Apple iPod and iPod Touch Cell Phone User Manual


 
Chapter 2 Creating and Deploying Configuration Profiles 23
 Maximum passcode age (in days): Requires users to change their passcode at the
interval you specify.
 Passcode lock (in minutes): If the device isn’t used for this period of time, it
automatically locks. Entering the passcode unlocks it.
Wi-Fi Settings
Use this pane to set how the device connects to your wireless network. You can add
multiple network configurations by clicking the Add (+) button.
These settings must be specified, and must match the requirements of your network,
in order for the user to initiate a connection.
 Service Set Identifier: Enter the SSID of the wireless network to connect to.
 Hidden Network: Specifies whether the network is broadcasting its identity.
 Security Type: Select an authentication method for the network. The following
choices are available for both Personal and Enterprise networks.
 None: The network doesn’t use authentication.
 WEP: The network uses WEP authentication only.
 WPA/WPA 2: The network uses WPA authentication only.
 Any: The device uses either WEP or WPA authentication when connecting to the
network, but won’t connect to non-authenticated networks.
Enterprise Settings
In this section of the Wi-Fi pane, you specify settings for connecting to enterprise
networks. This section of the pane appears only if you choose an Enterprise setting in
the Security Type pop-up menu.
In the Protocols tab, you specify which EAP methods to use for authentication and
configure the EAP-FAST Protected Access Credential settings.
In the Authentication tab, you specify sign-in settings such as user name and
authentication protocols. If you’ve installed an identity certificate using the Credentials
tab, you can choose it using the Identity Certificate pop-up menu.
In the Trust tab, you specify which certificates should be regarded as trusted for the
purpose of validating the authentication server for the Wi-Fi connection. The Trusted
Certificates list displays certificates that have been added using the Credentials tab, and
lets you select which certificates should be regarded as trusted. Add the names of the
authentication servers to be trusted to the Trusted Server Certificates Names list. You
can specify a particular server, such as server.mycompany.com or a partial name such as
*.mycompany.com.
The Allow Trust Exceptions options lets users decide to trust a server when the chain of
trust can’t be established. To avoid these prompts, and to permit connections only to
trusted services, turn off this option and embed all necessary certificates in a profile.