+

Search Tips   |   Advanced Search

Configure security for Mobile

Configure security for the Mobile application.

Use the Mobile Administration console, we can control which users and mobile devices can access the Connections servers. In addition to denying access to specific users or specific devices, we can delete Connections data from devices, restore access to users or devices, and set password policies.

Tips:

Ensure that you created the database for the Mobile application. Verify the database exists ...

  1. Log on to the WAS console on the system hosting the Deployment Manager.

  2. Click Resources > JDBC > Data sources.
  3. Search the page for the mobile data source. If it is not present, install the MOBILE database. See Create databases with the database wizard topic.


Registering devices

When a device connects to an IBM Connections server, it is automatically registered in the MOBILE database. We can view the inventory of every device and user that accessed the Connections Mobile application. See User and device data topic.

If a device that connects to a 4.0 server uses an version of the native app, the user is prompted to update the app.


Audit history

We can view the security and ID details of each registered device by clicking the device entry in the console. The audit history also shows who issued requests for changes to access and other configuration settings.


OS capabilities

Some operating systems provide different capabilities for security management of devices:

The following topics describe how to configure security for Connections Mobile:


Parent topic:
Mobile


Related:

Create databases with the database wizard

Configure access with client certificates