Skip to end of metadata
Go to start of metadata


Welcome to the Digital Workspace blog! 

The blog is focused on interesting things around End User Computing (EUC), primarily VMware Workspace One platform.

This week I had several requests "can we control our very special SAP app with MDM?" So SAP once had their own MDM called SAP Afaria, and the fact they dropped it did not change the fact that they are quite diligent in supporting MDM topic as a whole in their apps. You can't always find it easily in their docs, but usually it works. A few things I found myself searching: SAP BI - <Corporate Connections> - https://help.sap.com/viewer/212f7e2a40ca490a81dc70b7a71f2b94/6.6/en-US/1c86a7b6b0ab45bea0b0b8358a4d9325.</Corporate>…
This week I had some "good old days" experience with Horizon deployment at a customer site. For the last couple of years all I did were AirWatch pilots, so it was a refreshing thing to check out what's up in the latest Horizon by myself. As always, it all starts with sending deployment requirements to the customer, and usually they say "we prepared everything" and in reality ignore 95% of what you ask them to do upfront. This time I had more or less a responsible customer,…
In short - yes, you do! But what's going on here anyway? We are trying to notify a mail client from our on-prem Exchange, that there is a fresh new EMail for him to pick up. To do this, we need to send a PUSH message to the device using a platform-vendor cloud (APNs for Apple, FCM for Google). MS Exchange cannot send PUSH messages itself, so VMware have built a special server for this - the ENSv2. It goes to Exchange, impersonating the EMail user, looks for new EMail,…
AirWatch applications and SDK check the system for compromised (jailbreak/root) status. When they uncover by some symptoms that the device was compromised, this status is transmitted to the Console, and an action is taken. Or not. There is a switch tucked away in the depths of settings, which allows AirWatch to ignore Compromised devices. It is in Settings → Apps → Settings and Policies → Security Policies. Compromised.…
LetsEncrypt public certificates from Mozilla Foundation are cool, but updating every 3 months can be a pain. There are several ways to automate, and the latest I discovered is to outsource this procedure: turns out there is a DNS-provider https://porkbun.com/ https://porkbun.com/ who do the procedure for you. Just download the brand new certificates every 3 months and insert them where they should be, without additional fuss.…
Recently I have spent the day troubleshooting a not-so-common piece of AirWatch together with a customer - the Remote File Storage or RFS. And then news of Personal Content going End-Of-Life https://support.workspaceone.com/articles/360015261113 hit us. So let's look at the topic in detail. There are 2 kinds of storage in AirWatch currently (until 3rd of January 2020 at least) for the 2 kinds of documents: For corporate documents, which the company may want to protect,…
Podcast stream of news
There are lots of ways to bring fresh news. Together with my colleague & VMware architect Alex Malashin we decided to try recording podcasts on latest VMware Cloud & EUC news & headlines (currently in Russian) and send them directly to your earbuds! Next step is to invite guests to talk about cool things happening in the industry. Follow our new project on https://digital-work.space/podcast https://digital-work.space/podcast
A quick question flew in: when adding user groups as local admins of enrolled macbooks during macOS domain join, how should such groups be listed in AirWatch console? (Profile-> macOS-> Device Profile-> Directory-> Administrative-> Group Names). Official doc https://docs.vmware.com/en/VMware-Workspace-ONE-UEM/1902/macOS_Platform/GUID-AWT-MACPROFILEDIRECTORY.html does not clarify this. Answer: group names should be just listed by simple name, example.…



Disclaimer

My postings are my own and don’t necessarily represent VMware’s positions, strategies or opinions.

Tags

Loading tagcloud ...