Top Banner
iPhone Configuration Utility Networking & Internet 2010-08-31
24

FA iPhone Configuration Utility

Apr 07, 2015

Download

Documents

William Mahn
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: FA iPhone Configuration Utility

iPhone Configuration UtilityNetworking & Internet

2010-08-31

Page 2: FA iPhone Configuration Utility

Apple Inc.© 2010 Apple Inc.All rights reserved.

No part of this publication may be reproduced,stored in a retrieval system, or transmitted, inany form or by any means, mechanical,electronic, photocopying, recording, orotherwise, without prior written permission ofApple Inc., with the following exceptions: Anyperson is hereby authorized to storedocumentation on a single computer forpersonal use only and to print copies ofdocumentation for personal use provided thatthe documentation contains Apple’s copyrightnotice.

The Apple logo is a trademark of Apple Inc.

Use of the “keyboard” Apple logo(Option-Shift-K) for commercial purposeswithout the prior written consent of Apple mayconstitute trademark infringement and unfaircompetition in violation of federal and statelaws.

No licenses, express or implied, are grantedwith respect to any of the technology describedin this document. Apple retains all intellectualproperty rights associated with the technologydescribed in this document. This document isintended to assist application developers todevelop applications only for Apple-labeledcomputers.

Every effort has been made to ensure that theinformation in this document is accurate. Appleis not responsible for typographical errors.

Apple Inc.1 Infinite LoopCupertino, CA 95014408-996-1010

App Store is a service mark of Apple Inc.

iTunes Music Store is a service mark of AppleInc., registered in the U.S. and other countries.

iTunes Store is a registered service mark ofApple Inc.

Apple, the Apple logo, AppleScript, FaceTime,iPhone, iPod, iPod touch, iTunes, Keychain,Leopard, Mac, Mac OS, Safari, Snow Leopard,and Xcode are trademarks of Apple Inc.,registered in the United States and othercountries.

iPad is a trademark of Apple Inc.

Java is a registered trademark of Oracle and/orits affiliates

IOS is a trademark or registered trademark ofCisco in the U.S. and other countries and is usedunder license.

UNIX is a registered trademark of The OpenGroup

Simultaneously published in the United Statesand Canada.

Even though Apple has reviewed this document,APPLE MAKES NO WARRANTY OR REPRESENTATION,EITHER EXPRESS OR IMPLIED, WITH RESPECT TOTHIS DOCUMENT, ITS QUALITY, ACCURACY,MERCHANTABILITY, OR FITNESS FOR A PARTICULARPURPOSE. AS A RESULT, THIS DOCUMENT ISPROVIDED “AS IS,” AND YOU, THE READER, AREASSUMING THE ENTIRE RISK AS TO ITS QUALITYAND ACCURACY.

IN NO EVENT WILL APPLE BE LIABLE FOR DIRECT,INDIRECT, SPECIAL, INCIDENTAL, ORCONSEQUENTIAL DAMAGES RESULTING FROM ANYDEFECT OR INACCURACY IN THIS DOCUMENT, evenif advised of the possibility of such damages.

THE WARRANTY AND REMEDIES SET FORTH ABOVEARE EXCLUSIVE AND IN LIEU OF ALL OTHERS, ORALOR WRITTEN, EXPRESS OR IMPLIED. No Appledealer, agent, or employee is authorized to makeany modification, extension, or addition to thiswarranty.

Some states do not allow the exclusion or limitationof implied warranties or liability for incidental orconsequential damages, so the above limitation orexclusion may not apply to you. This warranty givesyou specific legal rights, and you may also haveother rights which vary from state to state.

Page 3: FA iPhone Configuration Utility

Contents

Chapter 1 iPhone Configuration Utility 5

About Configuration Profiles 5About iPhone Configuration Utility 5Creating Configuration Profiles 8

Automating Configuration Profile Creation 8General Settings 9Passcode Settings 9Restrictions Settings 10Wi-Fi Settings 11VPN Settings 12Email Settings 14Exchange ActiveSync Settings 14LDAP Settings 14CalDAV Settings 15Subscribed Calendars Settings 15CardDAV Settings 15Web Clip Settings 15Credentials Settings 16SCEP Settings 17Mobile Device Management Settings 17Advanced Settings 18

Editing Configuration Profiles 18Installing Provisioning Profiles and Apps 19Installing Configuration Profiles 19

Installing Configuration Profiles Using iPhone Configuration Utility 19Distributing Configuration Profiles by Email 19Distributing Configuration Profiles on the Web 20Distributing Configuration Profiles Wirelessly 21User Installation of Downloaded Configuration Profiles 21

Removing and Updating Configuration Profiles 22

Document Revision History 23

32010-08-31 | © 2010 Apple Inc. All Rights Reserved.

Page 4: FA iPhone Configuration Utility

42010-08-31 | © 2010 Apple Inc. All Rights Reserved.

CONTENTS

Page 5: FA iPhone Configuration Utility

Read this document to learn how to use iPhone Configuration Utility to create configuration profiles.Configuration profiles define how iOS 4 devices work with your enterprise systems.

