Go to main content
1/21
Contents
Title and Copyright Information
Preface
Audience
Documentation Accessibility
Related Documents
Conventions
What's New in This Release?
Product Enhancements for Oracle Mobile Security Suite 11.1.2.3.0
Part I Introducing Oracle Mobile Security Suite
1
Understanding Oracle Mobile Security Suite
1.1
Understanding Oracle Mobile Security Suite
1.2
Key Components
1.3
Key Concepts
1.4
Deployment Topologies
1.5
Understanding the Oracle Mobile Security Suite Process Flows
Part II Working With Mobile Security Manager
2
Getting Started Working With Mobile Security Manager
2.1
Administrator Roles
2.1.1
How to Add Mobile Security Manager System Administrators and Help Desk Administrators
2.2
Working With the Mobile Security Manager Console Pages
2.2.1
About the Mobile Security Manager Console Pages
2.2.2
Opening the Mobile Security Manager Console Pages
2.2.3
Accessing Online Help
3
Enrolling Devices and Workspaces
3.1
About Device and Workspace Enrollment
3.2
Preparing and Sending the Invite Template
3.2.1
Configuring the Invite Template
3.2.1.1
How to Create and Edit Notification Templates
3.2.2
Attaching Invite Templates to a Policy
3.2.2.1
How to Attach an Invite Template to a Policy
3.2.3
Inviting the User
3.2.4
How to Invite a Group of Users by Role Assignment
3.3
Enrolling a Workspace (MAM-Only Enrollment)
3.4
Enrolling a Device and Workspace (MDM+MAM Enrollment)
3.4.1
iOS Enrollment
3.4.2
Android Enrollment
3.5
Enrolling a Workspace in PKINIT Mode
4
Managing Devices and Workspaces
4.1
About the Mobile Devices Page in the Mobile Security Manager Console
4.1.1
Searching for Devices and Workspaces
4.1.2
How to View Details About a Managed Device or Workspace
4.1.2.1
View Details About a Managed Device
4.1.2.2
View Details About a Workspace
4.1.2.3
View a List of Apps Installed on a Workspace
4.2
Managing Devices and Workspaces
4.2.1
How to Lock, Wipe, De-Register, or set a Passcode on a Device or Workspace
4.2.2
How to Lock, Unlock, and Wipe Devices/Workspaces by Role Assignment
4.3
About Device Configurations
4.4
Managing Devices and Workspaces With Policies
4.5
Multi-User and Kiosk Mode
5
Managing Users and Mobile Roles
5.1
About the Mobile Users Page and Mobile Roles Page in the Mobile Security Manager Console
5.2
About the Identity Store Directory Server
5.3
Managing Mobile Users
5.3.1
How to Search for a User in Oracle Mobile Security Suite
5.3.2
Making Users Eligible to Register a Device
5.3.3
Managing Passwords
5.3.4
Disabling User Accounts
5.4
Managing Mobile Roles
5.4.1
How to Search for a Role in Mobile Security Manager
5.4.2
How to Assign a Mobile Policy to a Role
6
Managing Mobile Apps
6.1
About the Secure Workspace App
6.2
About the Apps Bundled With the Secure Workspace
6.2.1
About the Secure Web Browser
6.2.2
About the Mobile File Manager
6.2.3
About the Secure White Pages App
6.2.3.1
Configure the Secure White Pages App
6.3
Managing the Mobile App Catalog
6.3.1
Using the App Catalog
6.3.2
How to Search for an App in the Mobile App Catalog
6.3.3
How to Add the Secure Workspace App to the Mobile Applications Catalog
6.3.4
Adding Native Apps
6.3.5
Adding Virtual Apps
6.3.6
Understanding the Dynamic App Catalog
6.4
Recovering Secure Workspace and Containerized App Data
6.5
How to Perform Common Mobile App Catalog Tasks
6.5.1
How to Update or Remove an App in the Catalog
6.5.2
How to Alert the User That App Updates are Available
6.5.3
How to Blacklist an App
6.5.4
How to Include the Mobile App Catalog on the Workspace Home Screen
7
Managing Device Configurations
7.1
About Device Configurations
7.2
How to Perform Common Device Configuration Tasks
7.2.1
About the Mobile Device Configurations Page in the Mobile Security Manager Console
7.2.2
How to Search for a Device Configuration
7.2.3
How to Create an E-mail, VPN, Calendar, or Wi-Fi Device Configuration
7.2.4
How to Update or Remove a Device Configuration
7.2.5
How to Associate Device Configurations with a Policy
8
Managing Mobile Security Policies
8.1
About Mobile Security Policies
8.2
Understanding the Mobile Security Policy Page
8.3
Understanding Workspace Policies and Device Policies
8.4
Understanding How Policies are Enforced
8.5
Understanding How the System Resolves Policy Conflicts
8.6
Creating Manageable Policies
8.7
How to Perform Common Mobile Security Policy Tasks
8.7.1
How to Search for a Policy Record in Mobile Security Manager
8.7.2
How to Assign a Mobile Policy to a Role
8.7.3
How to Create or Edit a Mobile Security Policy
8.7.4
How to Duplicate or Delete a Policy
Part III Preparing Apps for use With Oracle Mobile Security Suite
9
Using the Oracle Mobile Security Suite Application Containerization Tool
9.1
Containerization Tool Features
9.2
Containerization Process
9.3
Preparing an App for Containerization
9.3.1
Preparing an iOS App for Containerization
9.3.2
Preparing an Android App for Containerization
9.4
