CUSTOMER Access Control Guide



Similar documents
Afaria Document Version: How to Install and Configure Access Control for

CUSTOMER SAP Afaria Windows Phone and Windows 8.1 Enrollment

SAP BusinessObjects Analysis, edition for Microsoft Office Document Version: What's New Guide

PUBLIC Supplement for J.D. Edwards

SuccessFactors HCM Suite November 2014 Release Version: December 5, SuccessFactors Learning Programs Administration Guide

Release Document Version: 1.4 SP What's New Guide: SAP BusinessObjects Analysis, edition for Microsoft Office

SAP Operational Process Intelligence Security Guide

SuccessFactors HCM Suite August 2014 Release Document Version: August 22, SuccessFactors Learning Programs Administration Guide

Mobile Secure Cloud Edition Document Version: ios Application Signing

CUSTOMER Presentation of SAP Predictive Analytics

SAP HANA Client Installation and Update Guide

What's New in SAP HANA Spatial (Release Notes)

How to Configure Access Control for Exchange using PowerShell Cmdlets A Step-by-Step guide

SAP BusinessObjects BI Platform Document Version: Recommendations for Conversion Using the Report Conversion Tool

SAP Business Intelligence Suite Patch 10.x Update Guide

SAP Best Practices for SAP Mobile Secure Cloud Configuration March 2015

System Requirements and Technical Prerequisites for SAP SuccessFactors HCM Suite

CUSTOMER SAP Afaria Overview

SAP BusinessObjects Document Version: 4.1 Support Package Dashboards and Presentation Design Installation Guide

Mobile Secure Cloud Edition Document Version: Mobile Application Management

Visualization Extension Plugin Version: Visualization Extension Plugin for SAP Web IDE

PUBLIC Preferences Setup Automated Analytics User Guide

PUBLIC SAP IT Operations Analytics 1.0: Administrator's and User's Guide

How-To Guide SAP Cloud for Customer Document Version: How to Configure SAP HCI basic authentication for SAP Cloud for Customer

Installation Guide: Agentry Device Clients SAP Mobile Platform 2.3

SAP Business Intelligence Platform Translation Management Tool SDK Developer Guide

R49 Using SAP Payment Engine for payment transactions. Process Diagram

SAP Customer Influence Guide

How to Configure an Example SAP Cloud Applications Studio (PDI) Solution for SAP Cloud for Customer

BlackBerry Enterprise Service 10. Universal Device Service Version: Administration Guide

WatchDox Administrator's Guide. Application Version 3.7.5

Setting up Visual Enterprise Integration (WM6)

Mobile app for Android Version 1.0.x, January 2014

How-To Guide SAP Cloud for Customer Document Version: How to replicate marketing attributes from SAP CRM to SAP Cloud for Customer

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version ForeScout Mobile

Securing Enterprise Mobility for Greater Competitive Advantage

Mobile app for Android Version 1.2.x, December 2015

Oracle Enterprise Manager

Mobile Security Without Barriers

Configuration (X87) SAP Mobile Secure: SAP Afaria 7 SP5 September 2014 English. Building Block Configuration Guide

Architecture and Data Flow Overview. BlackBerry Enterprise Service Version: Quick Reference

SAP HANA SPS 09 - What s New? Administration & Monitoring

Administration Guide. BlackBerry Enterprise Service 12. Version 12.0

Integration Guide. SafeNet Authentication Service. SAS Using RADIUS Protocol with Microsoft DirectAccess

SAP BusinessObjects Business Intelligence 4 Innovation and Implementation

How-To Guide SAP Cloud for Customer Document Version: How to Perform Initial Load of data from SAP ERP to SAP Cloud for Customer

Advanced Configuration Steps

SAP BusinessObjects Financial Consolidation Excel Link (Web) User Guide

How to configure BusinessObjects Enterprise with Citrix Presentation Server 4.0

Virtual Contact Center

Universal Management Service 2015

Introduction to Google Apps for Business Integration

UP L18 Enhanced MDM and Updated Protection Hands-On Lab

Citrix Receiver. Configuration and User Guide. For Macintosh Users

Oracle Enterprise Manager. Description. Versions Supported

Technical Certificates Overview

User Guide. BES12 Self-Service

SAP Business One mobile app for Android Version 1.0.x November 2013

How To Configure A Windows 8.1 On A Windows (Windows) With A Powerpoint (Windows 8) On A Blackberry) On An Ipad Or Ipad (Windows 7) On Your Blackberry Or Black

