Docs at Worki OSGuide
Docs at Worki OSGuide
0 for iOS
Guide for Administrators
for MobileIron Core and MobileIron Cloud
Any reproduction or redistribution of part or all of these materials is strictly prohibited. Information in this publication
is subject to change without notice. MobileIron, Inc. does not warrant the use of this publication. For some phone
images, a third-party database and image library, Copyright © 2007-2009 Aeleeta's Art and Design Studio, is used.
This database and image library cannot be distributed separate from the MobileIron product.
“MobileIron,” the MobileIron logos and other trade names, trademarks or service marks of MobileIron, Inc.
appearing in this documentation are the property of MobileIron, Inc. This documentation contains additional trade
names, trademarks and service marks of others, which are the property of their respective owners. We do not
intend our use or display of other companies’ trade names, trademarks or service marks to imply a relationship
with, or endorsement or sponsorship of us by, these other companies.
Contents
Chapter 1 Overview of Docs@Work for iOS ........................................................................... 4
About Docs@Work ........................................................................................................... 4
Enable MobileIron Access for Docs@Work ........................................................................ 5
Where to find Docs@Work for iOS .................................................................................. 5
About Docs@Work for iOS configuration ...................................................................... 5
What the users see in Docs@Work for iOS .................................................................... 6
Chapter 2 Configuring Docs@Work for iOS............................................................................ 7
Required components for Docs@Work for iOS deployment ........................................ 7
Main steps for configuring Docs@Work for iOS (Core) ................................................ 7
Set up app distribution ...................................................................................................................7
Set up Docs@Work .......................................................................................................................8
AppTunnel setup ...........................................................................................................................8
Attachment control setup ...............................................................................................................8
Docs@Work app behavior setup ...................................................................................................8
Before you begin ................................................................................................................. 8
Distributing as a recommended app ................................................................................... 8
Enabling Docs@Work ....................................................................................................... 11
Configuring the AppConnect global policy ........................................................................ 12
Applying to a label .......................................................................................................................12
Configuring an AppConnect container policy .................................................................... 13
Configuring content sites in the Docs@Work configuration .............................................. 13
Adding SharePoint, WebDAV, CIFS, and DFS sites ...................................................................14
Support for variables in configuring content sites ............................................................. 17
Prerequisites for using variables for configuring content sites ....................................................17
Supported Content sites for variables .........................................................................................17
Supported variables for configuring content sites ........................................................................17
Verifying the SharePoint URL ........................................................................................... 18
Adding Box enterprise as a Group site ............................................................................. 19
Adding a SharePoint Group site with Federated authentication ....................................... 19
Adding a SharePoint Group site with derived credentials ................................................. 20
Adding Google Drive as a Group site ............................................................................... 20
Authentication with an identity provider (IdP) ..............................................................................21
Configuring DFS content site ............................................................................................ 21
Enabling DFS ..............................................................................................................................21
Configuring an AppTunnel service for DFS .................................................................................21
Configuring AppTunnel rules and DFS site in the Docs@Work setting .......................................22
Configuring an AppTunnel service .................................................................................... 24
Configuring AppTunnel rules ............................................................................................ 27
Configuring attachment control ......................................................................................... 29
Main steps for configuring Docs@Work for iOS (Cloud) ............................................ 30
User-added sites ............................................................................................................... 32
Docs@Work installation on an iOS device (Core and Cloud) ..................................... 33
AES-256-GCM encryption for email attachments ........................................................ 33
Configuring 256-bit encryption .......................................................................................... 34
The following provide an overview of the Docs@Work app for iOS devices:
• About Docs@Work
• Where to find Docs@Work for iOS
• About Docs@Work for iOS configuration
• What the users see in Docs@Work for iOS
About Docs@Work
The Docs@Work app gives device users an intuitive and secure way to access, store, view, edit, and annotate
documents from content repositories, such as Microsoft SharePoint, and cloud services such as Box and Dropbox.
It allows administrators to configure content repositories, which are then automatically available to device users. It
also lets administrators establish data loss prevention controls to protect documents from unauthorized
distribution. Docs@Work supports AES-256-GCM for encrypting email attachments.
Device users must have a valid user ID and password to access content sites.
A MobileIron license is required for Docs@Work. Docs@Work uses certain aspects of AppConnect, including
passcode access and app tunneling. However, an AppConnect license is not required for Docs@Work. The
Docs@Work app for iOS is an AppConnect enabled app.
Docs@Work for iOS is an AppConnect-enabled app. AppConnect is a MobileIron feature that containerizes apps
to protect content on iOS and Android devices. Each AppConnect app becomes a secure container whose content
is encrypted and, protected from unauthorized access. Because each user has multiple business apps, each app
container is also connected to other secure app containers. This connection allows the AppConnect apps to share
content. AppConnect apps are managed using policies configured in a MobileIron Enterprise Mobility Management
(EMM) platform. The EMM platform is either MobileIron Core or MobileIron Cloud.
As an AppConnect app, all Docs@Work content is secured. The app interacts with other apps according to the
data loss prevention policies that you specify. The app has the following secure features:
• Secure apps passcode: A secure apps passcode, if you require one, protects access to all secure apps. This
is the AppConnect passcode, which you define in MobileIron EMM. The AppConnect passcode provides an
additional layer of security for secure apps, beyond the device passcode.
• Data encryption: AppConnect encrypts all AppConnect-related data on the device, such as Docs@Work app
data, app configurations, and policies. This means app data is secure even if a device is compromised.
