
If the end user enters an incorrect passcode for the set number of times, the device locks. Select the number of failed attempts allowed. The maximum grace period, in minutes, to unlock the phone without entering a passcode.Įnter the number of passwords to store in order to prevent end users from recycling passwords. Select the amount of time the device can be idle before the screen is locked automatically. Select the maximum number of days the passcode can be active. A complex character is a character other than a number or a letter, such as & % $ #. The minimum number of complex characters that a passcode must contain. Select the minimum number of characters required in the passcode. Restrict the end user from using spaces or non-alphanumeric characters in their passcode. Select Apple macOS, and then select whether this profile will apply to only the enrollment user on the device (User Profile), or the entire device (Device Profile).Ĭonfigure the profile's General settings.Īllow the end user to apply a simple numeric passcode. Navigate to Resources > Profiles & Baselines > Profiles and select Add.
Apple configurator 2.3 download password#
If your password policy is being managed by your directory for network users logging into the devices, Workspace ONE UEM does not recommend a passcode policy. If multiple profiles enforce separate policies on a single device, the most restrictive policy is enforced. Choose strict options for high-profile employees, and more flexible options for other devices or for those part of a BYOD program.
Apple configurator 2.3 download update#
For more information, see Create a Software Update Server Profile for macOS Devices.ĭevice passcode profiles secure macOS devices and their content. Ensure that the devices remain up to date with the macOS Updates profile.For more information, see Create an Exchange Web Services Profile for macOS Devices. Set up access to Microsoft Outlook and corporate files with an Exchange Web Services profile.Some examples of device configuration profiles include: These profiles configure the device settings to meet your business needs. For more information, see Create a VPN Profile for macOS Devices and Create a VPN On Demand Profile for macOS Devices.Ĭonfigure the various settings of your macOS devices with the configuration profiles. Ensure access to internal resources for your devices with the VPN profile.For more information, see Associate a SCEP/Credentials Payload with a Profile for macOS Devices Implement digital certificates to protect corporate assets.For more information, see Create a Network Access Profile for macOS Devices. Use a Wi-Fi profile to connect enrolled devices to your corporate Wi-Fi without sending the network credentials to users.Some examples of device security profiles include: These profiles configure the native macOS security features or configure corporate security settings on a device through Workspace ONE UEM. For more information, see Create an Accessibility Profile for macOS Devices.Įnsure that your macOS devices remain secure through device profiles. Configure accessibility options to accommodate end users' needs.For more information, see Create a Security and Privacy Settings Profile for macOS Devices. Configure Apple's Gatekeeper functionality, which secures application downloads and controls specific settings related to user passwords.For more information, see Create a Passcode Policy for macOS Devices Secure a device with a Passcode profile.Some examples of device access profiles include:


Use these profiles to ensure that access to a device is limited only to authorized users. Some device profiles configure the settings for accessing a macOS device. Some profiles can only be applied to the user level or device level. When creating macOS profiles, you select the level the profile applies to. MacOS profiles apply to a device at either the user level or the device level. Profiles work best when they contain only a single payload. They contain the settings, configurations, and restrictions that you want to enforce on devices.Ī profile consists of the general profile settings and a specific payload. You can think of profiles as the settings and rules that, when combined with compliance policies, help you enforce corporate rules and procedures. Configure profiles so your macOS devices remain secure and configured to your preferred settings. Profiles are the primary means to manage devices.
