You are previewing Enterprise iPhone and iPad Administrator's Guide.
O'Reilly logo
Enterprise iPhone and iPad Administrator's Guide

Book Description

Are you an IT professional involved in deploying the iPhone and or iPad in your company or organization? Do you have fellow employees who are eager to use their iPhones and iPads for work? Then this is the book for you. Enterprise iPhone and iPad Administrator's Guide provides step-by-step instructions on how to deploy and integrate the iPhone within a range of professional environments—from large businesses and educational institutions to medium-sized offices. This book ensures that the process is achieved in a streamlined, efficient, and cost-effective manner.

The guide begins with an introduction to basic deployment concerns, then moves into actual methods and tools that you can use to streamline the deployment process. Next, an in-depth discussion of configuration and provisional profiles helps you deliver solid device setup, security, and adherence to organization policies. Finally, you'll learn how to use existing help desk teams to provide effective user support. Also included is coverage of the latest iPhone- and iPad-specific enterprise technologies (such as push notification and calendaring tools) as well as internal iPhone and iPad applications and web-based solutions for businesses.

Table of Contents

  1. Copyright
  2. About the Authors
  3. About the Technical Reviewer
  4. Acknowledgments
  5. Introduction
  6. 1. The Inevitability of the iPhone in the Enterprise
    1. 1.1. Three Devices, One Platform
    2. 1.2. Welcoming Change While Protecting the Enterprise
      1. 1.2.1. Sandbox
      2. 1.2.2. Long-Term Implications
    3. 1.3. Mobile Integration Strategies
    4. 1.4. The Paradigm Shift
      1. 1.4.1. Impact to Infrastructure
      2. 1.4.2. Integration with the Enterprise
    5. 1.5. Summary
  7. 2. Purchasing and Activating
    1. 2.1. Making Large-Purchase Considerations
    2. 2.2. Preparing the Pilot
    3. 2.3. Purchasing Applications
      1. 2.3.1. Understanding the License Agreement
      2. 2.3.2. Purchasing in Bulk
    4. 2.4. Managing Activations
      1. 2.4.1. Using StoreActivationMode
      2. 2.4.2. Using StoreGeniusMode
    5. 2.5. Activating Devices
      1. 2.5.1. Getting Started
      2. 2.5.2. Synchronizing for the First Time
      3. 2.5.3. Choosing Synchronization Options
    6. 2.6. Developing Organizational Policies
    7. 2.7. Using the App Store
    8. 2.8. Managing iTunes
    9. 2.9. Registering Devices
    10. 2.10. Backing Up and Restoring Devices
    11. 2.11. Placing Devices Back into Production
    12. 2.12. Upgrading the Software
    13. 2.13. Summary
  8. 3. Applying Basic Configurations to Mobile Devices
    1. 3.1. Getting Familiar with iOS 4
    2. 3.2. Setting Wireless Network Connections
      1. 3.2.1. Configuring Wireless Network Settings
      2. 3.2.2. Joining a Wireless Network
    3. 3.3. Leveraging the Mobile Web Browser
      1. 3.3.1. Configuring the Browser (Mobile Safari)
      2. 3.3.2. Navigating Through the Browser Environment
    4. 3.4. Installing SSL Certificates
    5. 3.5. Setting up E-Mail Accounts
      1. 3.5.1. Leveraging the Cloud
      2. 3.5.2. Using IMAP, POP, and SMTP
    6. 3.6. Securing the Device
      1. 3.6.1. Restricting Access to Applications
      2. 3.6.2. Authenticating with Passcodes
    7. 3.7. Maintaining Devices
      1. 3.7.1. Performing Basic Startup Maintenance
      2. 3.7.2. Verifying Network Connectivity
      3. 3.7.3. Obtaining Updates
      4. 3.7.4. Leveraging the Logs
      5. 3.7.5. Performing Backup and Restoration
      6. 3.7.6. Bypassing the Passcode
    8. 3.8. Summary
  9. 4. Integrating with Groupware
    1. 4.1. Integrating with Microsoft Exchange Servers
      1. 4.1.1. Ensuring a Proper Exchange Environment
        1. 4.1.1.1. Using Exchange Server Remote Connectivity Analyzer
