Managing Devices & Corporate Data On iOS
Managing Devices & Corporate Data On iOS
Overview
Contents Businesses everywhere are empowering their employees with iPhone and iPad.
Overview
Management Basics The key to a successful mobile strategy is balancing IT control with user
Separating Work and
enablement. By personalizing iOS devices with their own apps and content,
Personal Data
users take greater ownership and responsibility, leading to higher levels of
Flexible Management Options
engagement and increased productivity. This is enabled by Apple’s management
Summary
framework, which provides smart ways to manage corporate data and apps
discretely, seamlessly separating work data from personal data. Additionally,
users understand how their devices are being managed and trust that their
privacy is protected.
Management Basics
With iOS, you can streamline iPhone and iPad deployments using a range of
built-in techniques that allow you to simplify account setup, configure policies,
distribute apps, and apply device restrictions remotely.
Other device management methods in the market may use different names to
describe MDM functionality, such as enterprise mobility management (EMM) or
mobile application management (MAM). These solutions have the same goal in
mind—to manage your organization’s devices and corporate data over the air.
And because Apple’s management framework is built into iOS, you don’t need a
separate agent application from your MDM solution provider.
Organizations that no longer use containers are seeing that the native
management controls in iOS enable an optimal personal experience for users
and increase their productivity. Rather than making it hard for users to use their
devices for both work and personal, you can use policy controls that manage the
data flow seamlessly behind the scenes.
Managed content
Managed content covers the installation, configuration, management, and
removal of App Store and custom in-house apps, accounts, books, and domains.
• Managed apps. Apps installed using MDM are called managed apps. They
may be free or paid apps from the App Store, or custom in-house apps, and all
can be installed over the air using MDM. Managed apps often contain sensitive
information, and provide more control than apps downloaded by the user. The
MDM server can remove managed apps and their associated data on demand,
or specify whether the apps should be removed when the MDM profile is
removed. Additionally, the MDM server can prevent managed app data from
being backed up to iTunes and iCloud.
• Managed accounts. MDM can help your users get up and running quickly by
setting up their mail and other accounts automatically. Depending on the MDM
solution provider and integration with your internal systems, account payloads
can also be pre-populated with a user’s name, mail address, and, where
applicable, certificate identities for authentication and signing. MDM can
• Managed books. Using MDM, books, ePub books, and PDF documents can
be automatically pushed to user devices, so employees always have what they
need. Managed books can be shared only with other managed apps or mailed
using managed accounts. When no longer necessary, the materials can be
removed remotely.
Managed distribution
Managed distribution lets you use your MDM solution or Apple Configurator 2 to
manage apps and books purchased from the Apple Business Manager.
To enable managed distribution, you’ll need to first link your MDM solution to
your Apple Business Manager account using a secure token. Once your MDM
server is connected to Apple Business Manager, assign apps directly to a device
without the user even needing an Apple ID. A user is prompted when apps are
ready to be installed on their device. If a device is supervised, apps are silently
pushed to that device without prompting the user.
To retain full control over apps with an MDM solution, assign apps directly to a device.
There are capabilities available to app developers that can be enabled using
managed app configuration such as app configuration, prevent app backup,
disable screen capture, and remotely wipe app.
To protect corporate data, only apps installed and managed by MDM can open this
work document.
– Action extensions let users manipulate or view content within the context of
another app. For example, users can use an action to translate text from
another language right in Safari.
– Share extensions give users a convenient way to share content with other
entities, such as social sharing websites or upload services. For example, in
an app that includes a Share button, users can choose a Share extension
that represents a social sharing website, then use it to post a comment or
other content.
Ownership models
Depending on the device ownership model—or models—in your organization,
you’ll manage devices and apps differently. The two ownership models for iOS
devices that are commonly used in the enterprise are user owned and
organization owned.
User-owned devices
With a user-owned deployment, iOS offers personalized setup by users and
transparency around how devices are configured, along with the assurance that
users’ personal data won’t be accessed by your organization.
• Opt-in and opt-out enrollment. When devices are purchased and set up by
the users—commonly referred to as BYOD—you can still provide access to
corporate services such as Wi-Fi, mail, and calendar. Users simply opt in to
enroll in your organization’s MDM solution. When users enroll in MDM for the
first time on an iOS device, they are provided with information about what the
MDM server can access on their devices and the features it will configure. This
provides transparency to users about what is being managed, and establishes
trust between you and the users. It’s important to let your users know that if at
any time they are not comfortable with this management, they can opt out of
the enrollment by removing the management profile from their device. When
they do, all corporate accounts and apps installed by MDM are removed.
The user interface for configuration profiles in Settings show users exactly what has
been configured on their device.