About Configuration Profiles

Configuration profiles are XML files that contain device security policies and restrictions, VPN configurationinformation, Wi-Fi settings, email and calendar accounts, and authentication credentials that permit iPhone,iPod touch, and iPad to work with your enterprise systems. Configuration profiles quickly load settings andauthorization information onto a device. Some VPN and Wi-FI settings can be set only by using a configurationprofile, and if you’re not using Microsoft Exchange, you need to use a configuration profile to set devicepasscode policies.

You can install configuration profiles on devices connected to a computer via USB using iPhone ConfigurationUtility, or you can distribute configuration profiles by email or on a webpage. When users open the emailattachment or download the profile using Safari on their device, they're prompted to begin the installationprocess. If you're using a Mobile Device Management server, you can distribute an initial profile that containsthe server configuration information only, then have the device obtain all other profiles wirelessly.

Configuration profiles can be encrypted and signed, which let you restrict their use to a specific device, andprevents anyone from changing the settings that a profile contains. You can also mark a profile as beinglocked to the device, so once installed, it can be removed only by wiping the device of all data, or optionally,by entering a passcode.

With the exception of passwords, users will not be able to change the settings provided in a configurationprofile. Additionally, accounts that are configured by a profile, such as Exchange accounts, can only beremoved by deleting the profile.

About iPhone Configuration Utility

iPhone Configuration Utility lets you easily create, encrypt and install configuration profiles, track and installprovisioning profiles and authorized apps, and capture device information, including console logs.

iPhone Configuration Utility requires one of the following:

■ Mac OS X v10.6 Snow Leopard

■ Windows XP Service Pack 3 with.NET Framework 3.5 Service Pack1

■ Windows Vista Service Pack 1 with .NET Framework 3.5 Service Pack 1

■ Windows 7 with .NET Framework 3.5 Service Pack 1

About Configuration Profiles 52010-08-31 | © 2010 Apple Inc. All Rights Reserved.

CHAPTER 1

iPhone Configuration Utility

Page 6: FA iPhone Configuration Utility

iPhone Configuration Utility operates in 32-bit mode on 64-bit versions of Windows.

You can download the .Net Framework 3.5 Service Pack 1 installer at: http://www.microsoft.com/downloads/de-tails.aspx?FamilyID=d0e5dea7-ac26-4ad7-b68c-fe5076bba986&displaylang=en

The utility lets you create an Outlook message with a configuration profile as an attachment. Additionally,you can assign users’ names and email addresses from your desktop address book to devices that you’veconnected to the utility. Both of these features require Outlook and are not compatible with Outlook Express.To use these features on Windows XP computers, you may need to install 2007 Microsoft Office SystemUpdate: Redistributable Primary Interop Assemblies. This is necessary if Outlook was installed before .NETFramework 3.5 Service Pack 1.

The Primary Interop Assemblies installer is available at: http://www.microsoft.com/downloads/details.as-px?familyid=59DAEBAA-BED4-4282-A28C-B864D8BFA513&displaylang=en

When you run the iPhone Configuration Utility installer, the utility is installed in /Applications/Utilities/ onMac OS X, or in Programs\iPhone Configuration Utility\ on Windows.

Note: Configuration profiles created with iPhone Configuration Utility 3.0 or later are for use only withdevices that have iOS 4 or later.

When you open iPhone Configuration Utility, a window similar to the one shown below appears.

6 About iPhone Configuration Utility2010-08-31 | © 2010 Apple Inc. All Rights Reserved.

CHAPTER 1

iPhone Configuration Utility

Page 7: FA iPhone Configuration Utility

The content of the window changes as you select items in the sidebar.

The sidebar shows the Library, which contains the following categories:

■ Devices shows a list of iOS devices that have been connected to your computer.

■ Applications lists your apps that are available to install on devices attached to your computer. Aprovisioning profile might be needed for an application to run on a device.

■ Provisioning Profiles lists profiles that permit the use of the device for iOS development, as authorizedby Apple Developer Connection. Provisioning profiles also allow devices to run enterprise apps thataren't distributed through the iTunes Store.

■ Configuration Profiles lists the configuration profiles you previously created, and lets you edit theinformation you entered, or create a new configuration that you can send to a user or install on aconnected device.

The sidebar also shows information about iOS devices currently connected to your computer via USB.Information about a connected device is automatically added to the Devices list, so you can view it againwithout having to reconnect the device. After a device has been connected, you can also encrypt profiles

About iPhone Configuration Utility 72010-08-31 | © 2010 Apple Inc. All Rights Reserved.

CHAPTER 1

iPhone Configuration Utility

Page 8: FA iPhone Configuration Utility

for use on only that device. iPhone Configuration Utility automatically installs a certificate on the device forthis purpose; you can see the certificate in the Summary pane. The message "This certificate was signed byan untrusted issuer" is normal and expected, because it's self-signed.

When a device is connected, you can use iPhone Configuration Utility to install configuration profiles andapps on the device.

When a device is connected, you can also view the console log. This is the same log available for viewingwithin the Xcode development environment on Mac OS X.

Creating Configuration Profiles

This document uses the terms configuration profile and payload. A configuration profile is the whole file thatconfigures certain (single or multiple) settings for iPhone, iPod touch, or iPad. A payload is an individualcollection of a certain type of settings, such as VPN settings, within the configuration profile. A configurationprofile contains one or more payloads.

