Manuel d'utilisation / d'entretien du produit MaaS360 du fabricant Cisco Systems
Aller à la page of 42
Int egrating Fiberlink MaaS 360 with Cisc o Identit y Ser vice s Engine Revised: August 6, 2013.
2.
3 Int e gr ating Fiberlink MaaS 360 with Cisc o Identity Ser vic es Engine ALL DESIGNS, SPECIFICA TIONS, ST A TEMENTS, INFORMA TION, AND RECOMMEND A TIONS (COLLECTIVEL Y , "DESIGNS") IN THIS MANU AL ARE PRESENTED "AS IS," WITH ALL F A UL TS.
Corporate Headquarters: Copyright © 20 13 Cisco Systems, Inc. All rights reserved. Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA 95134-1706 USA Integrating Fiberlink MaaS360 with Cisco Identity Services Engine This document supplement s the Cisco Bring Y our Own Device (BY OD) CVD ( http://www .
5 Int e gr ating Fiberlink MaaS 360 with Cisc o Identity Ser vic es Engine Ta b l e 1 Fiber link MaaS360—K ey Capabilities Capability Features Architecture and Adminintrat ion • SaaS delivery mode.
Int e gr ating Fiberlink MaaS36 0 with Cisco Identit y Ser vice s E ngine 6 Enterprise A pplication Catalo g • Manage and distrib ute third-party and in-house mob ile apps from the Fiberlink MaaS360.
7 Int e gr ating Fiberlink MaaS 360 with Cisc o Identity Ser vic es Engine The Fiberlink MaaS360 so lution has three main components: • Portals (Administration and End User) • Fiberlink MaaS 360 S.
Int e gr ating Fiberlink MaaS36 0 with Cisco Identit y Ser vice s E ngine 8 Getting Fiberlink MaaS360 Ready for ISE The first requirement is to establish basic connecti vity between the Cisco ISE server and the Fiberlink MaaS360 MDM server . A f irew all is typically located between ISE and the Fiberlink MaaS360 cloud.
9 Int e gr ating Fiberlink MaaS 360 with Cisc o Identity Ser vic es Engine Figur e 2 Exporting the MDM Site Cer tificate with Int er net Explorer Fiberlink MaaS360 utili zes a wildca rd certif icate that is v alid for all portal websites belonging to the Fiberlink MaaS360 portals d omain.
Int e gr ating Fiberlink MaaS36 0 with Cisco Identit y Ser vice s E ngine 10 Figur e 4 Impor ting the Cer tificate in ISE Grant ISE Access to the Fiberlink MaaS360 API The Fiberlink MaaS360 API is pro tected by HTTPS and requires an adminis trator account that has been granted permissi on to the API.
11 Int e gr ating Fiberlink MaaS 360 with Cisc o Identity Ser vic es Engine Figur e 5 Manage A dministrat or A ccount Each account type can be assigned roles entitling th at user to specific features of the system. Also the role of service adminis trator can be used to manage the API from ISE.
Int e gr ating Fiberlink MaaS36 0 with Cisco Identit y Ser vice s E ngine 12 Figur e 6 A dd Accoun t The MDM role created for IS E requires the REST API features.
13 Int e gr ating Fiberlink MaaS 360 with Cisc o Identity Ser vic es Engine Figur e 7 Assign Role t o the Account Once the role as been added, an admin account can be created for ISE.
Int e gr ating Fiberlink MaaS36 0 with Cisco Identit y Ser vice s E ngine 14 Figur e 8 Configur e the MDM API on ISE The polling interv al specif ies ho w often ISE will query th e MDM for changes to de vice posture. Polling can be disabled by setting the v alu e to 0 minutes.
15 Int e gr ating Fiberlink MaaS 360 with Cisc o Identity Ser vic es Engine The T est Con nection button will attemp t to log in to the API an d is required prio r to saving the settings with the MDM set to Enable.
Int e gr ating Fiberlink MaaS36 0 with Cisco Identit y Ser vice s E ngine 16 Review MDM Dictionaries When the Fiberlink MaaS360 MDM becomes acti ve, ISE w ill retrie ve a list of the supported dictionary attrib utes from the MDM. Currently Fiberli nk MaaS360 supports all of the attrib utes that ISE can query .
