Manuale per l’uso Apple iPod and iPod Touch

58 pagine 0.71 mb
Scarica

Vai alla pagina of 58

Summary
  • Apple iPod and iPod Touch - page 1

    iPhone and iP od touch En terprise Deploymen t Guide ...

  • Apple iPod and iPod Touch - page 2

    K Apple Inc. © 2008 Apple Inc. All rights reserved. This manual may not be copied , in whole or in part, without the written consent of Apple . The Apple logo is a trademark of Apple Inc ., registered in the U.S. and other countries. Use of the “keyboard” Apple logo (Option-Shift-K) for commercial purposes without the prior written consent of ...

  • Apple iPod and iPod Touch - page 3

    3 3 C onten ts Prefac e 5 iPhone in the Enterprise 5 System Requiremen ts 6 Microsoft Exchange ActiveSync 8 VPN 8 Network Security 9 Certificates 9 Email accounts 9 Additional Resour ces Chapter 1 1 0 Deploying iPhone and iP od touch 10 Activating Devices 11 Pr eparing Access t o Network Services and Enterprise Data 14 Determining Device P asscode ...

  • Apple iPod and iPod Touch - page 4

    4 Contents 39 Setting iT unes Restrictions Chapter 5 42 Deploying iPhone Applications 42 Register for A pplication Development 43 Signing Applications 43 Creating the Distribution P rovisioning P rofile 43 Installing Pr ovisioning P rofiles using iT unes 44 Installing Pro visioning Profiles using iPhone Configuration Utility for Mac OS X 44 Install ...

  • Apple iPod and iPod Touch - page 5

    5 Prefac e iPhone in the Ent erprise Learn ho w to int egrate iPhone and iP od touch with your enterprise syst ems. This guide is for system administrat ors. It provides information about deploying and supporting i Phone and iP od touch in enterprise environmen ts. Syst em Requirements Read this section for an overview of the system requirements an ...

  • Apple iPod and iPod Touch - page 6

    6 Preface iPhone in the Enterprise Windows c omputers  Windows XP Ser vice P ack 2 or Windo ws V ista  500 MHz P entium processor or faster  256 MB of RAM  Quick Time 7 . 1 .6 or later Some features of iT unes, such as use of the iT unes Store, have additional requir ements. See the documentation included with the iT unes installer for more ...

  • Apple iPod and iPod Touch - page 7

    Preface iPhone in the Enterprise 7 Remote Wipe Y ou can remotely wipe the contents of an iPhone or iP od touch. Doing so quick ly remove s all data and configuration information from the devic e, then the device is securely erased and restor ed to original, factor y settings. I t can take approximately one hour for each 8 GB of device capacity for ...

  • Apple iPod and iPod Touch - page 8

    8 Preface iPhone in the Enterprise Exchange A c tiveSync F eatures Not Supported Not all Exchange f eatures are supported, including, for example:  F older management  Opening links in email to documents stor ed on Sharepoint servers  T ask synchronization  Setting an “ out of office ” a utoreply message  Creating meeting invitations ...

  • Apple iPod and iPod Touch - page 9

    Preface iPhone in the Enterprise 9 Certificates iPhone and iP od touch can use certificates in the following ra w formats: Â PKCS1 (.cer , .cr t, .der) Â PKSC1 2 (.p1 2, .pfx) Email accounts iPhone and iP od touch support industr y-standard IMAP4- and POP3-enabled mail solutions on a range of ser ver platforms including Windows, UNIX, Linux, and ...

  • Apple iPod and iPod Touch - page 10

    1 10 1 Deploying iPhone and iP od touch This chapter pr ovides an o ver view of how to deploy iPhone and iP od touch in your ent erprise. iPhone and iP od touch are designed t o easily integrate with y our enterprise systems including Microsoft Exchange 2003 and 2 007 , 802. 1X-based secure wireless networks , and Cisco IPSec vir tual private netw ...

  • Apple iPod and iPod Touch - page 11

    Chapter 1 Deploying iPhone and iPod touch 11 Although there is no cellular service or SIM card for iP od touch, it must also be connected to a computer with iT unes for unlocking. Because iT unes is required to c omplete the activation proce ss for both iPhone and iP od touch, y ou must decide whether you want t o install iT unes on each user ’ s ...