Although you can create a single configuration profile that contains all of the payloads you need for yourorganization, consider creating separate profiles that allow you to enforce policies while granting access, aswell as provide updates to any settings that are subject to change.

Many of the payloads allow you to specify user names and passwords. If you omit this information, the useris asked to enter the missing information when the profile is installed. If you include passwords, you shoulddistribute the profile in encrypted format to protect its contents. For more information see "InstallingConfiguration Profiles" (page 19).

To create a new configuration profile, click the New button in the iPhone Configuration Utility toolbar. Youadd payloads to the profile using the payloads list. Then, you edit the payloads by entering and selectingoptions that appear in the editing pane. Required fields are marked with a red arrow. For some settings suchas Wi-Fi, you can click the Add (+) button to add a configuration. To remove a configuration, click the Delete(–) button in the editing pane.

To edit a payload, select the appropriate item in the payloads list, then click the Configure button, and fill inthe information as described in the sections below.

Automating Configuration Profile Creation

You can automate the creation of configuration files using AppleScript on a Mac, or C# Script on Windows.To see the supported methods and their syntax, do the following:

■ Mac OS X: Use Script Editor to open the AppleScript dictionary for iPhone Configuration Utility.

■ Windows: Use Visual Studio to view the method calls provided by iPCUScripting.dll.

To execute a script, on a Mac, use the AppleScript Tell command. On Windows, pass the script name to iPhoneConfiguration Utility as a command-line parameter.

8 Creating Configuration Profiles2010-08-31 | © 2010 Apple Inc. All Rights Reserved.

CHAPTER 1

iPhone Configuration Utility

Page 9: FA iPhone Configuration Utility

General Settings

This is where you provide the name and identifier of this profile, and specify if users are allowed to removethe profile after it is installed.

The name you specify appears in the profiles list and is displayed on the device after the configuration profileis installed. The name doesn’t have to be unique, but you should use a descriptive name that identifies theprofile.

The profile identifier must uniquely identify this profile and must use the format com.companyname.identifier,where identifier describes the profile—for example, com.mycompany.homeoffice.

The identifier is important because, when a profile is installed, the value is compared with profiles that arealready on the device. If the identifier is unique, information in the profile is added to the device. If theidentifier matches an installed profile, information in the profile replaces the settings already on the device,except in the case of Exchange settings. To alter an Exchange account, the profile must first be manuallyremoved so that the data associated with the account can be purged.

To prevent a user from deleting a profile installed on a device, choose an option from the Security pop-upmenu. The With Authorization option lets you specify an authorization password that permits the removalof the profile on the device. If you select the Never option, the profile can be updated with a new version,but it cannot be removed.

Passcode Settings

Use this payload to set device policies if you aren’t using Exchange passcode policies. You can specify whethera passcode is required in order to use the device, and specify characteristics of the passcode and how oftenit must be changed. When the configuration profile is loaded, the user is immediately required to enter apasscode that meets the policies you select. Otherwise, the profile won’t be installed.

If you use device policies and Exchange passcode policies, the two sets of policies are merged and the strictestsettings are enforced. For information about supported Exchange ActiveSync policies, see the article "ExchangeActiveSync and iOS 4 Devices."

The following policies are available:

Creating Configuration Profiles 92010-08-31 | © 2010 Apple Inc. All Rights Reserved.

CHAPTER 1

iPhone Configuration Utility

Page 10: FA iPhone Configuration Utility

■ Require passcode on device: Requires users to enter a passcode before using the device. Otherwise,anyone who has the device can access all of its functions and data.

■ Allow simple value: Permits users to use sequential or repeated characters in their passcodes. (Forexample, this would allow the passcodes “3333” or “DEFG.”)

■ Require alphanumeric value: Requires that the passcode contain at least one letter character.

■ Minimum passcode length: Specifies the minimum number of characters a passcode can contain.

■ Minimum number of complex characters: The number of non-alphanumeric characters (such as $, &, and!) that the passcode must contain.

■ Maximum passcode age (in days): Requires users to change their passcode at the interval you specify.

■ Auto-Lock (in minutes): If the device isn’t used for the period of time you specify, it automatically locks.Entering the passcode unlocks it.

■ Passcode history: A new passcode won’t be accepted if it matches a previously used passcode. You canspecify how many previous passcodes are remembered and compared.

■ Grace period for device lock: Specifies how soon the device can be unlocked again after use, withoutreprompting for the passcode.

■ Maximum number of failed attempts: Determines how many failed passcode attempts can be madebefore the device is wiped. If you don’t change this setting, after six failed passcode attempts, the deviceimposes a time delay before a passcode can be entered again. The time delay increases with each failedattempt. After the final failed attempt, all data and settings are securely erased from the device. Thepasscode time delay begins after the sixth attempt, so if you set this value to 6 or lower, no time delayis imposed and the device is erased when the attempt limit is exceeded.

Restrictions Settings

Use this payload to specify which device features the user can use.

Device Restrictions

■ Allow installing apps: When this option is off, the App Store is disabled and its icon is removed from theHome screen. Users are unable to install or update their apps using the App Store or iTunes.

■ Allow use of camera: When this option is off, cameras are completely disabled and the Camera icon isremoved from the Home screen. Users are unable to take photographs or videos, or use FaceTime.