• Data loss prevention: You determine whether Docs@Work for iOS can use the iOS copy/paste or open-in
features. AppConnect data loss prevention policies control if users can copy/paste data out of Docs@Work and
control how email attachments can be shared with other apps via open-in.
For information about AppConnect features and configuration beyond Docs@Work for iOS, see the AppConnect
and AppTunnel Guide.
Federated traffic through AppTunnel and Access as a service is not supported for Docs@Work. Selecting Enable
Access in the Docs@Work configuration has no impact.
NOTE: Mobile@Work must be available on the device and registered with MobileIron Core, before installing
the Docs@Work app.
• If you are using the Default AppConnect Global Policy, you may not need to create a new policy.
• Configuring an AppConnect container policy is required only if you did not Authorize for Apps without an
AppConnect container policy in the AppConnect Global policy. Or, if you want to configure a different set of data
loss prevention policies for Docs@Work.
• Standalone Sentry configured for AppTunnel is required if you want to tunnel traffic to content repositories.
CIFS traffic must be tunneled through Standalone Sentry.
• Standalone Sentry configured for ActiveSync is required to open encrypted email attachments in Docs@Work.
• Use the Docs@Work configuration to specify:
- AppTunnel rules
- Content sites
- Docs@Work app behavior
For more information on Configurations, See “Configuring Docs@Work for iOS” on page 7.
The Docs@Work app enables iOS users to access, store, view, edit, and annotate documents from content
repositories, such as Microsoft SharePoint. MobileIron Cloud administrators can set up Docs@Work so that:
• users see all available content repositories
• documents are protected from unauthorized distribution
For supported versions see the MobileIron Docs@Work for iOS Release Notes.
NOTE: If a device user has already launched Docs@Work for iOS as a standalone trial app, the device user
must uninstall and reinstall Docs@Work for iOS to use it as a secure AppConnect-enabled app.
Set up Docs@Work
• “Enabling Docs@Work” on page 11
• “Configuring the AppConnect global policy” on page 12
• “Configuring an AppConnect container policy” on page 13
• “Configuring content sites in the Docs@Work configuration” on page 13
AppTunnel setup
Complete the following additional tasks to set up app tunneling to content repositories.
1. “Configuring an AppTunnel service” on page 24
2. “Configuring AppTunnel rules” on page 27
Procedure
1. In the Admin Portal, go to Apps > App Catalog.
2. Click Add+.
3. Click iTunes to import Docs@Work for iOS from the Apple App Store.
4. Enter MobileIron Docs@Work in the Application Name text box.
5. Click Search.
6. Select the app from the list that is displayed.
7. Click Next.
8. (Optional) Select one or more categories if you want to display this app in a specific group of apps on the
device. Click Add New Category to define new categories.
9. Click Next.
10. Use the following guidelines to make the appropriate selections for App@Work Catalog:
Item Description
Hide this App from the Select to prevent this app from being displayed in Apps@Work. For example, you
Apps@Work catalog might want to hide apps that will be installed upon registration anyway. Hiding a
mandatory app reduces clutter in Apps@Work, leaving device users with a
concise menu of the approved apps they might find useful.
Allow conversion of Select if you want to allow the app to be converted from an unmanaged app to a
apps from unmanaged managed app in Apps@Work on devices running iOS 9 through the most recently
to managed in released version as supported by MobileIron. The unmanaged app will not require
Apps@Work (iOS 9 or uninstallation, as it will be converted directly to a managed app.
later).
Feature this App in the Select this option if you want to highlight this app in the Featured apps list.
Apps@Work Catalog
NOTE: The Message feature for iOS apps applies only to featured apps. For
more information, see “Informing users of new apps and upgrades for
featured apps” in the Apps@Work Guide.
Item Description
Per App VPN by Label Select the VPN setting you created for per app VPN in the right (all) column, and
Only click the right arrow to move it to the left (selected) column. If the app will use
MobileIron Tunnel, select the MobileIron Tunnel VPN setting you created. You can
select multiple per app VPN settings.
To reorder the per app VPN configurations in the Selected column, use the up and
down arrows to sort the names in the list.
This feature applies to iOS 7 through the most recently released version as
supported by MobileIron.
See Managing VPN settings in the MobileIron Core Device Management Guide
for information on creating a per app VPN or MobileIron Tunnel VPN setting.
See “Setting per app VPN priority” in the Apps@Work Guide.
Prevent backup of the Select to ensure that iTunes will not attempt to back up possibly sensitive data
app data associated with the given app.
Remove app when Select to enable configured compliance actions to remove the app if a policy
device is quarantined violation results in a quarantined device or the device signs out in multi-user
or signed out mode.
To enable this feature, you must also configure a corresponding compliance
action, and security policy with that compliance action selected. Once the device
is no longer quarantined, the app can be downloaded again.
NOTE: If you change the setting after the app is added, the changed setting
will not be applied to the app.
Send installation Select this option so that after device registration is complete, or after a user signs
request or send convert in on a multi-user device:
unmanaged to • The device user is prompted to install this app.
managed app request
• The app is converted to a managed app, if the app is already installed as an
(iOS 9 and later) on
unmanaged app.
device registration or
sign-in. To allow conversion to a managed app, also select the option Allow conversion
of apps from unmanaged to managed in Apps@Work (iOS 9 or later).
This setting is not selected by default.
Item Description
Send installation or Select this option to enable the following on quarantined devices:
convert unmanaged to • Prompt the device user to install the app.
managed app request
• Convert the app to a managed app, if the app is already installed as an
to quarantined devices
unmanaged app.