17 Int e gr ating Fiberlink MaaS 360 with Cisc o Identity Ser vic es Engine Enterprise Integration Fiberlink MaaS360 of fers a solution t hat enables integrati on with existing ent erprise infrastructures such as AD, Ex change, and a certificate author ity .
Int e gr ating Fiberlink MaaS36 0 with Cisco Identit y Ser vice s E ngine 18 The installation of the Cloud Extender is straightforward and ful ly documented by Fiberlink MaaS360. All the information requi red to install is a v ailable by logging onto Fi berlink MaaS360 and going to SETUP > Enrollment Settings, as sho wn in Figure 11 .
19 Int e gr ating Fiberlink MaaS 360 with Cisc o Identity Ser vic es Engine Figur e 12 Cloud Ext ender Installation Wizard.
Int e gr ating Fiberlink MaaS36 0 with Cisco Identit y Ser vice s E ngine 20 Figur e 13 Cloud Ext ender AD Configur ation Active Directory/LDAP Integration Integr ating ISE and the MDM to a common directo ry is important for o verall operat ions.
21 Int e gr ating Fiberlink MaaS 360 with Cisc o Identity Ser vic es Engine Figur e 14 CVD Use P olicies These groups can be extended to the MDM such th at members are issued prof iles that complement their lev el of network access.
Int e gr ating Fiberlink MaaS36 0 with Cisco Identit y Ser vice s E ngine 22 MDM Profiles Device prof iles are an important co ncept of mobile device man agement.
23 Int e gr ating Fiberlink MaaS 360 with Cisc o Identity Ser vic es Engine Figur e 15 Creat e P olicies T o bind policies to us er groups, Go to Users > Groups and assign appropriate polic y , as shown in Figure 16 .
Int e gr ating Fiberlink MaaS36 0 with Cisco Identit y Ser vice s E ngine 24 Figur e 16 Binding P olicies to User Gr oups W ith the e xample configu ration shown abov e, users that belong to BY OD_Employ ee_Access will get Full_Access_polic y pushed to their de vices.
25 Int e gr ating Fiberlink MaaS 360 with Cisc o Identity Ser vic es Engine Figur e 17 Enr ollment Netwo rk Fl ows 293804 APNS/GCN MDM Device Authenticate User WebEnroll Policy Assessment Mobileconfig.
Int e gr ating Fiberlink MaaS36 0 with Cisco Identit y Ser vice s E ngine 26 Because ISE depends on these features for policy enforcemen t, corporate de vices and personal de vices with partial or full access should include a prof ile that specif ies the Fiberlink MaaS36 0 Agent as a mandatory appl ication.
27 Int e gr ating Fiberlink MaaS 360 with Cisc o Identity Ser vic es Engine User Experience For the most part, the fact that a de vice is un der management is seamless to the user .
Int e gr ating Fiberlink MaaS36 0 with Cisco Identit y Ser vice s E ngine 28 Figur e 18 MDM Enr ollmen t Figur e 19 MDM Enr ollment—Logi n.
29 Int e gr ating Fiberlink MaaS 360 with Cisc o Identity Ser vic es Engine Figur e 20 MDM Enrollment—T er ms of Acceptance Figur e 21 MDM Enrollment—Maas360 Profile Installation Figur e 22 MDM Enrollment—Maas360 Application Installation After the device has enrolled, the server will re ques t a check-in.
Int e gr ating Fiberlink MaaS36 0 with Cisco Identit y Ser vice s E ngine 30 Pass Code Complexity The user may be required to conf iguring a PIN lock on t heir device during the on-boarding process if the device is not already conf igured with one. When this occurs, the user will need to laun ch the client app and send data.
31 Int e gr ating Fiberlink MaaS 360 with Cisc o Identity Ser vic es Engine • Manage and distri bute third-party and in-house mobile apps. • Allo w users to view , install, and be aler ted to updated apps on a pri vate catal og. • Manage mobile app lifec ycle workf low to al l dev ices, device group s, and indi vidual devices.
Int e gr ating Fiberlink MaaS36 0 with Cisco Identit y Ser vice s E ngine 32 Figur e 25 Maas360 Applcation Corporate Data Fiberlink MaaS360 and ISE can w ork closely together to create a comprehensi ve approach to managing corporate data. This is generally kno wn as data loss prev ention (DLP).
