Edge | Enterprise iPhone and iPad Administrator's Guide | E-Book | www2.sack.de
E-Book

E-Book, Englisch, 392 Seiten

Edge Enterprise iPhone and iPad Administrator's Guide


1. ed
ISBN: 978-1-4302-3010-6
Verlag: Apress
Format: PDF
Kopierschutz: 1 - PDF Watermark

E-Book, Englisch, 392 Seiten

ISBN: 978-1-4302-3010-6
Verlag: Apress
Format: PDF
Kopierschutz: 1 - PDF Watermark



Are you an IT professional involved in deploying the iPhone and or iPad in your company or organization? Do you have fellow employees who are eager to use their iPhones and iPads for work? Then this is the book for you. Enterprise iPhone and iPad Administrator's Guide provides step-by-step instructions on how to deploy and integrate the iPhone within a range of professional environments-from large businesses and educational institutions to medium-sized offices. This book ensures that the process is achieved in a streamlined, efficient, and cost-effective manner. The guide begins with an introduction to basic deployment concerns, then moves into actual methods and tools that you can use to streamline the deployment process. Next, an in-depth discussion of configuration and provisional profiles helps you deliver solid device setup, security, and adherence to organization policies. Finally, you'll learn how to use existing help desk teams to provide effective user support. Also included is coverage of the latest iPhone- and iPad-specific enterprise technologies (such as push notification and calendaring tools) as well as internal iPhone and iPad applications and web-based solutions for businesses.

Charles Edge has been working with Apple products since he was a child. Professionally, Charles started with the Mac OS and Apple server offerings in 1999 after years working with various flavors of Unix. Charles began his consulting career working with Support Technologies and Andersen Consulting. In 2000, he found a new home at 318, Inc., a consulting firm in Santa Monica, California which is now the largest Mac consultancy in the country. At 318, Charles leads a team of over 40 engineers and has worked with network architecture, security and storage for various vertical and horizontal markets. Charles has spoken at a variety of conferences including DefCon, BlackHat, LinuxWorld, MacWorld and the WorldWide Developers Conference. Charles' first book, Mac Tiger Server Little Black Book, can be purchased through Paraglyph Press. Charles recently hung up his surfboard and moved to Minneapolis, Minnesota, with his wife, Lisa. Charles can be contacted at krypted@mac.com.

Edge Enterprise iPhone and iPad Administrator's Guide jetzt bestellen!

Autoren/Hrsg.


