SlideShare a Scribd company logo
WSO2 Enterprise Mobility
Manager (EMM) 2.0
Dilshan Edirisuriya
Senior Software Engineer
WSO2
Agenda
• Enterprise Mobile Device Management Overview
• Key Challenges Faced by Organizations
• Need for Mobile Device Management
• EMM Architecture and Features
• CDMF Architecture and Features
• Demo
• Platform Features
Enterprise Few Years Back
Employees
Enterprise
Data
Device
Work
• Carried out inside a place
• Dependent on specific technology
• Resources
Within the premise
Owned by enterprise
Device
Enterprise Now
Enterprise
Device
Data
Work
• Independent of place
• Independent of technology
• Resources
Within the premise and outside
Owned by enterprise and employees
Data
Employees
Challenges
Enterprise
Data
Employees
Device
Data
Employees working out of the office with mobile devices and cloud services
to perform business tasks.
Challenge - Data Security
How data can be compromised ?
Device being lost or stolen
Malicious applications stealing data
Data leaks
What is data ?
Email message or the attachments
Documents like pdf, word, excel,
ppt, text files
Browser accessing HTML pages
with cookies
Contacts, calendars and notes
Application with databases
Why data is sensitive ?
It can be highly confidential
like quotation value, salary
details etc.
It can have a high impact if it
goes to the wrong person
Who can compromise ?
External
Internal
Challenge - Monitor Devices
• What to monitor (location, root check, malicious
apps, bandwidth usage etc.)?
• To what extent?
• A threat to employee privacy?
Challenge - Enterprise Application Development &
Management
Challenge - Legacy Back End System Integrations
• Legacy backends are not mobile friendly.
• Adheres to older protocols and standards.
• Only compatible with older mobile technologies.
Eg: MIDlets.
Why EMM?
Applications
Documents Emails
Browsers
Devices
Enterprise
Data
Employees
Devices
AndroidiOS Windows 8Blackberry
COPE
Corporate Owned
Personally
Enabled
BYOD
Bring Your
Own
Device
Phones Tablets Laptops
CYOD
Choose Your
Own Device
Device Ownership
How EMM addresses Data Security
• Device level
• Application level
Data Security - Device Level
Data Security
Enforce Password Policy
Encrypt Device Data
Remote Device Management
Monitor Device (location, battery)
Configure device(Email, VPN)
Control Device (Enable/Disable
Camera)
Update OS, Install & Uninstall App
Data Security - Application Level
MAM gets you a step closer to managing what you care about
MAM brings the perimeter closer to the corporate resources
Data is protected
Application can be controlled
remotely
MAM Controls Application Behavior
• Encrypt the data at transmit. Eg: Uses app VPN
tunnel or app tunnel.
• Encrypt the data at storing & decrypt only when
viewing.
• Two factor authentication.
• Data Loss Prevention - DLP (disable cut, copy and
paste).
• Policy based data control, where policy can be
pushed and updated.
Solution - Enterprise Application Development &
Management
Data
COPE BYOD
1
3
2
4
Data Security
Remote Device Management
Enterprise Store
Decision for CIOs or IT Managers
Allow mobility in my business?
Allow employees to use their device ?
Allow business partners, distributors to
use their device ?
Allow them access corporate resources?
To what extent?
Risks vs Benefits
risks
benefits
Drafting a BYOD Policy
• What devices are permitted?
• Supported features and boundaries for device
types.
• Ownership and permissions to applications and
data.
• Policy violation criteria and actions.
• Employee exit strategy.
• Prompt for approval.
Enterprise Mobility Manager
Key Components
• Connected Device Management Framework
(CDMF)
• Mobile Device Management (MDM)
• Mobile Application Management (MAM)
Connected Device Management Framework
Connected Device Management Framework
(CDMF) Cont.
• Device Management
• Operation Management
• Application Management
• Policy Management
• Compliance Monitoring
• Configuration Management
• License Management
Connected Device Management Framework
(CDMF) Cont.
• API Management
• Certificate Management
• Identity Extensions
• Web Application Authenticators
• Notifications
• User Management
• Permissions
Connected Device Management Framework
(CDMF) Cont.
Devices
Operations
Applications
Policies
Monitoring
Configurations
Licenses
API Management
Certificate Management
Identity Extensions
Authenticators
Notifications
Permissions
Enterprise Mobility Manager
Architecture
Notification Method - MDM Push
Notification Method - Local
Notification Method - App Push & Silent
Mobile Device Management Features
• Self-service device enrollment and management
with end-user EMM Console for iOS, Android and
Windows devices.
• Integrates to enterprise identity systems for
device ownership: LDAP, Microsoft AD
