More

    How to Set Up App Permissions & Configurations with Scalefusion MDM

    Mobile application management is witnessing widespread adoption at workplaces, thanks to the growing culture of bring your own device (BYOD). Mobile application management allows users to access internally developed and commercially available apps on their personal or company-provided devices. The aim is to make sure employees stay productive, and companies prevent any data loss—intentional and unintentional. With Scalefusion MDM, IT admins can put together app configurations and permissions on deployed mobile devices. Mobile app configuration for Android, iOS, and Windows devices ensures that the organization’s data remains safe or contained in a managed app.

    App Protection Policies on Android Devices

    1. Navigate to Application Management
    2. Click Play for Work Apps 
    1. Select the app from the repository and navigate to App Configurations; click +Create
    1. Provide a configuration name and manage the settings
    1. Save and publish the configuration on the required device groups/profiles/devices.
    Note: Once the configurations are saved, they will reflect under App Configurations

    App Protection Policies on iOS Devices

    1. Navigate to Application Management
    2. Click Apple App Store
    1. Select the app from the repository and navigate to App Configurations; click +Create
    1. Provide a configuration name and manage the settings by –
      1. Clicking the ADD button to create a key-value pair or
      2. Uploading a configuration file
    1. Save the configuration and distribute the app to the required devices
    Note: Configured iOS apps can be published on device profiles only

    App Protection Policies on Windows Devices

    Note: IT admins will first need to associate Microsoft Store for Business with Scalefusion MDM to download or push apps to devices
    1. Navigate to Application Management
    2. Click Windows Business Store > Windows App Catalog
    1. Select the app from the repository and navigate to App Configurations; click +Create
    1. Provide a configuration name and modify the app configuration; click Save to finish
    1. Select a device profile to push the modified app and click Publish

    Alternatively, IT admins can click the three-dot menu against the newly created configuration and click Publish to distribute the app on device profiles.

    Additional App Protection on BYOD Work Profiles

    Employees often use personal devices for personal and work tasks. While companies may trust employees to handle sensitive corporate information responsibly, they need to be on the safe side. Organizations can apply extensive app management policies to secure sensitive business information without hampering employee privacy.

    1. Navigate to Device Profiles & Policies > Device Profiles
    2. Select the necessary BYOD work profile 
    3. Click the Edit Device Profile icon
    1. Navigate to Restrictions > Device Settings > General Settings
    1. Scroll down to Data Sharing and turn on the toggle controls to apply app permissions

    Using these app protection settings in a BYOD scenario prevents the sharing of data between personal and work profiles.

    Wrapping Up

    Want to learn more about Mobile Application Management? Get access to Scalefusion’s mobile device management platform by starting a 14-day free trial.

    Rajnil Thakur
    Rajnil Thakur
    Rajnil is a Senior Content Writer at Scalefusion. He’s been a B2B marketer for over 8 years and applies the power of content marketing to simplify complex technology and business ideas.

    Product Updates

    Introducing Just-In-Time Admin for macOS: Extending Access Management with OneIdP

    While macOS security is a prime business concern, most (if not all) security discussions focus on software updates and endpoint security software, and user...

    New Feature Release: Managing AI Settings on Windows

    As enterprises integrate AI-driven functionalities for operational efficiency, they tread carefully due to potential security risks. AI implementations can introduce vulnerabilities like data breaches...

    Introducing Remote Terminal and User Account Management for Linux

    We’re thrilled to announce new features for Linux devices—Remote Terminal and User Account Management—now available with the latest version of the Linux MDM agent....

    Scalefusion OneIdP Reimagined: Introducing Single Sign-On and Enhancements to OneIdP Suite

    Identity and Access Management (IAM) tools oversee and regulate user access to business systems and resources. They ensure that only authorized individuals access business...

    Introducing Staggered Deployment for Android

    We're excited to unveil a new feature to simplify app deployment: Staggered Deployment for Android Enterprise and Recommended Applications. This feature is designed to...

    Exploring Android Device Profiles for Enterprises

    Effective management of Android devices is critical for businesses seeking to enhance security and productivity. Android device profiles provide...

    iOS Location Tracking with Scalefusion: Overview, Features, Benefits

    There’s no doubt that businesses rely heavily on mobile devices to stay productive and competitive. For this interconnected ecosystem...

    Must read

    Introducing Just-In-Time Admin for macOS: Extending Access Management with OneIdP

    While macOS security is a prime business concern, most...

    Scalefusion OneIdP Reimagined: Introducing Single Sign-On and Enhancements to OneIdP Suite

    Identity and Access Management (IAM) tools oversee and regulate...
    spot_img

    More from the blog

    Key MDM Features for iOS Application Management

    Effective management of iOS applications is paramount for organizations striving to enhance productivity, security, and compliance. The use of iOS devices has expanded to...

    Understanding Remote IT Support: Types, Challenges and Benefits

    As businesses adopt remote and hybrid work models alongside traditional on-site operations, the question of “How to manage remote devices?” has become crucial for...

    What is an MDM Policy? Best Practices for Effective Implementation

    A modern organization is like an intricate machinery, where every device must function seamlessly for optimal performance. Much like the precision required to keep...

    USB Security Management: A Primer

    What happens when an employee unknowingly introduces a USB flash drive found in the parking lot into a company’s network? Within minutes, the computer...