51CTO expert column Li Yang talks about iOS Security Mechanism Overview (1)

Source: Internet
Author: User

The iPad provides many security mechanisms for enterprise users and their applications and a secure mobile computing platform for users. Next, let's take a look at the security mechanisms in iOS.

1. Device Control and Protection

1.1 Password Policy

The iPad allows you to choose from a series of password design policies based on security requirements, including timeout settings, password length, and password update cycle. The iPad supports Microsoft Exchange ActiveSync password policies, such as the Minimum Password Length, maximum number of password attempts, number and letter combinations required for password setting, and maximum password inactivity time. In addition, the iPad supports password policies in Microsoft Exchange Server 2007, such: allow/prohibit password close, password timeout, password history, policy update interval, minimum number of complex letters in the password, etc.

1.2 set security policies

There are two ways to set security policies on the iPad. If the device is configured as an accessible Microsoft Exchange Account, the corresponding policies of Exchange ActiveSync will be pushed directly to the device without user settings. In addition, you can deploy and install the configuration in the configuration file. It is worth noting that the administrator password is required to delete the configuration.

1.3 Security Device Configuration

The iPad uses XML (eXtensible Markup Language) format configuration files to set security policies and restrictions for devices, Virtual Private Network (VPN) configuration information, Wi-Fi settings, and emails. The iPad provides signature and encryption protection for configuration files.

1.4 Device restrictions

Device restrictions specify which feature users can access and use the iPad. In other words, device Restrictions mainly aim to help enterprises regulate and limit which specific services employees can use the iPad in the enterprise environment. These restrictions usually include some network applications, such as Safari, YouTube, and iTunes Store. Of course, the restrictions can also include whether to allow application installation.


Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.