NOTE: These settings are applied even if a compliance action blocks new
app downloads for a quarantined device.
Advanced Settings
Remove app when Select this option to remove this app from the device when the MDM profile is
MDM profile is removed removed from the device.
13. Associate the app with a label to have that app listed on iOS devices.
a. Go to Apps > App Catalog.
b. Select iOS from the Platform list.
c. Select the app you want to work with.
d. Click Actions > Apply to Label.
e. Select the label that represents the iOS devices for which you want the selected app to be displayed.
f. Click Apply.
14. Make sure that the Apps@Work web clip is also applied to the same labels, so that iOS devices can access
your enterprise storefront.
a. Select Policies & Configs > Configurations.
b. Select the System - iOS Enterprise AppStore setting.
c. Select More Actions > Apply to Label.
d. Select the iOS label and click Apply.
Enabling Docs@Work
A Docs@Work license is required on MobileIron Core to enable support. Enabling this setting indicates that you
have the required license to deploy Docs@Work. Enabling Docs@Work is also required for AES-256-GCM
encryption for email attachments.
Procedure
1. In the Admin Portal, go to Settings > System Settings.
2. In the left menu bar, click Additional Products > Licensed Products.
3. Select Docs@Work.
4. Select Enable merging of configurations option to enable merging multiple configurations for a device.
You may decide to create a new AppConnect Global Policy (Add New > AppConnect). If you create a new
AppConnect Global Policy, you must apply it to the appropriate labels. You do not need to apply the Default
AppConnect Global Policy to a label.
Procedure
1. In the Admin Portal, go to Policies & Configs > Policies.
2. Select Default AppConnect Global Policy.
Applying to a label
Applying a policy or configuration to a label makes the policy or configuration available to all the devices that are
associated with that label. Perform these steps only if you created a new AppConnect Global Policy. You do not
need to apply a default AppConnect Global Policy to a label.
Procedure
1. Select the AppConnect global policy.
2. Click More Actions > Apply To Label.
3. Select the appropriate labels to which you want to apply the policy.
4. Click Apply.
Related topics
For more information about the AppConnect Global policy, see the “Configuring the AppConnect global policy”
section in the AppConnect and AppTunnel Guide.
The AppConnect container policy authorizes an AppConnect app and specifies the data loss prevention settings.
The container policy overrides the corresponding settings in the AppConnect Global Policy. Separate AppConnect
container policies are required for each operating system (Android or iOS).
NOTE: Ensure that only one Docs@Work AppConnect container policy is applied to a device.
Procedure
1. In the Admin Portal, go to Policy & Configs > Configurations.
2. Click Add New > AppConnect > Container Policy.
3. Enter a name for the policy. For example, enter Docs@Work container policy for iOS.
4. Enter a description for the policy.
5. In the Application field, select Docs@Work.
Select Docs@Work only if the app is available in the app catalog as a recommended app. If not, you must enter
the app bundle ID.
6. Select the data loss prevention settings.
7. Select Save.
8. Select the Docs@Work container policy.
9. Click More Actions > Apply To Label.
10. Select the appropriate labels to which you want to apply this policy.
11. Click Apply.
Related topics
For more information on configuring the AppConnect Container Policy, see the “Configuring AppConnect container
policies” section in the AppConnect and AppTunnel Guide.
SharePoint sites that use Federated authentication, and Google Drive sites are configured in the Custom
Configurations section using key-value pairs.
• “Adding SharePoint, WebDAV, CIFS, and DFS sites” on page 14
• “Support for variables in configuring content sites” on page 17
• “Verifying the SharePoint URL” on page 18
• “Adding Box enterprise as a Group site” on page 19
• “Adding a SharePoint Group site with Federated authentication” on page 19
• “Adding a SharePoint Group site with derived credentials” on page 20
• “Configuring DFS content site” on page 21
Content sites configured in the Doc@Work configuration are automatically added to the Docs@Work app. Device
user action is not required. SharePoint (including OneDrive for Business), WebDAV, CIFS, and DFS sites are
configured in the Content Sites section of the Docs@Work configuration.
Procedure
1. In the Admin Portal, go to Policies & Configs > Configurations.
2. Select Add New > Docs@Work.
3. Use the following guidelines to create or edit a Docs@Work setting and add content sites:
Item Description
Description Enter additional text that clarifies the purpose of this Docs@Work setting.
Content Sites
Item Description
CIFS sites
For CIFS sites, the URL must also include the CIFS port. A valid URL can start with
smb:// or \\. UNC is supported. Both domain name and IP address are supported.
Examples for CIFS:
https://server.name:445/path/to/share/folder
smb://server.name:445/path/to/share/folder
\\server.name:445\path\to\share\folder
Variables
You can also specify variables in the URL. You can specify a single variable, or a
combination of variables. LDAP or AD integration is required for using variables.
See also, “Support for variables in configuring content sites” on page 17.
Examples with variables:
https://networkdrive/users/$FIRST_NAME$
https://sharepoint.mycompany.com/personal/
$FIRST_NAME$_$LAST_NAME$_company_com/
Item Description
NOTE: Published sites for SharePoint are not supported at root, site, and subsite
levels. Published sites are supported at document library and folder
levels. MobileIron recommends that Published sites be set for publishing
50-100 documents.
Web View Only for SharePoint domains. Only applicable to iOS devices. Does not apply to
Android devices.
Select to allow device users to view and navigate SharePoint folders in browser
view.
