Afaria Document Version: 1-2014-03-24. How to Install and Configure Access Control for E-mail



Similar documents
CUSTOMER Access Control Guide

CUSTOMER SAP Afaria Windows Phone and Windows 8.1 Enrollment

Release Document Version: 1.4 SP What's New Guide: SAP BusinessObjects Analysis, edition for Microsoft Office

SuccessFactors HCM Suite August 2014 Release Document Version: August 22, SuccessFactors Learning Programs Administration Guide

Mobile Secure Cloud Edition Document Version: ios Application Signing

SAP BusinessObjects Analysis, edition for Microsoft Office Document Version: What's New Guide

SuccessFactors HCM Suite November 2014 Release Version: December 5, SuccessFactors Learning Programs Administration Guide

How to Configure Access Control for Exchange using PowerShell Cmdlets A Step-by-Step guide

Mobile Secure Cloud Edition Document Version: Mobile Application Management

SAP Operational Process Intelligence Security Guide

SAP Business Intelligence Suite Patch 10.x Update Guide

PUBLIC Supplement for J.D. Edwards

CUSTOMER SAP Afaria Overview

CUSTOMER Presentation of SAP Predictive Analytics

BlackBerry Enterprise Service 10. Universal Device Service Version: Administration Guide

Mobility Manager 9.5. Users Guide

How-To Guide SAP Cloud for Customer Document Version: How to Configure SAP HCI basic authentication for SAP Cloud for Customer

SAP Best Practices for SAP Mobile Secure Cloud Configuration March 2015

Android App User Guide

SAP Customer Influence Guide

SAP HANA Client Installation and Update Guide

CA Mobile Device Management 2014 Q1 Getting Started

System Requirements and Technical Prerequisites for SAP SuccessFactors HCM Suite

What's New in SAP HANA Spatial (Release Notes)

SAP BusinessObjects BI Platform Document Version: Recommendations for Conversion Using the Report Conversion Tool

Compliance Rule Sets in MaaS360

CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version ForeScout Mobile

Architecture and Data Flow Overview. BlackBerry Enterprise Service Version: Quick Reference

Administration Guide. BlackBerry Enterprise Service 12. Version 12.0

Introduction to Google Apps for Business Integration

Advanced Configuration Steps

Integration Guide. SafeNet Authentication Service. SAS Using RADIUS Protocol with Microsoft DirectAccess

PUBLIC SAP IT Operations Analytics 1.0: Administrator's and User's Guide

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android

SAP BusinessObjects Document Version: 4.1 Support Package Dashboards and Presentation Design Installation Guide

MaaS360 Cloud Extender

MaaS360 On-Premises Cloud Extender

WatchDox Administrator's Guide. Application Version 3.7.5

Administration Guide BES12. Version 12.3

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown

Certificate Management

Visualization Extension Plugin Version: Visualization Extension Plugin for SAP Web IDE

Installation Guide: Agentry Device Clients SAP Mobile Platform 2.3

Configuration Guide. BES12 Cloud

Citrix Receiver. Configuration and User Guide. For Macintosh Users

UP L18 Enhanced MDM and Updated Protection Hands-On Lab

Mobile app for Android Version 1.0.x, January 2014

How-To Guide SAP Cloud for Customer Document Version: How to replicate marketing attributes from SAP CRM to SAP Cloud for Customer

Introduction to the Secure Gateway (SEG)

SAP NetWeaver Identity Management Identity Services Configuration Guide

PUBLIC Preferences Setup Automated Analytics User Guide

Integrating Autotask Service Desk Ticketing with the Cisco OnPlus Portal

Oracle Enterprise Manager

User Guide. BES12 Self-Service

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

CUSTOMER Android for Work Quick Start Guide

Introduction to PowerShell Integration

Setting up Visual Enterprise Integration (WM6)

Sophos Mobile Control as a Service Startup guide. Product version: 3.5

CUSTOMER Installing SAP Afaria

FOR WINDOWS FILE SERVERS

Security Provider Integration RADIUS Server

Product Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15

Virtual Contact Center

CA Performance Center

HOTPin Integration Guide: DirectAccess

Sophos Mobile Control Startup guide. Product version: 3

Managing policies. Chapter 7

Introduction to the EIS Guide

Sophos Mobile Control Startup guide. Product version: 3.5

P R O V I S I O N I N G O R A C L E H Y P E R I O N F I N A N C I A L M A N A G E M E N T

Configuration (X87) SAP Mobile Secure: SAP Afaria 7 SP5 September 2014 English. Building Block Configuration Guide