■ Allow FaceTime: When this option is off, users are unable to place or receive FaceTime video calls.

■ Allow screen capture: When this option is off, users are unable to save a screenshot of the display.

■ Allow automatic sync while roaming: When this option is off, devices that are roaming will sync onlywhen an account is accessed by the user.

■ Allow voice dialing: When this option is off, users can't dial their phone using voice commands.

■ Allow In-App Purchase: When this option is off, users can't make in-app purchases.

■ Allow multiplayer gaming: When this option is off, users can't play multiplayer games in Game Center.

■ Force encrypted backups: When this option is off, users can choose whether or not device backups,performed in iTunes, are stored in encrypted format on their computer.

10 Creating Configuration Profiles2010-08-31 | © 2010 Apple Inc. All Rights Reserved.

CHAPTER 1

iPhone Configuration Utility

Page 11: FA iPhone Configuration Utility

Application Restrictions

■ Allow use of YouTube: When this option is off, the YouTube app is disabled and its icon is removed fromthe Home screen.

■ Allow use of iTunes Music Store: When this option is off, the iTunes Store is disabled and its icon isremoved from the Home screen. Users cannot preview, purchase, or download content.

■ Allow use of Safari: When this option is off, the Safari web browser app is disabled and its icon removedfrom the Home screen. This also prevents users from opening web clips.

❏ Enable autofill: When this option is off, Safari doesn't remember what users enter in web forms.

❏ Force Fraud warning: When this option is off, Safari doesn't attempt to prevent the user from visitingwebsite identified as being fraudulent or compromised.

❏ Enable JavaScript: When this option is off, Safari ignores all javascript on websites.

❏ Block pop-ups: When this option is off, Safari's pop-up blocking feature is disabled.

❏ Accept cookies: Sets Safari's cookie policy. Choose to accept all cookies, accept no cookies, or rejectcookies from sites not directly accessed.

■ Allow explicit music and podcasts: When this is turned off, explicit music or video content purchasedfrom the iTunes Store is hidden. Explicit content is flagged by content providers, such as record labels,when sold through the iTunes Store.

Media Restrictions

Select a ratings region, then select maximum allowed ratings for movies, TV shows, and apps.

Wi-Fi Settings

iOS supports the following 802.11i wireless networking security standards, as defined by the Wi-Fi Alliance:

■ WEP

■ WPA Personal

■ WPA Enterprise

■ WPA2 Personal

■ WPA2 Enterprise

Additionally, iOS supports the following 802.1X authentication methods for WPA Enterprise and WPA2Enterprise networks:

■ EAP-TLS

■ EAP -TTLS

■ EAP-FAST

■ EAP-SIM

■ PEAP v0, PEAP v1

Creating Configuration Profiles 112010-08-31 | © 2010 Apple Inc. All Rights Reserved.

CHAPTER 1

iPhone Configuration Utility

Page 12: FA iPhone Configuration Utility

■ LEAP

Use the Wi-Fi settings payload to set how the device connects to your wireless network. You can add multiplenetwork configurations by clicking the Add (+) button in the editing pane.

These settings must be specified and must match the requirements of your network, in order for the user toinitiate a connection.

■ Service Set Identifier: Enter the SSID of the wireless network to connect to.

■ Hidden Network: Specify whether the network is broadcasting its identity.

■ Security Type: Select an authentication method for the network. The following choices are available forboth Personal and Enterprise networks.

❏ None: The network doesn’t use authentication.

❏ WEP: The network uses WEP authentication only.

❏ WPA/WPA 2: The network uses WPA authentication only.

❏ Any: The device uses either WEP or WPA authentication when connecting to the network, but won’tconnect to non-authenticated networks.

■ Password: Enter the password for joining the wireless network, if applicable. If you leave this blank, theuser will be asked to enter it.

Enterprise Settings

In this section you specify settings for connecting to enterprise networks. These settings appear when youchoose an Enterprise setting in the Security Type pop-up menu.

In the Protocols tab, you specify which EAP methods to use for authentication, and configure the EAP-FASTProtected Access Credential settings.

In the Authentication tab, you specify sign-in settings, such as user name and authentication protocols. Ifyou’ve installed an identity using the Credentials section, you can choose it using the Identity Certificatepop-up menu.

In the Trust tab, you specify which certificates should be trusted for the purpose of validating the authenticationserver for the Wi-Fi connection. The Trusted Certificates list shows certificates that have been added usingthe Credentials tab, and lets you select which certificates are trusted. Add the names of the authenticationservers to be trusted to the Trusted Server Certificates Names list. You can specify a particular server, suchas server.mycompany.com, or a partial name such as *.mycompany.com.

The Allow Trust Exceptions option lets users decide to trust a server when the chain of trust can’t beestablished. To avoid these prompts and permit connections only to trusted services, turn off this option andembed all necessary certificates in a profile.

VPN Settings

Use this payload to enter the VPN settings for connecting to your network. You can add multiple VPNconfigurations by clicking the Add (+) button.

12 Creating Configuration Profiles2010-08-31 | © 2010 Apple Inc. All Rights Reserved.

CHAPTER 1

iPhone Configuration Utility

Page 13: FA iPhone Configuration Utility

For information about supported VPN protocols and authentication methods, see "VPN Server Configurationfor iOS Devices." The options available vary by the protocol and authentication method you select.