Max auto download Specify the maximum file size for automatic download.
size (MB)
Files greater than this size will not be automatically downloaded. The default
setting is 500 MB.
Item Description
Max documents per Specify the maximum number of documents to update for each site.
update
Only the number of files specified will be updated. The default setting is 100 files.
Update Mode Specify the method devices can use to update Published sites.
Select either Wi-Fi Only or Wi-Fi and Cellular.
MobileIron recommends using Wi-Fi only if you support large number of
documents.
4. Click Save.
5. Select the Docs@Work configuration.
6. Click More Actions > Apply To Label.
7. Select the appropriate labels to which you want to apply the configuration.
8. Click Apply.
NOTE: Docs@Work is a document centric application. It relies on an API (in native mode) to query directories
and files. If the entity that is queried is not a folder or a file, then the APIs fail. As a result, List support is
limited to only DocumentLibrary. No other type of List is supported.
$USER_CUSTOM3$
$USER_CUSTOM4$
Procedure
1. Add the SharePoint or WebDAV site as a User site in Docs@Work.
2. In Docs@Work, tap on the SharePoint or WebDAV site.
3. Navigate to the folder you want to configure as a Group site.
4. Tap, hold, and then release the ... menu.
The menu items will display.
5. Select one of the menu items to either view the URL or email the URL.
Item Description
Email path A draft email message with the site URL displays.
Enter an email address to email the URL path.
Show path The URL path for the content site displays.
Procedure
1. In the Core Admin Portal, go to Policies & Configs > Configurations > Add New > Docs@Work >
Docs@Work.
2. Scroll down to the Custom Configurations section.
3. Add the SITE_DETAILS_N key-value pair. For more information, see “Key-value pairs to configure app
behavior” section.
4. Click Save.
NOTE: iOS devices support one Group site and multiple user sites.
Procedure
1. In the MobileIron Core Admin Portal, go to Policies & Configs > Configurations > Add New > Docs@Work
> Docs@Work.
2. Scroll down to the Custom Configurations section.
3. Add the SITE_DETAILS_N key-value pair. For more information, see “Key-value pairs to configure app
behavior” section.
4. Click Save.
NOTE: Variables are not supported in the URL for configuring the Google Drive site. For example, you will not
be able to specify a user name as part of the JSON value. However, you can configure
fAUTOFILL_CREDENTIALS key-value pair to autofill the username for Google Drive.
Procedure
1. In the MobileIron Core Admin Portal, go to Policies & Configs > Configurations.
2. Select the Docs@Work configuration to which you want to add Google Drive.
3. Click Edit.
Key Value
SITE_DETAILS_N Enter parameters for the content site in the following JSON format:
Where n is a number 1- {"name":"name for the site","domain":"GoogleDrive","url":"https://
100 drive.google.com”}
Example:
NOTE:
SITE_DETAILS_1 • Values are case sensitive.
Description
name for the site: Enter a name for the site. Example: Google Drive.
6. Click Save.
If your Google Drive setup uses an identity provider (IdP) for authentication, device users are directed to the IdP
without having to go through any intermediate screens.
If Google Drive is set up through the Docs@Work configuration in MobileIron Core, you must also configure the
AUTOFILL_CREDENTIALS key-value pair to enable this feature.
Requirements
• Standalone Sentry 8.0.1 through the most recently released version as supported by MobileIron.
• Standalone Sentry 8.5.0 through the most recently released version as supported by MobileIron is required for
create, upload, and delete (CUD) operations for files and folders.
• MobileIron Core 9.0.0.0 through the most recently released version as supported by MobileIron.
The following configuration tasks are required. These tasks are done in the MobileIron Core Admin Portal.
1. Enable DFS in Standalone Sentry settings.
See “Enabling DFS” on page 21.
2. Configure an AppTunnel service for a CIFS repository in Standalone Sentry settings.
See “Configuring an AppTunnel service for DFS” on page 21.
3. Configure AppTunnel rules and DFS content site in Docs@Work configuration.
See “Configuring AppTunnel rules and DFS site in the Docs@Work setting” on page 22.
Enabling DFS
1. In the Admin Portal, go to Services > Sentry.
2. Edit the entry for the Standalone Sentry that supports AppTunnel.
3. In the App Tunneling Configuration section, select the check box for Enable DFS.
Item Description
Service Name The Service Name is used in the Docs@Work configuration for setting up tunneling to
the content repository.
Enter one of the following:
• A unique name for the service that Docs@Work accesses. One or more of your
internal app servers provide the service. You list the servers in the Server List
field.
- The service name must begin with CIFS_.
- A service name cannot contain these characters: 'space' \ ; * ? < > " |.
• <CIFS_ANY>
Select <CIFS_ANY> to allow tunneling to any URL for a CIFS-based or DFS
content server. Typically, you select <CIFS_ANY> if the URL for a CIFS-based or
DFS content server contains wildcards for tunneling, such as *.myCompany.com.
Server List NOTE: The Server List field is not applicable when the service name is
<CIFS_ANY>.
Enter the DFS server’s host name or IP address (usually an internal host name or IP
address). Include the port number on the DFS server that Standalone Sentry can
access.
Example: fs1.companyname.com:445
You can enter multiple servers. Depending on the Global Configuration settings for
the Sentry, either round-robin or priority distribution is used to load balance the
servers. Separate each server name with a semicolon.
Example: fs1.companyname.com:445;fs2.companyname.com:445
TLS Enabled Not applicable for app tunnel to DFS.