SAP NetWeaver Identity Management Identity Services Configuration Guide

WatchDox SharePoint Beta Guide. Application Version 1.0.0

Mobility Manager 9.5. Users Guide

Building the SAP Business One Cloud Landscape Part of the SAP Business One Cloud Landscape Workshop

Complementary Demo Guide

Dell Enterprise Reporter 2.5. Configuration Manager User Guide

SAP Mobile - Webinar Series SAP Mobile Platform 3.0 Security Concepts and Features

Oracle Enterprise Manager. Description. Versions Supported. Prerequisites

How To Configure MDM to Work with Oracle ASM-Based Products

User Self-Service Configuration Overview

Dell One Identity Cloud Access Manager How to Configure vworkspace Integration

Product Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android

Symantec Mobile Management for Configuration Manager

Manage the Mobile Workforce Without the Complexity and Expense of an On-Premise Installation

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown

Object Level Authentication

Hands-On Lab: WSUS. Lab Manual Expediting WSUS Service for XP Embedded OS

Sophos Mobile Control Administrator guide. Product version: 3

Sophos Mobile Control Administrator guide. Product version: 3.6

Android App User Guide

Compliance Rule Sets in MaaS360

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Cloud Deployment Guide

Certificate Management

How-To Guide SAP NetWeaver Document Version: How To Guide - Configure SSL in ABAP System

ORACLE USER PRODUCTIVITY KIT USAGE TRACKING ADMINISTRATION & REPORTING RELEASE 3.6 PART NO. E

Software and Delivery Requirements

SAP Business One mobile app for ios. Version 1.9.x September 2013

Preparing for GO!Enterprise MDM On-Demand Service

Oracle Enterprise Single Sign-on Logon Manager How-To: Configuring ESSO-LM Event Logging with Microsoft SQL Server 2005 Release

Dell One Identity Cloud Access Manager How to Configure Microsoft Office 365

Synchronizing ProCurve IDM and Windows Active Directory

SOLARWINDS ORION. Patch Manager Evaluation Guide for ConfigMgr 2012

Oracle Enterprise Manager. Description. Versions Supported

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

How To Integrate An Ipm With Airwatch With Big Ip On A Server With A Network (F5) On A Network With A Pb (Fiv) On An Ip Server On A Cloud (Fv) On Your Computer Or Ip

Kaspersky Lab Mobile Device Management Deployment Guide

Integration of SAP Netweaver User Management with LDAP

Transcription:

Mobile Secure Cloud Edition Document Version: 2.3 2016-03-21 CUSTOMER

Content 1 Access Control.... 3 2 Access Control Remote....4 2.1 Configuring Access Control Remote....4 3 Default Access Control Policies.... 6 3.1 Creating Access Control Policies for Android Devices....6 3.2 Creating Access Control Policies for ios Devices....7 3.3 Creating Access Control Policies for Windows Mobile Devices....8 3.4 Creating Access Control Policies for Windows Phone Devices....8 3.5 Creating Access Control Policies for Unknown Devices....9 3.6 Creating Access Control Policies for Domains....10 Primary and Accepted Domains....10 3.7 Creating Access Control Policies for Groups....11 3.8 Access Control Device List....12 3.9 Viewing Access Control Information for Devices....13 4 Custom Access Control Policies.... 14 4.1 Adding Android Devices to Access Control....14 4.2 Adding ios Devices to Access Control....15 4.3 Adding Windows Mobile Devices to Access Control....16 4.4 Adding Windows Phone Devices to Access Control....17 4.5 Editing Custom Access Control Policies....18 4.6 Exchange Environment Unique Device ID Value.... 18 5 Access Control Policy Conflict Resolution....19 2 2016 SAP SE or an SAP affiliate company. All rights reserved. Content

1 Access Control Access control regulates synchronization requests to email servers. Access Control can prevent synchronization requests that do not meet the access control policies in SAP Mobile Secure. Access control policies include a list of known devices, their associated policies, any remediation actions, and any defined polices for unknown devices. In addition to synchronization requests from devices, Access Control Filter can regulate synchronization requests from desktop and Web email clients. Access Control 2016 SAP SE or an SAP affiliate company. All rights reserved. 3