Upgrade: SAP Mobile Platform Server for Windows SAP Mobile Platform 3.0 SP02

CA Nimsoft Monitor. Probe Guide for Cloud Monitoring Gateway. cuegtw v1.0 series

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

CA Nimsoft Monitor. Probe Guide for Active Directory Response. ad_response v1.6 series

Symantec AntiVirus Corporate Edition Patch Update

How-To Guide SAP NetWeaver Document Version: How To Guide - Configure SSL in ABAP System

Polycom RSS 4000 / RealPresence Capture Server 1.6 and RealPresence Media Manager 6.6

Technical Certificates Overview

Symantec Mobile Management 7.2 MR1Quick-start Guide

Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide

ALTIRIS Software Delivery Solution for Windows 6.1 SP3 Product Guide

How To Configure A Bomgar.Com To Authenticate To A Rdius Server For Multi Factor Authentication

Certificate Management

CA Nimsoft Monitor Snap

Windows Server Update Services 3.0 SP2 Step By Step Guide

Content Filtering Client Policy & Reporting Administrator s Guide

SAP Mobile - Webinar Series SAP Mobile Platform 3.0 Security Concepts and Features

Citrix Receiver. Configuration and User Guide. For Windows Users

SAP Business One mobile app for ios. Version 1.9.x September 2013

How To Configure A Windows 8.1 On A Windows (Windows) With A Powerpoint (Windows 8) On A Blackberry) On An Ipad Or Ipad (Windows 7) On Your Blackberry Or Black

How to Configure an Example SAP Cloud Applications Studio (PDI) Solution for SAP Cloud for Customer

Securing Enterprise Mobility for Greater Competitive Advantage

CA Nimsoft Monitor. Probe Guide for NT Event Log Monitor. ntevl v3.8 series

Building a BYOD Program Using the Casper Suite. Technical Paper Casper Suite v9.4 or Later 17 September 2014

Good Share Client User Guide for ios Devices

SAP HANA SPS 09 - What s New? Administration & Monitoring

Mobile Device Management Version 8. Last updated:

Transcription:

Afaria Document Version: 1-2014-03-24 How to Install and Configure Access Control for E-mail

Table of Contents 1 Introduction.... 3 1.1 Access Control Overview....3 1.2 Access Control Requirements.... 3 1.3 Devices Supported.... 4 2 Configuring Connectivity through Enterprise Connector....5 3 Setting Up Access Control for Email using Exchange PowerShell Commandlets....6 4 Configuring Afaria for Access Control....8 4.1 Configuring Exchange ActiveSync for ios Devices....8 4.2 Required Variables While Creating/Editing an ios or Android Enrollment Policy....9 4.3 Examples for Using Substitution Variables When Creating/Editing an Android or ios Configuration Policy....9 4.4 Required E-Mail Formats for Android Devices.... 11 5 Defining Access Control Policies....12 5.1 Access Control Policy Conflict Resolution....12 5.2 Defining an Access Control Policy for Android....12 5.3 Defining an Access Control Policy for ios....13 5.4 Defining an Access Control Policy for Windows Phone....14 5.5 Managing a Domain for Access Control.... 15 5.6 Primary Domain/Accepted Domains Scenarios.... 16 5.7 Defining an Access Control Policy to Block or Allow by Group....17 5.8 Providing Access Control Information While Creating/Editing an ios Enrollment Policy....18 6 Managing Devices....21 6.1 Manually Adding a Device for Access Control....21 6.2 Viewing Access Control Information of a Device....22 6.3 Access Control Device List....23 6.4 Editing Device Information of an ios Device....24 7 Troubleshooting.... 27 2 2014 SAP AG or an SAP affiliate company. All rights reserved. Table of Contents

1 Introduction This document describes how to install and configure the Access Control for E-mail component, including managing access control in a local e-mail environment and configuring access control policies. 1.1 Access Control Overview The Access Control for E-mail component adds a layer of protection to your enterprise e-mail platforms by filtering mobile device synchronization requests according to your access control policies. Access control discards any synchronization requests that do not meet the policies you defined on the Afaria server and saved to the Afaria database. Access control policies include the list of known devices, their associated policies, and any defined polices for unknown devices. 1.2 Access Control Requirements For PowerShell Commandlets For the Afaria Access Control for Email feature, the commandlet implementation uses PowerShell commands that are native to the Exchange environment and are called from the Afaria server. The Exchange environment may be local or hosted. Component Description Local Email Server Microsoft Exchange Server 2013 Microsoft Exchange Server 2010 Hosted Email Microsoft Office 365 PowerShell Host Server Microsoft PowerShell Version 2.0 The PowerShell virtual directory is created when you install Exchange. Enable the PowerShell remote command capability by enabling Basic Authentication on the virtual directory in IIS. Introduction 2014 SAP AG or an SAP affiliate company. All rights reserved. 3

