CUSTOMER Access Control Guide
|
|
- Brooke Atkins
- 7 years ago
- Views:
Transcription
1 Mobile Secure Cloud Edition Document Version: CUSTOMER
2 Content 1 Access Control Access Control Remote Configuring Access Control Remote Default Access Control Policies Creating Access Control Policies for Android Devices Creating Access Control Policies for ios Devices Creating Access Control Policies for Windows Mobile Devices Creating Access Control Policies for Windows Phone Devices Creating Access Control Policies for Unknown Devices Creating Access Control Policies for Domains Primary and Accepted Domains Creating Access Control Policies for Groups Access Control Device List Viewing Access Control Information for Devices Custom Access Control Policies Adding Android Devices to Access Control Adding ios Devices to Access Control Adding Windows Mobile Devices to Access Control Adding Windows Phone Devices to Access Control Editing Custom Access Control Policies Exchange Environment Unique Device ID Value Access Control Policy Conflict Resolution SAP SE or an SAP affiliate company. All rights reserved. Content
3 1 Access Control Access control regulates synchronization requests to servers. Access Control can prevent synchronization requests that do not meet the access control policies in SAP Mobile Secure. Access control policies include a list of known devices, their associated policies, any remediation actions, and any defined polices for unknown devices. In addition to synchronization requests from devices, Access Control Filter can regulate synchronization requests from desktop and Web clients. Access Control 2016 SAP SE or an SAP affiliate company. All rights reserved. 3
4 2 Access Control Remote Access control remote regulates synchronization requests to hosted servers. 2.1 Configuring Access Control Remote You can set up Access Control Remote for hosted with Office 365 or local using Microsoft Exchange PowerShell commandlets. Prerequisites Ensure that the Access Control Filter is not installed. The PowerShell virtual directory is created when you install Exchange. Enable the powershell remoting by enabling Basic Authentication on the virtual directory in IIS. Context You can configure access control to match devices against multiple domains in a single active directory forest on your network by using the "Global" setting in the Domain list. To configure this, define a separate profile for each MS Exchange Client Access Server (CAS) you want to include. If your is hosted externally, you are restricted to the "Local" setting. With the "Local" setting, access control can only match accounts in the same domain as the account you enter here. services are available locally, where a local Exchange server is used. services are also hosted by a third-party and are available to users from the Internet, without any servers or related Afaria components inside the enterprise network or DMZ. Afaria server communicates with Exchange for updating device status. Afaria uses the following API calls on the Exchange server: Get-ActiveSyncDevice Get-CASMailbox Set-CASMailbox For more information on these Microsoft Exchange server API calls, refer to Microsoft Exchange documentation. In addition to the API calls on the Exchange server, Afaria also issues some setup commands to initiate the remote PowerShell session with the Exchange server SAP SE or an SAP affiliate company. All rights reserved. Access Control Remote
5 1. Log in to the Afaria Administration console. 2. Navigate to the Server Configuration MS Exchange page. Note Devices with ISAPI account and Microsoft Exchange account cannot co-exist in a tenant as this configuration is not supported. Ensure that this page is empty if the tenant is supposed to be used for local exchange. 3. Click Add. 4. Enter the following information: List View Select Include to include the CAS profile in the list Remote Select Include to match devices against this CAS server for access control. MS Exchange CAS URL Enter the URL of the hosted or local Exchange CAS server. Domain Select "Global" if you intend to define multiple CAS servers on your network. If your is hosted externally, only the "Local" setting is available. Account User Enter the hosted or local Exchange Admin User ID. Create a user that is a member of the Exchange Organization Managers group so that the user will have minimum permission to execute PowerShell commands. Password Enter the hosted or local Exchange Admin password. Note Ensure that the Microsoft Exchange account credentials have Administrator privileges. 5. Click Test connection to authenticate the account credentials and test connectivity for the local Exchange or hosted accounts. If the account credentials are valid, you see a success message; otherwise, you see an error message. 6. Click Save. When Microsoft Exchange triggers blocking using access control, it may take as long as 10 minutes for Exchange to block messages. 7. Repeat steps 3 to 6 for each additional CAS server as required. Access Control Remote 2016 SAP SE or an SAP affiliate company. All rights reserved. 5
6 3 Default Access Control Policies Access control policies define the conditions that devices must meet to connect to messaging servers in an organization. Access control policies can apply to both known and unknown devices. Administrators should communicate access control policies to users to establish accurate expectations towards device synchronization and compliance. 3.1 Creating Access Control Policies for Android Devices You can create an access control policy in the Afaria Administration console to regulate synchronization requests from Android devices. Context To use access control to manage on an Android device, ensure the Exchange account is configured through SAP Mobile Secure. from unmanaged accounts is blocked by default. For Samsung devices with KNOX installed, provision the Exchange account through the Samsung KNOX Account configuration policy. For devices using NitroDesk TouchDown, use the NitroDesk Account configuration policy; for other devices, use the appropriate LG or Samsung SAFE Exchange account configuration policy. 1. On the Server page, click Configuration. 2. Click Component Access Control Option. 3. Click Access Policy Android. 4. Perform one of the following tasks: a. To allow synchronization requests, select Always allow. b. To block synchronization requests, select Always block. c. To allow synchronization requests when devices meet specific criteria, select Allow when. 5. If you select Allow when, perform at least one of the following tasks: a. To allow synchronization requests from devices that have the SAP Mobile Secure client installed and granted administrator privileges, select Afaria setting enabled. b. To allow synchronization requests from devices with a password policy, select Password Policy Enabled SAP SE or an SAP affiliate company. All rights reserved. Default Access Control Policies