• User privacy. While an MDM server lets you interact with iOS devices, not all
settings and account information are exposed. You can manage corporate
accounts, settings, and information provisioned via MDM, but the user’s
personal accounts cannot be accessed. In fact, the same features that keep
data secure in corporate-managed apps also protect a user’s personal content
from entering the corporate data stream.
• The examples show what a third-party MDM server can and cannot see on a
personal iOS device:
• MDM can see: MDM cannot see personal data such as:
• Device name Personal or work mail, calendars, contacts
• Phone number SMS or iMessages
• Serial number Safari browser history
• Model name and number FaceTime or phone call logs
• Capacity and space available Personal reminders and notes
• iOS version number Frequency of app use
• Installed apps Device location
Organization-owned devices
With an organization-owned deployment, you can provide a device to each user,
referred to as a personally enabled deployment, or another option is to rotate
devices among users, referred to as a nonpersonalized deployment. iOS features
such as automated enrollment, lockable MDM settings, device supervision, and
always-on VPN ensure that devices are configured based on your organization’s
specific requirements, providing increased control while ensuring that corporate
data is protected.
With Apple Business Manager, your MDM solution will automatically configure your
iOS devices during the Setup Assistant.
Even if you don’t plan to use any supervised-only features now, consider
supervising your devices when you set them up, enabling you to take advantage
of supervised-only features in the future. Otherwise, you’ll need to wipe devices
that have already been deployed. Supervision isn’t about locking down a device;
rather, it makes company-owned devices better by extending management
capabilities. In the long run, supervision provides even more options for your
enterprise.
For a complete list of supervised settings, see the iOS Deployment Reference.
Restrictions
iOS supports the following categories of restrictions, which you can configure
over the air to meet the needs of your organization, without impacting users:
• AirPrint
• App installation
• App usage
• Classroom app
• Device
• iCloud
• Safari
• Siri
The following categories also have options that can be configured by your
MDM solution:
The following are examples of information that can be queried on an iOS device:
• Network information
• Installed applications
• Encryption status
Management tasks
When a device is managed, an MDM server may perform a wide variety of
administrative tasks, including changing configuration settings automatically
without user interaction, performing an iOS update on passcode-locked devices,
locking or wiping a device remotely, or clearing the passcode lock so users can
reset forgotten passwords. An MDM server may also request an iOS device to
begin AirPlay mirroring to a specific destination or end a current AirPlay session.
Lost Mode
With iOS 9.3 or later, your MDM solution can place a supervised device in Lost
Mode remotely. This action locks the device and allows a message with a phone
number to be displayed on the Lock screen.
With Lost Mode, supervised devices that are lost or stolen can be located,
because MDM remotely queries for their location the last time they were online.
Lost Mode doesn’t require Find My iPhone to be enabled.
If MDM remotely disables Lost Mode, the device is unlocked and its location
is collected. To maintain transparency, the user is notified that Lost Mode is
turned off.
When MDM puts a missing device in Lost Mode, it locks the device, allows messages
to be displayed onscreen, and determines its location.
Activation Lock
With iOS 7.1 or later, use MDM to enable Activation Lock when a user turns on
Find My iPhone on a supervised device. This allows your organization to benefit
from the theft-deterrent functionality of Activation Lock, while still allowing you
to bypass the feature if, for instance, a user leaves your organization without first
removing Activation Lock using their Apple ID.
Your MDM solution can retrieve a bypass code and permit the user to enable
Activation Lock on the device based on the following:
• If Find My iPhone is turned on when your MDM solution allows Activation Lock,
Activation Lock is enabled at that point.
• If Find My iPhone is turned off when your MDM solution allows Activation Lock,
Activation Lock is enabled the next time the user activates Find My iPhone.
Summary
Apple’s unified management framework in iOS gives you the best of both
worlds: IT is able to configure, manage, and secure devices and control the
corporate data flowing through them, while at the same time users are
empowered to do great work with the devices they love to use.
© 2018 Apple Inc. All rights reserved. Apple, the Apple logo, AirPlay, AirPrint, FaceTime, iMessage, iPad, iPhone, iTunes,
Mac, macOS, Safari, and Siri are trademarks of Apple Inc., registered in the U.S. and other countries. tvOS is a trademark
of Apple Inc. App Store and iCloud are service marks of Apple Inc., registered in the U.S. and other countries. IOS is a
trademark or registered trademark of Cisco in the U.S. and other countries and is used under license. Other product and
company names mentioned herein may be trademarks of their respective companies. Product specifications are subject to
change without notice. This material is provided for information purposes only; Apple assumes no liability related to its use.