Weitere Infos & Material


1;Contents at a Glance;5
2;Table of Contents;6
3;About the Authors;12
4;About the Technical Reviewer;13
5;Acknowledgments;14
6;Introduction;15
7;Chapter 1 The Inevitability of the iPhone in the Enterprise;17
7.1;Three Devices, One Platform;18
7.2;Welcoming Change While Protecting the Enterprise;20
7.2.1;Sandbox;21
7.2.2;Long-Term Implications;21
7.3;Mobile Integration Strategies;22
7.4;The Paradigm Shift;23
7.4.1;Impact to Infrastructure;23
7.4.2;Integration with the Enterprise;25
7.5;Summary;27
8;Chapter 2: Purchasing and Activating;28
8.1;Making Large-Purchase Considerations;28
8.2;Preparing the Pilot;29
8.3;Purchasing Applications;30
8.3.1;Understanding the License Agreement;30
8.3.2;Purchasing in Bulk;31
8.4;Managing Activations;32
8.4.1;Using StoreActivationMode;32
8.4.2;Using StoreGeniusMode;33
8.5;Activating Devices;34
8.5.1;Getting Started;34
8.5.2;Synchronizing for the First Time;35
8.5.3;Choosing Synchronization Options;36
8.6;Developing Organizational Policies;38
8.7;Using the App Store;38
8.8;Managing iTunes;39
8.9;Registering Devices;41
8.10;Backing Up and Restoring Devices;41
8.11;Placing Devices Back into Production;43
8.12;Upgrading the Software;44
8.13;Summary;46
9;Chapter 3: Applying Basic Configurations to Mobile Devices;48
9.1;Getting Familiar with iOS 4;49
9.2;Setting Wireless Network Connections;50
9.2.1;Configuring Wireless Network Settings;51
9.2.2;Joining a Wireless Network;52
9.3;Leveraging the Mobile Web Browser;54
9.3.1;Configuring the Browser (Mobile Safari);54
9.3.2;Navigating Through the Browser Environment;56
9.4;Installing SSL Certificates;59
9.5;Setting up E-Mail Accounts;62
9.5.1;Leveraging the Cloud;64
9.5.2;Using IMAP, POP, and SMTP;65
9.6;Securing the Device;69
9.6.1;Restricting Access to Applications;69
9.6.2;Authenticating with Passcodes;73
9.7;Maintaining Devices;76
9.7.1;Performing Basic Startup Maintenance;76
9.7.2;Verifying Network Connectivity;77
9.7.3;Obtaining Updates;77
9.7.4;Leveraging the Logs;81
9.7.5;Performing Backup and Restoration;82
9.7.6;Bypassing the Passcode;84
9.8;Summary;84
10;Chapter 4: Integrating with Groupware;86
10.1;Integrating with Microsoft Exchange Servers;87
10.1.1;Ensuring a Proper Exchange Environment;87
10.1.1.1;Using Exchange Server Remote Connectivity Analyzer;88
10.1.1.2;Looking at Paths in Exchange;92
10.1.1.3;Troubleshooting Exchange 2007 and 2010 Virtual Directories;93
10.1.2;Configuring iOS for ActiveSync;94
10.1.3;Using Exchange to Manage Policies;98
10.1.4;Managing Policies from PowerShell;101
10.1.5;Using Remote Wipe;102
10.2;Using Alternative Groupware Solutions;104
10.2.1;MobileMe;104
10.3;Leveraging the Cloud;111
10.4;Summary;113
11;Chapter 5: Working with Documents and Files;115
11.1;Sharing Files Using iTunes;116
11.2;Building a File Sharing Environment;118
11.2.1;Selecting Your Service;118
11.2.2;AFP;119
11.2.2.1;Configuring AFP;119
11.2.2.2;Defining AFP Authentication;120
11.2.2.3;Setting Limits;121
11.2.2.4;Managing Idle User Handling;122
11.2.3;Setting up Share Points;123
11.3;Accessing Servers With Third-Party Software;125
11.3.1;EZSharePro;126
11.3.2;NetPortal and NetPortal Lite;132
11.3.3;FileBrowser;136
11.3.4;Using iWork;138
11.4;Leveraging Public Clouds;139
11.4.1;MobileMe;140
11.4.1.1;Configuring the Desktop;140
11.4.1.2;Connecting to the iDisk;143
11.4.2;Google Docs;144
11.4.3;Box.net;145
11.4.4;SharePoint;149
11.5;Summary;150
12;Chapter 6: Remote Access for iOS;152
12.1;Introducing Mac OS X Server Services;153
12.2;Configuring the VPN Client;153
12.2.1;L2TP;154
12.2.2;PPTP;156
12.2.3;Using the Cisco VPN Client;157
12.2.4;Assigning a Proxy to a VPN Connection;159
12.3;Providing VPN Services;160
12.3.1;Setting Up a PPTP Server;162
12.3.2;Setting Up an L2TP Server;165
12.4;Installing Mobile Access and Push Notification;167
12.5;Setting Up Mobile Access;168
12.5.1;Planning Design Considerations;169
12.5.2;Configuring Mobile Access;169
12.5.2.1;Configuring the Address Book Proxy;170
12.5.2.2;Configuring the iCal;171
12.5.2.3;Configuring the Mail Proxy;172
12.5.2.4;Configuring Web Proxy Entries;173
12.5.3;Starting the Service and Checking the Status;174
12.5.4;Controlling Access;175
12.5.5;Connecting Clients;177
12.6;Setting Up Push Notification for the iPhone;177
12.7;Using the Command Line to Manage Mobile Access and Push Notification;181
12.8;Summary;182
13;Chapter 7: Developing In-House Applications;183
13.1;Don’t Develop If You Don’t Have To;184
13.1.1;Additional Plug-ins;187
13.2;Understanding iPhone Developer Programs;188
13.2.1;The iPhone Developer Program;189
13.2.2;The iPhone Enterprise Developer Program;189
13.2.3;The iPhone Developer University Program;189