You can configure settings for supported VPN apps, such as Juniper Junos Pulse or Cisco AnyConnect, butmake sure they are installed on the device for the settings to work. The VPN apps are available in the AppStore.

VPN On Demand

For certificate-based configurations, you can turn on VPN On Demand so that a VPN connection is automaticallyestablished when accessing certain domains.

The VPN On Demand options are:

DescriptionSetting

Initiates a VPN connection for any address that matches the specified domain.Always

Doesn't initiate a VPN connection for addresses that match the specified domain, butif VPN is already active, it can be used.

Never

Initiates a VPN connection for addresses that match the specified domain, after a failedDNS look-up has occurred.

Establish if needed

The action applies to all matching addresses. Addresses are compared using simple string matching, startingfrom the end and working backwards. The address “.example.org” matches “support.example.org” and“sales.example.org,” but doesn’t match “www.private-example.org.” However, if you specify the match domainas “example.com”—notice there isn't a period at the beginning—it matches “www.private- example.com”and all the others.

LDAP connections don't initiate a VPN connection; if the VPN hasn’t already been established by anotherapp, such as Safari, the LDAP lookup fails.

After two minutes of inactivity, the device closes a VPN session initiated by VPN On Demand. If the connectionwas initiated manually, using the Settings app, only the VPN server's timeout applies.

VPN Proxy

iPhone supports manual VPN proxy, and automatic proxy configuration using PAC or WPAD. To specify aVPN proxy, select an option from the Proxy Setup pop-up menu.

For PAC-based auto-proxy configurations, select Automatic from the pop-up menu and then enter the URLof a PAC file. For information about PACS capabilities and the file format, see “Other Resources” on page 56.

Creating Configuration Profiles 132010-08-31 | © 2010 Apple Inc. All Rights Reserved.

CHAPTER 1

iPhone Configuration Utility

Page 14: FA iPhone Configuration Utility

For Web Proxy Autodiscovery (WPAD) configurations, select Automatic from the pop-up menu. Leave theProxy Server URL field empty, iPhone will request the WPAD file using DHCP and DNS.

Email Settings

Use this payload to configure POP or IMAP mail accounts for the user. iOS supports industry-standard IMAP4-and POP3-enabled mail solutions on a range of server platforms including Windows, UNIX, Linux, and MacOS X.

Users can modify some of the mail settings you provide in a profile, such as the account name, password,and alternative SMTP servers. If you omit any of this information from the profile, users are asked to enter itwhen they access the account.

You can add multiple mail accounts by clicking the Add (+) button.

Exchange ActiveSync Settings

Use this payload to enter the user’s settings for your Microsoft Exchange server. You can create a profile fora specific user by specifying the user name, host name, and email address, or you can provide just the hostname—users are prompted to fill in the other values when they install the profile.

You can configure multiple Exchange accounts by clicking the Add (+) button.

If you select the Use SSL option, use the Credentials pane to add any root or intermediate certificates thatare necessary to validate the server's SSL certificate.

To provide a certificate that identifies the user to the Exchange ActiveSync Server, click the Add (+) buttonand then select an identity certificate from the Mac OS X Keychain or Windows Certificate Store. After addinga certificate, you can specify the Authentication Credential Name, if necessary for your ActiveSync configuration.You can also embed the certificate’s passphrase in the configuration profile. If you don’t provide the passphrase,the user is asked to enter it when the profile is installed.

For information about requirements and supported features, see "Exchange ActiveSync and iOS Devices."

LDAP Settings

iOS 4 devices retrieve contact information from your company’s LDAPv3 server corporate directories.Youcan access directories when searching in Contacts, and they are automatically accessed for completing emailaddresses as you enter them.

Use this payload to enter settings for connecting to an LDAPv3 directory. You can specify multiple searchbases for each directory, and you can configure multiple directory connections by clicking the Add (+) button.

If you select the Use SSL option, use the Credentials pane to add any root or intermediate certificates thatare necessary to validate the server's SSL certificate.

14 Creating Configuration Profiles2010-08-31 | © 2010 Apple Inc. All Rights Reserved.

CHAPTER 1

iPhone Configuration Utility

Page 15: FA iPhone Configuration Utility

CalDAV Settings

iPhone, iPod touch, and iPad synchronize calendar data with your company’s CalDAV server. Changes to thecalendar are periodically updated between the device and server.

You can also subscribe to read-only published calendars, such as holiday calendars or those of a colleague’sschedule.

Creating and responding to new calendar invitations from a device is supported for CalDAV servers thatsupport the "calendar-auto-schedule" specification, such as Mac OS X Server v10.6.

Use this payload to provide accounts settings for connecting to a CalDAV-compliant calendar server. Theseaccounts will be added to the device, and as with Exchange accounts, users need to manually enter informationyou omit from the profile, such as their account password, when the profile is installed.

If you select the Use SSL option, use the Credentials pane to add any root or intermediate certificates thatare necessary to validate the server's SSL certificate.

You can configure multiple accounts by clicking the Add (+) button.