33 Int e gr ating Fiberlink MaaS 360 with Cisc o Identity Ser vic es Engine • Querying Exchange Serv er using Microsoft Po werShell commands and stand ard APIs for vital information related t o the Activ eSync enable d devices on the Exchange Server .
Int e gr ating Fiberlink MaaS36 0 with Cisco Identit y Ser vice s E ngine 34 End User Portal Fiberlink MaaS360 of fers an End User portal that al lows the user to manage their de vices. Users can perform actions lik e Lock Dev ice, Locate Device, W i pe De vice, Reset Passcode, and Check-in device with Fiberlink MaaS360 servi ce.
35 Int e gr ating Fiberlink MaaS 360 with Cisc o Identity Ser vic es Engine The attributes sho wn in Ta b l e 4 should help clarify the diff eren ce between compliance policies.
Int e gr ating Fiberlink MaaS36 0 with Cisco Identit y Ser vice s E ngine 36 Currently the MDM does not pr ovide a method to mar k compliance checks that are not reported to ISE. ISE cannot assert that netw ork security issue caused a de vice to be MDM non-compliant.
37 Int e gr ating Fiberlink MaaS 360 with Cisc o Identity Ser vic es Engine PINLockStatus The PINLockStatus is a vail able to the API and can be used by ISE to set a minimum requirement for network access, as sho w n in t he CVD.
Int e gr ating Fiberlink MaaS36 0 with Cisco Identit y Ser vice s E ngine 38 Jailbroken or Rooted devices These are de vices where the user ha s gained direct access to the oper ating system, bypassing the control imposed on the de vice by the service pro vider .
39 Int e gr ating Fiberlink MaaS 360 with Cisc o Identity Ser vic es Engine • Reassign the de vice to a secured locatio n group. This group ef fecti vely removes all co rporate applications and data.
Int e gr ating Fiberlink MaaS36 0 with Cisco Identit y Ser vice s E ngine 40 Cisco Applications (Jabber, etc.) Cisco of fers a wide range of mobile b usiness appl ications for both increased produ ctiv e and security . Ta b l e 6 sho ws some popular applications.
41 Int e gr ating Fiberlink MaaS 360 with Cisc o Identity Ser vic es Engine Figur e 29 An yConnect Provisioning Profile Conclusion The inte gration of the netw ork polic y enforced by Cisco I SE and t.
Int e gr ating Fiberlink MaaS36 0 with Cisco Identit y Ser vice s E ngine 42.
Un point important après l'achat de l'appareil (ou même avant l'achat) est de lire le manuel d'utilisation. Nous devons le faire pour quelques raisons simples:
Si vous n'avez pas encore acheté Cisco Systems MaaS360 c'est un bon moment pour vous familiariser avec les données de base sur le produit. Consulter d'abord les pages initiales du manuel d'utilisation, que vous trouverez ci-dessus. Vous devriez y trouver les données techniques les plus importants du Cisco Systems MaaS360 - de cette manière, vous pouvez vérifier si l'équipement répond à vos besoins. Explorant les pages suivantes du manuel d'utilisation Cisco Systems MaaS360, vous apprendrez toutes les caractéristiques du produit et des informations sur son fonctionnement. Les informations sur le Cisco Systems MaaS360 va certainement vous aider à prendre une décision concernant l'achat.
Dans une situation où vous avez déjà le Cisco Systems MaaS360, mais vous avez pas encore lu le manuel d'utilisation, vous devez le faire pour les raisons décrites ci-dessus,. Vous saurez alors si vous avez correctement utilisé les fonctions disponibles, et si vous avez commis des erreurs qui peuvent réduire la durée de vie du Cisco Systems MaaS360.
Cependant, l'un des rôles les plus importants pour l'utilisateur joués par les manuels d'utilisateur est d'aider à résoudre les problèmes concernant le Cisco Systems MaaS360. Presque toujours, vous y trouverez Troubleshooting, soit les pannes et les défaillances les plus fréquentes de l'apparei Cisco Systems MaaS360 ainsi que les instructions sur la façon de les résoudre. Même si vous ne parvenez pas à résoudre le problème, le manuel d‘utilisation va vous montrer le chemin d'une nouvelle procédure – le contact avec le centre de service à la clientèle ou le service le plus proche.