7 c. To allow synchronization requests from devices that are not rooted, select Device uncompromised. d. To allow synchronization requests from devices that have connected within a period of time, select Device connected within and set the period of time. 6. Click Save. 3.2 Creating Access Control Policies for ios Devices You can create an access control policy in the Afaria Administration console to regulate synchronization requests from ios devices. Context Access control policies are prioritized in this order: group-level policy, device-level policy, server-level policy. 1. On the Server page, click Configuration. 2. Click Component Access Control Option. 3. Click Access Policy ios. 4. Perform one of the following tasks: a. To allow synchronization requests, select Always allow. b. To block synchronization requests, select Always block. c. To allow synchronization requests when devices meet specific criteria, select Allow when. 5. If you select Allow when, perform at least one of the following tasks: a. To allow synchronization requests from devices that are under SAP Mobile Secure MDM management, select Administered by mobile device management. b. To allow synchronization requests from devices that have the SAP Mobile Secure client installed and have connected within a period of time, select Afaria installed and device connected within and set the period of time. c. To allow synchronization requests from devices that have received policies within a period of time, select Assigned policy delivered within and set the period of time. d. To allow synchronization requests from devices that use hardware encryption, select Device hardware encrypted. e. To allow synchronization requests from devices that are not jailbroken, select Device uncompromised. 6. Click Save. Default Access Control Policies 2016 SAP SE or an SAP affiliate company. All rights reserved. 7
8 3.3 Creating Access Control Policies for Windows Mobile Devices You can create an access control policy in the Afaria Administration console to regulate synchronization requests from Windows Mobile devices. 1. On the Server page, click Configuration. 2. Click Component Access Control Option. 3. Click Access Policy Windows Mobile. 4. Perform one of the following tasks: a. To allow synchronization requests, select Always allow. b. To block synchronization requests, select Always block. c. To allow synchronization requests from devices that have connected within a period of time, select Allow when connected within time frame and set the period of time. 5. Click Save. 3.4 Creating Access Control Policies for Windows Phone Devices You can create an access control policy in the Afaria Administration console to regulate synchronization requests from Windows Phone devices. 1. On the Server page, click Configuration. 2. Click Component Access Control Option. 3. Click Access Policy Windows Phone. 4. Perform one of the following tasks: a. To allow synchronization requests, select Always allow. b. To block synchronization requests, select Always block. c. To allow synchronization requests when devices meet specific criteria, select Allow when. 5. If you select Allow when, perform at least one of the following tasks: a. To allow synchronization requests when devices are under SAP Mobile Secure MDM management, select Administered by mobile device management SAP SE or an SAP affiliate company. All rights reserved. Default Access Control Policies
9 b. To allow synchronization requests when devices have connected within a period of time, select Device connected within and set the period of time. 6. Click Save. 3.5 Creating Access Control Policies for Unknown Devices Define a default access control policy for a local to manage synchronization for devices that do not enroll in SAP Mobile Secure management. Context You are advised to define an unknown device policy for each domain managed by your server. Note For cloud implementation on the unknown devices the connection is rejected. 1. On the Home page Server tile, click Configuration to open the Server Configuration page. 2. Navigate to the Component Access Control Option page. 3. Click the Domains tab. 4. Click Add to define unknown device properties. 5. Enter the server's domain. 6. Select the default policy for that domain. 7. Define the interval at which the SAP Mobile Secure ISAPI filter's polling agent queries the SAP Mobile Secure server for a list of known devices and policies. 8. In the inline editor row, click the Check icon to save. Default Access Control Policies 2016 SAP SE or an SAP affiliate company. All rights reserved. 9
10 3.6 Creating Access Control Policies for Domains You can create an access control policy in the Afaria Administration console to regulate synchronization requests to specific domains. Context Access control policies for domains can regulate synchronization requests from devices that are unknown to SAP Mobile Secure. 1. On the Server page, click Configuration. 2. Click Component Access Control Option. 3. Click Domains. 4. Click Add. 5. In the Primary Domain tab, type the domain. 6. In the Access Control Policy list, select how SAP Mobile Secure responds to synchronization requests to the domain. 7. In the Retry Rate field, select the interval that SAP Mobile Secure enforces between synchronization requests. 8. In the Accepted Domains, specify the subdomains that the primary domain includes. 9. Click Save Primary and Accepted Domains This section discusses couple of primary domain and accepted domains scenarios. Scenario 1: CAS 1 on one network domain and CAS 2 and CAS 3 are on a different network domain CAS A runs on domain domaina.com, services domains A.com, AA.com, and AAA.com. CAS B runs on domain domainb.com, services domains B.com, BB.com, and BBB.com. CAS C runs on domain domainb.com, services domains C.com, CC.com, and CCC.com SAP SE or an SAP affiliate company. All rights reserved. Default Access Control Policies
11 A primary domain maps to the network domain on which the server resides. The accepted domain list includes all supported domains. Therefore, this scenario has two primary domains on the Server Configuration Access Control Option page: One primary domain for domaina.com with accepted domains A.com, AA.com, and AAA.com. One primary domain for domainb.com with accepted domains B.com, BB.com, BBB.com, C.com, CC.com, and CCC.com. Scenario 2: CAS 1, CAS 2, and CAS 3 on different network domains CAS A runs on domain domaina.com, services domains A.com, AA.com, and AAA.com. CAS B runs on domain domainb.com, services domains B.com, BB.com, and BBB.com. CAS C runs on domain domainc.com, services domains C.com, CC.com, and CCC.com. A primary domain maps to the network domain on which the server resides. The accepted domain list includes all supported domains. Therefore, this scenario has three primary domains on the Server Configuration Access Control Option page: One primary domain for domaina.com with accepted domains A.com, AA.com, and AAA.com. One primary domain for domainb.com with accepted domains B.com, BB.com, and BBB.com. One primary domain for domainc.com with accepted domains C.com, CC.com, and CCC.com. 3.7 Creating Access Control Policies for Groups You can create an access control policy in the Afaria Administration console to regulate synchronization requests from groups. Context Blocking and allowing by groups can let you block devices that do not meet some criteria, or allow devices that meet some criteria. You define dynamic group with your criteria to use with this feature. The frequency of the Dynamic Group Refresh schedule, access control polling interval, and device inventory reporting all affect when a group policy goes into effect on a device. 1. On the Server page, click Configuration. Default Access Control Policies 2016 SAP SE or an SAP affiliate company. All rights reserved. 11