Subscribed Calendars Settings

Use this payload to add read-only calendar subscriptions to the device’s Calendar app. You can configuremultiple subscriptions by clicking the Add (+) button.

A list of public calendars you can subscribe to is available at www.apple.com/downloads/macosx/calendars/

If you select the Use SSL option, use the Credentials pane to add any root or intermediate certificates thatare necessary to validate the server's SSL certificate.

CardDAV Settings

iOS 4 devices retrieve contact information from your company’s CardDAV contact list. You can access directorieswhen searching in Contacts, and they are automatically accessed for completing email addresses as youenter them.

Use this payload to provide account settings for connecting to a CardDAV-compliant contact server. If youomit the account information, users need to manually enter it when the profile is installed.

You can configure multiple CalDAV accounts by clicking the Add (+) button.

If you select the Use SSL option, use the Credentials pane to add any root or intermediate certificates thatare necessary to validate the server's SSL certificate.

Web Clip Settings

Use this payload to add web clips to the Home screen of the user’s device. Web clips provide fast access tofavorite web pages. You can add multiple web clips by clicking the Add (+) button.

Creating Configuration Profiles 152010-08-31 | © 2010 Apple Inc. All Rights Reserved.

CHAPTER 1

iPhone Configuration Utility

Page 16: FA iPhone Configuration Utility

Make sure the URL you enter includes the prefix http:// or https://—this is required for the web clip to functioncorrectly. For example, to add the online version of the iPhone User Guide to the Home screen, specify theweb clip URL: http://help.apple.com/iphone/

If you choose to prevent the user from removing the web clip, the only way to remove it is to remove theconfiguration profile that installed it.

To add a custom icon, select a graphic file in gif, jpeg, or png format that's 59 x 60 pixels in size. The imageis automatically scaled and cropped to fit, and converted to png format if necessary. To prevent the devicefrom adding a shine to the image, click Precomposed Icon.

A full-screen web clip will open the URL as a web app.

Credentials Settings

iOS 4 devices can use X.509 certificates with RSA keys. The file extensions .cer, .crt, and .der are recognized.

Use the Credentials settings payload to add certificates and identities to the device. Certificates in PKCS1and PKCS12 format are supported. Use P12 (PKCS #12 standard) files that contain exactly one identity. Thefile extensions .p12 and .pfx are recognized. When an identity is installed, the user is prompted for thepassphrase that protects it, unless you include the passphrase in the payload.

When you install credentials, also install the intermediate certificates that are necessary to establish a chainto a trusted certificate that’s on the device. To view a list of the preinstalled roots, see the Apple Supportarticle at http://support.apple.com/kb/HT3580

To add an identify for use with Microsoft Exchange, use the Exchange payload. See "Enterprise Settings" (page12).

If you include the certificate passphrase in the payload, you should encrypt the configuration profile whenyou export it. If you omit the passphrase, the user will be asked to enter it when the profile is installed.

To add credentials on Mac OS X:

1. Click the Add (+) button.

2. In the dialog that appears, select a PKCS1 or PKSC12 file, then click Open.

If the certificate or identity that you want to install is in your Keychain, use Keychain Access to export itin .p12 format. Keychain Access is located in /Applications/Utilities/. For help, see Keychain Access Help,available in the Help menu when Keychain Access is open.

To add multiple credentials to the configuration profile, click the Add (+) button again.

To add credentials on Windows:

1. Click the Add (+) button.

2. Select the credential that you want to install from the Windows Certificate Store.

16 Creating Configuration Profiles2010-08-31 | © 2010 Apple Inc. All Rights Reserved.

CHAPTER 1

iPhone Configuration Utility

Page 17: FA iPhone Configuration Utility

If the credential isn’t available in your personal certificate store, you must add it. The private key mustbe marked as exportable, which is one of the steps offered by the certificate import wizard. Adding rootcertificates requires administrator access to the computer, and the certificate must be added to thepersonal certificate store.

Instead of installing certificates using a configuration profile, you can let users use Safari to download thecertificates directly to their device from a webpage. Or, you can email certificates to users. You can also usethe SCEP Settings, described below, to specify how the device obtains certificates over the air when theprofile is installed.

SCEP Settings

The SCEP payload lets you specify settings that allow the device to obtain certificates from a CA using SimpleCertificate Enrollment Protocol (SCEP).

DescriptionSetting

This is the address of the SCEP server.URL

This can be any string that will be understood by the certificate authority. It canbe used to distinguish between instances, for example.

Name

The representation of a X.500 name represented as an array of OID and value. Forexample, /C=US/O=Apple Inc./CN=foo/1.2.5.3=bar, which translates to: [ [ [“C”,“US”] ], [ [“O”, “Apple Inc.”] ], ..., [ [ “1.2.5.3”, “bar” ] ] ]

Subject

Specify the type and value of an alternative name for the SCEP server. Valid valuesare an email address (RFC-822), the DNS name of the server, or the server'sfully-qualified URL.

Subject AlternativeName

A pre-shared secret the SCEP server can use to identify the request or user.Challenge

Select a key size, and—using the checkboxes below this field—the acceptableuses of the key.

Key Size and Usage

If your Certificate Authority uses HTTP, use this field to provide the fingerprint ofthe CA’s certificate, which the device will use to confirm authenticity of the CA’sresponse during the enrollment process. You can enter a SHA1 or MD5 fingerprint,or select a certificate to import its signature.