• Policy-driven device and profile management for
security, data, and device features (Camera,
Password Policy)
• Deploy policies over-the-air (OTA).
Mobile Device Management Features
• Compliance monitoring for applied policies on
devices.
• Role-based access control (RBAC) for device
management.
• Securely wipe enterprise configurations from
Enterprise wipe.
• Track locations of enrolled devices.
• Retrieve device information.
Mobile Device Management Features
• Facilitate device-owner operations such as
registering and unregistering devices, installing,
rating, sorting mobile apps, etc.
Mobile App Management
• Supports App management.
• App approval process through a lifecycle.
• Provision and deprovisioning apps to enrolled
devices.
• Provision apps to enrolled devices based on
roles.
• Provision apps to multiple enrolled devices per
user.
Mobile App Management
• Retrieve list of apps.
• Install new apps and update existing apps on iOS
devices via REST APIs, enabling automation of
application installation/updates for third party
systems/vendors.
• Install Web Clips on devices.
• Enterprise App Store.
• Discover mobile apps through an Enterprise App
Store.
Mobile App Management
• Self-provisioning of mobile apps to devices.
• Rating and Sorting Applications.
Device and Data Security
• Multi-tenancy to ensure data isolation across all
tenants.
• Enforce built-in security features of passcode and
encryption.
• Encryption of data storage.
• Device lock and reset.
• Managed APIs to perform administrative functions.
• Ring and GPS to locate device remotely if lost/stolen.
Demo
Email configurations
<EMM_HOME>/repository/conf/axis2/axis2.xml
<transportSender name="mailto"
class="org.apache.axis2.transport.mail.MailTransportSender">
<parameter name="mail.smtp.from">cdm.wso2@gmail.com</parameter>
<parameter name="mail.smtp.user">cdm.wso2@gmail.com</parameter>
<parameter name="mail.smtp.password">wso21234</parameter>
<parameter name="mail.smtp.host">smtp.gmail.com</parameter>
<parameter name="mail.smtp.port">587</parameter>
<parameter name="mail.smtp.starttls.enable">true</parameter>
<parameter name="mail.smtp.auth">true</parameter>
</transportSender>
Change config.json file
• <EMM_HOME>/repository/deployment/server/
jaggeryapps/emm-web-agent/config
• <EMM_HOME>/repository/deployment/server/
jaggeryapps/emm/config
Change cdm-config.xml file
• Change LBHostPortPrefix in <EMM_HOME>/
repository/conf
Enroll Email
Dear Dilshan,
You have been registered to WSO2 MDM with following credentials.
Domain:
Username: dilshan
Password: LbmS82
Below is the link to enroll.
https://192.168.1.5:9443/emm-web-agent/enrollment
Best Regards,
WSO2 MDM Team.
http://www.wso2.com
Platform Features
iOS Features
• Self-service device enrollment and management with
end-user EMM Console via iOS Agent or Web interface
for versions up to iOS 9 SDK.
• Facilitate remote notifications via Apple Push
Notification Service (APNS).
• Support for iOS 9.
• Device Tracking.
• Configuring cellular network settings.
• Device profile management.
iOS Features
• Retrieving device info.
• Device lock
• Restricting device operations.
• Automatic WiFi configuration.
• Set up AirPlay
• Set up restrictions
• Enterprise WIPE
• Set up APN
iOS Features
• Setup LDAP.
• Setup email accounts.
• Set up CalDav
• Calendar subscription
• Passcode policy
• Clear passcode
• App installation and update
• Retrieve app list
iOS Features
• Web clip installation
• Supports App management
• Setup email accounts
Android Features
• Self-service device enrollment and management with
end-user EMM Console via Android Agent (Android
4.0.3 Ice Cream Sandwich MR1 up to 5.0 Lollipop).
• Supports App management.
• App policy compliance monitoring.
• Device location tracking.
• Retrieving device info.
• Changing lock code.
Android Features
• Restricting Camera.
• OTA WiFi configuration.
• Enterprise WIPE.
• Configuring encryption settings.
• Passcode policy configuration and clear passcode policy.
• Device master reset
• Mute device
• Ring device
Android Features
• Send messages to the device.
• Install/uninstall store and enterprise
applications.
• Retrieve apps installed on the device.
• Install web clips on the device.
• Support GCM/LOCAL connectivity modes.
Windows Features
• Self-service device enrollment and management with
end-user EMM Console via Workplace (Windows 8.1).
• Passcode policy
• Restriction on camera.
• Encryption settings
• Retrieve device info.
• Device Lock and Lock Reset
• Ring device
• Data Wipe
GitHub Repositories
• Connected Device Management Framework
https://github.com/wso2/carbon-device-mgt
• Device management plugins
https://github.com/wso2/carbon-device-mgt-
plugins
• Enterprise Mobility Manager
https://github.com/wso2/product-mdm
Questions?
Thank You

