- Managing device features and behavior
- Managing devices with IT policies
- Restricting or allowing device capabilities
- Setting device password requirements
- Setting iOS password requirements
- Setting macOS password requirements
- Setting Android password requirements
- Setting Windows password requirements
- Setting BlackBerry 10 password requirements
- Creating and managing IT policies
- How BlackBerry UEM chooses which IT policy to assign
- Allowing BlackBerry 10 users to back up device data
- Creating device support messages
- Controlling BlackBerry OS device capabilities using IT policies
- Importing IT policy and device metadata updates
- Enforcing compliance rules for devices
- Create a compliance profile
- Compliance profile settings
- Managing BlackBerry Dynamics compliance profiles
- Sending commands to users and devices
- Send a command to a device
- Send a bulk command
- Set an expiry time for commands
- Commands reference
- Deactivating devices
- Controlling the software updates that are installed on devices
- Create a device SR requirements profile for Android Enterprise devices
- Create a device SR requirements profile for Samsung KNOX devices
- Create a device SR requirements profile for BlackBerry 10 devices
- View users who are running a revoked software release
- Managing OS updates on devices with MDM controls activations
- View available updates for iOS devices
- Update the OS on supervised iOS devices
- Configuring communication between devices and BlackBerry UEM
- Displaying organization information on devices
- Using location services on devices
- Using Activation Lock on iOS devices
- Managing iOS features using custom payload profiles
- Setting up factory reset protection for Android Enterprise devices
- Setting up Windows Information Protection for Windows 10 devices
- Managing attestation for devices
- Manage attestation for Android devices and BlackBerry Dynamics apps using SafetyNet
- Managing iOS app integrity checking on devices
- Manage attestation for Samsung KNOX devices
- Manage attestation for Windows 10 devices
Add Apple DeviceCheck keys
You can use
AppleDeviceCheck keys to check the integrity of
iOSwork apps that have been published to the
App Store. The
AppleDeviceCheck framework is a way to identify your app is running on a valid
Appledevice and the app is published by the specified
AppleTeam ID. You can map DeviceCheck keys to apps when you add apps to the attestation list. You must add DeviceCheck keys to the table before you can add apps that will receive attestation challenges from
BlackBerry UEM. For more information on
AppleDeviceCheck, see the information from Apple. This setting is valid only for devices running
iOS11 and later.
Appledoes not provide support for enabling the
iOSapp integrity check on enterprise apps that your organization has developed and distributed internally using the
AppleEnterprise Distribution program.
- ClickSettings > General settings > Attestation.
- In theiOS app integrity check frequencysection, in theApple DeviceCheck keystable, click+.
- In theDeviceCheck key namefield, type a name for the key.
- In theApple team IDfield, type your team ID. You can find this information in the Apple Developer Portal.
- In theKey IDfield, type the ID for the key. You can find this information in the Apple Developer Portal.
- In theDeviceCheck key filefield, click browse and navigate to the location where your key file is stored.