In the previous chapter, we covered a fairly complex topic, certificate-based authentication, including setup and configuration of a fairly small public-key infrastructure, and made the relevant configuration changes to Exchange.
You'll be relieved to find out that this chapter is relatively easier, and for the most part relies little on Exchange Server configuration and is mostly focused on workstation-based configuration and deployment of iOS client devices.
In this chapter, you'll learn about how to provision and deploy iOS devices using Apple's iPhone Configuration Utility. This tool allows you to do more than what is possible using Exchange Server 2010 alone, including deploying certificates to iOS devices and a wealth of features to improve the restrictions that can be enforced on devices.
We'll look at how to create and manage the Configuration Profiles themselves, including how to associate user certificates with Configuration Profiles, and...