  • Apple iPod and iPod Touch - page 12

    12 Chapter 1 Deploying iPhone and iPod touch Network C onfiguration  Make sure por t 443 is open on the firewall. I f your company use s Outlook Web Access , port 443 is most likely already open.  V erify that a ser ver cer tificate is installed on the Exchange fron tend server and enable Require Basic SSL for the Ex change ActiveSync vir tual ...

  • Apple iPod and iPod Touch - page 13

    Chapter 1 Deploying iPhone and iPod touch 13 WP A/WP A2 Enterprise Network C onfiguration  V erify network appliances for compatibility and select an authentication type (EAP type) suppor ted by iPhone and iP od touch. Make sure that 802. 1X is enabled on the authentication server , and if nece ssar y , install a ser ver cer tificate and assign n ...

  • Apple iPod and iPod Touch - page 14

    14 Chapter 1 Deploying iPhone and iPod touch IMAP Email If you don ’t use Microsof t Exchange , y ou can still implement a secure , standards-based email solution using any email server that suppor ts IMAP and is configured to requir e user authentication and SSL. The se servers can be located within a DMZ subnetwork, behind a corporate firewall, ...

  • Apple iPod and iPod Touch - page 15

    Chapter 1 Deploying iPhone and iPod touch 15 If you don ’t use Microsof t Exchange , y ou can set similar policies on your device s by creating configuration profiles . Y ou distribute the profiles via email or a web site that is accessible using the device . If you want to change a policy , you must post or send an updated profile to users f or ...

  • Apple iPod and iPod Touch - page 16

    2 16 2 Creating and Deplo ying C onfiguration P rofile s Configur ation profile s define how iPhone and iP od touch work with y our enterprise syst ems. Configuration profiles ar e XML files that, when installed, provide information that iPhone and iP od touch can use to connect to and communicat e with your enterprise systems. They contain VPN con ...

  • Apple iPod and iPod Touch - page 17

    Chapter 2 Creating and Deploying Configuration Profiles 17 When you open iPhone Configuration Utility , a window similar t o the one shown below appears. The cont ent of the main section of the window changes as you select items in the sidebar . The sidebar displa ys the Librar y , which contains the following categorie s: Â Devices shows a list o ...

  • Apple iPod and iPod Touch - page 18

    18 Chapter 2 Creating and Deploying Configuration Profiles iPhone Configur ation Utility for the W eb The web-based version of iPhone C onfiguration Utilit y lets you create configuration profiles for y our devices. Follow the instructions below for the platf orm you’ re using. Installing on Mac OS X T o install the utilit y on Mac OS X v1 0.5 Le ...

  • Apple iPod and iPod Touch - page 19

    Chapter 2 Creating and Deploying Configuration Profiles 19 A screen similar to the one shown here will appear . F or information about using the utility , see “Creating Configuration P rofiles,” below . Changing the User name and P assword for iPhone C onfiguration Utility W eb T o change the user name and password for accessing the utility , e ...

  • Apple iPod and iPod Touch - page 20

    20 Chapter 2 Creating and Deploying Configuration Profiles T o restar t the utility on Windo ws 1 Go to Con trol P anel > Administrative T ools > Ser vices. 2 Select Apple iPhone Configuration Web Utility . 3 Select Restar t from the Action menu. T o restar t the utility on Mac OS X 1 Open T erminal. 2 Enter sudo -s and authen ticate with an ...

  • Apple iPod and iPod Touch - page 21

    Chapter 2 Creating and Deploying Configuration Profiles 21 General Settings This is where you pr ovide the name and identifier of this profile . A configuration name is required . The name you specify appears in the profiles list and is display ed on the device after the configuration profile is installed . Although the name doesn ’t have to be u ...

  • Apple iPod and iPod Touch - page 22

    22 Chapter 2 Creating and Deploying Configuration Profiles T o sign a profile, click Apply Signature in the Signature section of the General pane. In the Configuration Signing window that appears , add the digital certificates necessary to authenticat e your signature . (Cer tificates in raw f ormats 1 and 1 2 are suppor ted.) Then select your priv ...

