This documentation is for WSO2 IoT Server 3.1.0. View the documentation for the latest release.
Available Mobile Device Management Policies - IoT Server 3.1.0 - WSO2 Documentation
||
Skip to end of metadata
Go to start of metadata

We identified a set of policies to help manage mobile devices such as Android, iOS, and Windows. These policies are available by default on WSO2 IoT Server. For more information on how to add a policy on mobile devices, see Adding a Mobile Device Management Policy

The policies available for mobile device management are listed below:

Policies for Android devices

The mobile device management administrator can add a new policy to a preferred device type, such as BYOD, or COPE. The following policies are available for the Android platform.

PolicyDescription
Passcode policyDefine a password policy for the devices.
Restrictions

Allow or disallow users from using the following features on Android devices. Most of the restrictions require the Android work profile to be set up, system app installed or for the device to be a single-purpose device.

Please note that the restrictions mentioned under the device ownership application do not work for Samsung devices at the moment.

RestrictionsAll device typesRequire the
Android work
profile
Require the
system app
or
the device
ownership application
Require the
single-purpose
device

Using the camera on the device.





Configuring user credentials.





Configuring VPN.





Restricting items copied to the clipboard from being posted on related profiles.





Enabling or accessing debugging features.





Installing applications.





Enabling the "Unknown Sources" setting.





Adding and removing accounts unless they are programmatically added by the Authenticator. For more information, see the details on adding an account directly.

Note!

If you enabled this policy before configuring the Google Play Store with a Google Account, the following message is displayed when you open the Google Play app: “This change is not allowed by the device administrator”.

To use the Google Play Store with this policy, you need to set up the Google account and configure Google Play before applying this policy.





Restrict the use of Near Field Communication (NFC) to beam out data from apps.





Turning on location sharing.





Uninstalling applications.





Allows or disallow apps in the parent profile to handle web links from the managed profile.





Disabling application verification





Enabling the auto time feature in the device that is in  Settings > Date & Time.



Disabling the screen shot option on the device.





Restricting the user from sending or receiving Short Message Service (SMS )messages.





Adjusting the master volume.





Configuring cell broadcasts.





Configuring Bluetooth



Configuring mobile networks.





Transferring files over USB.



Changing Wi-Fi access.





Device rebooting.





Making outgoing phone calls.





Mounting physical external media.





Restricting windows beside the app window from being created.



Factory resetting the device from Settings.





Removing other users.





Adding new users and profiles.





Resetting the network settings from Settings.





Adjusting the microphone volume.





Disabling the status bar on the device.

This restriction is only supported in Android version 6.0 Marshmallow and higher.





Encrypt storageEncrypt data on the device, when the device is locked and make it readable when the passcode is entered.

Wi-Fi

Ability to configure the Wi-Fi access on a device. WSO2 IoT Server provides advanced Wi-Fi configuration settings, as shown below:
  • You are able to configure the Wi-Fi settings for the WEPWPA/WPS 2PSK and 802.1 EAP security types. 
  • The 802.1 EAP security type works only for Android 4.3 and above.
  • WSO2 IoT Server supports the following EAP methods: PEAPTLSTTLSPWDSIM, and AKA.
  • If you want to provide the identity of the user that access the Wi-Fi through their Android device, you can provide [user] as the value for Identity and it will provide the username used by the user to enroll their Android device with WSO2 IoT Server. This setting is only applicable for the following EAP methods: PEAPTLSTTLS, and PWD.
 
VPNAbility to specify the VPN and per app VPN settings.
Work-Profile Configurations

Ability separate the personal andwork relateddata on your device via the managed profile feature.

For more information on how it works, see Data Containerization for Android Device.

Application restrictions

Ability blacklist and whitelist applications on the Android platform. Let's take a look at how it works:

Blacklist applications

Prevents you from using the applications defined in the policy. For Android operation systems before Lollipop, when a blacklisted application is clicked a screen is displayed to prevent you from using the app. For the Lollipop Android operating systems and after, the blacklisted apps will be hidden. Blacklisting can be used on both BYOD and COPE devices.

Whitelisting applications

Allows you to only install the applications defined in the policy. This feature requires another application, i.e., WSO2 IoT Server System app, that is signed by the device firmware owner. Therefore, generally, it will be available for COPE devices but if you are able to get the WSO2 IoT Server system application signed via a firmware signing key, then you are able to use it for BYOD devices too.

In addition to the above, you are able to enable application restrictions via the restrictions policy. The restrictions policy has two settings to restrict application installation and uninstallation. For this, the WSO2 IoT Server application needs to have device owner privileges or the device needs to have the WSO2 IoT Server System app installed.

Policies for iOS devices

The mobile device management administrator is able to restrict operations on Windows devices by adding a new policy. The following policies are available for the iOS platform.

PoliciesDescription

Passcode policy

Define a password policy for the devices.

Restrictions

Restricts the usage of the camera and other functions.

You are able to allow or disallow users from using the following features on the device:

  • Restrict users from installing applications on the device.
  • Prohibit users from adding friends to the Game Center.
  • Restrict users from removing applications from the device.
  • Restrict users from using Siri.
  • Prevent Siri from querying user-generated content from the web.
  • Prevent users from using Siri when the device is locked. Availability: iOS 5.1 and later. 

