA:F7:24:B9)ĭesc : The profile “Test Profile” is invalid. Sep 24 17:51:57 Test-iPad mc_mobile_tunnel : (Error) MC: Profile MCConfigurationProfile 0x1f526100, version 1: ![]() US Desc: The payload “Test Profile” is invalid. Error: NSError:ĭesc : The payload “Test Profile” is invalid. Sep 24 17:51:57 Test-iPad mc_mobile_tunnel : (Error) MC: Cannot create profile of type “”. Please file a bug requesting that these keys be added: Sep 24 17:51:56 Test-iPad installd : 0x2ff9f000 filter_attributes: ist keys requested via MobileInstallationLookup/Browse in client Apple Configurator (via mobile_installation_proxy) were not found in MobileInstallation's cache. The console output in Xcode shows the following: Sep 24 17:51:56 Test-iPad mc_mobile_tunnel : (Note ) MDM: Attempting to perform Supervised request: ProfileList When I try to add the config profile to the iPad (whether through a Safari link, MDM, or Apple Configurator), it rejects it. Essentially, you just set the PayloadType as '' and add a property called 'Identifier' which is set to the value of your application's bundle ID. I followed the recently-updated configuration profile document. You then add a special entry to a configuration profile called "App Lock". In order to use this, the device first has to be setup as a "Supervised" device using Apple Configurator. Great for using iPads in retail/restaurants/etc. Apple provides a "kiosk mode" for their iPads as part of iOS6 which locks the device into one application (even boots directly into the app too).
0 Comments
Leave a Reply. |