Fingerprint

Mobile Device Management Settings

The Mobile Device Management (MDM) payload configures the device so that its configuration will bemanaged over the air by an MDM server, available from third-party solution providers. Only one MobileDevice Management payload can be installed on a device, and once it's installed, the device can receivefurther configuration profiles wirelessly.

The Mobile Device Management server can install configuration profiles, but can only remove configurationprofiles that it installed. To ensure that you can update or remove configurations, once a device has beenconfigured to use the server, you should distribute all of your configuration profiles wirelessly.

Creating Configuration Profiles 172010-08-31 | © 2010 Apple Inc. All Rights Reserved.

CHAPTER 1

iPhone Configuration Utility

Page 18: FA iPhone Configuration Utility

DescriptionSetting

The fully-qualified, publicly accessible URL of the MDM server. It must begin with https://,and can specify a port number. Example: https://mdm.example.org:nnnn

Server URL

An optional fully-qualified URL the device contacts after being notified that there is aprofile available for installation. It must begin with https:// and can specify a port number.Example: https://mdm.example.org:nnnn

If this isn't specified, the device checks in using with the Server URL.

Check In URL

The topic field identifies which push notification messages contain MDM directives. Thevalue must match the User ID in the Subject field of the certificate used by the MDM serverto send push notifications.

Topic

Select the certificate the device uses to identify itself to the MDM server. Add the certificateto the device using the Credentials Settings, or use SCEP Settings to provide instructionsfor the device to obtain the certificate using SCEP.

Identity

Instructs the device to add a signature header to every http response to the MDM server.See your MDM server's documentation for information about using this option with yourserver.

Sign Messages

Use the checkboxes to specify the rights granted to the MDM server. You can allow remote administrationof profiles, ask the device to respond to various queries, as well as remove the device's passcode and wipeall device data. The options you select here work in conjunction with your MDM server. See its documentationfor information.

If you enable Use Development APNS Server, the device listens for all push notifications from the Apple PushNotification Server development server. This should be used only during development of MDM server software.

Advanced Settings

The Advanced payload lets you change the device’s Access Point Name (APN) and cell network proxy settings.These settings define how the device connects to the carrier’s network. Change these settings only wheninstructed to do so by a carrier network expert. If these settings are incorrect, the device can’t access datausing the cellular network. To undo an inadvertent change to these settings, remove the profile from thedevice.

iOS supports APN user names and passwords of up to 64 characters.

Editing Configuration Profiles

In iPhone Configuration Utility, select a profile in the Configuration Profiles list, and then use the payload listpane and editing pane to make changes. You can also import a profile by choosing File > Add to Library andthen selecting a .mobileconfig file. If the settings panes aren’t visible, choose View > Show Detail.

The Identifier field in the General payload is used by the device to determine whether a profile is new, or anupdate to an existing profile. If you want the updated profile to replace one that users have already installed,don’t change the Identifier.

18 Editing Configuration Profiles2010-08-31 | © 2010 Apple Inc. All Rights Reserved.

CHAPTER 1

iPhone Configuration Utility

Page 19: FA iPhone Configuration Utility

Installing Provisioning Profiles and Apps

iPhone Configuration Utility can install apps and distribution provisioning profiles on devices attached tothe computer. For details see the article "Distributing Enterprise Applications for iOS 4 Devices."

Installing Configuration Profiles

After you create a profile, you can connect a device and install the profile using iPhone Configuration Utility.

You can also distribute the profile to users by email, or post it to a website. When users use their device toopen an email message or download the profile from the web, they’re prompted to start the installationprocess.

You can also distribute profiles using a Mobile Device Management server.

Installing Configuration Profiles Using iPhone Configuration Utility

You can use iPhone Configuration Utility to install configuration profiles directly on a device that has beenupdated to iOS 3.0 or later and is attached to your computer. You can also use it to remove previously installedprofiles.

To install a configuration profile:

1. Connect the device to a USB port on your computer.

After a moment, the device appears in the Devices list in iPhone Configuration Utility.

2. Select the device, and then click the Configuration Profiles tab.

3. Select a configuration profile from the list, and then click Install.

4. On the device, tap Install to install the profile.

When you install directly onto a device using USB, the configuration profile is automatically signed andencrypted before being transferred to the device.

Distributing Configuration Profiles by Email

You can distribute configuration profiles by email. Users receive the message on their device and then tapthe attachment to install the profile.

To email a configuration profile:

1. Click the Share button in the iPhone Configuration Utility toolbar.

Installing Provisioning Profiles and Apps 192010-08-31 | © 2010 Apple Inc. All Rights Reserved.

CHAPTER 1

iPhone Configuration Utility

Page 20: FA iPhone Configuration Utility

In the dialog that appears, select a security option:

■ None: A plain text .mobileconfig file is created. It can be installed on any device. Some content inthe file is obfuscated to prevent casual snooping if the file is examined.

■ Sign Configuration Profile: The .mobileconfig file is signed and can be installed by any device, aslong as the profile hasn't been altered. Once installed, the profile can be updated only by a profilethat has the same identifier and is signed by the same copy of iPhone Configuration Utility.