More Related Content

What's hot

WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and BeyondWSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
WSO2
 
Device Management for Connected Devices
Device Management for Connected Devices Device Management for Connected Devices
Device Management for Connected Devices WSO2
 
What iOS 9 Means for the Enterprise
What iOS 9 Means for the EnterpriseWhat iOS 9 Means for the Enterprise
What iOS 9 Means for the Enterprise
Alexander Romero
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
Andris Soroka
 
CIS14: Providing Security and Identity for a Mobile-First World
CIS14: Providing Security and Identity for a Mobile-First WorldCIS14: Providing Security and Identity for a Mobile-First World
CIS14: Providing Security and Identity for a Mobile-First World
CloudIDSummit
 
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
IBM Security
 
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...
CA API Management
 
Connecting The Real World With The Virtual World
Connecting The Real World With The Virtual WorldConnecting The Real World With The Virtual World
Connecting The Real World With The Virtual World
Ping Identity
 
Enterprise Mobility: winning strategies to get your organization ready for th...
Enterprise Mobility: winning strategies to get your organization ready for th...Enterprise Mobility: winning strategies to get your organization ready for th...
Enterprise Mobility: winning strategies to get your organization ready for th...
Luca Rossetti
 
Layer 7: Building Multi Enterprise SOA
Layer 7: Building Multi Enterprise SOALayer 7: Building Multi Enterprise SOA
Layer 7: Building Multi Enterprise SOA
CA API Management
 
IBM Mobile foundation overview
IBM Mobile foundation overviewIBM Mobile foundation overview
IBM Mobile foundation overview
Ajay Chebbi
 
Prosoft mobile services v3
Prosoft mobile services v3Prosoft mobile services v3
Prosoft mobile services v3rajpsft
 
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the CloudOracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Indus Khaitan
 
The Future of Mobile Application Security
The Future of Mobile Application SecurityThe Future of Mobile Application Security
The Future of Mobile Application Security
SecureAuth
 
Considerations when building mobile app. Presented by Microstrategy
Considerations when building mobile app. Presented by MicrostrategyConsiderations when building mobile app. Presented by Microstrategy
Considerations when building mobile app. Presented by Microstrategyitnewsafrica
 
Make Good Apps great - Using IBM MobileFirst Foundation
Make Good Apps great - Using IBM MobileFirst FoundationMake Good Apps great - Using IBM MobileFirst Foundation
Make Good Apps great - Using IBM MobileFirst Foundation
Ajay Chebbi
 
Blackberry, Saatnya beralih ke solusi multi-platform Enterprise Mobility Mana...
Blackberry, Saatnya beralih ke solusi multi-platform Enterprise Mobility Mana...Blackberry, Saatnya beralih ke solusi multi-platform Enterprise Mobility Mana...
Blackberry, Saatnya beralih ke solusi multi-platform Enterprise Mobility Mana...
BlackberryIndonesia
 