  • Apple iPod and iPod Touch - page 23

    Chapter 2 Creating and Deploying Configuration Profiles 23 Â Maximum passcode age (in days): Requires users to change their passcode at the interval you specify . Â Passc ode lock (in minutes): If the device isn’ t used for this period of time , it automatically locks. Entering the passcode unlocks it. Wi-F i Settings Use this pane to set how t ...

  • Apple iPod and iPod Touch - page 24

    24 Chapter 2 Creating and Deploying Configuration Profiles VPN Settings Use this pane to ent er the VPN settings for connecting to your network. Y ou can add multiple sets of VPN connec tions by clicking the Add (+) button. F or information about supported VPN protocols and authentication methods , see “ VPN” on page 8. Email Settings Use this ...

  • Apple iPod and iPod Touch - page 25

    Chapter 2 Creating and Deploying Configuration Profiles 25 Credentials Settings Use this pane to add certificates to the device . Cer tificates in raw f ormats PKCS1 (.cer , .der , .cr t) and PKCS1 2 (.p1 2, .pfx) ar e suppor ted . When installing an identity cer tificate on the device , make sure that the file contains a certificate and not just a ...

  • Apple iPod and iPod Touch - page 26

    26 Chapter 2 Creating and Deploying Configuration Profiles The Configuration Iden tifier field in the General pane is used by the device to determine whether a profile is new , or an update to an existing profile. If you want the updated profile to replac e one that users have alr eady installed , don’t change the Configuration Identifier . Pr ep ...

  • Apple iPod and iPod Touch - page 27

    Chapter 2 Creating and Deploying Configuration Profiles 27 IIS W eb S erver If your web server is IIS, add the MIME t ype in the Properties page of the ser ver using IIS Manager . The extension is mobileconfig and the file t ype is application/x-apple- aspen-config. Alternatively , you can add this information t o specific sites using the HTTP Head ...

  • Apple iPod and iPod Touch - page 28

    28 Chapter 2 Creating and Deploying Configuration Profiles If the installation isn ’t completed succ essfully , perhaps beca use the Exchange server was unreachable or the user cancelled the proce ss, none of the information ent ered by the user is retained . Users may want t o change how many da ys worth of data is synced to the device. The defa ...

  • Apple iPod and iPod Touch - page 29

    3 29 3 Manually C onfiguring D evice s This chapter de scribes how t o configure iPhone and iP od touch manually . If you don ’t provide automatic configuration pr ofiles, users can configure their devices manually . Some settings, such as passcode policies, can only be set by using a configuration profile. VPN Settings T o change VPN settings , ...

  • Apple iPod and iPod Touch - page 30

    30 Chapter 3 Manually Configuring Devices Cisco IPSec Settings When you manually configure the device f or Cisco IPSec VPN, a screen similar to following appears: Use this chart to identify the settings and information you ent er: Field Description Description A descriptive title that identifies this group of settings . Ser ver The DNS name or IP a ...

  • Apple iPod and iPod Touch - page 31

    Chapter 3 Manually Configuring Devices 31 PPTP Settings When you manually configure the device f or PPTP VPN, a screen similar to the following appears: Use this chart to identify the settings and information you ent er: Field Description Description A descriptive title that identifies this group of settings . Ser ver The DNS name or IP address of ...

  • Apple iPod and iPod Touch - page 32

    32 Chapter 3 Manually Configuring Devices L2TP Settings When you manually configure the device f or L2TP VPN, a screen similar to the follo wing appears: Use this chart to identify the settings and information you ent er: Field Description Description A descriptive title that identifies this group of settings . Ser ver The DNS name or IP address of ...

  • Apple iPod and iPod Touch - page 33

    Chapter 3 Manually Configuring Devices 33 Wi-F i S ettings T o change Wi-F i settings, go to Settings > G eneral > Network > Wi-Fi. If the network you ’re adding is within range , select it from the list of a vailable networks . O ther wise, tap Other . Make sure that your network infrastructure uses authen tication and encr yption suppo ...

  • Apple iPod and iPod Touch - page 34

    34 Chapter 3 Manually Configuring Devices Exchange Settings Y ou can configure only one Exchange account per devic e. T o add an Exchange account, go to Settings > Mail, Contacts, Calendars, and then tap Add Account. On the Add Account scr een, tap M icrosoft Exchange. When you manually configure the device f or Exchange, use this char t to iden ...