■ Create and Sign Encrypted Configuration Profile For Each Selected Device: This option signs theprofile so it cannot be altered, and encrypts all of the contents so the profile cannot be examinedand can only be installed on a specific device. If the profile contains passwords, this option isrecommended. Separate .mobileconfig files are created for each of the devices you select from theDevices list. If a device doesn't appear in the list, it either hasn’t been previously connected to thecomputer so that the encryption key can be obtained, or it hasn’t been upgraded to iOS 3.0 or later.

2. Click Share, and a new Mail (Mac OS X) or Outlook (Windows) message opens with the profiles addedas uncompressed attachments. The files must remain uncompressed for the device to recognize andinstall the profile.

Distributing Configuration Profiles on the Web

You can distribute configuration profiles using a website. Users install the profile by downloading it usingSafari on their device. To easily distribute the URL to your users, send it via SMS.

To export a configuration profile:

1. Click the Export button in the iPhone Configuration Utility toolbar.

In the dialog that appears, select a security option:

■ None: A plain text .mobileconfig file is created. It can be installed on any device. Some content inthe file is obfuscated to prevent casual snooping if the file is examined, but you should make surethat when you put the file on your website it’s accessible only by authorized users.

■ Sign Configuration Profile: The .mobileconfig file is signed and won’t be installed by a device if it’saltered. Once installed, the profile can be updated only by a profile that has the same identifier andis signed by the same copy of iPhone Configuration Utility. You should make sure that when youput the file on your website, it’s accessible only by authorized users.

■ Sign and Encrypt Profile: This option signs the profile so it cannot be altered, and encrypts all of thecontents so the profile cannot be examined and can only be installed on a specific device. Separate.mobileconfig files are created for each of the devices you select from the Devices list.

2. Click Export, and then select a location to save the .mobileconfig files.

The files are ready for posting on your website. Don’t compress the .mobileconfig file or change its extension,or the device won’t recognize or install the profile.

20 Installing Configuration Profiles2010-08-31 | © 2010 Apple Inc. All Rights Reserved.

CHAPTER 1

iPhone Configuration Utility

Page 21: FA iPhone Configuration Utility

Distributing Configuration Profiles Wirelessly

You can use a Mobile Device Management server to configure iOS devices over the air. This server can bebuilt in-house by your IT department, or purchased from a third-party solution provider. See "iPhone inBusiness: Mobile Device Management" for information.

User Installation of Downloaded Configuration Profiles

Provide your users with the URL where they can download the profiles onto their devices, or send the profilesto an email account your users can access on the device before it’s set up with your enterprise-specificinformation.

When a user downloads the profile from the web or opens the attachment using Mail, the device recognizesthe .mobileconfig extension as a profile and begins installing when the user taps Install.

During installation, the user is asked to enter any necessary information, such as passwords that weren'tspecified in the profile, and other information as required by the settings you specified.

The device also retrieves the Exchange ActiveSync policies from the server, and refreshes the policies, if theychange, with every subsequent connection. If the device or Exchange ActiveSync policies enforce a passcodesetting, the user must enter a passcode that complies with the policy in order to complete the installation.

The user is also asked to enter any passwords necessary to use certificates included in the profile.

If the installation isn’t completed successfully—perhaps because the Exchange server was unreachable orthe user cancelled the process—none of the information entered by the user is kept.

Installing Configuration Profiles 212010-08-31 | © 2010 Apple Inc. All Rights Reserved.

CHAPTER 1

iPhone Configuration Utility

Page 22: FA iPhone Configuration Utility

Removing and Updating Configuration Profiles

Managed configuration profiles can be updated and removed over the air by using an MDM server. To updatea configuration profile that was manually installed, distribute the new profile to user and have them installthe new version. As long as the profile identifier matches and (if signed) has been signed by the same copyof iPhone Configuration Utility, the new profile replaces the profile on the device.

Settings enforced by a configuration profile cannot be changed on the device. To change a setting, you mustinstall an updated profile. If the profile was signed, it can be replaced only by a profile signed by the samecopy of iPhone Configuration Utility. The identifier in both profiles must match. For more information aboutthe identifier, see "General Settings" (page 9).

Important: Removing a configuration profile removes policies and all of the information (including mailaccounts) associated with the profile.

If the General Settings payload of the profile specifies that it cannot be removed by the user, the Removebutton doesn't appear. If the settings allow removal using an authorization password, the user is asked toenter the password after tapping Remove. For more information about profile security settings, see “GeneralSettings”.

22 Removing and Updating Configuration Profiles2010-08-31 | © 2010 Apple Inc. All Rights Reserved.

CHAPTER 1

iPhone Configuration Utility

Page 23: FA iPhone Configuration Utility

This table describes the changes to iPhone Configuration Utility.

NotesDate

Minor updates and clarifications for iOS 4.1.2010-08-31

First version for iOS 4, replaces former iPhone Enterprise Deployment Guide.2010-07-08

232010-08-31 | © 2010 Apple Inc. All Rights Reserved.

REVISION HISTORY

Document Revision History

Page 24: FA iPhone Configuration Utility

242010-08-31 | © 2010 Apple Inc. All Rights Reserved.

REVISION HISTORY

Document Revision History