5. Click Save.
3. In the AppTunnel Rules section, use the following guidelines to add an AppTunnel rule for CIFS repository:
Item Description
AppTunnel Rules
Configure AppTunnel rules settings for Docs@Work.
When Docs@Work tries to connect to the URL configured here, Standalone Sentry creates a tunnel to the
content server.
To add an AppTunnel entry, click + .
To delete an AppTunnel entry, click - .
Sentry Select the Standalone Sentry on which you configured the AppTunnel service.
The drop-down list contains all Standalone Sentrys that are configured to support
AppTunnel.
A hostname with wildcards works only with the service <CIFS_ANY>. Unlike
services with specific service names, these services do not have associated app
servers. The Standalone Sentry tunnels the data to the URL specified in the app.
MobileIron recommends that you carefully consider how you use wildcards. For
example, do not use just * for the URL.
The order of these AppTunnel rows matters. If you specify more than one
AppTunnel row, the first row that matches the hostname requested is chosen.
That row determines the Standalone Sentry and Service to use for tunneling.
Do not include a URI scheme, such as http:// or https:/, in this field.
Port Enter the port number that Docs@Work can request. Typically, the port number
is 445.
Identity Certificate Select the Certificate or the SCEP profile that you created for devices to present
to the Standalone Sentry that supports app tunneling.
Item Description
URL Enter a valid URL for the DFS. Both domain name and IP address are supported.
A valid URL must start with http:// or https://.
Format example:
https://resolvablehostname:445/URL
Variables:
You can enter a valid URL with variables for the content site. Variables in the protocol or
the hostname are not supported. See also, “Support for variables in configuring content
sites” on page 17.
Examples with variables:
\\$USER_CUSTOM1$
Format of DFS URL with UserId:
https://resolvablehostname:445/users/$USERID$
5. Click Save.
6. Select the Docs@Work configuration.
7. Click More Actions > Apply To Label.
8. Select the appropriate labels to which you want to apply the configuration.
9. Click Apply.
Ensure that you have a Standalone Sentry that is set up for AppTunnel and the necessary device authentication is
also configured. See “Configuring Standalone Sentry for app tunneling” in the MobileIron Sentry Guide.
Procedure
1. In the Admin Portal, go to Services > Sentry.
2. Edit the entry for the Standalone Sentry that supports AppTunnel.
3. In the App Tunneling Configuration section, under Services, click + to add a new service.
4. Use the following guidelines to configure a tunnel service:
Item Description
Service Name The Service Name is used in the Docs@Work configuration for setting up tunneling
to the content repository.
Enter one of the following:
• A unique name for the service that the AppConnect app on the device accesses.
One or more of your internal app servers provide the service. You list the servers
in the Server List field.
For example, some possible service names are:
- SharePoint
- Human Resources
A service name cannot contain these characters: 'space' \ ; * ? < > " |.
Special prefixes:
- For app tunnels that point to CIFS-based content servers, the service name
must begin with CIFS_.
• <ANY>
Select <ANY> to allow tunneling to any URL that the app requests. Typically, you
select <ANY> if an AppConnect app’s app configuration specifies a URL with
wildcards for tunneling, such as *.myCompany.com. The Sentry tunnels the data
for any URL request that the app makes that matches the URL with wildcards.
The Sentry tunnels the data to the app server that has the URL that the app
specified. The Server List field is therefore not applicable when the Service Name
is <ANY>.
For example, consider when the app requests URL
myAppServer.mycompany.com, which matches *.mycompany.com in the app
configuration. The Sentry tunnels the data to myAppServer.myCompany.com.
Docs@Work typically uses the <ANY> service, so that it can browse to any of
your internal servers.
NOTE: Do not select the <ANY> option for tunneling to CIFS-based content
servers, Office 365, Box, and Dropbox. For CIFS-based content servers,
select <CIFS_ANY>.
• <CIFS_ANY>
Select <CIFS_ANY> to allow tunneling to any URL for a CIFS-based content
server. Typically, you select <CIFS_ANY> if the URL for a CIFS-based content
server contains wildcards for tunneling, such as *.myCompany.com.
NOTE: The order of the Service Name entries does not matter.
Item Description
Server Auth Select the authentication scheme for the Standalone Sentry to use to authenticate
the user to the app server:
• Pass Through
The Sentry passes through the authentication credentials, such as the user ID
and password (basic authentication) or NTLM, to the app server.
• Kerberos
The Sentry uses Kerberos constrained delegation (KCD). KCD supports Single
Sign On (SSO). SSO means that the device user does not have to enter any
credentials when the AppConnect app accesses the app server.
The Kerberos option is only available if you selected Identity Certificate for
Device Authentication.
Server List Enter the app server’s host name or IP address (usually an internal host name or IP
address). Include the port number on the app server that the Sentry can access.
Example:
sharepoint1.companyname.com:443
Acceptable characters in a host name are letters, digits, and a hyphen. The name
must begin with a letter or digit.
You can enter multiple servers. The Sentry uses a round-robin distribution to load
balance the servers. That is, it sets up the first tunnel with the first app server, the
next with the next app server, and so on. Separate each server name with a
semicolon.
Example:
sharepoint1.companyname.com:443;sharepoint2.companyname.com:443
NOTE: The Server List field is not applicable when the service name is <ANY>
or <CIFS_ANY>.
TLS Enabled Select TLS Enabled if the app servers listed in the Server List field require SSL.
This option is not applicable when the service name is <ANY> or <CIFS_ANY>.
NOTE: Although port 443 is typically used for https and requires SSL, the app
server can use other port numbers requiring SSL.