1.3 Devices Supported Access Control for E-mail is supported only for Android, ios, and Windows Phone devices; it is not supported for BlackBerry devices. For more information, see the SAP Mobile Secure, Cloud Edition System Requirements document. 4 2014 SAP AG or an SAP affiliate company. All rights reserved. Introduction

2 Configuring Connectivity through Enterprise Connector Afaria uses the enterprise connector in order to connect to your Exchange server. For more information, see the Enterprise Resource Access Guide. Configuring Connectivity through Enterprise Connector 2014 SAP AG or an SAP affiliate company. All rights reserved. 5

3 Setting Up Access Control for Email using Exchange PowerShell Commandlets Set up access control for hosted email by configuring Office 365 or local email using Microsoft Exchange PowerShell commandlets. The PowerShell virtual directory is created when you install Exchange. Enable the powershell remoting by enabling Basic Authentication on the virtual directory in IIS. E-mail services are available locally, where a local Exchange server is used. E-mail services are also hosted by a third-party and are available to users from the Internet, without any e-mail servers or related Afaria components inside the enterprise network or DMZ. Afaria server communicates with Exchange for updating device status. You can configure access control for local email by using the Exchange PowerShell commandlets. Afaria uses the following API calls on the Exchange server: Get-ActiveSyncDevice Get-CASMailbox Set-CASMailbox For more information on these Microsoft Exchange server API calls, refer to Microsoft Exchange documentation. In addition to the API calls on the Exchange server, Afaria also issues some setup commands to initiate the remote PowerShell session with the Exchange server. 1. Log in to the Afaria Administration console. 2. Navigate to the Server Configuration MS Exchange page. Devices with ISAPI account and MS Exchange account cannot co-exist in a tenant as this configuration is not supported. Ensure that this page is empty if the tenant is supposed to be used for local exchange. 3. Click New. 4. Enter the following information: URL Enter the URL of the hosted or local Exchange server. Account Username Enter the hosted or local Exchange Admin User ID. Create a user that is a member of the Exchange Organization Managers group so that the user will have minimum permission to execute PowerShell commands. Password Enter the hosted or local Exchange Admin password. Ensure that MS Exchange account credentials have Administrator privileges. 5. Click Test connection to authenticate the account credentials and test connectivity for the local Exchange or hosted accounts. If the account credentials are valid, you see a success message; otherwise, you see an error message. 6 2014 SAP AG or an SAP affiliate company. All rights reserved. Setting Up Access Control for Email using Exchange PowerShell Commandlets

6. Click Save. When MS Exchange triggers e-mail blocking using access control, it may take as long as 10 minutes for Exchange to block e-mail messages. 7. To specify local or hosted service Exchange ActiveSync Access Settings, select one of: Always allow allow users who have enrolled in Afaria management to access hosted or local MS Exchange. Always block or quarantine prevent all users who are not enrolled in Afaria management from accessing hosted or local MS Exchange. Afaria sends a device enablement message when it is enrolled in the Always allow mode for enhanced security. 8. Click Save. 9. (Optional) Change or delete a record by selecting it and clicking Edit or Delete. After a device is enrolled in Afaria, it will use the access policy that is set for the device. Setting Up Access Control for Email using Exchange PowerShell Commandlets 2014 SAP AG or an SAP affiliate company. All rights reserved. 7

4 Configuring Afaria for Access Control This section describes how to configure Afaria to use Access Control. 4.1 Configuring Exchange ActiveSync for ios Devices Configure an Exchange ActiveSync account with a Microsoft Exchange server. You can create a policy for users by specifying the user name, host name, and e-mail address, or only the host name. This task is applicable for hosted e-mail and local e-mail environments. 1. From the Afaria Administrator Web Console, click the Policy tab. 2. Do one of the following: To create a new ios Configuration policy, click New Configuration ios and provide information on the Summary page. To edit an existing ios Configuration policy, select the policy from the list and click Edit. 3. Expand the MDM Payload menu and select Exchange ActiveSync. 4. Click Add. 8 2014 SAP AG or an SAP affiliate company. All rights reserved. Configuring Afaria for Access Control

