© 2014 IBM Corporation Mobile Customization & Administration IBM Connections 5.0 Workshop Author: Paul Godby IBM Ecosystem Development Duration: 30 minutes.

Slides:



Advertisements
Similar presentations
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
Advertisements

Windows 8.1 Device Management With Windows Intune Mark O’Shea MVP Windows Expert – IT Pro 30 June 2014.
IPads Everywhere! Management Considerations for the Enterprise Bill Morrison Director of Technology, Rapides Parish School District
Desktop Central Managing Desktops, Servers & Devices Romanus Prabhu R Technical Account Manager LinkedIn : romanus.prabhu.
Sophos Mobile Control. Tablets on the rise 2 Trends 3 75% of 157 polled companies encourage employee owned smart phones and tablets to access corporate.
1 Configuring Internet- related services (April 22, 2015) © Abdou Illia, Spring 2015.
Lesson 17: Configuring Security Policies
1 Configuring Web services (Week 15, Monday 4/17/2006) © Abdou Illia, Spring 2006.
Protect your data Enable your users Unify Your Environment DevicesAppsData Help organizations enable their users to be productive on the devices they.
Desktop virtualization Access & information protection Mobile device & application management Hybrid identity Simplified device enrollment and.
4/17/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
TRIRIGA Anywhere 10.4 Beta Registration Steps
IOS 8 for MDM/EMM Greg Elliott Shiv Chandra Kumar.
ManageEngine ADAudit Plus A detailed walkthrough.
Tivoli Software © 2010 IBM Corporation Maximo Everyplace Lori Landesman.
Empower Enterprise Mobility Jasbir Gill Azure Mobility.
Windows Phone 8 device and app management Alan Meeus Sr. Technical Product Manager Windows Phone Division Microsoft Corporation WPH205.
Managing Client Access
Module 4 Managing Client Access. Module Overview Configuring the Client Access Server Role Configuring Client Access Services for Outlook Clients Configuring.
May 30 th – 31 st, 2006 Sheraton Ottawa. Microsoft Certificate Lifecycle Manager Saleem Kanji Technology Solutions Professional - Windows Server Microsoft.
Hands-On Microsoft Windows Server Security Enhancements in Windows Server 2008 Windows Server 2008 was created to emphasize security –Reduced attack.
Section 1: Introducing Group Policy What Is Group Policy? Group Policy Scenarios New Group Policy Features Introduced with Windows Server 2008 and Windows.
Module 7: Fundamentals of Administering Windows Server 2008.
Course ILT Internet/intranet support Unit objectives Use the Internet Information Services snap-in to manage IIS, Web sites, virtual directories, and WebDAV.
Extending Forefront beyond the limit TMG UAG ISA IAG Security Suite
1 Thomas Lippert Senior Product Manager - Mobile What’s new in SMC 5.0.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
…. PrePlanPrepareMigratePost Pre- Deployment PlanPrepareMigrate Post- Deployment First Mailbox.
TWSd - Security Workshop Part I of III T302 Tuesday, 4/20/2010 TWS Distributed & Mainframe User Education April 18-21, 2010  Carefree Resort  Carefree,
IFORM ACCOUNT MAINTENANCE ICT4D SESSION 4. IFORMBUILDER WEBSITE REQUIREMENTS To access the iFormBuilder website, you need the following items: -Reliable.
An Overview of Single Sign-On, Federation, Its Benefits, and Basic Procedures for Integrating Applications.
Lieberman Software Random Password Manager & Two-Factor Authentication.
Getting Started with Chatter Nina Jameson Senior Business Analyst, ISU-ITS (office)
Good MDM IOS Overview Presented by: Jerry Wen 02/09/2012.
Enabling users to be productive, responsibly Finding the right balance Devices & Experiences Users Want Applications and data across devices, anywhere.
Case Study.  Client needed to build data collection agents for various mobile platform  This needs to be integrated with the existing J2ee server 
Purpose Intended Audience and Presenter Contents Proposed Presentation Length Intended audience is all distributor partners and VARs This would be presented.
Gary Gruba Systems Engineer Absolute Manage MDM Managing iPhones, iPads, iPod Touches and Android Dougald MacNaughton Account Executive.
Module 9 User Profiles and Social Networking. Module Overview Configuring User Profiles Implementing SharePoint 2010 Social Networking Features.
1 Chapter Overview Creating Web Sites and FTP Sites Creating Virtual Directories Managing Site Security Troubleshooting IIS.
User and Device Management
Craig Pringle & Derek Moir
IBM Express Runtime Quick Start Workshop © 2007 IBM Corporation Deploying a Solution.
Secure Mobile Development with NetIQ Access Manager
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
What’s New in Fireware v WatchGuard Training.
© 2014 IBM Corporation Activity Streams Integration IBM Connections 5.0 Workshop Author: Paul Godby IBM Ecosystem Development Duration: 45 minutes.
© 2014 IBM Corporation iWidget Development IBM Connections 5.0 Workshop Author: Paul Godby IBM Ecosystem Development Duration: 45 minutes.
Business Objects XIr2 Windows NT Authentication Single Sign-on 18 August 2006.
JUNOS PULSE Junos PULSE for Windows Junos PULSE Mobile Security Suite.
© 2014 IBM Corporation Architecture & Deployment IBM Connections 5.0 Workshop Author: Paul Godby IBM Ecosystem Development Duration: 30 minutes.
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
Managing Devices in the Enterprise: From EMS zero to Hero in only 60 minutes Ken Goossens Herman Arnedo Mahr.
MaaS360 MDM for iOS, Android & Windows Phone 7
Barracuda Mobile Device Manager
Product Specialist Enterprise Mobility Technical Readiness EMEA
Configuring Windows Firewall with Advanced Security
Getting Started with Chatter
2016 Citrix presentation.
To Join the Teleconference
Migration for students
Which is right for your business, Office 365 or Microsoft 365?
Which is right for your business, Office 365 or Microsoft 365?
Configuring Internet-related services
Getting Started with UCSF Chatter
Chapter 10: Advanced Cisco Adaptive Security Appliance
Private Cloud Time Attendance System
D Guidance 26-Jun: Would like to see a refresh of this title slide
Microsoft 365 Business Technical Fundamentals Series
Presentation transcript:

© 2014 IBM Corporation Mobile Customization & Administration IBM Connections 5.0 Workshop Author: Paul Godby IBM Ecosystem Development Duration: 30 minutes

Agenda Overview Application Management Security Management

IBM Connections Mobile One application per mobile OS Regardless of the server deployment & level IBM Greenhouse Customer A x Customer N 5.0.x IBM SmartCloud ™

Architecture Server requirements Minimum Connections Mobile refresh (L061851)  Connections CR2 – added application management capabilities  Connections 4.0 CR1 – added mobile security management capabilities Connections Mobile enterprise appplication installed

Client Components Mobile apps iPhone, iPad, iPod Touch  iOS 6, 7 Android  Android BlackBerry  BlackBerry 6, 7 Microbrowser version Server Mobile Application Management Mobile Security Management

Agenda Overview Application Management Security Management

Customization Available since IBM Connections CR2 (and version 3.2 of the App) What can be customized? Custom login form Custom EULA Rebranding Add / remove services Rename services Add additional application launchers Customizations / extensions are defined in file: mobile-config.xml

Service customization By default, if a service is enabled in IBM Connections, it will be enabled on mobile An administrator can disable a mobile service by Setting enabled = false for the application in mobile-config.xml An administrator can remove a service from the home screen but make it available to other applications (ie: Files in Communities) by Setting displayInLauncher=false

Service customization – Files Additional configuration is available for the Files application

Rebranding You can rebrand: The App name  Only in the app itself! You will still see “IBM Connections” in Android or iOS The service labels used for various applications

Service Labels

Extensibility You can add additional services and include: Icons for different devices and densities Service label Service URL

Notifications When a user follows objects in Connections he/she will receive an digest By default, the digest only contains direct links to the Connections server apps To include additional links for mobile device access:

Custom URIs Connections Mobile App can be started from a browser, or another mobile app, on the device using the following URIs Launch App → ibmscp://com.ibm.connections/launch Open Profile → ibmscp://com.ibm.connections/profiles? | Open Community → ibmscp://com.ibm.connections/communities? Open File → ibmscp://com.ibm.connections/files? And More!!! → BlackBerry does not support ibmscp, so use an http prefix instead

Agenda Overview Application Management Security Management

Mobile Security Management Overview Designed to prevent data loss in the event of a lost or stolen device Provides Secure access to data stored on the device Ability to control user access to data Ability to remove enterprise data from the device (if needed) Capabilities Password retention policies for storing password on device Expose/hide addresses Allow/prevent geolocation information to be used Allow/prevent copy & paste in the app Allow/prevent app documents to be shared during sync (ie: iTunes) Available in IBM Connections 4.0+ Is not a full-fledged Mobile Device Management (MDM) solution  For full capabilities: MobileIron, McAfee, BigFix, Tango, Tivoli Endpoint Manager, etc.

Topology – Deployed on Connections server

Configure Mobile Administrators Enable MobileAdmin settings in mobile-config.xml Restart Mobile Administration application In the Integrated Solutions Console, map users to administrator role Mobile Administration URL:

Device Registration Initiated the first time the user logs in after installing the app on a device Registration process logs: User name Device name Device id Policy compliance status

Configuration Profile Provisioning occurs during app registration process on the device Upon login, application will check server for policy updates

Remote Wipe & Access Denial Administrator can issue Remote Wipe Request for a lost device Administrator can deny application access Reasons: lost device, security, functionality, performance, etc. If a lost device is recovered, administrator can clear Remote Wipe or Access Denial

Administration Audit Audit actions that can be enabled / disabled Device registration, Enable / disable Access Denial, Enable / disable Remote Wipe Configuration Inactive user reap interval  Length of time user can be inactive without being removed from registration Audit purge interval  Length of time an audit event should be retained in the database

Custom Login Form A custom login form can be defined for various authentication mechanisms such as TAM, SiteMinder, SPNEGO, etc. The Connections App presents the same login interface regardless of the login form/mechanism enabled in the environment

Custom EULA/Information page(s) Enterprise User License Agreement (EULA) or information pages can be defined to be presented to users before they are granted app access

Two factor client certificate authentication Requires the mobile user to provide a certificate during the login process Android 4.0+ Uses the unified keychain Can be installed via a p12 or ibmmbd file iOS Certificate must be installed in the app's keychain Must add “ibmmbd” extension to certificate to it can be opened by the app User gains access to ibmmbd file via website or ; User then opens the file in the Connections App to import it into the keychain See “Configuring access with client certificates” in wiki

Client certificate authentication flow The IBM Connections Mobile App Attempts to make a connection to the server Is challenged for a client certificate by the server Sends certificate to the server Is allowed to connect by the server Is challenged for IBM Connections server credentials Sends IBM Connections credentials Is granted access to all available services

Other settings Allow/prevent browser access to the mobile app. User will get redirected to appstore URL is web access is disabled Set the default service used when a user logs in

Thanks! Access FREE education on the IBM Collaboration Solutions portfolio of products today! 1. Visit the IBM Greenhouse and create a free account. Link → 1. Visit the IBM Collaboration Solutions Ecosystem Development Community Link → 1. Learn new skills and share these links with your friends and colleagues!