Llunitebe2018 ten practical tips to secure your corporate data with microsoft...
Llunitebe2018 ten practical tips to secure your corporate data with microsoft...Llunitebe2018 ten practical tips to secure your corporate data with microsoft...
Llunitebe2018 ten practical tips to secure your corporate data with microsoft...
Kenny Buntinx
 
Mobility and the Real-Time Enterprise
Mobility and the Real-Time EnterpriseMobility and the Real-Time Enterprise
Mobility and the Real-Time Enterprise
AnyPresence
 
EMM and MBaaS: How IT Can Enable Secure App Development
EMM and MBaaS: How IT Can Enable Secure App DevelopmentEMM and MBaaS: How IT Can Enable Secure App Development
EMM and MBaaS: How IT Can Enable Secure App Development
AnyPresence
 

What's hot (20)

WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and BeyondWSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
 
Device Management for Connected Devices
Device Management for Connected Devices Device Management for Connected Devices
Device Management for Connected Devices
 
What iOS 9 Means for the Enterprise
What iOS 9 Means for the EnterpriseWhat iOS 9 Means for the Enterprise
What iOS 9 Means for the Enterprise
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
 
CIS14: Providing Security and Identity for a Mobile-First World
CIS14: Providing Security and Identity for a Mobile-First WorldCIS14: Providing Security and Identity for a Mobile-First World
CIS14: Providing Security and Identity for a Mobile-First World
 
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
 
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...
 
Connecting The Real World With The Virtual World
Connecting The Real World With The Virtual WorldConnecting The Real World With The Virtual World
Connecting The Real World With The Virtual World
 
Enterprise Mobility: winning strategies to get your organization ready for th...
Enterprise Mobility: winning strategies to get your organization ready for th...Enterprise Mobility: winning strategies to get your organization ready for th...
Enterprise Mobility: winning strategies to get your organization ready for th...
 
Layer 7: Building Multi Enterprise SOA
Layer 7: Building Multi Enterprise SOALayer 7: Building Multi Enterprise SOA
Layer 7: Building Multi Enterprise SOA
 
IBM Mobile foundation overview
IBM Mobile foundation overviewIBM Mobile foundation overview
IBM Mobile foundation overview
 
Prosoft mobile services v3
Prosoft mobile services v3Prosoft mobile services v3
Prosoft mobile services v3
 
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the CloudOracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
 
The Future of Mobile Application Security
The Future of Mobile Application SecurityThe Future of Mobile Application Security
The Future of Mobile Application Security
 
Considerations when building mobile app. Presented by Microstrategy
Considerations when building mobile app. Presented by MicrostrategyConsiderations when building mobile app. Presented by Microstrategy
Considerations when building mobile app. Presented by Microstrategy
 
Make Good Apps great - Using IBM MobileFirst Foundation
Make Good Apps great - Using IBM MobileFirst FoundationMake Good Apps great - Using IBM MobileFirst Foundation
Make Good Apps great - Using IBM MobileFirst Foundation
 
Blackberry, Saatnya beralih ke solusi multi-platform Enterprise Mobility Mana...
Blackberry, Saatnya beralih ke solusi multi-platform Enterprise Mobility Mana...Blackberry, Saatnya beralih ke solusi multi-platform Enterprise Mobility Mana...
Blackberry, Saatnya beralih ke solusi multi-platform Enterprise Mobility Mana...
 
Llunitebe2018 ten practical tips to secure your corporate data with microsoft...
Llunitebe2018 ten practical tips to secure your corporate data with microsoft...Llunitebe2018 ten practical tips to secure your corporate data with microsoft...
Llunitebe2018 ten practical tips to secure your corporate data with microsoft...
 
