filesvova.blogg.se

Apple configurator 2 profile
Apple configurator 2 profile





  1. #APPLE CONFIGURATOR 2 PROFILE HOW TO#
  2. #APPLE CONFIGURATOR 2 PROFILE INSTALL#
  3. #APPLE CONFIGURATOR 2 PROFILE ZIP FILE#

The wizard’s user interface is different for Active Directory and CyberArk Cloud Directory services. This process leaves the base security policy profiles installed using Apple Configurator in place. This removes the additional policy profiles installed when the user logged in. When you receive preconfigured devices back from users, instruct them to click the Logout button on the Settings screen in the CyberArk Identity mobile app. If your license expires, you can no longer pre-configure iOS devices for bulk enrollment.

apple configurator 2 profile

However, pre-configuring is also available for 30 days after receiving your customer ID during your CyberArk Identity evaluation period. Preconfiguring iOS devices is a CyberArk Identity licensed feature. In addition, the base security policy profiles contain the wi-fi profiles you created in the Common Mobile Settings, excluding any WEP or WPA/WPA2 Enterprise profiles. The Apple Configurator wizard builds the base security policy profiles from the passcode and restrictions policies from the group policy object or policy set you created.

apple configurator 2 profile

The profiles are listed in the device’s Settings > General > Profiles screen.

#APPLE CONFIGURATOR 2 PROFILE INSTALL#

CyberArk Identity creates multiple profiles to install the full set of policies in the device. See Common Mobile Settings, iOS Settings for a summary of the mobile device policies for iOS devices. Which tool you use depends upon whether you use Active Directory or CyberArk Cloud Directory policy service to define the mobile device policies (see Select the policy service for device management). You can use either the Active Directory Group Policy Object Editor to create a group policy object or the Identity Administration portal to create a policy set. You create the full mobile device policy for the iOS devices before you use this wizard. If the user logs out of CyberArk Identity, the additional policy profiles are removed and only the base security policy profiles remain in place. When the user enrolls the device, CyberArk Identity installs additional profiles which contain the remainder of the policy settings for the device. See Apple Configurator Help for more information about this program. During the profile installation process, the devices are also enrolled in CyberArk Identity.

apple configurator 2 profile

#APPLE CONFIGURATOR 2 PROFILE ZIP FILE#

You then import the zip file into Apple Configurator to install the profiles in the devices. The Apple Configuration page provides a wizard which builds iOS profiles that contain the base security policy settings and stores them in a zip file. You use the Apple Configurator option to preconfigure iOS devices with a base security policy before you distribute them to your users.

#APPLE CONFIGURATOR 2 PROFILE HOW TO#

This topic describes how to use Apple Configurator to preconfigure iOS devices with a base security policy.







Apple configurator 2 profile