2 Access Control Remote Access control remote regulates synchronization requests to hosted email servers. 2.1 Configuring Access Control Remote You can set up Access Control Remote for hosted email with Office 365 or local email using Microsoft Exchange PowerShell commandlets. Prerequisites Ensure that the Access Control Filter is not installed. The PowerShell virtual directory is created when you install Exchange. Enable the powershell remoting by enabling Basic Authentication on the virtual directory in IIS. Context You can configure access control to match devices against multiple domains in a single active directory forest on your network by using the "Global" setting in the Domain list. To configure this, define a separate profile for each MS Exchange Client Access Server (CAS) you want to include. If your email is hosted externally, you are restricted to the "Local" setting. With the "Local" setting, access control can only match accounts in the same domain as the account you enter here. E-mail services are available locally, where a local Exchange server is used. E-mail services are also hosted by a third-party and are available to users from the Internet, without any e-mail servers or related Afaria components inside the enterprise network or DMZ. Afaria server communicates with Exchange for updating device status. Afaria uses the following API calls on the Exchange server: Get-ActiveSyncDevice Get-CASMailbox Set-CASMailbox For more information on these Microsoft Exchange server API calls, refer to Microsoft Exchange documentation. In addition to the API calls on the Exchange server, Afaria also issues some setup commands to initiate the remote PowerShell session with the Exchange server. 4 2016 SAP SE or an SAP affiliate company. All rights reserved. Access Control Remote

1. Log in to the Afaria Administration console. 2. Navigate to the Server Configuration MS Exchange page. Note Devices with ISAPI account and Microsoft Exchange account cannot co-exist in a tenant as this configuration is not supported. Ensure that this page is empty if the tenant is supposed to be used for local exchange. 3. Click Add. 4. Enter the following information: List View Select Include to include the CAS profile in the list Remote Select Include to match devices against this CAS server for access control. MS Exchange CAS URL Enter the URL of the hosted or local Exchange CAS server. Domain Select "Global" if you intend to define multiple CAS servers on your network. If your email is hosted externally, only the "Local" setting is available. Account User Enter the hosted or local Exchange Admin User ID. Create a user that is a member of the Exchange Organization Managers group so that the user will have minimum permission to execute PowerShell commands. Password Enter the hosted or local Exchange Admin password. Note Ensure that the Microsoft Exchange account credentials have Administrator privileges. 5. Click Test connection to authenticate the account credentials and test connectivity for the local Exchange or hosted accounts. If the account credentials are valid, you see a success message; otherwise, you see an error message. 6. Click Save. When Microsoft Exchange triggers e-mail blocking using access control, it may take as long as 10 minutes for Exchange to block e-mail messages. 7. Repeat steps 3 to 6 for each additional CAS server as required. Access Control Remote 2016 SAP SE or an SAP affiliate company. All rights reserved. 5

3 Default Access Control Policies Access control policies define the conditions that devices must meet to connect to messaging servers in an organization. Access control policies can apply to both known and unknown devices. Administrators should communicate access control policies to users to establish accurate expectations towards device synchronization and compliance. 3.1 Creating Access Control Policies for Android Devices You can create an access control policy in the Afaria Administration console to regulate synchronization requests from Android devices. Context To use access control to manage email on an Android device, ensure the Exchange account is configured through SAP Mobile Secure. Email from unmanaged accounts is blocked by default. For Samsung devices with KNOX installed, provision the Exchange account through the Samsung KNOX Email Account configuration policy. For devices using NitroDesk TouchDown, use the NitroDesk Account configuration policy; for other devices, use the appropriate LG or Samsung SAFE Exchange account configuration policy. 1. On the Server page, click Configuration. 2. Click Component Access Control Option. 3. Click Access Policy Android. 4. Perform one of the following tasks: a. To allow synchronization requests, select Always allow. b. To block synchronization requests, select Always block. c. To allow synchronization requests when devices meet specific criteria, select Allow when. 5. If you select Allow when, perform at least one of the following tasks: a. To allow synchronization requests from devices that have the SAP Mobile Secure client installed and granted administrator privileges, select Afaria setting enabled. b. To allow synchronization requests from devices with a password policy, select Password Policy Enabled. 6 2016 SAP SE or an SAP affiliate company. All rights reserved. Default Access Control Policies