Mobility and the Real-Time Enterprise
Mobility and the Real-Time EnterpriseMobility and the Real-Time Enterprise
Mobility and the Real-Time Enterprise
 
EMM and MBaaS: How IT Can Enable Secure App Development
EMM and MBaaS: How IT Can Enable Secure App DevelopmentEMM and MBaaS: How IT Can Enable Secure App Development
EMM and MBaaS: How IT Can Enable Secure App Development
 

Similar to WSO2 Enterprise Mobility Manager - 2.0

WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2
 
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...WSO2
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2
 
Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the Enterprise
Will Adams
 
MMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure itMMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure it
Peter Daalmans
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Conference_by_EVRY
 
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
MVP Dagen
 
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Nordic Infrastructure Conference
 
#EVRYWhatsNext EMS Slide Deck
#EVRYWhatsNext EMS Slide Deck#EVRYWhatsNext EMS Slide Deck
#EVRYWhatsNext EMS Slide Deck
Olav Tvedt
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
Sumana Mehta
 
Empower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSEmpower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMS
Kris Wagner
 
Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!
Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!
Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!
Kaseya
 
Primendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suitePrimendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suite
Primend
 
Managing BYOD Conference: Mobile Enterprise Data
Managing BYOD Conference: Mobile Enterprise DataManaging BYOD Conference: Mobile Enterprise Data
Managing BYOD Conference: Mobile Enterprise Datakidozen
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
Chris Pepin
 
Security Beyond the Firewall
Security Beyond the FirewallSecurity Beyond the Firewall
Security Beyond the Firewall
KTL Solutions
 
Mobile DAta
Mobile DAtaMobile DAta
Mobile DAtakidozen
 
Microsoft Enterprise Mobility Suite Launch Presentation - Atidan
Microsoft Enterprise Mobility Suite Launch Presentation - AtidanMicrosoft Enterprise Mobility Suite Launch Presentation - Atidan
Microsoft Enterprise Mobility Suite Launch Presentation - Atidan
David J Rosenthal
 
LML Technologie offre les solutions de SOTI
LML Technologie offre les solutions de SOTILML Technologie offre les solutions de SOTI
LML Technologie offre les solutions de SOTI
Louis-Martin Landry
 

Similar to WSO2 Enterprise Mobility Manager - 2.0 (20)

WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the Enterprise
 
MMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure itMMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure it
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
 
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
 
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
 
#EVRYWhatsNext EMS Slide Deck
#EVRYWhatsNext EMS Slide Deck#EVRYWhatsNext EMS Slide Deck
#EVRYWhatsNext EMS Slide Deck
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Empower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSEmpower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMS
 
Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!
Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!
Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!
 
Primendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suitePrimendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suite
 
Managing BYOD Conference: Mobile Enterprise Data
Managing BYOD Conference: Mobile Enterprise DataManaging BYOD Conference: Mobile Enterprise Data
Managing BYOD Conference: Mobile Enterprise Data
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
Security Beyond the Firewall
Security Beyond the FirewallSecurity Beyond the Firewall
Security Beyond the Firewall
 
Mobile DAta
Mobile DAtaMobile DAta
Mobile DAta
 
Microsoft Enterprise Mobility Suite Launch Presentation - Atidan
Microsoft Enterprise Mobility Suite Launch Presentation - AtidanMicrosoft Enterprise Mobility Suite Launch Presentation - Atidan
Microsoft Enterprise Mobility Suite Launch Presentation - Atidan
 
LML Technologie offre les solutions de SOTI
LML Technologie offre les solutions de SOTILML Technologie offre les solutions de SOTI
LML Technologie offre les solutions de SOTI
 

Recently uploaded

Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 

Recently uploaded (20)

Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 

WSO2 Enterprise Mobility Manager - 2.0

  • 1. WSO2 Enterprise Mobility Manager (EMM) 2.0 Dilshan Edirisuriya Senior Software Engineer WSO2
  • 2. Agenda • Enterprise Mobile Device Management Overview • Key Challenges Faced by Organizations • Need for Mobile Device Management • EMM Architecture and Features • CDMF Architecture and Features • Demo • Platform Features
  • 3. Enterprise Few Years Back Employees Enterprise Data Device Work • Carried out inside a place • Dependent on specific technology • Resources Within the premise Owned by enterprise Device
  • 4. Enterprise Now Enterprise Device Data Work • Independent of place • Independent of technology • Resources Within the premise and outside Owned by enterprise and employees Data Employees
  • 5. Challenges Enterprise Data Employees Device Data Employees working out of the office with mobile devices and cloud services to perform business tasks.
  • 6. Challenge - Data Security How data can be compromised ? Device being lost or stolen Malicious applications stealing data Data leaks What is data ? Email message or the attachments Documents like pdf, word, excel, ppt, text files Browser accessing HTML pages with cookies Contacts, calendars and notes Application with databases Why data is sensitive ? It can be highly confidential like quotation value, salary details etc. It can have a high impact if it goes to the wrong person Who can compromise ? External Internal
  • 7. Challenge - Monitor Devices • What to monitor (location, root check, malicious apps, bandwidth usage etc.)? • To what extent? • A threat to employee privacy?
  • 8. Challenge - Enterprise Application Development & Management
  • 9. Challenge - Legacy Back End System Integrations • Legacy backends are not mobile friendly. • Adheres to older protocols and standards. • Only compatible with older mobile technologies. Eg: MIDlets.
  • 11. Enterprise Data Employees Devices AndroidiOS Windows 8Blackberry COPE Corporate Owned Personally Enabled BYOD Bring Your Own Device Phones Tablets Laptops CYOD Choose Your Own Device Device Ownership
  • 12. How EMM addresses Data Security • Device level • Application level
  • 13. Data Security - Device Level Data Security Enforce Password Policy Encrypt Device Data Remote Device Management Monitor Device (location, battery) Configure device(Email, VPN) Control Device (Enable/Disable Camera) Update OS, Install & Uninstall App
  • 14. Data Security - Application Level MAM gets you a step closer to managing what you care about MAM brings the perimeter closer to the corporate resources Data is protected Application can be controlled remotely
  • 15. MAM Controls Application Behavior • Encrypt the data at transmit. Eg: Uses app VPN tunnel or app tunnel. • Encrypt the data at storing & decrypt only when viewing. • Two factor authentication. • Data Loss Prevention - DLP (disable cut, copy and paste). • Policy based data control, where policy can be pushed and updated.
  • 16. Solution - Enterprise Application Development & Management Data COPE BYOD 1 3 2 4 Data Security Remote Device Management Enterprise Store
  • 17. Decision for CIOs or IT Managers Allow mobility in my business? Allow employees to use their device ? Allow business partners, distributors to use their device ? Allow them access corporate resources? To what extent?
  • 19. Drafting a BYOD Policy • What devices are permitted? • Supported features and boundaries for device types. • Ownership and permissions to applications and data. • Policy violation criteria and actions. • Employee exit strategy. • Prompt for approval.
  • 21. Key Components • Connected Device Management Framework (CDMF) • Mobile Device Management (MDM) • Mobile Application Management (MAM)
  • 23. Connected Device Management Framework (CDMF) Cont. • Device Management • Operation Management • Application Management • Policy Management • Compliance Monitoring • Configuration Management • License Management
  • 24. Connected Device Management Framework (CDMF) Cont. • API Management • Certificate Management • Identity Extensions • Web Application Authenticators • Notifications • User Management • Permissions
  • 25. Connected Device Management Framework (CDMF) Cont. Devices Operations Applications Policies Monitoring Configurations Licenses API Management Certificate Management Identity Extensions Authenticators Notifications Permissions
  • 27.
  • 28.
  • 31. Notification Method - App Push & Silent
  • 32. Mobile Device Management Features • Self-service device enrollment and management with end-user EMM Console for iOS, Android and Windows devices. • Integrates to enterprise identity systems for device ownership: LDAP, Microsoft AD • Policy-driven device and profile management for security, data, and device features (Camera, Password Policy) • Deploy policies over-the-air (OTA).
