Mobile device management: Difference between revisions

Jump to navigation Jump to search
Line 80: Line 80:


Similarly, the iOS App Store app can be typically chosen from the list. It’s a bit more complicated in the case of custom mobile apps because line-of-business distribution on iOS requires resigning the resulting app with your Apple Developer distribution certificate (see [[Enterprise deployment on iOS]]).
Similarly, the iOS App Store app can be typically chosen from the list. It’s a bit more complicated in the case of custom mobile apps because line-of-business distribution on iOS requires resigning the resulting app with your Apple Developer distribution certificate (see [[Enterprise deployment on iOS]]).
=== Integrating custom iOS app with Microsoft Intune ===
Microsoft provides the [https://learn.microsoft.com/en-us/mem/intune/developer/app-wrapper-prepare-ios MS Intune App Wrapping Tool] for injecting security features into existing IPA installation. Here is the digest of the MS Intune documentation:
Prerequisites:
* Mac OS 12.6 or later with Xcode 13.x (v14.x won’t work!)
* Apple Developer account with a valid distribution certificate, App ID for bundle ID (package name) of your custom app, In-house provisioning profile for this App ID (AdHoc can also be used, but it requires app resigning after adding a new device into the team).
Steps:
# Request the build of your [[custom mobile apps|custom mobile app]] via Woodford.
# Your Resco account manager contacts you to discuss the pricing and approves the build.
# Our branding portal makes the new IPA installation based on your mobile app request. You obtain a download link by email. Download the IPA file.
# Make sure that you have a distribution certificate with the private key on your Mac. Type the following command to Terminal:
#: <code>Security find-identity -v -c codesigning</code>
# Copy certificate hash into clipboard
# Download provisioning profile for your app and place it into same folder as IPA.
# Download the [https://github.com/msintuneappsdk/intune-app-wrapping-tool-ios/archive/refs/tags/16.1.1.zip MS Intune App Wrapping Tool v16.1.1] (v17.x won’t work!), unzip it, mount included DMG file and copy “IntuneMAMPackager” folder into ~/Applications.
# Open Terminal app, go to folder with IPA and place following command (replace MobileCrm.ipa with real file name and [CertificateHash] with hash from clipboard):
#: <code>~/Applications/IntuneMAMPackager/Contents/MacOS/IntuneMAMPackager -i MobileCrm.ipa -o MobileCrm-wrapped.ipa -p MobileCrmInHouse.mobileprovision -c [CertificateHash] -v true</code>
# Upload MobileCrm-wrapped IPA into Microsoft EndPoint Manager as line-of-business app
=== Integrating custom iOS app with Citrix XenMobile ===
Citrix provides [https://github.com/citrix/citrix-mam-sdks MAM SDK] implementing security features in apps. SDK isn’t part of our App Store app, but it can be incorporated into [[custom mobile apps]]. Make sure to enable '''Include Citrix MAM SDK''' before requesting a new custom app build. If you also provided a valid distribution certificate and provisioning profile, the resulting IPA installation should be suitable for side-loading onto your devices. Otherwise, you must resign the IPA with your certificate and provisioning profile (see [[Enterprise deployment on iOS]]).
However, Citrix EndPoint Management doesn’t support IPA installation, and it requires a wrapped MDX envelope. To achieve it, you must pass the following steps:
Prerequisites:
* Mac OS 12.6 or later with Xcode 13+
* Citrix MAMSDK_iOS.zip file from GitHub releases
Steps:
# Request the build of your [[custom mobile apps|custom mobile app]] via Woodford.
# Your Resco account manager contacts you to discuss the pricing and approves the build.
# Our branding portal makes the new IPA installation based on your mobile app request. You obtain a download link by email. Download the IPA file.
# If you haven’t provided the distribution certificate and provisioning profile into the Mobile Apps config, resign the IPA file with your distribution certificate (see [[Enterprise deployment on iOS]]).
# Unpack the MAM SDK and copy MobileCrm.ipa file into the SDK root folder.
# Download the [https://www.resco.net/downloads/CitrixMdxGenerator.zip MDX generator script] and unpack it into the same folder.
# Open the Terminal app, go to the MAM SDK root folder (command <code>cd [folderpath]</code>), and enter the following command:<br><code>./generate_mdx MobileCrm.ipa</code>
# Upload the MobileCrm_Full.mdx file into [https://docs.citrix.com/en-us/citrix-endpoint-management/apps.html#add-an-mdx-app Citrix EndPoint Management] and configure specific app details and policy settings that the [https://docs.citrix.com/en-us/mdx-toolkit/mam-sdk-policies-ios.html Endpoint Management Store] enforces.

Navigation menu