  • Apple iPod and iPod Touch - page 35

    Chapter 3 Manually Configuring Devices 35 iPhone and iP od touch support M icrosoft’ s Autodiscov er y service, which uses your user name and password to det ermine the address of the fron t-end Exchange server . I f the ser ver’ s address can ’t be determined, you’ll be asked to enter it. After the Exchange accoun t is successfully configu ...

  • Apple iPod and iPod Touch - page 36

    36 Chapter 3 Manually Configuring Devices Important: When you configure a device to sync with Ex change, all existing calendar and contact information on the device is o verwritten. Additionally , iT unes no longer sync contacts and calendars with your desktop c omputer . Y ou can still sync your device wirelessly with MobileMe services. T o change ...

  • Apple iPod and iPod Touch - page 37

    Chapter 3 Manually Configuring Devices 37 When a certificate is downloaded to the device, the Install Profile screen appears. The description indicate s the type of cer tificate: identity or cer tificate authority (root). T o install the cer tificate, tap Install. T o view or remove a certificate that has been installed, go to Settings > General ...

  • Apple iPod and iPod Touch - page 38

    4 38 4 Deploying i T unes Y ou use iT unes to sync music and video , install applications, and more . This chapter describe s how to deploy iT unes and enterprise applications, and defines the settings and restrictions you can specify . Installing iT unes iT unes uses standard Macintosh and Windows installers. The latest version of iT unes is avail ...

  • Apple iPod and iPod Touch - page 39

    Chapter 4 Deploying iTunes 39 Silently Installing on Windows T o push iTune s to client comput ers, extrac t the individual .msi files from iT unesSetup.ex e. T o Ex tract .msi files from iT unesSetup.ex e: 1 Run iT unesSetup.ex e. 2 Open %temp% and find a folder named IXP nnn .TMP , where %temp% is your temporar y director y (typically bootdrive : ...

  • Apple iPod and iPod Touch - page 40

    40 Chapter 4 Deploying iTunes  Play iT unes media cont ent that is marked as explicit  Play movie s  Play T V shows  Play games Setting iT unes Restrictions for Mac OS X On Mac OS X, you control access by using keys in a plist file . On Mac OS X the k ey values sho wn above can be s pecified for each user by editing ~/Library/Pref erences/ ...

  • Apple iPod and iPod Touch - page 41

    Chapter 4 Deploying iTunes 41 Updating iT unes and iPhone Software Manually If you turn off automat ed and user-initiated software update checking in iT unes, you’ll need to distribute software updates t o users for manual installation. T o update iT unes, see the installation and deployment steps described earlier in this document. It ’ s the ...

  • Apple iPod and iPod Touch - page 42

    5 42 5 Deploying iPhone A pplications Y ou can distribute iPhone and iP od touch applications to your users . If you want to install iPhone OS applications that you ’ve developed , y ou distribute the application to your users , who install the applications using iT unes. Applications from the online App St ore work on iPhone and iP od touch with ...

  • Apple iPod and iPod Touch - page 43

    Chapter 5 Deploying iPhone Applications 43 Signing Applications Applications you distribute t o users must be signed with your distribution certificate. F or instructions about obtaining and using a cer tificate, see the i Phone Developer Cent er at http://developer .apple.com/iphone . Creating the Distribution P rovisioning P rofile Distribution p ...

  • Apple iPod and iPod Touch - page 44

    44 Chapter 5 Deploying iPhone Applications Windows Vista  bootdrive :Users username A ppDataRoamingApple Comput erMobileDevice Pr ovisioning P rofiles  bootdrive :P rogramDataApple ComputerMobileDeviceP rovisioning P rofiles  the path specified in the HK CU or HKLM by the P rovisioningP rofilesPath r egistery key SOFT W AREApple C ...

  • Apple iPod and iPod Touch - page 45

    Chapter 5 Deploying iPhone Applications 45 Installing Applications using iPhone C onfiguration Utility for Mac OS X Y ou can use iPhone Configuration Utility for Mac OS X to install applications on connected devices. Follow these steps: 1 In iPhone Configuration Utility , choose File > Open and then select the application that you want to instal ...