c. To allow synchronization requests from devices that are not rooted, select Device uncompromised. d. To allow synchronization requests from devices that have connected within a period of time, select Device connected within and set the period of time. 6. Click Save. 3.2 Creating Access Control Policies for ios Devices You can create an access control policy in the Afaria Administration console to regulate synchronization requests from ios devices. Context Access control policies are prioritized in this order: group-level policy, device-level policy, server-level policy. 1. On the Server page, click Configuration. 2. Click Component Access Control Option. 3. Click Access Policy ios. 4. Perform one of the following tasks: a. To allow synchronization requests, select Always allow. b. To block synchronization requests, select Always block. c. To allow synchronization requests when devices meet specific criteria, select Allow when. 5. If you select Allow when, perform at least one of the following tasks: a. To allow synchronization requests from devices that are under SAP Mobile Secure MDM management, select Administered by mobile device management. b. To allow synchronization requests from devices that have the SAP Mobile Secure client installed and have connected within a period of time, select Afaria installed and device connected within and set the period of time. c. To allow synchronization requests from devices that have received policies within a period of time, select Assigned policy delivered within and set the period of time. d. To allow synchronization requests from devices that use hardware encryption, select Device hardware encrypted. e. To allow synchronization requests from devices that are not jailbroken, select Device uncompromised. 6. Click Save. Default Access Control Policies 2016 SAP SE or an SAP affiliate company. All rights reserved. 7

3.3 Creating Access Control Policies for Windows Mobile Devices You can create an access control policy in the Afaria Administration console to regulate synchronization requests from Windows Mobile devices. 1. On the Server page, click Configuration. 2. Click Component Access Control Option. 3. Click Access Policy Windows Mobile. 4. Perform one of the following tasks: a. To allow synchronization requests, select Always allow. b. To block synchronization requests, select Always block. c. To allow synchronization requests from devices that have connected within a period of time, select Allow when connected within time frame and set the period of time. 5. Click Save. 3.4 Creating Access Control Policies for Windows Phone Devices You can create an access control policy in the Afaria Administration console to regulate synchronization requests from Windows Phone devices. 1. On the Server page, click Configuration. 2. Click Component Access Control Option. 3. Click Access Policy Windows Phone. 4. Perform one of the following tasks: a. To allow synchronization requests, select Always allow. b. To block synchronization requests, select Always block. c. To allow synchronization requests when devices meet specific criteria, select Allow when. 5. If you select Allow when, perform at least one of the following tasks: a. To allow synchronization requests when devices are under SAP Mobile Secure MDM management, select Administered by mobile device management. 8 2016 SAP SE or an SAP affiliate company. All rights reserved. Default Access Control Policies

b. To allow synchronization requests when devices have connected within a period of time, select Device connected within and set the period of time. 6. Click Save. 3.5 Creating Access Control Policies for Unknown Devices Define a default access control policy for a local email to manage e-mail synchronization for devices that do not enroll in SAP Mobile Secure management. Context You are advised to define an unknown device policy for each domain managed by your e-mail server. Note For cloud implementation on the unknown devices the connection is rejected. 1. On the Home page Server tile, click Configuration to open the Server Configuration page. 2. Navigate to the Component Access Control Option page. 3. Click the Domains tab. 4. Click Add to define unknown device properties. 5. Enter the e-mail server's domain. 6. Select the default policy for that domain. 7. Define the interval at which the SAP Mobile Secure ISAPI filter's polling agent queries the SAP Mobile Secure server for a list of known devices and policies. 8. In the inline editor row, click the Check icon to save. Default Access Control Policies 2016 SAP SE or an SAP affiliate company. All rights reserved. 9

3.6 Creating Access Control Policies for Domains You can create an access control policy in the Afaria Administration console to regulate synchronization requests to specific domains. Context Access control policies for domains can regulate synchronization requests from devices that are unknown to SAP Mobile Secure. 1. On the Server page, click Configuration. 2. Click Component Access Control Option. 3. Click Domains. 4. Click Add. 5. In the Primary Domain tab, type the domain. 6. In the Access Control Policy list, select how SAP Mobile Secure responds to synchronization requests to the domain. 7. In the Retry Rate field, select the interval that SAP Mobile Secure enforces between synchronization requests. 8. In the Accepted Domains, specify the subdomains that the primary domain includes. 9. Click Save. 3.6.1 Primary and Accepted Domains This section discusses couple of primary domain and accepted domains scenarios. Scenario 1: CAS 1 on one network domain and CAS 2 and CAS 3 are on a different network domain CAS A runs on domain domaina.com, services domains A.com, AA.com, and AAA.com. CAS B runs on domain domainb.com, services domains B.com, BB.com, and BBB.com. CAS C runs on domain domainb.com, services domains C.com, CC.com, and CCC.com. 10 2016 SAP SE or an SAP affiliate company. All rights reserved. Default Access Control Policies