Item Description
Proxy/ATC Select if you want to direct the AppTunnel service traffic through the proxy server.
You must also have configured Server-side Proxy or Advanced Traffic Control (ATC).
Server SPN List Enter the Service Principal Name (SPN) for each server, separated by semicolons.
For example:
sharepoint1.company.com;sharepoint2.company.com.
The Server SPN List applies only when the Service Name is not <ANY> and the
Server Auth is Kerberos.
If each server in the Server List has the same name as its SPN, you can leave the
Server SPN List empty. However, if you include a Server SPN List, the number of
SPNs listed must equal the number of servers listed in the Server List. The first
server in the Server List corresponds to the first SPN in the Server SPN List, the
second server in the Server List corresponds to the second server in the Server SPN
List, and so on.
NOTE: When the Service Name is <ANY> and the Server Auth is Kerberos, the
Standalone Sentry assumes that the SPN is the same as the server name
received from the device.
5. Click Save.
Related topics
For more information on configuring AppTunnel, advanced traffic control, and AppTunnel rules, see “Configuring
an AppTunnel service” in the AppConnect and AppTunnel Guide.
Procedure
1. In the MobileIron Core Admin Portal, go to Policies & Configs > Configurations.
2. Select for the Docs@Work configuration you want to add AppTunnel rules.
3. Click on Edit.
4. In the AppTunnel Rules section click on Add+.
5. Use the following guidelines to create an AppTunnel rule:
Item Description
AppTunnel Rules
Sentry Select the Standalone Sentry that you want to tunnel the URLs listed in this AppTunnel
entry. The drop-down list contains all Standalone Sentrys that are configured to support
AppTunnel.
URL Wildcard The Sentry and Service fields that you specify in the AppTunnel row determine the target
content server.
NOTE: Tunneling traffic through Standalone Sentry is not supported for Box and
Dropbox.
• Docs@Work data is tunneled only if the Docs@Work request matches the hostname in
the URL Wildcard field and the port number specified in the Port field.
Item Description
NOTE: If a port number is not configured, for http and https traffic, the default port is
used. The default port used for http is 80 and the default port used for https is
443.
Identity Select the Certificate or the SCEP profile that you created for devices to present to the
Certificate Standalone Sentry that supports app tunneling.
A Standalone Sentry set up for ActiveSync is required to enable device users to open encrypted email attachments
in Docs@Work.
See “Configuring Standalone Sentry for ActiveSync” in the MobileIron Sentry Guide for information about how to
set up a Standalone Sentry for ActiveSync.
Procedure
1. In the Admin Portal, go to Services > Sentry.
2. Select the Standalone Sentry that handles email for the devices.
3. Click the edit icon.
4. In the section Attachment Control Configuration, select Enable Attachment Control.
5. For iOS using native Email, select Open with Docs@Work and protect with encryption.
6. Click Save.
For information on setting up Standalone Sentry and configuring attachment control, see “Email attachment control
with Standalone Sentry” in the MobileIron Sentry Guide.
NOTE: If the same settings will apply to all user groups and all AppConnect-enabled apps, then you can edit
the default configuration. Only one AppConnect device configuration can be applied to a given
device and all AppConnect-enabled apps on that device.
2. Add the Docs@Work app to the app catalog.
• Under Advanced Options and App Configuration, provide the following information for each content site you
want to display in Docs@Work:
Item Description
App Configuration
All content in a published site is automatically downloaded and mirrored locally on the
device when the device syncs. If the option is not selected, the user must manually
download the content.
A Web View site cannot be configured as a published site, and a published site cannot be
configured as a Web View site.
NOTE: Published sites for SharePoint are not supported at root, site, and subsite levels.
Published sites are supported at document library and folder levels. MobileIron
recommends that published sites be set for publishing 50-100 documents..
Web View Only for SharePoint domains.
Select to allow users to view and navigate SharePoint folders in browser view.
Item Description
Published site
Max auto Specify the maximum file size for automatic download. Files above this size will not be
download size automatically downloaded. The default setting is 500 MB.
(MB)
Max Specify the maximum number of documents to update for each updated site. Only the
documents per number of files specified will be updated. The default setting is 100 files.
update
Update Mode Specify the method devices can use to update published sites. Select either Wi-Fi Only or
Wi-Fi and Cellular. MobileIron recommends using Wi-Fi Only if you support large number of
documents.
User-added sites
Users can add the following types of sites:
• Box
• Cloud Storage
• Dropbox
• Network Drive
• SharePoint
To add corporate sites, the user will need the following information:
• The site’s URL. The URL must include http:// or https://. Both domain name and IP address are supported.
• Type of Authentication for Network drives. The authentication setting is labeled No Authentication.
• Device users should enable this setting, if the site does not require authentication.
• Type of authentication for SharePoint servers:
Authentication
type Description
Corporate User authenticates with on-premise SharePoint using either Windows NTLM or
Forms-based authentication with corporate credentials. User credentials can be
domain\username or just username, depending on how SharePoint is set up with
Windows domain authentication.
Office 365 User authenticates with Office 365 SharePoint using the authentication
mechanism supported by Office 365. User credentials map to the user’s account
on Office 365, or to the user’s AD credentials. If Office 365 has been integrated
with corporate AD, then user’s SharePoint credentials map to AD credentials.
NoAuthn User doesn’t need to provide credentials for authentication. The SharePoint
server supports anonymous access..
• Web View. For SharePoint sites, the user can turn on Web View to be able to view and navigate SharePoint
folders in browser view.