12 2. Click Component Access Control Option. 3. Click Groups. 4. To block synchronization requests from groups, perform the following tasks in the Block selected groups section: a. In the Available Groups list, select a group. b. Click the arrow to add the group to the Selected Groups list. 5. To only allow synchronization requests from selected groups, perform the following tasks in the Only allow selected Groups section: a. Select Enable. b. In the Available groups list, select a group. c. Click the arrow to add the group to the Selected Groups list. 6. Click Save. 3.8 Access Control Device List SAP Mobile Secure displays access control devices and policy assignments in different locations of the Afaria Administration console, depending upon the device type. Assignment locations include: Android, Windows Mobile, and Windows Phone Access Control Option Devices page tab. On the Devices tab, the device list shows devices and white list devices that are access control devices. The SAP Mobile Secure server populates this list with devices after it assigns a synchronization policy to a connecting device. White list devices populate the list as you add them. Therefore, the list starts empty and grows as each device connects and receives its synchronization policy assignment, and as you manually add devices. Note When an Android device does not contain a known ActiveSync ID or an Exchange User ID, Access Control ID displays the value NOT_EXCHANGE followed by the client GUID. ios Device List page SAP SE or an SAP affiliate company. All rights reserved. Default Access Control Policies
13 3.9 Viewing Access Control Information for Devices You can view access control information for devices in the Afaria Administration console. 1. On the Devices page, select a device. 2. Click the Show/Hide Inspector icon. The Device Inspector displays the following information about access control: Access control policy that is applicable to the device Current access policy state for the device: allowed or blocked Device compliance state: Whether the device is compliant or not Last remediation timestamp for the device Default Access Control Policies 2016 SAP SE or an SAP affiliate company. All rights reserved. 13
14 4 Custom Access Control Policies 4.1 Adding Android Devices to Access Control You can add Android devices that are not enrolled in SAP Mobile Secure to access control in the Afaria Administration console. Context You should add devices when: Devices synchronize with your server but are not managed by SAP Mobile Secure. Devices will connect to the server in the future and you want to make sure that the default access control policy does not prevent synchronization requests. 1. On the Server page, click Configuration. 2. Click Component Access Control Option. 3. Click the Devices tab. 4. Click Add. 5. In the Device field, type the Exchange environment unique device identifier of the device. 6. In the User Name field, type the Exchange user name. 7. In the Domain, type the Exchange domain. 8. In the OS list, select Android. 9. In the Access control policy list, perform one of the following tasks: a. To allow synchronization requests, select Always allow. b. To block synchronization requests, select Always block. c. To allow synchronization requests when devices meet specific criteria, select Allow when. 10. If you select Allow when, perform at least one of following tasks: a. To allow synchronization requests from devices that have the SAP Mobile Secure client installed and granted administrator privileges, select Afaria setting enabled. b. To allow synchronization requests from devices with a password policy, select Password Policy Enabled SAP SE or an SAP affiliate company. All rights reserved. Custom Access Control Policies
15 c. To allow synchronization requests from devices that are not rooted, select Device uncompromised. d. To allow synchronization requests from devices that have connected within a period of time, select Device connected within and set the period of time. 11. Click Save. 4.2 Adding ios Devices to Access Control You can edit the access control policies for ios devices in the Afaria Administration console. 1. On the Device page, select a device. 2. Click Edit. 3. In the Access Control Policy field, click Setup. 4. Perform one of the following tasks: a. To apply the default access control policy to the device, select Use default policy. b. To create a custom access control policy for the device, select Use explicit policy. 5. In you select Use explicit policy, perform one of the following tasks: a. To allow synchronization requests, select Always allow. b. To block synchronization requests, select Always block. c. To allow synchronization requests when devices meet specific criteria, select Allow when. 6. If you select Allow when, perform at least one of following tasks: a. To allow synchronization requests from devices that are under SAP Mobile Secure MDM management, select Administered by mobile device management. b. To allow synchronization requests from devices that have the SAP Mobile Secure client installed, select Afaria installed. c. To allow synchronization requests from devices that have received policies, select Assigned policy delivered. d. To allow synchronization requests from devices that use hardware encryption, select Device hardware encrypted. e. To allow synchronization requests from devices that are not jailbroken, select Device uncompromised. 7. Click Ok. 8. Click Save. Custom Access Control Policies 2016 SAP SE or an SAP affiliate company. All rights reserved. 15
16 4.3 Adding Windows Mobile Devices to Access Control You can add Windows Mobile devices that are not enrolled in SAP Mobile Secure to access control in the Afaria Administration console. Context You should add devices when: Devices synchronize with your server but are not managed by SAP Mobile Secure. Devices will connect to the server in the future and you want to make sure that the default access control policy does not prevent synchronization requests. 1. On the Server page, click Configuration. 2. Click Component Access Control Option. 3. Click the Devices tab. 4. Click Add. 5. In the Device field, type the Exchange environment unique device identifier of the device. 6. In the User Name field, type the Exchange user name. 7. In the Domain, type the Exchange domain. 8. In the OS list, select Windows Mobile. 9. In the Access control policy list, perform one of the following task: a. To allow synchronization requests, select Always allow. b. To block synchronization requests, select Always block. c. To allow synchronization requests from devices that have connected within a period of time, select Allow when connected within time frame. 10. Click Save SAP SE or an SAP affiliate company. All rights reserved. Custom Access Control Policies
17 4.4 Adding Windows Phone Devices to Access Control You can add Windows Phone devices that are not enrolled in SAP Mobile Secure to access control in the Afaria Administration console. Context You should add devices when: Devices synchronize with your server but are not managed by SAP Mobile Secure. Devices will connect to the server in the future and you want to make sure that the default access control policy does not prevent synchronization requests. 1. On the Server page, click Configuration. 2. Click Component Access Control Option. 3. Click the Devices tab. 4. Click Add. 5. In the Device field, type the Exchange environment unique device identifier of the device. 6. In the User Name field, type the Exchange user name. 7. In the Domain, type the Exchange domain. 8. In the OS list, select Android. 9. In the Access control policy list, perform one of the following task: a. To allow synchronization requests, select Always allow. b. To block synchronization requests, select Always block. c. To allow synchronization requests when devices meet specific criteria, select Allow when. 10. If you select Allow when, perform at least one of the following task: a. To allow synchronization requests from devices that have connected within a period of time, select Device connected within time frame. b. To allow synchronization requests from devices with a password policy, select Password policy enabled. 11. Click Save. Custom Access Control Policies 2016 SAP SE or an SAP affiliate company. All rights reserved. 17