5. Provide the following information: Name: Enter a unique name. Host: Enter the host. For example, m.outlook.com. Domain Host: Leave this field blank or add an administrative e-mail address. User: Enter an Exchange 365 e-mail address. For example, BlockMe@afaria13.onmicrosoft.com. Password: Enter your password. If you want to use substitution variables, click the Substitution link next to the following boxes and select the variables indicated below: Domain Host: Use the variable %S.ExchangeDomain%. If you use the %S.ExchangeDomain% variable, configure the enrollment policy so that either the domain is specified on the General page or the Exchange Domain device prompt is selected on the Variable page. User: Use the variable %S.ExchangeUser%. E-mail Address: Use the variables %S.ExchangeUser% and %S.ExchangeDomain%. The format is %S.ExchangeUser%@%S.ExchangeDomain%. Password: Use the variable %S.ExchangePassword%. 4.2 Required Variables While Creating/Editing an ios or Android Enrollment Policy When you are creating and editing an ios or Android enrollment policy, add the following variables: ExchangeDomain (for Exchange and Domino environments) ExchangePassword (for Exchange and Domino environments) ExchangeUser (for Exchange and Domino environments) UserName 4.3 Examples for Using Substitution Variables When Creating/Editing an Android or ios Configuration Policy This section provides examples of how to use substitution variables when creating or editing an Android or ios configuration policy. Configuring Afaria for Access Control 2014 SAP AG or an SAP affiliate company. All rights reserved. 9

Example 1 When creating or editing a configuration policy for built-in email on a Samsung device from Policy Edit Android Configuration Samsung Exchange account policy page, you can use substitution variables for: Domain %S.ExchangeDomain% Email Address %S.ExchangeUser%@%S.ExchangeDomain%. In case of built in email account, configuration policy fetches ASID for Android devices are supported to MDM 2.0 or 2.0 + devices. Example 2 While creating or editing a configuration policy for NitroDesk from Policy Edit Android Configuration Account configuration page, you can use substitution variables for: User ID %S.ExchangeUser% Password %S.ExchangePassword% Email Address %S.ExchangeUser%@%S.ExchangeDomain% Domain - %S.ExchangeDomain% 10 2014 SAP AG or an SAP affiliate company. All rights reserved. Configuring Afaria for Access Control

Example 3 While creating or editing a configuration policy for ios from Policy Edit ios Configuration Exchange ActiveSync page, you can use substitution variables for: Host subcas. %S.ExchangeDomain%, where subcas is a sample CAS server name. Domain Host Do not include %S.ExchangeDomain% for Domain Host. However, if you choose to use the substitution variable %S.ExchangeDomain%, ensure that the domain is specified on enrollment policy General page or Exchange domain prompt is selected on Enrollment policy Variable page. User %S.ExchangeUser% Email Address %S.ExchangeUser%@%S.ExchangeDomain% Password %S.ExchangePassword%. You can also choose to leave the Password field blank. 4.4 Required E-Mail Formats for Android Devices For Android devices, the e-mail user name requirement for Access Control for Email varies according to your enterprise environment. Ensure that users enter the information correctly. On the device's configuration page ( Afaria Configuration ), the e-mail user name must comply with your e-mail server's requirement for user name. The format, as observed in table A_ANDROID_DEVICES, is: domain\user user@domain Configuring Afaria for Access Control 2014 SAP AG or an SAP affiliate company. All rights reserved. 11

5 Defining Access Control Policies Access Control Policies define default synchronization policies, by device type or by group, for devices that synchronize with your enterprise s e-mail environment, including those that are not managed by Afaria. Email can be configured manually on the device or can be configured through Afaria configuration policy. 5.1 Access Control Policy Conflict Resolution When a device is subject to more than one access control policy, the most restrictive policy takes precedence. Example For example, if an Android device is subject to a default policy for Android that allows access, and a group policy that blocks access, then the device is blocked from synchronizing with the e-mail server. 5.2 Defining an Access Control Policy for Android Define a default access control policy to manage e-mail synchronization for Android devices that enroll or reenroll in Afaria device management. When both group policies and device type policies are defined, the most restrictive policy is the one that takes effect. To use Afaria access control to manage email on an Android device, ensure the Exchange account is configured through Afaria. Email from unmanaged accounts is blocked by default. For Samsung devices with KNOX installed, provision the Exchange account through the Samsung KNOX Exchange Account configuration policy; for devices using NitroDesk TouchDown, use the NitroDesk Account configuration policy; for other devices, use the appropriate LG or Samsung SAFE Exchange account configuration policy. Changing the default policy affects only newly enrolling or re-enrolling devices; Afaria does not retroactively apply such changes to devices that are already enrolled. If an enrolled Android device has been assigned an access control policy other than the default policy, reenrolling the device assigned that same policy. 1. From the Afaria Administrator Web console, click Server Configuration. 2. Navigate to the Component Access Control Option page. 3. Click on the Access Policy tab. For the best control of access control policy on Android devices, configure NitroDesk by Afaria. 12 2014 SAP AG or an SAP affiliate company. All rights reserved. Defining Access Control Policies