  • Apple iPod and iPod Touch - page 46

    46 Appendix A A Cisco VPN Ser ver C onfiguration Use these guideline s to configure your Cisco VPN ser ver for use with iPhone and iP od touch. Authen tication Methods iPhone suppor t the following a uthentication methods: Â Pre-shar ed key IPsec a uthentication with user authen tication via xauth. Â Client and server cer tificates for IP sec aut ...

  • Apple iPod and iPod Touch - page 47

    Appendix A Cisco VPN Server Configuration 47 Certificates When setting up and installing certificates, make sure of the following: Â The server identity cer tificate must contain the server ’ s DNS name and/or IP address in the subject alternate name (SubjectAltName) field. The device uses this information to v erify that the certificate belongs ...

  • Apple iPod and iPod Touch - page 48

    48 Appendix A Cisco VPN Server Configuration Other Suppor ted F eatures iPhone and iP od touch suppor t the following: Â Application V ersion: T he client software version is sent t o the server , allowing the ser ver to accept or r eject connections based on the device’ s software version. Â Banner: The banner , if configured on the server , i ...

  • Apple iPod and iPod Touch - page 49

    49 B Appendix B C onfiguration P rofile F ormat This appendix specifie s the forma t of mobileconfig files f or those who want to cr eate their own t ools. This document assumes that y ou ’ re familiar with the Apple XML DTD and the general propert y list format. A general description of the Apple plist format is a vailable at www .apple.com/DTDs ...

  • Apple iPod and iPod Touch - page 50

    50 Appendix B Configuration Profile Format P ayload Con tent The P ayloadConten t array is an array of dictionaries, where each dictionar y describes an individual payload of the profile . Each func tional profile has at least one or more entrie s in this array . Each dictionar y in this array has a few common properties, regardless of the payload ...

  • Apple iPod and iPod Touch - page 51

    Appendix B Configuration Profile Format 51 P asscode P olic y Pa yload The P asscode P olicy payload is designated by the com.apple.mobiledevice .passwordpolic y P ayloadT ype value. The presence of this payload type prompts iPhone to presen t the user with an alphanumeric passcode entry mechanism, which allows the entr y of arbitrarily long and co ...

  • Apple iPod and iPod Touch - page 52

    52 Appendix B Configuration Profile Format Email P ayload The email payload is designat ed by the com.apple .mail.managed P ayloadT ype value . This payload creat es an email account on the devic e. In addition to the settings common to all payloads , this pa yload defines the follo wing: Key V alue EmailAccountDescription String, optional. A user- ...

  • Apple iPod and iPod Touch - page 53

    Appendix B Configuration Profile Format 53 APN P ayload The APN (Acce ss P oint Name) payload is designated by the c om.apple.apn.managed P ayloadT ype value . In addition to the settings common to all payloads , this payload defines the following: Exchange P ayload The Exchange pa yload is designated by the c om.apple.eas.acc ount P ayloadT ype va ...

  • Apple iPod and iPod Touch - page 54

    54 Appendix B Configuration Profile Format VPN P ayload The VPN payload is designated by the com.apple .vpn.managed PayloadT ype value. In addition to the settings common to all pa yload types, the VPN pa yload defines the following keys. There are tw o possible dictionaries present at the top lev el, under the keys “PPP ” and “IPSec” . The ...

  • Apple iPod and iPod Touch - page 55

    Appendix B Configuration Profile Format 55 IPSec Dic tionary Keys The follo wing elements are f or VPN payloads of t ype IPSec Wi-F i Pa yload The Wi-Fi payload is de signated by the com.apple .wifi.managed P ayloadT ype value. This describes v ersion 0 of the P ayloadV ersion value . In addition to the settings common to all payload types , the pa ...

  • Apple iPod and iPod Touch - page 56

    56 Appendix B Configuration Profile Format F or 802. 1X enterprise netw orks, the EAP Client Configuration Dictionary must be provided . EAPClientC onfiguration Dic tionary In addition to the standard encryption t ypes, it is also possible to specify an en terprise profile for a giv en network via the “EAPClientConfiguration ” k ey . This key i ...