18 4.5 Editing Custom Access Control Policies You can edit access control policies. 1. On the Server page, click Configuration. 2. Click Component Access Control Option. 3. Click Devices. 4. Select one or more devices on the managed device list. 5. Click Edit. 6. Select new policy and click the Save icon. 4.6 Exchange Environment Unique Device ID Value For access control in a Microsoft Exchange environment, the unique device ID value is the DeviceID value stored in the device registry. You can obtain the value from a device if it has already connected to the Exchange server. SAP Mobile Secure cannot retrieve the value if the SAP Mobile Secure client is not installed on the device. You can use your own method to retrieve the value or: Use a device utility to read the value. Use your Exchange Server ActiveSync Web Administration tool to run a query that retrieves the value. Choose the Remote Device Wipe menu option and query for the user of interest. The query returns information about the devices associated with the user. Copy the value from the Device ID column and exit the page without initiating any further action SAP SE or an SAP affiliate company. All rights reserved. Custom Access Control Policies
19 5 Access Control Policy Conflict Resolution When a device is subject to more than one access control policy, the most restrictive policy takes precedence. Example For example, if an Android device is subject to a default policy for Android that allows access, and a group policy that blocks access, then the device is blocked from synchronizing with the server. Access Control Policy Conflict Resolution 2016 SAP SE or an SAP affiliate company. All rights reserved. 19
20 Important Disclaimers and Legal Information Coding Samples Any software coding and/or code lines / strings ("Code") included in this documentation are only examples and are not intended to be used in a productive system environment. The Code is only intended to better explain and visualize the syntax and phrasing rules of certain coding. SAP does not warrant the correctness and completeness of the Code given herein, and SAP shall not be liable for errors or damages caused by the usage of the Code, unless damages were caused by SAP intentionally or by SAP's gross negligence. Accessibility The information contained in the SAP documentation represents SAP's current view of accessibility criteria as of the date of publication; it is in no way intended to be a binding guideline on how to ensure accessibility of software products. SAP in particular disclaims any liability in relation to this document. This disclaimer, however, does not apply in cases of wilful misconduct or gross negligence of SAP. Furthermore, this document does not result in any direct or indirect contractual obligations of SAP. Gender-Neutral Language As far as possible, SAP documentation is gender neutral. Depending on the context, the reader is addressed directly with "you", or a gender-neutral noun (such as "sales person" or "working days") is used. If when referring to members of both sexes, however, the third-person singular cannot be avoided or a gender-neutral noun does not exist, SAP reserves the right to use the masculine form of the noun and pronoun. This is to ensure that the documentation remains comprehensible. Internet Hyperlinks The SAP documentation may contain hyperlinks to the Internet. These hyperlinks are intended to serve as a hint about where to find related information. SAP does not warrant the availability and correctness of this related information or the ability of this information to serve a particular purpose. SAP shall not be liable for any damages caused by the use of related information unless damages have been caused by SAP's gross negligence or willful misconduct. All links are categorized for transparency (see: SAP SE or an SAP affiliate company. All rights reserved. Important Disclaimers and Legal Information
21 Important Disclaimers and Legal Information 2016 SAP SE or an SAP affiliate company. All rights reserved. 21
22 go.sap.com/registration/ contact.html 2016 SAP SE or an SAP affiliate company. All rights reserved. No part of this publication may be reproduced or transmitted in any form or for any purpose without the express permission of SAP SE or an SAP affiliate company. The information contained herein may be changed without prior notice. Some software products marketed by SAP SE and its distributors contain proprietary software components of other software vendors. National product specifications may vary. These materials are provided by SAP SE or an SAP affiliate company for informational purposes only, without representation or warranty of any kind, and SAP or its affiliated companies shall not be liable for errors or omissions with respect to the materials. The only warranties for SAP or SAP affiliate company products and services are those that are set forth in the express warranty statements accompanying such products and services, if any. Nothing herein should be construed as constituting an additional warranty. SAP and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP SE (or an SAP affiliate company) in Germany and other countries. All other product and service names mentioned are the trademarks of their respective companies. Please see index.epx for additional trademark information and notices.
Afaria Document Version: 1-2014-03-24. How to Install and Configure Access Control for E-mail
Afaria Document Version: 1-2014-03-24 How to Install and Configure Access Control for E-mail Table of Contents 1 Introduction.... 3 1.1 Access Control Overview....3 1.2 Access Control Requirements....
More informationCUSTOMER SAP Afaria Windows Phone and Windows 8.1 Enrollment
SAP Afaria Document Version: 7 SP05-2014-09-03 CUSTOMER SAP Afaria Windows Phone and Windows 8.1 Enrollment Table of Contents 1 Windows 8.1 Device Enrollment....3 1.1 Enrolling a Windows 8.1 Device Using
More informationSAP BusinessObjects Analysis, edition for Microsoft Office Document Version: 2.3 2016-06-16. What's New Guide
SAP BusinessObjects Analysis, edition for Microsoft Office Document Version: 2.3 2016-06-16 Content 1 About this guide....3 2 About the documentation set....4 3 Administration.... 6 3.1 New and changed
More informationPUBLIC Supplement for J.D. Edwards
SAP Data Services Document Version: 4.2 Support Package 7 (14.2.7.0) 2016-05-06 PUBLIC Content 1 Overview....3 2 System requirements....4 2.1 World....4 2.2 OneWorld....4 3 Datastores.... 6 3.1 Defining
More informationSuccessFactors HCM Suite November 2014 Release Version: 1.0 - December 5, 2014. SuccessFactors Learning Programs Administration Guide
SuccessFactors HCM Suite November 2014 Release Version: 1.0 - December 5, 2014 Programs Administration Guide Content 1 Change History....3 2 Programs.... 4 2.1 Adding a New Program.... 5 2.2 Assigning
More informationRelease Document Version: 1.4 SP8-2014-07-31. What's New Guide: SAP BusinessObjects Analysis, edition for Microsoft Office
Release Document Version: 1.4 SP8-2014-07-31 What's New Guide: SAP BusinessObjects Analysis, edition for Microsoft Office Table of Contents 1 About this guide....3 2 About the documentation set....4 3
More information2015-09-24. SAP Operational Process Intelligence Security Guide
2015-09-24 SAP Operational Process Intelligence Security Guide Content 1 Introduction.... 3 2 Before You Start....5 3 Architectural Overview.... 7 4 Authorizations and Roles.... 8 4.1 Assigning Roles to
More informationSuccessFactors HCM Suite August 2014 Release Document Version: 1.0 - August 22, 2014. SuccessFactors Learning Programs Administration Guide
SuccessFactors HCM Suite August 2014 Release Document Version: 1.0 - August 22, 2014 Programs Administration Guide Table of Contents 1 Change History....3 2 Programs.... 4 2.1 Adding a New Program....