4. On the Android tab, indicate the access policy action parameters. Always allow allow synchronization requests at all times. Always block block synchronization requests at all times. If a device unknown policy is set to "Always block", then you cannot manually configure NitroDesk and native client on the Android device. If NitroDesk and native client has to be manually configured on the Android device, then the device unknown policy should be set to "Always allow". Allow when: Administrator setting enabled allow synchronization requests if Afaria is installed on the device with Afaria administrator privileges activated Password policy enabled allow synchronization requests if the user ignores password prompt a few times while connecting to Afaria on the device Device not compromised allow synchronization requests if the device's most recent device connection did not report the device's status as rooted. Device connected within xx days and xx hours allow synchronization requests if the device is connected within the number of days and hours specified. 5.3 Defining an Access Control Policy for ios Define a default access control policy to manage e-mail synchronization for ios devices that enroll or reenroll in Afaria device management. Access control policies are prioritized in this order: group-level policy, device-level policy, server-level policy. 1. On the Home page Server tile, click Configuration. 2. Navigate to the Component Access Control Option page. 3. Click the Access Policy tab. Defining Access Control Policies 2014 SAP AG or an SAP affiliate company. All rights reserved. 13

4. Select the ios tab, indicate the access policy action parameters. Always allow allow synchronization requests at all times. Always block block synchronization requests at all times. Allow when: Administered by mobile device management the device is under Afaria ios mobile device management (MDM) control. Afaria installed and device connected within xx days and xx hours Afaria is installed on the device and the device is connected within the number of days and hours specified here. If Afaria application is removed from the device, access is blocked. Assigned policy delivered within xx days and xx hours assigned policies are reported to the Afaria server as delivered and installed on the device within the number of days and hours specified here, and as verified in the Policy Delivery log. Device hardware encrypted the device has the hardware encryption feature enabled. Device uncompromised the device's most recent connection did not report the device's status as jailbroken. 5.4 Defining an Access Control Policy for Windows Phone Define a default access control policy to manage e-mail synchronization for Windows Phone devices that enroll or reenroll. When both group policies and device type policies are defined, the most restrictive policy prevails. You can manage Access Control policy for Windows Phone devices only if email is configured through an Afaria configuration policy. Changing the default policy impacts only newly enrolling or reenrolling devices; Afaria does not retroactively apply a change to previously enrolled devices. 1. On the Home page Server tile, click Configuration to open the Server Configuration page. 2. Navigate to the Component Access Control Option page. 3. Click the Windows Phone tab. 4. Select the default policy: 14 2014 SAP AG or an SAP affiliate company. All rights reserved. Defining Access Control Policies

Always allow allow synchronization requests at all times. Always block block synchronization requests at all times. Allow when: Administered by mobile device management allow synchorinization requests if the device is under Afaria Windows Phone mobile device management (MDM) control. Allow when connected within time frame allow synchronization requests if the device's most recent device connection occurred within the defined time frame. 5. Click Save to save the access control policy. 5.5 Managing a Domain for Access Control Add, modify, or delete an Exchange server domain for access control. 1. On the Home page Server tile, click Configuration. 2. Navigate to the Component Access Control Option page. 3. Click the Domains tab. 4. Click Add. Defining Access Control Policies 2014 SAP AG or an SAP affiliate company. All rights reserved. 15

Enter the primary domain of the tenant. A primary domain maps to the network domain on which the server resides. Select the required access control policy. Specify the retry rate, in minutes. The minimum value for retry rate is 5 minutes. If you have set the value of retry rate below 5 minutes using the previous version of Afaria, the minimum value of retry rate will be set to 5 minutes after upgrading to SP4 release. Retry rate is the interval time (in minutes) for a domain, based on the HTTP client requests that are made to the Afaria server. Retry rate lists the known devices for that domain, along with their Always allow or Always block status. Enter accepted domains of a primary domain. You can add multiple accepted domains, separated by a comma. There is no limit on the number of accepted domains. The name of each accepted domain must be fewer than 65 characters in length. The total list of accepted domains, including comma separators, must be fewer than 2550 characters in length. Exchange servers often host e-mail messages for multiple domains. Duplicate accepted domains are automatically deleted from the Accepted Domains field when you save the domain information. 5. Click Save. 6. (Optional) To make changes to a domain, click the Domains tab, select the domain to change, then click Edit or Delete. 5.6 Primary Domain/Accepted Domains Scenarios This section discusses couple of primary domain and accepted domains scenarios. Only FQDN values are supported these scenarios. You cannot configure NetBIOS domain name. Scenario 1: CAS 1 on one network domain and CAS 2 and CAS 3 are on a different network domain CAS A runs on domain domaina.com, services domains A.com, AA.com, and AAA.com. CAS B runs on domain domainb.com, services domains B.com, BB.com, and BBB.com. 16 2014 SAP AG or an SAP affiliate company. All rights reserved. Defining Access Control Policies

