How are enterprise/educational people thinking about deploying the iPad? The iPhone was always a single user type device but the iPad lends itself a whole lot more to sharing.
We share laptops for travel and often wipe out the previous user account, installing a new one for the next user. I imagine that could be done for the iPad as well, just deleting the user-specific information instead of restoring the entire system.
How are emails, document, etc., stored on the iPad? Are they kept separately from applications? Can you wipe out a user without wiping out applications or is everything stored in the user's iTunes account? Speaking of iTunes, how are people managing iPads with iTunes. I assume everything is managed by iTunes per user (except for applications installed by the iPhone configuration utility). Would the easiest way to switch users be to sync to the new user's iTunes and restore their complete package?
On May 7, 2010, at 7:17 AM, Walls, Bryan K. (MSFC-IS30) wrote: We use a single profile for all of our users. Well, actually 3 profiles that go on all the phones. Part of the setup on each phone is to enter the user's information for the Exchange and wireless setups.
So, though the profile is for multiple users, it's still only one user per device. The iPhone OS is really designed for a single user. If you want multiple users accounts, go to Mac OS X.
On May 7, 2010, at 8:56 AM, Peter Link wrote: Don, I've never seen the iPad or iPhone described as a multi-user platform but the Enterprise deployment guide does talk about the ability to configure profiles for multiple users (pg 30).
"Many of the payloads allow you to specify user names and passwords. If you omit this information, the profile can be used by multiple users, but the user will be asked to enter the missing information when the profile is installed. If you do personalize the profile for each user, and include passwords, you should distribute the profile in encrypted format to protect its contents. For more information see “Installing Configuration Profiles” on page 40."
I suggest you read through the two documents listed below, and the iPad Security Overview, and try things out to see what you get. I found out we're getting a few to "test" so we're going to have to go through the same research. Good luck and please report back what you find.
Peter Link Cyber Security Analyst Cyber Security Program Lawrence Livermore National Laboratory PO Box 808, L-315 Livermore, CA 94550
|