More informationMobile Secure Cloud Edition Document Version: 2.0-2014-06-26. ios Application Signing
Mobile Secure Cloud Edition Document Version: 2.0-2014-06-26 Table of Contents 1 Introduction.... 3 2 Apple Team Membership....4 3 Building a Team by Adding Team Admins and Team Members.... 5 4 App Protection
More informationCUSTOMER Presentation of SAP Predictive Analytics
SAP Predictive Analytics 2.0 2015-02-09 CUSTOMER Presentation of SAP Predictive Analytics Content 1 SAP Predictive Analytics Overview....3 2 Deployment Configurations....4 3 SAP Predictive Analytics Desktop
More informationSAP HANA Client Installation and Update Guide
PUBLIC SAP HANA Platform SPS 12 Document Version: 1.0 2016-05-11 Content 1 Introduction....3 1.1 Supported Platforms.... 3 1.2 Software Download.... 4 2 SAP HANA Client on UNIX or Linux....7 2.1 Planning
More informationWhat's New in SAP HANA Spatial (Release Notes)
PUBLIC SAP HANA Platform Document Version: 4.0 2016-05-11 Content 1 What's New in SAP HANA Spatial....3 2 SAP HANA Spatial SPS 12, Features Included in Revision 120.... 4 2.1 SAP HANA Spatial (New and
More informationHow to Configure Access Control for Exchange using PowerShell Cmdlets A Step-by-Step guide
SAP How-to Guide Mobile Device Management SAP Afaria How to Configure Access Control for Exchange using PowerShell Cmdlets A Step-by-Step guide Applicable Releases: SAP Afaria 7 SP3 HotFix 06, SAP Afaria
More informationSAP BusinessObjects BI Platform Document Version: 4.2 2015-11-12. Recommendations for Conversion Using the Report Conversion Tool
SAP BusinessObjects BI Platform Document Version: 4.2 2015-11-12 Recommendations for Conversion Using the Report Conversion Tool Content 1 Document History....3 2 About this Document.... 4 3 Conversion
More informationSAP Business Intelligence Suite Patch 10.x Update Guide
SAP BusinessObjects Business Intelligence Suite Document Version: 4.0 Support Package 10-2014-07-25 SAP Business Intelligence Suite Patch 10.x Update Guide Table of Contents 1 Introduction.... 3 1.1 About
More informationSAP Best Practices for SAP Mobile Secure Cloud Configuration March 2015
SAP Best Practices for SAP Mobile Secure Cloud Configuration March 2015 2014 SAP SE or an SAP affiliate company. All rights reserved. No part of this publication may be reproduced or transmitted in any
More informationSystem Requirements and Technical Prerequisites for SAP SuccessFactors HCM Suite
System Requirements and Technical Prerequisites for SAP SuccessFactors HCM Suite SAP SuccessFactors HCM Suite is a fully web-based offering. You will need an Internet connection and a system that meets
More informationCUSTOMER SAP Afaria Overview
SAP Afaria 7 SP15 Document Version: 1.0 2016-06-13 CUSTOMER Content 1 Afaria Overview....3 1.1 About Afaria....3 1.2 Afaria Access and Support....4 1.3 Finding Information....5 2 Afaria Architecture....7
More informationSAP BusinessObjects Document Version: 4.1 Support Package 7 2015-11-27. Dashboards and Presentation Design Installation Guide
SAP BusinessObjects Document Version: 4.1 Support Package 7 2015-11-27 Dashboards and Presentation Design Installation Guide Content 1 Document History....3 2 About this Guide....4 3 Planning Installations....5
More informationMobile Secure Cloud Edition Document Version: 2.0-2014-07-07. Mobile Application Management
Mobile Secure Cloud Edition Document Version: 2.0-2014-07-07 Table of Contents 1 Important Disclaimers on Legal Aspects....3 2 Introduction....4 3 Application Catalog....5 3.1 Application Catalog Icons....5
More informationVisualization Extension Plugin Version: 1.0.0-2014-12-04. Visualization Extension Plugin for SAP Web IDE
Visualization Extension Plugin Version: 1.0.0-2014-12-04 Visualization Extension Plugin for SAP Web IDE Content 1 Visualization Extension Plugin Overview....3 1.1 About the visualization extension plugin....
More informationPUBLIC Preferences Setup Automated Analytics User Guide
SAP Predictive Analytics 2.3 2015-08-27 PUBLIC Automated Analytics User Guide Content 1 About Startup Options....3 1.1 Accessing the Preferences Dialog.... 3 2 Setting the General Options....4 2.1 Default
More informationPUBLIC SAP IT Operations Analytics 1.0: Administrator's and User's Guide
Document Version: ITOA 1.0-1.3 2015-10-06 PUBLIC SAP IT Operations Analytics 1.0: Administrator's and User's Guide Content 1 Introduction....5 1.1 Technical Architecture....5 1.2 Basic Prerequisites....7
More informationHow-To Guide SAP Cloud for Customer Document Version: 1.0-2014-03-20. How to Configure SAP HCI basic authentication for SAP Cloud for Customer
How-To Guide SAP Cloud for Customer Document Version: 1.0-2014-03-20 How to Configure SAP HCI basic authentication for SAP Cloud for Customer Document History Document Version Description 1.0 First official
More informationInstallation Guide: Agentry Device Clients SAP Mobile Platform 2.3
Installation Guide: Agentry Device Clients SAP Mobile Platform 2.3 Windows DOCUMENT ID: DC01954-01-0230-01 LAST REVISED: February 2013 Copyright 2013 by SAP AG or an SAP affiliate company. All rights reserved.
