The iPad provides many security mechanisms for enterprise users and their applications and a secure mobile computing platform for users. Next, let's take a look at the security mechanisms in iOS.
1. Device Control and Protection
1.1 Password Policy
The iPad allows you to choose from a series of password design policies based on security requirements, including timeout settings, password length, and password update cycle. The iPad supports Microsoft Exchange ActiveSync password policies, such as the Minimum Password Length, maximum number of password attempts, number and letter combinations required for password setting, and maximum password inactivity time. In addition, the iPad supports password policies in Microsoft Exchange Server 2007, such: allow/prohibit password close, password timeout, password history, policy update interval, minimum number of complex letters in the password, etc.
1.2 set security policies
There are two ways to set security policies on the iPad. If the device is configured as an accessible Microsoft Exchange Account, the corresponding policies of Exchange ActiveSync will be pushed directly to the device without user settings. In addition, you can deploy and install the configuration in the configuration file. It is worth noting that the administrator password is required to delete the configuration.
1.3 Security Device Configuration
The iPad uses XML (eXtensible Markup Language) format configuration files to set security policies and restrictions for devices, Virtual Private Network (VPN) configuration information, Wi-Fi settings, and emails. The iPad provides signature and encryption protection for configuration files.
1.4 Device restrictions
Device restrictions specify which feature users can access and use the iPad. In other words, device Restrictions mainly aim to help enterprises regulate and limit which specific services employees can use the iPad in the enterprise environment. These restrictions usually include some network applications, such as Safari, YouTube, and iTunes Store. Of course, the restrictions can also include whether to allow application installation.