After importing Docs@Work for iOS into the app distribution library, the app appears in Apps@Work on the
device. Tap the entry for Docs@Work and follow the prompts to install the app.
bit encryption with Docs@Work, you must first disable Docs@Work (Original) and then regenerate the attachment
encryption key. A 256-bit key is only generated if Docs@Work (Original) is disabled and all Standalone Sentrys are
at least at version 6.1.0.
TIP: After you upgrade Standalone Sentry, in the Core Admin Portal, go to Services > Overview, and click
Verify for the Standalone Sentry. This action immediately updates the Standalone Sentry version in Core.
Otherwise, the Standalone Sentry version in Core is updated at the next sync. All Standalone Sentry
versions in Core must be at least at version 6.1.0 to generate a 256-bit key.
Procedure
1. Ensure that all Sentrys configured on Core are at least at version 6.1.0.
2. In the Admin Portal, go to Settings > System Settings.
3. Scroll down to the Additional Products section.
4. Click on Licensed Products.
5. De-select Enable Docs@Work (Original).
6. Ensure that Enable Docs@Work is enabled.
7. Click on Save.
8. Go to Settings > Sentry, and click Preferences.
9. In the Standalone Sentry section, click Regenerate Key.
Related topics
For information about regenerating the encryption key, see “Regenerating the encryption key” in the MobileIron
Sentry Guide.
Key-value pairs allow you to manage and control the device user experience in the following ways:
• Making it easier for the device user to email you logs for the app.
• Controlling the detail in the device logs to help troubleshoot issues.
• Controlling which types of sites device users can add to Docs@Work.
• Restricting the number of User sites device users can add.
• Disabling editing in Docs@Work
• Enabling the embedded viewer in Docs@Work
• Autofilling username and domain
Procedure
1. In the MobileIron Core Admin Portal, go to Policies & Configs > Configurations.
2. Select for the Docs@Work configuration you want to edit.
3. Click Edit.
4. In the Custom Configurations section click on Add+ to add a key-value pair.
See “Key-value pairs to configure app behavior” on page 37.
5. Click Save.
Value: Enter/Select
Key one Description and Value
Email logs
Value: Enter/Select
Key one Description and Value
Value: Enter/Select
Key one Description and Value
Disable editing
Value: Enter/Select
Key one Description and Value
NOTE:
• Ensure that there
are no spaces
• Values are case
sensitive
Required
parameters:
“name”, “url”,
“domain”,
“subDomain”
Autofill Credentials
Value: Enter/Select
Key one Description and Value
Value: Enter/Select
Key one Description and Value
Value: Enter/Select
Key one Description and Value
mailto_prefix To open Email+, use Brings up the email client for which
email+launcher:// the schema is configured in
docsatwork?url=mailto: mailto_prefix.
To open IBM Verse, Use this key-value pair to open the
use email client for which the schema is
ibmverse:// configured in mailto_prefix.
com.ibm.lotus.travele Support for third party email client
r/mailto?to= enabled.
To open SecurePIM,
use
spmailto:
Value: Enter/Select
Key one Description and Value
Value: Enter/Select
Key one Description and Value
Value: Enter/Select
Key one Description and Value
Custom keyboards
Value: Enter/Select
Key one Description and Value
AppConnect logs
Value: Enter/Select
Key one Description and Value
Miscelleneous
Procedure
1. In MobileIron Core Admin Portal, go to Policies & Configs > Configurations.
2. Select the Docs@Work configuration in which you want to enable the embedded viewer.
3. Click Edit.
4. Scroll down to the Custom Configuration section.
5. Click on Add+ to add enable_polaris_viewer key-value pair. For more information, see Key-value pairs to
configure app behavior section.
6. Click Save to save the changes.
Procedure
1. In the MobileIron Core Admin Portal, go to Policies & Configs > Configurations.
2. Select the Docs@Work configuration for which you want to disable editing.
3. Click Edit.
Key Value
DISABLE_EDITING true
6. Click Save.
• Touch ID
• Content sites
• Favorites
• User added sites
• Sorting content sites
• View options for SharePoint sites in Docs@Work
• Google Drive group site
• Email document links from Docs@Work
• Email documents from Docs@Work
• Email Docs@Work logs
• Add attachments from Docs@Work in Email+
• Add attachments from Docs@Work in Native mail
• Email documents from Docs@Work through third-party email clients
• Edit documents in Docs@Work
• Edit Online
• Extracting files from .zip files
• File and folder management
• Locating file or folder
• Sorting files and folders
• Background notifications for Published sites
• Importing images and video
• Browse and add SharePoint site
• Single Sign On
• Support for multiple configurations
• Allow Drag and Drop from Docs@Work for iOS 11
• Watermark text
• Other features
Touch ID
If Touch ID is enabled for accessing secure apps, Docs@Work users can use Touch ID as an alternative to using
their secure apps passcode. For information about enabling Touch ID for secure apps, see the AppConnect and
AppTunnel Guide.
Content sites
Content sites configured by the administrator are automatically available in Docs@Work on the device. If a content
site is configured as a Published site, the content is automatically downloaded to the device.
Site details are available by tapping the Info icon on the site.
Favorites
When you mark a document as favorite, the document is downloaded and available for offline viewing in Favorites.
If changes are made to the document on the content site, the updated version of the document becomes available
only when the device user launches the content site containing the document. At the same time, an update
notification is also sent and the Notifications icon is badged.
To add corporate sites, the device user will need the following information:
• The site’s URL. The URL must include http:// or https://. Both domain name and IP address are supported.