  • Apple iPod and iPod Touch - page 57

    Appendix B Configuration Profile Format 57 EAP-F ast Suppor t The EAP-F AST module uses the following pr operties in the EAPClientConfiguration dictionar y . Thes keys are hierarchical in nature: if EAPF ASTUseP AC is false , the other two pr operties aren ’t consulted. Similarly , if EAPF ASTProvisionP AC is false , EAPF ASTPro visionP ACAnonymo ...

  • Apple iPod and iPod Touch - page 58

    58 Appendix B Configuration Profile Format If EAPF ASTUseP AC is true , then an existing P AC is used , if it is present. The only way to get a P AC on the device currently is to allo w P AC provisioning . So, you need to enable EAPF ASTPro visionP AC, and if desired, also EAPF ASTProvisionP ACAnonymously . EAPF ASTPro visionP ACAnonymously has a s ...

Fabbricante Apple Categoria Cell Phone

I documenti che otteniamo dal fabbricante del dispositivoApple iPod and iPod Touch possono essere suddivisi in diversi gruppi. Questi sono tra gli altri:
- disegni tecnici Apple
- manuali per l’uso iPod and iPod Touch
- schede prodotto Apple
- opuscoli
- o etichette energetiche Apple iPod and iPod Touch
Tutti sono importanti, ma le informazioni più importanti dal punto di vista di utilizzo del dispositivo possono essere trovate nel manuale per l’uso Apple iPod and iPod Touch.

Un gruppo di documenti denominato manuali per l’uso, è anche suddiviso in tipi più specifici, come: Manuali di installazione Apple iPod and iPod Touch, manuali di manutenzione, brevi manuali o manuali utente Apple iPod and iPod Touch. A seconda delle esigenze, si dovrebbe cercare il documento necessario. Nel nostro sito web, puoi visualizzare il manuale più popolare per l'uso del prodotto Apple iPod and iPod Touch.

Manuali per l’uso simili

Manuale completo del dispositivo Apple iPod and iPod Touch, come deve essere?
Il manuale per l’uso, denominato anche istruzioni per l’uso, o semplicemente il manuale è un documento tecnico progettato per aiutare ad utilizzare Apple iPod and iPod Touch dagli utenti. I manuali sono di solito scritti da uno scrittore tecnico, ma in un linguaggio accessibile a tutti gli utenti Apple iPod and iPod Touch.

Il manuale per l’uso completo Apple, dovrebbe includere vari elementi di base. Alcuni di loro sono meno importanti, come ad esempio: copertina / pagina del titolo o pagina di autore. Tuttavia, la parte rimanente, dovrebbe fornire informazioni importanti dal punto di vista dell'utente.

1. Introduzione e la guida su come utilizzare il manuale Apple iPod and iPod Touch - All'inizio di ogni manuale, dovremmo trovare indizi su come utilizzare il documento. Dovrebbe contenere informazioni sulla posizione dell’indice Apple iPod and iPod Touch, FAQ o i problemi più comuni : i punti che sono più spesso cercati dagli utenti di ogni manuale
2. Indice - elenco di tutti i suggerimenti per Apple iPod and iPod Touch che possono essere trovati nel documento corrente
3. Suggerimenti su come utilizzare le funzioni di base del dispositivo Apple iPod and iPod Touch - che ci dovrebbe aiutare nei primi passi durante l'uso Apple iPod and iPod Touch
4. Troubleshooting - sequenza sistematica delle attività che vi aiuterà a diagnosticare e, successivamente, risolvere i problemi più importanti del Apple iPod and iPod Touch
5. FAQ - domande più frequenti
6. Dettagli di contatto Informazioni su dove cercare il contatto con il fabbricante / servizio Apple iPod and iPod Touch in un dato paese, se il problema non può essere risolto da noi stessi.

Hai una domanda su Apple iPod and iPod Touch?

Utilizza il modulo sottostante

Se non hai risolto il problema con Apple iPod and iPod Touch con l'aiuto del manuale che hai trovato, fai una domanda utilizzando il modulo sottostante. Se un utente ha avuto un problema simile con Apple iPod and iPod Touch è probabile che voglia condividere il modo di risolverlo.

Riscrivi il testo dall’immagine

Commenti (0)