Book Image

Instant Apple Configurator How-to

Book Image

Instant Apple Configurator How-to

Overview of this book

The Apple configurator is an incredible piece of software which grants full control in mobile device management, but on a larger scale. The popularity of people taking their own devices to work has grown tremendously. However, valued professional and personal information is at risk, through loss, theft, or hacking. Instant Apple Configurator How-to is a hands-on guide that eliminates any worries that are associated with the deployment and security of iOS devices. This book provides practical, quick win solutions to combat these issues, with clear, concise, and informative examples providing solutions to secure, remote wipe, and encrypt devices. The book will further explore how to personalize iOS devices for configuration and deployment. With the Instant Apple Configurator How-to, learn to build profiles with customised control settings, with examples on how to capture device information and use console logs for added protection. You will become skilled at tracking and installing provisional profiles for greater security. We will also explore developing workflows for successful deployment, installing software and applications whilst managing files on iOS devices, and how to deploy enrolment profiles for mobile device management solutions en masse. If you are looking for a complete guide that provides simple solutions to complex problems, look no further.
Table of Contents (7 chapters)

Migrating existing profiles into Apple Configurator (Should know)


Profiles can be created in iPhone Configuration Utility, Profile Manager, and third-party MDM solutions, programmatically (through scripts) and with Apple Configurator. In some cases, a lot of time and effort went into creating profiles and so recreating them will take a considerable amount of time.

Getting ready

Before importing a profile, you'll first need to have a profile to import. While we haven't discussed creating and editing profiles in this book yet (we will), we're going to assume that you've exported a profile from one of the many apps that can create them and that you have permission to access the file. This is very helpful though, if you've configured a number of different profiles in iPhone Configuration Utility and are transitioning into Apple Configurator, a common task. Profiles should not be encrypted and should be saved in the .mobileconfig format to be imported.

How to do it...

  1. To import a profile, click on Prepare in Apple Configurator. Then, click on the plus sign and then on Import Profile... as seen in the following screenshot:

  2. At the Select Configuration Profiles screen, browse to the profile you will be importing as shown in the following screenshot:

How it works...

Profiles are XML files, saved in the .mobileconfig format. For those with experience with OS X, these are similar to the standard Apple Property List (.plist) files used to configure settings within OS X. As mentioned previously, profiles should not be encrypted or Apple Configurator cannot read them. However, Apple Configurator can import profiles that have been "signed".

There's more...

XML, or Extensible Markup Language, has become the defacto standard for managing many forms of information both for the Web, iOS, and OS X. The .mobileconfig files in OS X are similar, as mentioned, to .plist files. The .mobileconfig files can also be created in the iPhone Configuration Utility. Both .plist and .mobileconfig files can be edited using tools like defaults. For more information on doing so, check out http://krypted.com/iphone/exporting-information-from-iphone-configuration-utility.

Enrolling in Mobile Device Management

Profiles can also be used to automate enrollment into Apple's Profile Manager (built into OS X Server) and third-party MDM solutions. When enrolling in these services, profiles need to be installed on devices, which then are configured to trust and routinely check in with the MDM solution. The MDM solution needs to be accessible to the devices when the profiles are installed, meaning that these profiles frequently need to also have a Wi-Fi password as a payload as well.