When you add an Application on devices, you need to specify an application control policy. Policies control the data that Applications can access on devices. You can create custom policies or change the default settings of the standard application control policies.
From the App Management section, click Policies from the left panel. The Policies page appears with a list of the policies. The list view displays a list of all the policies along with their State and Statuses. You can search the policies based on each column and also sort on each column.
The Policies list view displays the following columns:
Columns Description | |
---|---|
Policy Name | Displays the unique identification name of the policy. |
Last Modified On | Displays the date on which the policy was last updated. |
State | Displays the current state of the policy for example, Active or Draft. |
Owner | Displays the administrator user name. |
Status | Displays the current status of the policy for example, Published or Unpublished. |
You can perform following activities from this page:
The app basics section refers to adding a title and description to the new policy. To add app basics, follow these steps:
The App Usage section allows you to configure an app usage policy. To add details, follow these steps:
Geofence programs enable an administrator to set up triggers so when a device crosses a geofence and enters or exits the borders demarcated by the administrator, an SMS or an email alert is sent. For example, geofence enables a mobile device to setup the places that matter most to you and interact at those locations. Once a user enters into your geofence configuration, you can communicate based on defined policies.
Note: When the device is offline, User can access the app by mocking device's GPS location.
Time fences enable you to establish policies for prioritizing activities. Time fences are points in time where you can define how a defined policy rule is applied to an app deployed on a device.
When a time fence policy is pushed to
Note: If the device is offline mode, user can access the app by changing the device time.
When the device is offline, the device cannot communicate with the EMM server and therefore must rely on device time to implement time related rules. Therefore there is a possibility for the User to manipulate device time to bypass some of the rules.
Idle Time out means that, if the application does not use the connection to the device for scheduled time period, then connection is closed automatically.
Select the date. Select the required Time – Zone through the slider.Click Done to continue.The date and time appears in the text field.
Note: If the device is offline mode, user can access the app by changing the device time.
When the device is offline, the device cannot communicate with the EMM server and therefore must rely on device time to implement time related rules. Therefore there is a possibility for the User to manipulate device time to bypass some of the rules.
This section enables an administrator to define the policy to support network access at the functional level. The declared policy set is enforced by the app. To configure the network, follow these steps:
Enterprise apps installed on devices can be accessed online or offline based on the policy assigned to the app and target. When a device is offline, a user can only launch apps through enterprise store – My Apps.
Force HTTPS option forces every user request to access the device via HTTPS.
The Storage section enables you to configure secure data storage on your device. To configure data storage, follow these steps:
Encrypted Data Storage lets you store your files in the encrypted container to check any unauthorized access to vital information.
Important: As part of wrapping, SQLite is replaced with SQLCipher. SQLCipher is used for database encryption. There is a subtle difference between SQLCipher and SQLite. In your app, if string data (i.e. base64 string for image) is stored in blob column then it works for SQLite and not SQLCipher. Please ensure that string data is stored in column with ‘TEXT’ data type and binary data is stored in column with ‘BLOB' data type.
Important: Kony Management provides SQLCipher where native libraries (.so files) are built with ARM 32-bit and X86 architectures. Kony Management does not provide SQLCipher libraries built for 64-bit ARM architectures. A child app which contains 64-bit arm libraries will not work after wrapped with Kony Management. The child app should not contain any 64-bit arm libraries for it work properly in Kony Management environment.
Important: Kony Management uses SQLCipher version 3.5.7. If you use a higher version of SQLCipher than 3.5.7 and build your app, while wrapping, Kony Management will downgrade the SQLCIpher version to 3.5.7.
This is to allow this particular feature to be used by the App or not. The list is to whom an SMS, Email or Phone can be made. To set the phone features, follow these steps:
Click the Cancel button to close the window.
For apps where app policy restrictions are applied, if the apps allow webview within the app, then not all app policy restrictions are applicable for the webview. See the image below for applicable restrictions.
Policies are applied when they are targeted to Users. Targeting can happen while creating an app, editing an app, upgrading an app, or adding a new platform.
Policies are applied for an app to a particular target (User/Group) that makes them very personalized. When policies are applied to Groups, a priority must also be assigned. Policies assigned to Users have the highest priority.
You can search a policy through search filters based on all grid columns. You can apply a single or a combination of search filters to define the search criteria and get the refined outcome.
You may need to update a policy detail for specific reasons, for example, you may need to update a policy name or its description.
Click the Policy Name. Edit Policy page appears.
All the fields in the policy can be updated. There are no restrictions. Once a policy is updated, it must be published again to come into effect, else the older policy continues to be effective.
Note: When EMM 2.0 is upgraded to EMM 2.1, all App Policies might require administrators to take ownership of the same (even those created by the same admin)
If a policy has been deprecated, or no longer required, you can delete it.
In the success message that appears, click OK to continue.
The policy is no longer displayed in the list view. Only unpublished policies can be deleted.
Copyright © 2018 Kony, Inc. All rights reserved. |