Running the Containerization Tool
9.4.1
Syntax for c14n
9.4.2
Parameters and Their Options for c14n
9.4.3
Examples for c14n
9.5
App Signing Requirements
9.5.1
App Signing Requirements for iOS
9.5.2
App Signing Requirements for Android
9.6
Logging
9.7
Dev Mode for iOS
10
Customizing the Oracle Secure Workspace App
10.1
Oracle Secure Workspace Customization for iOS
10.1.1
Change Bundle Identifier
10.1.2
Change App Name
10.1.3
Change App Icon, Company Logo and Default Splash Screen
10.1.4
Create a EULA File
10.1.5
Customize Config URLs
10.1.6
Customize Password Management
10.1.7
Enable Apple Data Protection
10.1.8
Remove Document Types
10.1.8.1
Removing the Document Types from BitzerSecureWorkspace.xcodeproj
10.1.8.2
Rebuilding the Workspace
10.1.8.3
Certificate and Provisioning Profile Requirements
10.2
Oracle Secure Workspace Customization for Android
10.2.1
Extracting APK for Customization
10.2.2
Change App Package Name
10.2.3
Change App Name
10.2.4
Change App Icon
10.2.5
Change Splash Screen Image
10.2.6
Change MDM Agent Settings
10.2.7
Create a EULA File
10.2.8
Customize Config URLs
10.2.9
Customize Password Management
10.2.10
Sample prop.txt File
10.2.11
Enable Kiosk Mode
10.2.12
Remove Document Types
10.2.13
Packaging Customized APK
10.2.14
Signing APK
10.2.15
Signing Certificate Requirements
Part IV Managing Oracle Mobile Security Suite Settings and Configuration
11
Configuring Mobile Security Manager
11.1
Understanding Scheduled Jobs
11.2
Configuring Mobile Security Manager Settings
11.2.1
About the Mobile Security Manager Settings Page
11.2.2
How to Open the Mobile Security Settings Page
11.2.3
Configuring Client Settings
11.2.4
Configuring Server Settings
11.2.4.1
Configuring General Server Settings
11.2.4.2
Configuring Proxy Settings
11.2.4.3
Configuring Mobile File Manager Authentication Settings
11.2.5
Configuring Identity Store Settings
11.2.6
Configuring CA Settings
11.2.6.1
Configure CA Settings for Internal CA Server
11.2.7
Configuring User Notification Settings
11.2.8
Configuring Exchange Server Settings
11.2.9
Configuring Device Notification Settings
11.2.10
Configuring the APNS Certificate
11.2.11
Configuring the GCM Entry
11.2.12
Configuring Notification Templates
11.2.13
Configuring MDM Agent Settings
11.2.14
Configuring Blacklisted Apps
12
Configuring Your Environment to Work With Mobile Security Manager
12.1
Tuning Oracle Mobile Security Suite
12.2
Configuring the Identity Store Configuration
12.3
Configuring NDES and the Active Directory Certificate Authority
12.4
Configuring Automatic Certificate Revocation with the Active Directory Certificate Authority
12.4.1
Steps to Configure Certificate Revocation Application
12.4.2
Deploy the Certificate Revocation Application in IIS
12.4.3
Deploy the Certificate Revocation PHP Scripts
12.4.4
Import the Mobile Security Manager Certificate in IIS
12.4.5
Configuring IIS to run PHP applications
12.5
Configuring Microsoft Exchange (Secure Mail) to Work With Mobile Security Manager
12.6
Configuring Oracle Mobile Security Suite to use Oracle Access Management 11gR2 PS2 for Authentication and SSO
13
Troubleshooting Oracle Mobile Security Suite
13.1
Gathering Mobile Security Workspace Logs
13.2
Configuring Mobile Security Access Server Logs
13.3
Logging Mobile Security Manager Component Event Messages
13.3.1
About Oracle Diagnostic Log File Management
13.3.2
About Component Loggers for Oracle Mobile Security Manager
13.3.3
About Logging Message Types and Levels
13.3.4
Configuring the Loggers and Log Handlers Using Fusion Middleware Control
13.3.5
Configuring the Loggers and Log Handlers Using the logging.xml File
13.3.5.1
Logger and Log Handler Configuration Example
13.3.5.2
Configuring Log Handler Level
13.3.5.3
Configuring Additional Settings for Log Handlers
13.3.5.4
Configuring Loggers
13.3.5.5
Sample Oracle Mobile Security Manager Log Output
13.4
Troubleshooting Common Oracle Mobile Security Suite Deployment Issues
13.5
Troubleshooting Missing LDAP Group in the List of Roles Applicable to the User
13.6
Troubleshooting the Mobile Security Access Server Issues
13.6.1
Troubleshooting Mobile Security Access Server SSL-Related Issues
13.6.2
Troubleshooting Mobile Security Access Server Connection Errors
13.7
Troubleshooting Kerberos-Enabled Applications Issues
13.8
Troubleshooting Mobile Devices Access Issues
13.8.1
Troubleshooting General Mobile Device Access Issues
13.8.2
Troubleshooting Mobile Device Access SSL-Related Issues
13.8.3
Turning on Client Debug Logs
13.8.4
About the Normal Sequence of Request for Registration and Authentication
13.9
Troubleshooting the Microsoft Exchange Notification Integration Issues
13.9.1
Exchange Impersonation on Exchange 2007
13.9.2
Exchange Impersonation on Exchange 2010
13.10
Troubleshooting Mobile File Manager Connection Issues
Scripting on this page enhances content navigation, but does not change the content in any way.