        2. 4.1.1.2. Looking at Paths in Exchange
        3. 4.1.1.3. Troubleshooting Exchange 2007 and 2010 Virtual Directories
      2. 4.1.2. Configuring iOS for ActiveSync
      3. 4.1.3. Using Exchange to Manage Policies
      4. 4.1.4. Managing Policies from PowerShell
      5. 4.1.5. Using Remote Wipe
    2. 4.2. Using Alternative Groupware Solutions
      1. 4.2.1. MobileMe
    3. 4.3. Leveraging the Cloud
    4. 4.4. Summary
  10. 5. Working with Documents and Files
    1. 5.1. Sharing Files Using iTunes
    2. 5.2. Building a File Sharing Environment
      1. 5.2.1. Selecting Your Service
      2. 5.2.2. AFP
        1. 5.2.2.1. Configuring AFP
        2. 5.2.2.2. Defining AFP Authentication
        3. 5.2.2.3. Setting Limits
        4. 5.2.2.4. Managing Idle User Handling
      3. 5.2.3. Setting up Share Points
    3. 5.3. Accessing Servers With Third-Party Software
      1. 5.3.1. EZSharePro
      2. 5.3.2. NetPortal and NetPortal Lite
      3. 5.3.3. FileBrowser
      4. 5.3.4. Using iWork
    4. 5.4. Leveraging Public Clouds
      1. 5.4.1. MobileMe
        1. 5.4.1.1. Configuring the Desktop
        2. 5.4.1.2. Connecting to the iDisk
      2. 5.4.2. Google Docs
      3. 5.4.3. Box.net
      4. 5.4.4. SharePoint
    5. 5.5. Summary
  11. 6. Remote Access for iOS
    1. 6.1. Introducing Mac OS X Server Services
    2. 6.2. Configuring the VPN Client
      1. 6.2.1. L2TP
      2. 6.2.2. PPTP
      3. 6.2.3. Using the Cisco VPN Client
      4. 6.2.4. Assigning a Proxy to a VPN Connection
    3. 6.3. Providing VPN Services
      1. 6.3.1. Setting Up a PPTP Server
      2. 6.3.2. Setting Up an L2TP Server
    4. 6.4. Installing Mobile Access and Push Notification
    5. 6.5. Setting Up Mobile Access
      1. 6.5.1. Planning Design Considerations
      2. 6.5.2. Configuring Mobile Access
        1. 6.5.2.1. Configuring the Address Book Proxy
        2. 6.5.2.2. Configuring the iCal Proxy
        3. 6.5.2.3. Configuring the Mail Proxy
        4. 6.5.2.4. Configuring Web Proxy Entries
      3. 6.5.3. Starting the Service and Checking the Status
      4. 6.5.4. Controlling Access
      5. 6.5.5. Connecting Clients
    6. 6.6. Setting Up Push Notification for the iPhone
    7. 6.7. Using the Command Line to Manage Mobile Access and Push Notification
    8. 6.8. Summary
  12. 7. Developing In-House Applications
    1. 7.1. Don't Develop If You Don't Have To
      1. 7.1.1. Additional Plug-ins
    2. 7.2. Understanding iPhone Developer Programs
      1. 7.2.1. The iPhone Developer Program
      2. 7.2.2. The iPhone Enterprise Developer Program
      3. 7.2.3. The iPhone Developer University Program
      4. 7.2.4. Getting a Developer Account
    3. 7.3. Xcode
      1. 7.3.1. Installing the Developer Tools
    4. 7.4. Using a Template
    5. 7.5. Planning Custom Applications
      1. 7.5.1. Training
      2. 7.5.2. Outsourcing Application Development
    6. 7.6. Distributing Custom Applications
    7. 7.7. Accessing Enterprise Databases with the iPhone
    8. 7.8. Additional Resources
    9. 7.9. Summary
  13. 8. Building Configuration Profiles
    1. 8.1. Setting Up the Tool
    2. 8.2. Building Configurations
      1. 8.2.1. General Tab
      2. 8.2.2. Passcode Tab
      3. 8.2.3. Restrictions Tab
      4. 8.2.4. Wi-Fi Tab
        1. 8.2.4.1. Hidden Network
        2. 8.2.4.2. Protocols
        3. 8.2.4.3. Authentication
        4. 8.2.4.4. Trust
      5. 8.2.5. VPN Tab
      6. 8.2.6. E-mail Tab
      7. 8.2.7. Exchange Tab
      8. 8.2.8. LDAP Tab
      9. 8.2.9. CalDAV Tab
      10. 8.2.10. Subscribed Calendars Tab
      11. 8.2.11. Web Clips Tab
      12. 8.2.12. Credentials Tab
      13. 8.2.13. The SCEP Tab
    3. 8.3. Deploying Configurations Using the iPhone Configuration Utility
      1. 8.3.1. Importing and Exporting Profiles
    4. 8.4. Summary
  14. 9. Mass-Deploying Devices
    1. 9.1. Deployment Terminology
    2. 9.2. Building Profiles from Scripts