CAS C runs on domain domainb.com, services domains C.com, CC.com, and CCC.com. A primary domain maps to the network domain on which the server resides. The accepted domain list includes all supported e-mail domains. Therefore, this scenario has two primary domains on the Server Configuration Access Control Option page: One primary domain for domaina.com with accepted domains A.com, AA.com, and AAA.com One primary domain for domainb.com with accepted domains B.com, BB.com, BBB.com, C.com, CC.com, and CCC.com. Scenario 2: CAS 1, CAS 2, and CAS 3 on different network domains CAS A runs on domain domaina.com, services domains A.com, AA.com, and AAA.com. CAS B runs on domain domainb.com, services domains B.com, BB.com, and BBB.com. CAS C runs on domain domainc.com, services domains C.com, CC.com, and CCC.com. A primary domain maps to the network domain on which the server resides. The accepted domain list includes all supported e-mail domains. Therefore, this scenario has three primary domains on the Server Configuration Access Control Option page: One primary domain for domaina.com with accepted domains A.com, AA.com, and AAA.com One primary domain for domainb.com with accepted domains B.com, BB.com, and BBB.com One primary domain for domainc.com with accepted domains C.com, CC.com, and CCC.com. 5.7 Defining an Access Control Policy to Block or Allow by Group To allow or block e-mail synchronization requests by group, create group-specific policy. When both group policies and device type policies are defined, the most restrictive policy prevails. Blocking and allowing by groups can let you block devices that do not meet some criteria, or allow devices that meet some criteria. You define dynamic group with your criteria to use with this feature. The frequency of the Dynamic Group Refresh schedule, access control polling interval, and device inventory reporting all affect when a group policy goes into effect on a device. 1. On the Home page Server tile, click Configuration to open the Server Configuration page. 2. Navigate to the Component Access Control Option page. 3. Click the Groups tab. 4. (Optional) For blocking specific groups, in the block area, select a group in the available list and click the Arrow icon to move it to the selected list. Defining Access Control Policies 2014 SAP AG or an SAP affiliate company. All rights reserved. 17

5. (Optional) For allowing groups, in the allow area, click Enable, select a group in the available list and click the Arrow icon to move it to the selected list. 6. Click Save. If you create policies that conflict for a device, the most restrictive policy prevails. 5.8 Providing Access Control Information While Creating/ Editing an ios Enrollment Policy You can set an access control policy for an ios device while creating or editing an ios enrollment policy. 18 2014 SAP AG or an SAP affiliate company. All rights reserved. Defining Access Control Policies

1. From the Afaria Administrator Web console, click the Policy tab. 2. Click New Enrollment ios. 3. In the left pane, select General. 4. Provide the following information in the Access Control section: Domain domain node of the e-mail address, expressed as a fully qualified domain. Policy accept (use default policy) or override (use explicit policy) the enterprise default policy for ios, as defined in the ios tab in the Server Configuration Access Control Option page. If you choose to use the explicit policy, select one of the following options: Always allow allow synchronization requests at all times. Always block block synchronization requests at all times. Allow when Administered by mobile device management the device is under Afaria ios mobile device management (MDM) control. Afaria installed Afaria is installed on the device and the device is connected within the number of days and hours specified in the Server Configuration Access Control Option page. If Afaria application is removed from the device, access is blocked. Assigned policy delivered assigned policies are reported to the Afaria server as delivered and installed on the device within the number of days and hours specified in the Server Configuration Access Control Option page, and as verified in the Policy Delivery log. Device hardware encrypted the device has the hardware encryption feature enabled. Device uncompromised the device's most recent connection did not report the device's status as jailbroken. 5. In the left pane, select Variable and add enrollment variables: a) Click Add b) Select one of the following variables: Defining Access Control Policies 2014 SAP AG or an SAP affiliate company. All rights reserved. 19

ExchangeDomain (for Exchange and Domino environments) ExchangePassword (for Exchange and Domino environments) ExchangeUser (for Exchange and Domino environments) UserName c) Enter a valid device prompt. d) Indicate whether to mask the device with asterisk (*) characters as the user types. e) Click the green checkmark to save the enrollment variable. f) Repeat for the remaining variables. 20 2014 SAP AG or an SAP affiliate company. All rights reserved. Defining Access Control Policies

