Enterprise Deployment Manual
Table Of Contents
- Enterprise Deployment Guide
- Contents
- iPhone in the Enterprise
- Deploying iPhone and iPodtouch
- Creating and Deploying Configuration Profiles
- Manually Configuring Devices
- Deploying iTunes
- Deploying Applications
- Registering for Application Development
- Signing Applications
- Creating the Distribution Provisioning Profile
- Installing Provisioning Profiles Using iTunes
- Installing Provisioning Profiles Using iPhone Configuration Utility
- Installing Applications Using iTunes
- Installing Applications Using iPhone Configuration Utility
- Using Enterprise Applications
- Disabling an Enterprise Application
- Other Resources
- Cisco VPN Server Configuration
- Configuration Profile Format
- Sample Scripts
34 Chapter 2 Creating and Deploying Configuration Profiles
Wi-Fi Settings
Use this payload to set how the device connects to your wireless network. You can add
multiple network configurations by clicking the Add (+) button in the editing pane.
These settings must be specified, and must match the requirements of your network,
in order for the user to initiate a connection.
 Service Set Identifier: Enter the SSID of the wireless network to connect to.
 Hidden Network: Specifies whether the network is broadcasting its identity.
 Security Type: Select an authentication method for the network. The following
choices are available for both Personal and Enterprise networks.
 None: The network doesn’t use authentication.
 WEP: The network uses WEP authentication only.
 WPA/WPA 2: The network uses WPA authentication only.
 Any: The device uses either WEP or WPA authentication when connecting to the
network, but won’t connect to non-authenticated networks.
 Password: Enter the password for joining the wireless network. If you leave this
blank, the user will be asked to enter it.
Enterprise Settings
In this section you specify settings for connecting to enterprise networks.
These settings appear when you choose an Enterprise setting in the Security Type
pop-up menu.
In the Protocols tab, you specify which EAP methods to use for authentication and
configure the EAP-FAST Protected Access Credential settings.
In the Authentication tab, you specify sign-in settings such as user name and
authentication protocols. If you’ve installed an identity using the Credentials section,
you can choose it using the Identity Certificate pop-up menu.
In the Trust tab, you specify which certificates should be regarded as trusted for the
purpose of validating the authentication server for the Wi-Fi connection. The Trusted
Certificates list displays certificates that have been added using the Credentials tab,
and lets you select which certificates should be regarded as trusted. Add the names of
the authentication servers to be trusted to the Trusted Server Certificates Names list.
You can specify a particular server, such as server.mycompany.com or a partial name
such as *.mycompany.com.
The Allow Trust Exceptions option lets users decide to trust a server when the chain of
trust can’t be established. To avoid these prompts, and to permit connections only to
trusted services, turn off this option and embed all necessary certificates in a profile.