13.2.4;Getting a Developer Account;189
13.3;Xcode;191
13.3.1;Installing the Developer Tools;192
13.4;Using a Template;195
13.5;Planning Custom Applications;197
13.5.1;Training;198
13.5.2;Outsourcing Application Development;199
13.6;Distributing Custom Applications;199
13.7;Accessing Enterprise Databases with the iPhone;200
13.8;Additional Resources;201
13.9;Summary;202
14;Chapter 8: Building Configuration Profiles;203
14.1;Setting Up the Tool;203
14.2;Building Configurations;205
14.2.1;General Tab;206
14.2.2;Passcode Tab;206
14.2.3;Restrictions Tab;208
14.2.4;Wi-Fi Tab;208
14.2.4.1;Hidden Network;209
14.2.4.2;Protocols;210
14.2.4.3;Authentication;210
14.2.4.4;Trust;211
14.2.5;VPN Tab;212
14.2.6;E-mail Tab;213
14.2.7;Exchange Tab;215
14.2.8;LDAP Tab;216
14.2.9;CalDAV Tab;218
14.2.10;Subscribed Calendars Tab;219
14.2.11;Web Clips Tab;220
14.2.12;Credentials Tab;220
14.2.13;The SCEP Tab;221
14.3;Deploying Configurations Using the iPhone Configuration Utility;222
14.3.1;Importing and Exporting Profiles;226
14.4;Summary;227
15;Chapter 9: Mass-Deploying Devices;228
15.1;Deployment Terminology;229
15.2;Building Profiles from Scripts;229
15.2.1;Creating Devices;230
15.2.2;Creating Configuration Profiles;232
15.3;Apple’s Sample Code;233
15.4;AirWatch;234
15.4.1;Managing Objects in the Portal;234
15.4.1.1;Setting Up Administrative Users;234
15.4.1.2;Configuring LDAP and SCEP;236
15.4.2;Creating a Profile;239
15.4.3;Enrolling a Device;242
15.5;JAMF’s Casper Suite;245
15.5.1;Configuring Global Settings;247
15.5.2;Creating Configuration Profiles;253
15.5.3;Enrolling Devices;256
15.5.4;Managing Devices;263
15.5.5;Adding Applications to the Catalog;265
15.5.6;Providing Self-Service;269
15.6;KACE Appliances;270
15.7;MobileIron;272
15.8;Sybase Afaria;273
15.9;TARMAC;274
15.10;Removing the Profiles;275
15.11;Summary;277
16;Chapter 10: Leveraging Third-Party Solutions for Productivity;278
16.1;The App Store;279
16.2;Integrating GroupWise;280
16.3;Security Applications;281
16.3.1;RSA;282
16.3.2;Good for Enterprise;282
16.4;Managing Thin Clients;283
16.4.1;Citrix;284
16.4.2;Remote Desktop;285
16.4.3;VNC;287
16.5;Contact Management Options;287
16.6;Tools for Public Speakers;288
16.6.1;Keynote;289
16.6.2;Teleprompters;290
16.7;Bridging the Gap;291
16.7.1;NetFlix;292
16.7.2;Facebook;293
16.7.3;Twitter;294
16.7.4;LinkedIn;295
16.8;Becoming the Informed Traveler;296
16.9;Summary;297
17;Chapter 11: Developing A Program For Support;299
17.1;What Is Supported?;299
17.2;Preparing Support Staff;300
17.2.1;Training Considerations;301
17.2.2;Training Materials;302
17.3;Supporting End Users;304
17.4;Considering the Help Desk;306
17.5;The iPhone Simulator;306
17.6;Using the Software Update Server for Patch Management;307
17.6.1;Installing the Software Update Service;309
17.6.2;Managing Your Software Update Server;310
17.6.2.1;Configuring Updates for Clients;311
17.6.2.2;Using Software Update;313
17.6.2.3;Using the softwareupdate Command to Install Software Updates;315
17.6.2.4;Working with the Repository;316
17.7;Using the Command Line to Manage Software Update Server;317
17.8;serveradmin;317
17.9;Multiple Software Update Servers;318
17.10;Implementing a Process to Manage Patches;318
17.11;Summary;319
18;Appendix A: Acceptable Use Policy;320
18.1;InfoSec Acceptable Use Policy;320
18.2;1.0 Overview;320
18.3;2.0 Purpose;321
18.4;3.0 Scope;321
18.5;4.0 Policy;321
18.5.1;4.1 General Use and Ownership;321
18.5.2;4.2 Security and Proprietary Information;322
18.5.3;4.3 Unacceptable Use;323
18.5.3.1;System and Network Activities;323
18.5.3.2;E-mail and Communications Activities;324
18.6;5.0 Enforcement;325
18.7;6.0 Definitions;325
18.7.1;Term Definition;325
18.8;7.0 Revision History;325
19;Appendix B: Using Mac OS X Server for Groupware;326
19.1;iCal Server;326
19.1.1;Setting Up iCal Server;327
19.1.2;Managing Calendars;331
19.1.3;Subscribing to Calendars;333
19.1.4;Delegating Access;335
19.1.5;Backing Up Calendars;336
19.1.6;Clustering CalDAV;337
19.1.7;Web and Wiki Integration;337
19.1.8;Troubleshooting;338
19.2;Address Book Server;339
19.2.1;Setting up Address Book Server;340
19.2.2;Backing up Address Books;344
19.3;iChat Server;345
19.3.1;Transcripts;347
19.4;Mac OS X Mail Server;348
19.4.1;Setting Up a Mail Server;348
19.4.2;Configuring Mail with ServerAdmin;349
19.4.3;Protecting the Mail Servers;352
19.4.3.1;Mailing Lists;356
19.4.3.2;Logging;357
19.4.3.3;The Command Line;358
19.4.4;Choosing Mailbox Locations;359
19.4.5;The Dovecot Mailstore;360
19.4.6;Setting Up Public folders;361
19.4.7;Backing Up Mail;362
19.4.8;Clustering Mail Services;363
20;Index;366



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.