6 Managing Devices This section provides tasks for manually adding a device for access control and for viewing and editing the access control settings applied to a device. 6.1 Manually Adding a Device for Access Control To manage access control to the e-mail server for devices (except ios) that are not enrolled in Afaria management, manually add the device to the access control device list. ios devices do not follow this procedure. Access control of ios devices is managed only when it is enrolled with the Afaria server. Manually add a device when it: synchronizes with your e-mail server but is not managed by Afaria. has, or will have, an installed Afaria application that has not connected to the server yet, and you want to ensure that the first synchronization request is managed with a non-default policy. To add a device manually: 1. From the Afaria Administrator Web console, click Server Configuration. 2. Navigate to the Component Access Control Option page. 3. Click the Devices tab. 4. Click Add. 5. Complete the new device information. Managing Devices 2014 SAP AG or an SAP affiliate company. All rights reserved. 21

Device identifier (ActiveSync ID (ASID)) of the device that is synchronizing with the email environment. User name the user node of the fully qualified e-mail user name used to synchronize with the email server. Domain the domain node of the fully qualified e-mail user name used to synchronize with the email server. 6. Select the operating sytem of the device. 7. Select an access control policy for the device. 8. Click Save. 6.2 Viewing Access Control Information of a Device To view access control information for Android and ios devices, use the Device Inspector. 1. From Afaria Administrator Web console, click the Device tab. 2. Select a device. 3. Click the Show/Hide Inspector icon. 22 2014 SAP AG or an SAP affiliate company. All rights reserved. Managing Devices

The Device Inspector displays the following information about access control: Access control policy that is applicable to the device Current access policy state for the device: allowed or blocked Device compliance state: Whether the device is compliant or not Last remediation timestamp for the device 6.3 Access Control Device List Afaria displays access control devices and their policy assignments in different locations of the user interface, depending upon the device type. Assignment locations include: Android, Windows Mobile, and Windows Phone Access Control Option Devices page tab. On the Devices tab, the device list displays your Afaria devices and white list devices that are access control devices. The Afaria server populates this list with Afaria devices after it assigns a synchronization policy to a connecting device. White list devices populate the list as you add them. Therefore, the list starts empty and grows as each Afaria device connects and receives its synchronization policy assignment, and as you manually add devices. When an Android device does not contain a known ActiveSync ID or an Exchange User ID, Access Control ID displays the value NOT_EXCHANGE followed by the client GUID. ios Device List page Managing Devices 2014 SAP AG or an SAP affiliate company. All rights reserved. 23

6.4 Editing Device Information of an ios Device Edit device information, such as device name, device ownership type, values for user variables, Self-Service Portal registered username, and Afaria Access Control for E-mail policy. You can edit information for an ios device by following the procedure below from Device Inspector page, or you can select an ios device from the Device page and click the Modify Access Control Policy icon. 1. From Afaria Administrator Web console, click the Device tab. 2. On the Device page, select a device. 3. On the top toolbar, click Edit. 4. Edit data as appropriate in the Device Edit page. 24 2014 SAP AG or an SAP affiliate company. All rights reserved. Managing Devices

Device click Setup to open the ID Setup dialog and select naming options: (Optional) Optional Prefix enter a prefix to use for the name. For example "Sales_". (Optional) Data Column select a data item to concatenate with the prefix. Selecting something meaningful to your organization can help facilitate effective searching, create a value for building custom views, or differentiate like-named devices. Device Owner set a corporate or personally owned device or reset to default value. (SSP) Registered User device user name, as a user would provide for WindowsNT or LDAP authentication in your Afaria environment, such as Domain\UserName. If users have enrolled in management, this is the user name they provided for authentication on the Afaria Self-Service Portal or in response to a prompt for a user name. Managing Devices 2014 SAP AG or an SAP affiliate company. All rights reserved. 25

Notification Address if a phone number is unavailable for SMS messaging, enter the address to which the server sends outbound notifications for configuring the Afaria application. E-mail Address and password e-mail address and password for access control policy. Access Control Policy click Setup to open the Device Access Control Policy Setup dialog. Accept (use default policy) or override (use explicit policy) the enterprise default policy for ios, as defined on the ios tab on the Server Configuration Access Control Option page. Select one of the following options to use an explicit policy: Always allow allow synchronization requests at all times. Always block block synchronization requests at all times. Allow when: Administered by mobile device management the device is under Afaria ios mobile device management (MDM) control. Afaria installed the Afaria App Store application is installed. Assigned policy delivered assigned policies are reported to the Afaria server as delivered and installed on the device, as verified in the Policy Delivery log. Device hardware encrypted the device has the hardware encryption feature enabled. Device uncompromised the device's most recent connection did not report the device's status as jailbroken. 5. (Optional) Substitution if you include user-defined substitution variables in policies that are planned for this device, define values for the appropriate variables. If the variable is not yet on the list, click Add to enter the variable name and value for the current device, as appropriate for your requirements. The variables on the list are global for the current tenant. The values you define for the variables are for only the current device. 6. On the top of the page, click Save. 26 2014 SAP AG or an SAP affiliate company. All rights reserved. Managing Devices