More informationSAP Business Intelligence Platform Translation Management Tool SDK Developer Guide
SAP BusinessObjects Business Intelligence platform Document Version: 4.2 2015-11-12 SAP Business Intelligence Platform Translation Management Tool SDK Developer Guide Content 1 Document History....4 2
More informationR49 Using SAP Payment Engine for payment transactions. Process Diagram
R49 Using SAP Payment Engine for payment transactions Process Diagram Purpose, Benefits, and Key Process Steps Purpose The purpose of this scenario is to show you how to check the result of payment orders
More informationSAP Customer Influence Guide
User Guide SAP Customer Influence CUSTOMER Page 1 Document Version: 2.0 - September 2014 Table of Contents 1 Overview of SAP Customer Influence... 3 2 Getting Started... 4 2.1 Customer Influence Home Page...
More informationHow to Configure an Example SAP Cloud Applications Studio (PDI) Solution for SAP Cloud for Customer
How-To Guide Document Version: 1411 2014.12.15 How to Configure an Example SAP Cloud Applications Studio (PDI) Solution for SAP Cloud for Customer How to configure an example SAP Cloud Applications Studio
More informationBlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide
BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry
More informationWatchDox Administrator's Guide. Application Version 3.7.5
Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals
More informationSetting up Visual Enterprise Integration (WM6)
SAP Mobile Platform 3.0 June 2015 English Setting up Visual Enterprise Integration (WM6) Building Block Configuration Guide SAP SE Dietmar-Hopp-Allee 16 69190 Walldorf Germany Copyright 2015 SAP SE or
More informationMobile app for Android Version 1.0.x, January 2014
Mobile app for Android Version 1.0.x, January 2014 Legal disclaimer The information in this presentation is confidential and proprietary to SAP and may not be disclosed without the permission of SAP. This
More informationHow-To Guide SAP Cloud for Customer Document Version: 1.0-2015-04-29. How to replicate marketing attributes from SAP CRM to SAP Cloud for Customer
How-To Guide SAP Cloud for Customer Document Version: 1.0-2015-04-29 How to replicate marketing attributes from SAP CRM to SAP Cloud for Customer Document History Document Version Description 1.0 First
More informationBlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
More informationCounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version 1.0.1. ForeScout Mobile
CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module Version 1.0.1 ForeScout Mobile Table of Contents About the Integration... 3 ForeScout MDM... 3 Additional Documentation...
More informationSecuring Enterprise Mobility for Greater Competitive Advantage
SAP Brief SAP Technology SAP Afaria Objectives Securing Enterprise Mobility for Greater Competitive Advantage Build a strong foundation for mobile success Build a strong foundation for mobile success Enterprise
More informationMobile app for Android Version 1.2.x, December 2015
Mobile app for Android Version 1.2.x, December 2015 Introduction This app allows you to access SAP Business One, SAP s enterprise resource planning application for small businesses, anywhere and anytime.
More informationOracle Enterprise Manager
Oracle Enterprise Manager System Monitoring Plug-in Installation Guide for Microsoft Active Directory Release 12.1.0.1.0 E28548-04 February 2014 Microsoft Active Directory, which is included with Microsoft
More informationMobile Security Without Barriers
SAP Mobile Secure Mobile Security Without Barriers Securing your enterprise for all the new and expanding mobile use cases is similar to protecting your home. Merely locking your doors won t suffice. You
More informationConfiguration (X87) SAP Mobile Secure: SAP Afaria 7 SP5 September 2014 English. Building Block Configuration Guide
SAP Mobile Secure: SAP Afaria 7 SP5 September 2014 English Afaria Network Configuration (X87) Building Block Configuration Guide SAP SE Dietmar-Hopp-Allee 16 69190 Walldorf Germany Copyright 2014 SAP SE
More informationArchitecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
More informationSAP HANA SPS 09 - What s New? Administration & Monitoring
SAP HANA SPS 09 - What s New? Administration & Monitoring (Delta from SPS08 to SPS09) SAP HANA Product Management November, 2014 2014 SAP AG or an SAP affiliate company. All rights reserved. 1 Content
More informationAdministration Guide. BlackBerry Enterprise Service 12. Version 12.0
Administration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2015-01-16 SWD-20150116150104141 Contents Introduction... 9 About this guide...10 What is BES12?...11 Key features of BES12...
More informationIntegration Guide. SafeNet Authentication Service. SAS Using RADIUS Protocol with Microsoft DirectAccess
SafeNet Authentication Service Integration Guide SAS Using RADIUS Protocol with Microsoft DirectAccess Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet,
More informationSAP BusinessObjects Business Intelligence 4 Innovation and Implementation
SAP BusinessObjects Business Intelligence 4 Innovation and Implementation TABLE OF CONTENTS 1- INTRODUCTION... 4 2- LOGON DETAILS... 5 3- STARTING AND STOPPING THE APPLIANCE... 6 4.1 Remote Desktop Connection
More informationHow-To Guide SAP Cloud for Customer Document Version: 2.0-2015-10-06. How to Perform Initial Load of data from SAP ERP to SAP Cloud for Customer
How-To Guide SAP Cloud for Customer Document Version: 2.0-2015-10-06 How to Perform Initial Load of data from SAP ERP to SAP Cloud for Customer Document History Document Version Description 1.0 First official
More informationAdvanced Configuration Steps
Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings
More informationSAP BusinessObjects Financial Consolidation Excel Link (Web) User Guide
SAP BusinessObjects Financial Consolidation Document Version: 10.0 2015-02-23 SAP BusinessObjects Financial Consolidation Excel Link (Web) User Guide Content 1 Logging on to an SAP BusinessObjects Financial
More informationHow to configure BusinessObjects Enterprise with Citrix Presentation Server 4.0
How to configure BusinessObjects Enterprise with Citrix Presentation Server 4.0 Applies to: BusinessObjects Enterprise XI 3.0 Summary The objective of this document is to provide steps to install and configure
More informationVirtual Contact Center
Virtual Contact Center MS Dynamics CRM Integration Configuration Guide Version 7.0 Revision 1.0 Copyright 2012, 8x8, Inc. All rights reserved. This document is provided for information purposes only and
More informationUniversal Management Service 2015
Universal Management Service 2015 UMS 2015 Help All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including photocopying, recording,
More informationIntroduction to Google Apps for Business Integration
Introduction to Google Apps for Business Integration Overview Providing employees with mobile email access can introduce a number of security concerns not addressed by most standard email security infrastructures.