      1. 9.2.1. Creating Devices
      2. 9.2.2. Creating Configuration Profiles
    3. 9.3. Apple's Sample Code
    4. 9.4. AirWatch
      1. 9.4.1. Managing Objects in the Portal
        1. 9.4.1.1. Setting Up Administrative Users
        2. 9.4.1.2. Configuring LDAP and SCEP
      2. 9.4.2. Creating a Profile
      3. 9.4.3. Enrolling a Device
    5. 9.5. JAMF's Casper Suite
      1. 9.5.1. Configuring Global Settings
      2. 9.5.2. Creating Configuration Profiles
      3. 9.5.3. Enrolling Devices
      4. 9.5.4. Managing Devices
      5. 9.5.5. Adding Applications to the Catalog
      6. 9.5.6. Providing Self-Service
    6. 9.6. KACE Appliances
    7. 9.7. MobileIron
    8. 9.8. Sybase Afaria
    9. 9.9. TARMAC
    10. 9.10. Removing the Profiles
    11. 9.11. Summary
  15. 10. Leveraging Third-Party Solutions for Productivity
    1. 10.1. The App Store
    2. 10.2. Integrating GroupWise
    3. 10.3. Security Applications
      1. 10.3.1. RSA
      2. 10.3.2. Good for Enterprise
    4. 10.4. Managing Thin Clients
      1. 10.4.1. Citrix
      2. 10.4.2. Remote Desktop
      3. 10.4.3. VNC
    5. 10.5. Contact Management Options
    6. 10.6. Tools for Public Speakers
      1. 10.6.1. Keynote
      2. 10.6.2. Teleprompters
    7. 10.7. Bridging the Gap
      1. 10.7.1. NetFlix
      2. 10.7.2. Facebook
      3. 10.7.3. Twitter
      4. 10.7.4. LinkedIn
    8. 10.8. Becoming the Informed Traveler
    9. 10.9. Summary
  16. 11. Developing A Program For Support
    1. 11.1. What Is Supported?
    2. 11.2. Preparing Support Staff
      1. 11.2.1. Training Considerations
      2. 11.2.2. Training Materials
    3. 11.3. Supporting End Users
    4. 11.4. Considering the Help Desk
    5. 11.5. The iPhone Simulator
    6. 11.6. Using the Software Update Server for Patch Management
      1. 11.6.1. Installing the Software Update Service
      2. 11.6.2. Managing Your Software Update Server
        1. 11.6.2.1. Configuring Updates for Clients
        2. 11.6.2.2. Using Software Update
        3. 11.6.2.3. Using the softwareupdate Command to Install Software Updates
        4. 11.6.2.4. Working with the Repository
    7. 11.7. Using the Command Line to Manage Software Update Server
      1. 11.7.1. serveradmin
    8. 11.8. Multiple Software Update Servers
    9. 11.9. Implementing a Process to Manage Patches
    10. 11.10. Summary
  17. A. Acceptable Use Policy
    1. A.1. InfoSec Acceptable Use Policy
    2. A.2. 1.0 Overview
    3. A.3. 2.0 Purpose
    4. A.4. 3.0 Scope
    5. A.5. 4.0 Policy
      1. A.5.1. 4.1 General Use and Ownership
      2. A.5.2. 4.2 Security and Proprietary Information
      3. A.5.3. 4.3 Unacceptable Use
        1. A.5.3.1. System and Network Activities
        2. A.5.3.2. E-mail and Communications Activities
    6. A.6. 5.0 Enforcement
    7. A.7. 6.0 Definitions
      1. A.7.1. Term Definition
    8. A.8. 7.0 Revision History
  18. B. Using Mac OS X Server for Groupware
    1. B.1. iCal Server
      1. B.1.1. Setting Up iCal Server
      2. B.1.2. Managing Calendars
      3. B.1.3. Subscribing to Calendars
      4. B.1.4. Delegating Access
      5. B.1.5. Backing Up Calendars
      6. B.1.6. Clustering CalDAV
      7. B.1.7. Web and Wiki Integration
      8. B.1.8. Troubleshooting
    2. B.2. Address Book Server
      1. B.2.1. Setting up Address Book Server
      2. B.2.2. Backing up Address Books
    3. B.3. iChat Server
      1. B.3.1.
        1. B.3.1.1. Transcripts
    4. B.4. Mac OS X Mail Server
      1. B.4.1. Setting Up a Mail Server
      2. B.4.2. Configuring Mail with ServerAdmin
      3. B.4.3. Protecting the Mail Servers
        1. B.4.3.1. Mailing Lists
        2. B.4.3.2. Logging
        3. B.4.3.3. The Command Line
      4. B.4.4. Choosing Mailbox Locations
      5. B.4.5. The Dovecot Mailstore
      6. B.4.6. Setting Up Public folders
      7. B.4.7. Backing Up Mail
      8. B.4.8. Clustering Mail Services