A primary domain maps to the network domain on which the server resides. The accepted domain list includes all supported e-mail domains. Therefore, this scenario has two primary domains on the Server Configuration Access Control Option page: One primary domain for domaina.com with accepted domains A.com, AA.com, and AAA.com. One primary domain for domainb.com with accepted domains B.com, BB.com, BBB.com, C.com, CC.com, and CCC.com. Scenario 2: CAS 1, CAS 2, and CAS 3 on different network domains CAS A runs on domain domaina.com, services domains A.com, AA.com, and AAA.com. CAS B runs on domain domainb.com, services domains B.com, BB.com, and BBB.com. CAS C runs on domain domainc.com, services domains C.com, CC.com, and CCC.com. A primary domain maps to the network domain on which the server resides. The accepted domain list includes all supported e-mail domains. Therefore, this scenario has three primary domains on the Server Configuration Access Control Option page: One primary domain for domaina.com with accepted domains A.com, AA.com, and AAA.com. One primary domain for domainb.com with accepted domains B.com, BB.com, and BBB.com. One primary domain for domainc.com with accepted domains C.com, CC.com, and CCC.com. 3.7 Creating Access Control Policies for Groups You can create an access control policy in the Afaria Administration console to regulate synchronization requests from groups. Context Blocking and allowing by groups can let you block devices that do not meet some criteria, or allow devices that meet some criteria. You define dynamic group with your criteria to use with this feature. The frequency of the Dynamic Group Refresh schedule, access control polling interval, and device inventory reporting all affect when a group policy goes into effect on a device. 1. On the Server page, click Configuration. Default Access Control Policies 2016 SAP SE or an SAP affiliate company. All rights reserved. 11

2. Click Component Access Control Option. 3. Click Groups. 4. To block synchronization requests from groups, perform the following tasks in the Block selected groups section: a. In the Available Groups list, select a group. b. Click the arrow to add the group to the Selected Groups list. 5. To only allow synchronization requests from selected groups, perform the following tasks in the Only allow selected Groups section: a. Select Enable. b. In the Available groups list, select a group. c. Click the arrow to add the group to the Selected Groups list. 6. Click Save. 3.8 Access Control Device List SAP Mobile Secure displays access control devices and policy assignments in different locations of the Afaria Administration console, depending upon the device type. Assignment locations include: Android, Windows Mobile, and Windows Phone Access Control Option Devices page tab. On the Devices tab, the device list shows devices and white list devices that are access control devices. The SAP Mobile Secure server populates this list with devices after it assigns a synchronization policy to a connecting device. White list devices populate the list as you add them. Therefore, the list starts empty and grows as each device connects and receives its synchronization policy assignment, and as you manually add devices. Note When an Android device does not contain a known ActiveSync ID or an Exchange User ID, Access Control ID displays the value NOT_EXCHANGE followed by the client GUID. ios Device List page 12 2016 SAP SE or an SAP affiliate company. All rights reserved. Default Access Control Policies

3.9 Viewing Access Control Information for Devices You can view access control information for devices in the Afaria Administration console. 1. On the Devices page, select a device. 2. Click the Show/Hide Inspector icon. The Device Inspector displays the following information about access control: Access control policy that is applicable to the device Current access policy state for the device: allowed or blocked Device compliance state: Whether the device is compliant or not Last remediation timestamp for the device Default Access Control Policies 2016 SAP SE or an SAP affiliate company. All rights reserved. 13