7 Troubleshooting If a device is not receiving e-mail, track down the relevant entries in the log file and in the Devices.xml file, and: Make sure that the ActiveSync IDs (ASIDs) in the files C:\Windows\System32\config\systemprofile \AppData\Roaming\Devices.xml and C:\Windows\System32\config\systemprofile\AppData \Roaming\NewDevices.xml agrees. Verify that the Exchange account information in both the files agree. Ensure the device is not being blocked because Afaria believes it to be out of compliance with policy. To manage access control for an Android device, proper ASID must appear in the Server Configuration Component Access Control Option Device tab. NOT_EXCHANGE is not treated as an ASID of the device. If the device reports NOT_EXCHANGE, unknown policy will be applied on the Android device. If an Android device reports NOT_EXCHANGE, perform the following steps: 1. Delete the device record from the Server Configuration Component Access Control Option Device tab. 2. Wait for the polling time set on the Server Configuration Component Access Control Option Domain page. 3. Follow the steps mentioned in the topic Manually Configuring an E-mail Application for Android Devices While Using an Access Control Policy. Troubleshooting 2014 SAP AG or an SAP affiliate company. All rights reserved. 27

8 Important Disclaimers on Legal Aspects This document is for informational purposes only. Its content is subject to change without notice, and SAP does not warrant that it is error-free. SAP MAKES NO WARRANTIES, EXPRESS OR IMPLIED, OR OF MERCHANTABILITY, OR FITNESS FOR A PARTICULAR PURPOSE. Coding Samples Any software coding and/or code lines / strings ("Code") included in this documentation are only examples and are not intended to be used in a productive system environment. The Code is only intended to better explain and visualize the syntax and phrasing rules of certain coding. SAP does not warrant the correctness and completeness of the Code given herein, and SAP shall not be liable for errors or damages caused by the usage of the Code, unless damages were caused by SAP intentionally or by SAP's gross negligence. Accessibility The information contained in the SAP documentation represents SAP's current view of accessibility criteria as of the date of publication; it is in no way intended to be a binding guideline on how to ensure accessibility of software products. SAP specifically disclaims any liability with respect to this document and no contractual obligations or commitments are formed either directly or indirectly by this document. Gender-Neutral Language As far as possible, SAP documentation is gender neutral. Depending on the context, the reader is addressed directly with "you", or a gender-neutral noun (such as "sales person" or "working days") is used. If when referring to members of both sexes, however, the third-person singular cannot be avoided or a gender-neutral noun does not exist, SAP reserves the right to use the masculine form of the noun and pronoun. This is to ensure that the documentation remains comprehensible. Internet Hyperlinks The SAP documentation may contain hyperlinks to the Internet. These hyperlinks are intended to serve as a hint about where to find related information. SAP does not warrant the availability and correctness of this related information or the ability of this information to serve a particular purpose. SAP shall not be liable for any damages caused by the use of related information unless damages have been caused by SAP's gross negligence or willful misconduct. Regarding link classification, see: http://help.sap.com/disclaimer 28 2014 SAP AG or an SAP affiliate company. All rights reserved. Important Disclaimers on Legal Aspects

Important Disclaimers on Legal Aspects 2014 SAP AG or an SAP affiliate company. All rights reserved. 29

www.sap.com/contactsap 2014 SAP AG or an SAP affiliate company. All rights reserved. No part of this publication may be reproduced or transmitted in any form or for any purpose without the express permission of SAP AG. The information contained herein may be changed without prior notice. Some software products marketed by SAP AG and its distributors contain proprietary software components of other software vendors. National product specifications may vary. These materials are provided by SAP AG and its affiliated companies ("SAP Group") for informational purposes only, without representation or warranty of any kind, and SAP Group shall not be liable for errors or omissions with respect to the materials. The only warranties for SAP Group products and services are those that are set forth in the express warranty statements accompanying such products and services, if any. Nothing herein should be construed as constituting an additional warranty. SAP and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP AG in Germany and other countries. Please see http://www.sap.com/corporate-en/legal/copyright/ index.epx for additional trademark information and notices.