  • 33. Mobile Device Management Features • Compliance monitoring for applied policies on devices. • Role-based access control (RBAC) for device management. • Securely wipe enterprise configurations from Enterprise wipe. • Track locations of enrolled devices. • Retrieve device information.
  • 34. Mobile Device Management Features • Facilitate device-owner operations such as registering and unregistering devices, installing, rating, sorting mobile apps, etc.
  • 35. Mobile App Management • Supports App management. • App approval process through a lifecycle. • Provision and deprovisioning apps to enrolled devices. • Provision apps to enrolled devices based on roles. • Provision apps to multiple enrolled devices per user.
  • 36. Mobile App Management • Retrieve list of apps. • Install new apps and update existing apps on iOS devices via REST APIs, enabling automation of application installation/updates for third party systems/vendors. • Install Web Clips on devices. • Enterprise App Store. • Discover mobile apps through an Enterprise App Store.
  • 37. Mobile App Management • Self-provisioning of mobile apps to devices. • Rating and Sorting Applications.
  • 38. Device and Data Security • Multi-tenancy to ensure data isolation across all tenants. • Enforce built-in security features of passcode and encryption. • Encryption of data storage. • Device lock and reset. • Managed APIs to perform administrative functions. • Ring and GPS to locate device remotely if lost/stolen.
  • 39. Demo
  • 40. Email configurations <EMM_HOME>/repository/conf/axis2/axis2.xml <transportSender name="mailto" class="org.apache.axis2.transport.mail.MailTransportSender"> <parameter name="mail.smtp.from">cdm.wso2@gmail.com</parameter> <parameter name="mail.smtp.user">cdm.wso2@gmail.com</parameter> <parameter name="mail.smtp.password">wso21234</parameter> <parameter name="mail.smtp.host">smtp.gmail.com</parameter> <parameter name="mail.smtp.port">587</parameter> <parameter name="mail.smtp.starttls.enable">true</parameter> <parameter name="mail.smtp.auth">true</parameter> </transportSender>
  • 41. Change config.json file • <EMM_HOME>/repository/deployment/server/ jaggeryapps/emm-web-agent/config • <EMM_HOME>/repository/deployment/server/ jaggeryapps/emm/config
  • 42. Change cdm-config.xml file • Change LBHostPortPrefix in <EMM_HOME>/ repository/conf
  • 43. Enroll Email Dear Dilshan, You have been registered to WSO2 MDM with following credentials. Domain: Username: dilshan Password: LbmS82 Below is the link to enroll. https://192.168.1.5:9443/emm-web-agent/enrollment Best Regards, WSO2 MDM Team. http://www.wso2.com
  • 45. iOS Features • Self-service device enrollment and management with end-user EMM Console via iOS Agent or Web interface for versions up to iOS 9 SDK. • Facilitate remote notifications via Apple Push Notification Service (APNS). • Support for iOS 9. • Device Tracking. • Configuring cellular network settings. • Device profile management.
  • 46. iOS Features • Retrieving device info. • Device lock • Restricting device operations. • Automatic WiFi configuration. • Set up AirPlay • Set up restrictions • Enterprise WIPE • Set up APN
  • 47. iOS Features • Setup LDAP. • Setup email accounts. • Set up CalDav • Calendar subscription • Passcode policy • Clear passcode • App installation and update • Retrieve app list
  • 48. iOS Features • Web clip installation • Supports App management • Setup email accounts
  • 49. Android Features • Self-service device enrollment and management with end-user EMM Console via Android Agent (Android 4.0.3 Ice Cream Sandwich MR1 up to 5.0 Lollipop). • Supports App management. • App policy compliance monitoring. • Device location tracking. • Retrieving device info. • Changing lock code.
  • 50. Android Features • Restricting Camera. • OTA WiFi configuration. • Enterprise WIPE. • Configuring encryption settings. • Passcode policy configuration and clear passcode policy. • Device master reset • Mute device • Ring device
  • 51. Android Features • Send messages to the device. • Install/uninstall store and enterprise applications. • Retrieve apps installed on the device. • Install web clips on the device. • Support GCM/LOCAL connectivity modes.
  • 52. Windows Features • Self-service device enrollment and management with end-user EMM Console via Workplace (Windows 8.1). • Passcode policy • Restriction on camera. • Encryption settings • Retrieve device info. • Device Lock and Lock Reset • Ring device • Data Wipe
  • 53. GitHub Repositories • Connected Device Management Framework https://github.com/wso2/carbon-device-mgt • Device management plugins https://github.com/wso2/carbon-device-mgt- plugins • Enterprise Mobility Manager https://github.com/wso2/product-mdm