4 Custom Access Control Policies 4.1 Adding Android Devices to Access Control You can add Android devices that are not enrolled in SAP Mobile Secure to access control in the Afaria Administration console. Context You should add devices when: Devices synchronize with your email server but are not managed by SAP Mobile Secure. Devices will connect to the email server in the future and you want to make sure that the default access control policy does not prevent synchronization requests. 1. On the Server page, click Configuration. 2. Click Component Access Control Option. 3. Click the Devices tab. 4. Click Add. 5. In the Device field, type the Exchange environment unique device identifier of the device. 6. In the User Name field, type the Exchange user name. 7. In the Domain, type the Exchange domain. 8. In the OS list, select Android. 9. In the Access control policy list, perform one of the following tasks: a. To allow synchronization requests, select Always allow. b. To block synchronization requests, select Always block. c. To allow synchronization requests when devices meet specific criteria, select Allow when. 10. If you select Allow when, perform at least one of following tasks: a. To allow synchronization requests from devices that have the SAP Mobile Secure client installed and granted administrator privileges, select Afaria setting enabled. b. To allow synchronization requests from devices with a password policy, select Password Policy Enabled. 14 2016 SAP SE or an SAP affiliate company. All rights reserved. Custom Access Control Policies

c. To allow synchronization requests from devices that are not rooted, select Device uncompromised. d. To allow synchronization requests from devices that have connected within a period of time, select Device connected within and set the period of time. 11. Click Save. 4.2 Adding ios Devices to Access Control You can edit the access control policies for ios devices in the Afaria Administration console. 1. On the Device page, select a device. 2. Click Edit. 3. In the Access Control Policy field, click Setup. 4. Perform one of the following tasks: a. To apply the default access control policy to the device, select Use default policy. b. To create a custom access control policy for the device, select Use explicit policy. 5. In you select Use explicit policy, perform one of the following tasks: a. To allow synchronization requests, select Always allow. b. To block synchronization requests, select Always block. c. To allow synchronization requests when devices meet specific criteria, select Allow when. 6. If you select Allow when, perform at least one of following tasks: a. To allow synchronization requests from devices that are under SAP Mobile Secure MDM management, select Administered by mobile device management. b. To allow synchronization requests from devices that have the SAP Mobile Secure client installed, select Afaria installed. c. To allow synchronization requests from devices that have received policies, select Assigned policy delivered. d. To allow synchronization requests from devices that use hardware encryption, select Device hardware encrypted. e. To allow synchronization requests from devices that are not jailbroken, select Device uncompromised. 7. Click Ok. 8. Click Save. Custom Access Control Policies 2016 SAP SE or an SAP affiliate company. All rights reserved. 15

4.3 Adding Windows Mobile Devices to Access Control You can add Windows Mobile devices that are not enrolled in SAP Mobile Secure to access control in the Afaria Administration console. Context You should add devices when: Devices synchronize with your email server but are not managed by SAP Mobile Secure. Devices will connect to the email server in the future and you want to make sure that the default access control policy does not prevent synchronization requests. 1. On the Server page, click Configuration. 2. Click Component Access Control Option. 3. Click the Devices tab. 4. Click Add. 5. In the Device field, type the Exchange environment unique device identifier of the device. 6. In the User Name field, type the Exchange user name. 7. In the Domain, type the Exchange domain. 8. In the OS list, select Windows Mobile. 9. In the Access control policy list, perform one of the following task: a. To allow synchronization requests, select Always allow. b. To block synchronization requests, select Always block. c. To allow synchronization requests from devices that have connected within a period of time, select Allow when connected within time frame. 10. Click Save. 16 2016 SAP SE or an SAP affiliate company. All rights reserved. Custom Access Control Policies

4.4 Adding Windows Phone Devices to Access Control You can add Windows Phone devices that are not enrolled in SAP Mobile Secure to access control in the Afaria Administration console. Context You should add devices when: Devices synchronize with your email server but are not managed by SAP Mobile Secure. Devices will connect to the email server in the future and you want to make sure that the default access control policy does not prevent synchronization requests. 1. On the Server page, click Configuration. 2. Click Component Access Control Option. 3. Click the Devices tab. 4. Click Add. 5. In the Device field, type the Exchange environment unique device identifier of the device. 6. In the User Name field, type the Exchange user name. 7. In the Domain, type the Exchange domain. 8. In the OS list, select Android. 9. In the Access control policy list, perform one of the following task: a. To allow synchronization requests, select Always allow. b. To block synchronization requests, select Always block. c. To allow synchronization requests when devices meet specific criteria, select Allow when. 10. If you select Allow when, perform at least one of the following task: a. To allow synchronization requests from devices that have connected within a period of time, select Device connected within time frame. b. To allow synchronization requests from devices with a password policy, select Password policy enabled. 11. Click Save. Custom Access Control Policies 2016 SAP SE or an SAP affiliate company. All rights reserved. 17