More informationUP L18 Enhanced MDM and Updated Email Protection Hands-On Lab
UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab Description The Symantec App Center platform continues to expand it s offering with new enhanced support for native agent based device management
More informationCitrix Receiver. Configuration and User Guide. For Macintosh Users
Citrix Receiver Configuration and User Guide For Macintosh Users rev: 25.03.2015 https://access.sap.com/ TABLE OF CONTENTS Introduction... 3 Installation... 3 Accessing our portal... 3 Accessing from SAP
More informationOracle Enterprise Manager. Description. Versions Supported
Oracle Enterprise Manager System Monitoring Plug-in Installation Guide for Microsoft Active Directory 10g Release 2 (10.2.0.2) B28044-02 June 2006 This document provides a brief description about the Oracle
More informationTechnical Certificates Overview
Technical Certificates Overview Version 8.2 Mobile Service Manager Legal Notice This document, as well as all accompanying documents for this product, is published by Good Technology Corporation ( Good
More informationUser Guide. BES12 Self-Service
User Guide BES12 Self-Service Published: 2016-01-27 SWD-20160127153905522 Contents About BES12 Self-Service...4 Log in to BES12 Self-Service... 4 Forgot your login password?... 4 Change your login password...5
More informationSAP Business One mobile app for Android Version 1.0.x November 2013
SAP Business One mobile app for Android Version 1.0.x November 2013 Legal disclaimer The information in this presentation is confidential and proprietary to SAP and may not be disclosed without the permission
More informationHow To Configure A Windows 8.1 On A Windows 7.1.1 (Windows) With A Powerpoint (Windows 8) On A Blackberry) On An Ipad Or Ipad (Windows 7) On Your Blackberry Or Black
Introduction to Cloud-Based Mobile Device Management with Intune Information in this document, including URLs and other Internet Web site references, is subject to change without notice. Unless otherwise
More informationSAP NetWeaver Identity Management Identity Services Configuration Guide
SAP NetWeaver Identity Management Identity Services Configuration Guide Version 7.2 Rev 7 2014 SAP AG or an SAP affiliate company. All rights reserved. No part of this publication may be reproduced or
More informationWatchDox SharePoint Beta Guide. Application Version 1.0.0
Application Version 1.0.0 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals
More informationMobility Manager 9.5. Users Guide
Mobility Manager 9.5 Users Guide LANDESK MOBILITY MANAGER Copyright 2002-2013, LANDesk Software, Inc. and its affiliates. All rights reserved. LANDesk and its logos are registered trademarks or trademarks
More informationBuilding the SAP Business One Cloud Landscape Part of the SAP Business One Cloud Landscape Workshop
Building the SAP Business One Cloud Landscape Part of the SAP Business One Cloud Landscape Workshop TABLE OF CONTENTS 1 INTRODUCTION... 3 2 LANDSCAPE DETAILS... 3 2.1 Server Details... 3 2.2 Landscape
More informationComplementary Demo Guide
Complementary Demo Guide Lockbox Payment Process SAP Business ByDesign SAP Business ByDesign Global August 15, 2014 SAP Cloud Reference Systems Table of Content 1 About this Document... 3 1.1 Purpose...
More informationDell Enterprise Reporter 2.5. Configuration Manager User Guide
Dell Enterprise Reporter 2.5 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license
More informationSAP Mobile - Webinar Series SAP Mobile Platform 3.0 Security Concepts and Features
SAP Mobile - Webinar Series SAP Mobile Platform 3.0 Security Concepts and Features Dirk Olderdissen Solution Expert, Regional Presales EMEA SAP Brought to you by the Customer Experience Group 2014 SAP
More informationOracle Enterprise Manager. Description. Versions Supported. Prerequisites
Oracle Enterprise Manager System Monitoring Plug-in Installation Guide for Microsoft SQL Server 10g Release 2 (10.2) B28049-01 January 2006 This document provides a brief description about the Oracle System
More informationHow To Configure MDM to Work with Oracle ASM-Based Products
SAP NetWeaver How-To Guide How To Configure MDM to Work with Oracle ASM-Based Products Applicable Releases: MDM 7.1 SP10 and later Version 1.0 June 2013 Copyright 2013 SAP AG. All rights reserved. No part
More informationUser Self-Service Configuration Overview
User Self-Service Configuration Overview Version 8.2 Mobile Service Manager Legal Notice This document, as well as all accompanying documents for this product, is published by Good Technology Corporation
More informationDell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration
Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration February 2015 This guide describes how to configure Dell One Identity Cloud Access Manager to communicate with a Dell
More informationProduct Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15
Product Manual MDM On Premise Installation Version 8.1 Last Updated: 06/07/15 Parallels IP Holdings GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 632 0411 Fax: + 41 52 672 2010 www.parallels.com
More informationGO!Enterprise MDM Device Application User Guide Installation and Configuration for Android
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android 1 Table of Contents GO!Enterprise MDM
More informationSymantec Mobile Management for Configuration Manager
Symantec Mobile Management for Configuration Manager Replication Services Installation Guide 7.5 Symantec Mobile Management for Configuration Manager: Replication Services Installation Guide The software
More informationManage the Mobile Workforce Without the Complexity and Expense of an On-Premise Installation
SAP Brief SAP Afaria, Cloud Edition Objectives Manage the Mobile Workforce Without the Complexity and Expense of an On-Premise Installation Low-cost investment yields high returns Low-cost investment yields
More informationGO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android with TouchDown 1 Table