  • Restrict users from using the camera. If this operation is not allowed the camera icon will be removed from the home screen.
  • Prevent users from backing up the device data to iCloud. Availability: iOS 5.0 and later. 

  • Disable documents and key-value syncing to iCloud. Availability: iOS 5.0 and later.

  • Disable Cloud keychain synchronization. Availability: Only in iOS 7.0 and later. 

  • Prevent the device from automatically submitting diagnostic reports to Apple. Availability: Only in iOS 6.0 and later. 

  • Hide explicit music or video content purchased from the iTunes Store. Explicit content is marked by content providers, such as record labels, when sold through the iTunes Store. 
  • Prevent the Touch ID from unlocking a device. Availability: iOS 7 and later. 

  • Disable the global background fetch activity when an iOS phone is on roaming.
  • Prohibit in-app purchasing.
  • Prevent the Control Center from appearing on the Lock screen. Availability: iOS 7 and later. 

  • Disable host pairing with the exception of the supervision host. If no supervision host certificate has been configured, all pairing is disabled. Host pairing lets the administrator control which devices an iOS 7 device can pair with. Availability: Only in iOS 7.0 and later.

  • Disable the 'Today view' in the Notification Center of the lock screen. Availability: Only in iOS 7.0 and later. 

  • Prohibit multiplayer gaming.
  • Allow managed apps and the accounts to only open in other managed apps and accounts. Availability: Only in iOS 7.0 and later.

  • Allow unmanaged apps and the accounts will only open in other unmanaged apps and accounts. Availability: Only in iOS 7.0 and later. 

  • Disable over-the-air PKI updates. Setting this restriction does not disable CRL and OCSP checks.  Availability: Only in iOS 7.0 and later. 

  • Disable Passbook notifications. Availability: Only in iOS 7.0 and later. 

  • Disable Photo Streams. Availability: Only in iOS 7.0 and later. 

  • Disable the Safari web browser application and remove the icon from the Home screen. This also prevents users from opening web clips. 
  • Disable Safari auto-fill.
  • Enable the Safari fraud warning.
  • Prevent Safari from executing JavaScript.
  • Prevent Safari from creating pop-up tabs.
  • Restrict users from saving a screenshot of the display.
  • Disable shared Photo Stream. Availability: iOS 6.0 and later. 

  • Disable video conferencing.
  • Disable voice dialing.
  • Disable the YouTube application and remove its icon from the home screen. Users will not be able to preview, purchase, or download content too. Availability: iOS 7.0 and later. 

  • Force the use of the profanity filter assistant.
  • Encrypt all backups.
  • Force user to enter their iTunes password for each transaction. Availability: iOS 5.0 and later. 

  • Limit ad tracking. Availability: iOS 7.0 and later. 

  • Force all devices receiving AirPlay requests from the user's device to use a pairing password. Availability: iOS 7.1 and later. 

  • Force all devices sending AirPlay requests to the user's device to use a pairing password.

  • Prevent the managed applications from using cloud sync.
  • Disable Activity Continuation.
  • Prevents the backing up of enterprise books.
  • Prevents the syncing of notes and highlights in the enterprise books.
  • Allow the user to modify the touch ID.
  • Determine the conditions under which the device will accept cookies. The conditions are as follows:
    • Never
    • From visited sites only 
    • Always 
  • Force users to unlock their Apple Watch with a passcode once the watch has been removed from their wrist. Availability: iOS 8.3 and later. 

  • Restrict access to apps based on the rating given for age. The ratings given are as follows:

    • Don't allow apps
    • 4+
    • 9+
    • 12+
    • 17+
    • Allow all apps
  • Restrict access to movies based on movie ratings. The ratings given are as follows:

    • Don't allow movies
    • G
    • PG
    • PG-13
    • R
    • NC-17
    • Allow all movies
  • Rate operations based on the region.
  • Restrict access to TV shows based on the ratings given. The ratings given are as follows:

    • Don't allow TV shows
    • TV-Y
    • TV-Y7
    • TV-G
    • TV-PG
    • TV-14
    • TV-MA
    • All allTV shows
  • Allow the apps to be identified by the bundle IDs listed in the array to autonomously enter Single App Mode. Availability: iOS 7.0 and later. 

Wi-Fi

Configure the Wi-Fi access on a device.

Email

Configure settings for connecting to your POP or IMAP email accounts.
AirPlayConfigure settings for connecting to AirPlay destinations.
LDAPConfigure settings for connecting to LDAP servers.
CalendarConfigure settings for connecting to CalDAV servers.
Calendar SubscriptionConfigure settings for calendar subscriptions.
APNSpecify Access Point Names ( APN ).
Cellular NetworkSpecify Cellular Network Settings on an iOS device
VPNSpecify the VPN and per app VPN settings.

Policies for Windows devices

The mobile device management administrator is able to restrict operations on Windows devices by adding a new policy. The following policies are available for the Windows platform.

PoliciesDescription

Passcode policy

Define a password policy for the devices.
RestrictionsRestrictsthe usage of the camera and other functions. Windows only support device restrictions on the camera.
Encrypt storageEncrypt data on the device, when the device is locked and make it readable when the passcode is entered.
  • No labels