4.5 Editing Custom Access Control Policies You can edit access control policies. 1. On the Server page, click Configuration. 2. Click Component Access Control Option. 3. Click Devices. 4. Select one or more devices on the managed device list. 5. Click Edit. 6. Select new policy and click the Save icon. 4.6 Exchange Environment Unique Device ID Value For access control in a Microsoft Exchange environment, the unique device ID value is the DeviceID value stored in the device registry. You can obtain the value from a device if it has already connected to the Exchange server. SAP Mobile Secure cannot retrieve the value if the SAP Mobile Secure client is not installed on the device. You can use your own method to retrieve the value or: Use a device utility to read the value. Use your Exchange Server ActiveSync Web Administration tool to run a query that retrieves the value. Choose the Remote Device Wipe menu option and query for the user of interest. The query returns information about the devices associated with the user. Copy the value from the Device ID column and exit the page without initiating any further action. 18 2016 SAP SE or an SAP affiliate company. All rights reserved. Custom Access Control Policies

5 Access Control Policy Conflict Resolution When a device is subject to more than one access control policy, the most restrictive policy takes precedence. Example For example, if an Android device is subject to a default policy for Android that allows access, and a group policy that blocks access, then the device is blocked from synchronizing with the e-mail server. Access Control Policy Conflict Resolution 2016 SAP SE or an SAP affiliate company. All rights reserved. 19

Important Disclaimers and Legal Information Coding Samples Any software coding and/or code lines / strings ("Code") included in this documentation are only examples and are not intended to be used in a productive system environment. The Code is only intended to better explain and visualize the syntax and phrasing rules of certain coding. SAP does not warrant the correctness and completeness of the Code given herein, and SAP shall not be liable for errors or damages caused by the usage of the Code, unless damages were caused by SAP intentionally or by SAP's gross negligence. Accessibility The information contained in the SAP documentation represents SAP's current view of accessibility criteria as of the date of publication; it is in no way intended to be a binding guideline on how to ensure accessibility of software products. SAP in particular disclaims any liability in relation to this document. This disclaimer, however, does not apply in cases of wilful misconduct or gross negligence of SAP. Furthermore, this document does not result in any direct or indirect contractual obligations of SAP. Gender-Neutral Language As far as possible, SAP documentation is gender neutral. Depending on the context, the reader is addressed directly with "you", or a gender-neutral noun (such as "sales person" or "working days") is used. If when referring to members of both sexes, however, the third-person singular cannot be avoided or a gender-neutral noun does not exist, SAP reserves the right to use the masculine form of the noun and pronoun. This is to ensure that the documentation remains comprehensible. Internet Hyperlinks The SAP documentation may contain hyperlinks to the Internet. These hyperlinks are intended to serve as a hint about where to find related information. SAP does not warrant the availability and correctness of this related information or the ability of this information to serve a particular purpose. SAP shall not be liable for any damages caused by the use of related information unless damages have been caused by SAP's gross negligence or willful misconduct. All links are categorized for transparency (see: http://help.sap.com/disclaimer). 20 2016 SAP SE or an SAP affiliate company. All rights reserved. Important Disclaimers and Legal Information

Important Disclaimers and Legal Information 2016 SAP SE or an SAP affiliate company. All rights reserved. 21

go.sap.com/registration/ contact.html 2016 SAP SE or an SAP affiliate company. All rights reserved. No part of this publication may be reproduced or transmitted in any form or for any purpose without the express permission of SAP SE or an SAP affiliate company. The information contained herein may be changed without prior notice. Some software products marketed by SAP SE and its distributors contain proprietary software components of other software vendors. National product specifications may vary. These materials are provided by SAP SE or an SAP affiliate company for informational purposes only, without representation or warranty of any kind, and SAP or its affiliated companies shall not be liable for errors or omissions with respect to the materials. The only warranties for SAP or SAP affiliate company products and services are those that are set forth in the express warranty statements accompanying such products and services, if any. Nothing herein should be construed as constituting an additional warranty. SAP and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP SE (or an SAP affiliate company) in Germany and other countries. All other product and service names mentioned are the trademarks of their respective companies. Please see http://www.sap.com/corporate-en/legal/copyright/ index.epx for additional trademark information and notices.