More informationObject Level Authentication
Toad Intelligence Central Version 2.5 New in This Release Wednesday, 4 March 2015 New features in this release of Toad Intelligence Central: Object level authentication - Where authentication is required
More informationHands-On Lab: WSUS. Lab Manual Expediting WSUS Service for XP Embedded OS
Lab Manual Expediting WSUS Service for XP Embedded OS Summary In this lab, you will learn how to deploy the security update to your XP Pro or XP embedded images. You will also learn how to prepare the
More informationSophos Mobile Control Administrator guide. Product version: 3
Sophos Mobile Control Administrator guide Product version: 3 Document date: January 2013 Contents 1 About Sophos Mobile Control...4 2 About the Sophos Mobile Control web console...7 3 Key steps for managing
More informationSophos Mobile Control Administrator guide. Product version: 3.6
Sophos Mobile Control Administrator guide Product version: 3.6 Document date: November 2013 Contents 1 About Sophos Mobile Control...4 2 About the Sophos Mobile Control web console...7 3 Key steps for
More informationAndroid App User Guide
www.novell.com/documentation Android App User Guide ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of
More informationCompliance Rule Sets in MaaS360
Compliance Rule Sets in MaaS360 MaaS360 allows you to apply sets of compliance rules on mobile devices. These rules are conditions that are checked on devices on real-time basis. If a device is not in
More informationSecurity Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
More informationCloud Deployment Guide
Cloud Deployment Guide Product Version: 1.2 Doc Rev 1.3 Last Updated: 15-Jan-15 Good Work TM Table of Contents Introduction What is the Cloud? 1 The Private Cloud 1 Good Work in the Cloud 1 Environment
More informationCertificate Management
www.novell.com/documentation Certificate Management ZENworks Mobile Management 3.1.x August 2015 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of
More informationHow-To Guide SAP NetWeaver Document Version: 1.0-2013-12-22. How To Guide - Configure SSL in ABAP System
How-To Guide SAP NetWeaver Document Version: 1.0-2013-12-22 Document History Document Version Description 1.0 First official release of this guide Document History 2013 SAP AG or an SAP affiliate company.
More informationORACLE USER PRODUCTIVITY KIT USAGE TRACKING ADMINISTRATION & REPORTING RELEASE 3.6 PART NO. E17087-01
ORACLE USER PRODUCTIVITY KIT USAGE TRACKING ADMINISTRATION & REPORTING RELEASE 3.6 PART NO. E17087-01 FEBRUARY 2010 COPYRIGHT Copyright 1998, 2009, Oracle and/or its affiliates. All rights reserved. Part
More informationSoftware and Delivery Requirements
SAP HANA Big Data Intelligence rapiddeployment solution November 2014 English SAP HANA Big Data Intelligence rapiddeployment solution: Software and Delivery Requirements SAP SE Dietmar-Hopp-Allee 16 69190
More informationSAP Business One mobile app for ios. Version 1.9.x September 2013
SAP Business One mobile app for ios Version 1.9.x September 2013 Legal disclaimer The information in this presentation is confidential and proprietary to SAP and may not be disclosed without the permission
More informationPreparing for GO!Enterprise MDM On-Demand Service
Preparing for GO!Enterprise MDM On-Demand Service This guide provides information on...... An overview of GO!Enterprise MDM... Preparing your environment for GO!Enterprise MDM On-Demand... Firewall rules
More informationOracle Enterprise Single Sign-on Logon Manager How-To: Configuring ESSO-LM Event Logging with Microsoft SQL Server 2005 Release 11.1.1.2.
Oracle Enterprise Single Sign-on Logon Manager How-To: Configuring ESSO-LM Event Logging with Microsoft SQL Server 2005 Release 11.1.1.2.0 20413-01 December 2010 8B Oracle Enterprise Single Sign-on Logon
More informationDell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 May 2015 This guide describes how to configure Microsoft Office 365 for use with Dell One Identity Cloud Access Manager
More informationSynchronizing ProCurve IDM and Windows Active Directory
An HP ProCurve Networking Application Note Synchronizing ProCurve IDM and Windows Active Directory Contents 1. Introduction... 2 2. Prerequisites... 2 3. Network and Active Directory tree diagrams... 2
More informationSOLARWINDS ORION. Patch Manager Evaluation Guide for ConfigMgr 2012
SOLARWINDS ORION Patch Manager Evaluation Guide for ConfigMgr 2012 About SolarWinds SolarWinds, Inc. develops and markets an array of network management, monitoring, and discovery tools to meet the diverse
More informationOracle Enterprise Manager. Description. Versions Supported
Oracle Enterprise Manager System Monitoring Plug-in Installation Guide for Microsoft.NET Framework 10g Release 2 (10.2) E10749-01 January 2006 This document provides a brief description about the Oracle
More information1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?
MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,
More informationHow To Integrate An Ipm With Airwatch With Big Ip On A Server With A Network (F5) On A Network With A Pb (Fiv) On An Ip Server On A Cloud (Fv) On Your Computer Or Ip
F5 Networks, Inc. F5 Recommended Practices for BIG-IP and AirWatch MDM Integration Contents Introduction 4 Purpose 5 Requirements 6 Prerequisites 6 AirWatch 6 F5 BIG-IP 6 Network Topology 7 Big-IP Configuration
More informationKaspersky Lab Mobile Device Management Deployment Guide
Kaspersky Lab Mobile Device Management Deployment Guide Introduction With the release of Kaspersky Security Center 10.0 a new functionality has been implemented which allows centralized management of mobile
More informationIntegration of SAP Netweaver User Management with LDAP
Integration of SAP Netweaver User Management with LDAP Applies to: SAP Netweaver 7.0/7.1 Microsoft Active Directory 2003 Summary The document describes the detailed steps of configuring the integration
More information