Cisco Systems MaaS360 manual MDM Profiles

Page 22

MDM Profiles

Device profiles are an important concept of mobile device management. They are defined as part of the MDM protocol implemented by the operating system. The concept can be extended to application profiles, but as discussed here, they are found under the settings of the device. Each profile can contain one or more payloads. A payload has all the attributes needed to provision some aspect of built-in system functions, such as PIN lock and Device Restrictions. Android and Apple differ in what payloads are supported. One special payload will be an MDM payload that defines the MDM server as the device administrator. There can only be one MDM payload installed on any device. The profile containing the MDM payload may not be locked and the user is free to delete it at any time. When this occurs, all other profiles installed by the MDM are also removed, essentially resulting in a corporate wipe.

The MDM may lock any profile that it installed to prevent the user from removing them individually. The MDM is allowed to inspect other profiles, such as the Wi-Fi profile installed by ISE, but is not allowed to remove any profile that it did not install. Since multiple profiles can be installed on a device and profiles have payloads, it is possible to have a payload collision. Devices with multiple security payloads will install all the payloads by aggregating the most secure settings from each. In most other cases the first payload is installed and subsequent payloads are ignored or multiple payloads are accepted. For example, the device can have multiple VPNs provisioned, but only one can be named XYZ.

MDM profiles can be applied to devices associated to users that belong to a user group. Configuring this with Fiberlink MaaS360, administrator will take following steps:

1.Configure Fiberlink MaaS360 Cloud Extender to import groups from Corporate Directory.

2.Create profiles as desired for different AD Group Types.

3.Bind Profiles to AD groups.

Figure 15 shows the creation of a profile.

On Fiberlink MaaS360 Administration Portal, Go to Security > Policy > Add Policy to create policies.

22Integrating Fiberlink MaaS360 with Cisco Identity Services Engine

Image 22
Contents Revised August 6 Page Page Fiberlink MaaS360 Capabilities and Features OverviewCapability Features Fiberlink MaaS360-Key Capabilities Deployment Models Getting Fiberlink MaaS360 Ready for ISE Import MDM Certificate to ISEExporting the MDM Site Certificate with Internet Explorer Grant ISE Access to the Fiberlink MaaS360 API Manage Administrator Account Add Account Add MDM Server to ISE Configure the MDM API on ISE Verify Connectivity to MDM Message ExplanationReview MDM Dictionaries Enterprise Integration DMZFiberlink MaaS360 Cloud Extender Download Cloud Extender Installation Wizard Active Directory/LDAP Integration AD Group MembershipsOwnership User Group Restrictions MDM Profiles Create Policies Shows the flow of this process Mobile Client Application-Fiberlink MaaS360 Agent MDM APNS/GCNDevice Ownership User Experience MDM On-boardingMDM Enrollment MDM Enrollment-Terms of Acceptance Enterprise Application Store Pass Code ComplexityInstallation of Maas360 Application Corporate Data Data at-RestCorporate Wipe Forced CoA from ISEEnd User Portal Verify Device ComplianceISE Compliance versus MDM Compliance Action Type Options Device Compliance/Restrictions Device Scanning IntervalsPINLockStatus Manually Updating the MDM ServerJailbroken or Rooted devices Manage Lost/Stolen DevicesRegisterStatus Application Distribution Cisco Applications Jabber, etc Conclusion Disclaimer