• Type of Authentication for Network drives. The authentication setting is labeled No Authentication.
Device users should enable this setting, if the site does not require authentication or you have set up Kerberos
Single Sign On using MobileIron.
• Type of authentication for SharePoint servers. This can be Corporate, Office 365, NoAuthn, or Federated.
Authentication
type Description
Corporate User authenticates with on-premise SharePoint using either Windows NTLM or
Forms-based authentication with corporate credentials. User credentials can be
domain\username or just username, depending on how SharePoint is set up with
Windows domain authentication.
Office 365 User authenticates with Office 365 SharePoint using the authentication
mechanism supported by Office 365. User credentials map to the user’s account
on Office 365, or to the user’s AD credentials. If Office 365 has been integrated
with corporate AD, then user’s SharePoint credentials map to AD credentials.
NoAuthn User does not need to provide any credentials for authentication. Access to on-
premise SharePoint is set up with Kerberos Constrained Delegation (using
Standalone Sentry), or the SharePoint server supports anonymous access.
• Web View. (Only for iOS devices) For SharePoint sites, the device user can turn on Web View to be able to
view and navigate SharePoint folders in browser view.
Procedure
1. Go to Settings in Docs@Work.
2. Tap the Site Order option.
3. Tap one of the following options to Sort:
- Alphabetical Names: to sort by content site name.
- Creation Date: to sort by the date the content site was added to Docs@Work.
- Last Opened: to sort by when a content site was last opened.
4. Tap one of the following options to order the content sites:
- Ascending: to order alphabetically from A to Z or from the most recent to the oldest date and time.
- Descending: to order alphabetically from Z to A or from the oldest to the most recent date and time.
When you edit a Google document format, the changed document is saved in the corresponding Microsoft
document format to My Files. The original Google document is not changed.
Example: If you edit a Google Slides file, the changed Slides file is saved as a PowerPoint file to My Files. The
original Google Slides file remains unchanged.
• Delete files and folders in My Drive.
If document encryption is enabled for Google Drive content site, documents uploaded from Docs@Work to Google
Drive will be encrypted. Documents in the Google Drive site that are edited using Docs@Work will also be
encrypted. These documents will have the .midx suffix. Example: myfile.doc.midx.
A secure email client is required on the device. For iOS, the native email client is required.
The Email a Link and Copy Link to Clipboard options are available when you open the document.
SharePoint, Office 365 The recipient must have the correct permissions to view the document.
Docs@Work does not check if the recipient has the correct permissions when the
device user shares the link.
The URL is of the form:
https://sharepoint1.companyname.com/
Shared Documents/Architecture/document.docx
Dropbox Uses Dropbox APIs to create a public shareable link to the document.
The URL is of the form:
https://www.dropbox.com/folder/5lg6dgrv7m2c862/Getting%20Started.pdf?dl=0
Box Uses Box APIs to create a public shareable link to the document.
The URL is of the form:
https://app.box.com/folder/50rvf49stdhqsywoj8lx
WebDAV network drive The URL of the document corresponds to the WebDAV http or https URL.
or cloud storage
The URL is of the form:
https://webdavserver.documents.mydoc.docx.
Procedure
1. Tap to open a document.
3. Tap Email.
The document is downloaded and attached to a new email message.
NOTE: If attachment control is enabled to Open only with Docs@Work and protect with encryption, then
the attachment will have .secure or the .attachctrl suffix.
Email+ allows only a single file attachment and the file is attached to the email when you select the file.
The email client must be AppConnect enabled. For example: Email+, IBM Verse, SecurePIM and so on.
Since Office Web Apps are only supported with SharePoint, Docs@Work supports online editing only with
SharePoint folders. Office Web Apps must be enabled on the SharePoint server. If Office Web Apps are not
enabled, the edit icon will not be available when you tap to view documents.
Option Description
Save Tap to save the edited file with the same file name.
A local copy is created.
Save as Tap to specify a different file name for the edited file.
A local copy is created with the new file name.
5. Tap one of the options presented when you exit edit mode.
These options are only presented if you tapped on Save as or Export.
Option Description
Save this File Tap to save the edited file to the same location in the content repository.
Save a Copy Tap to specify a different location to save the edited file. The location could be in
the same content repository or different content repository.
The file in the original location is not changed.
• If saving to a different location fails, you will be presented with the option to download the document to My
Files.
• To save an edited document, you must also tap Exit. If you do not Exit from edit mode, changes to the edited
document will not be saved. If users try to open an email attachment while another document is open in edit
mode, they are provided with the option to discard changes to the opened document before viewing the
attachment.
Edit Online
On iPad devices, Docs@Work users may see an additional Edit Online option. The Edit Online option is available
only for .docx, .pptx, and .xlsx files on SharePoint sites that have Office Web Apps enabled. Tapping on the Edit
Online option takes the user to SharePoint Office Web Apps. The user can then edit the documents using Office
Web Apps.
Note that .key, .numbers., and .pages files are displayed with a .zip extension in Docs@Work. Also, .key,
.numbers, and .pages files with .zip extensions are not supported and cannot be extracted.
Procedure
1. Tap on the .zip file.
If the .zip file is in a content repository, the My Files pop-up window displays. If necessary, you can tap an
existing folder or tap Create Folder. Depending on your selection, the files are extracted into My Files, the
selected folder, or the newly created folder.
If the .zip file was already in My Files, a pop-up is not displayed. The file is automatically extracted to the same
location as the .zip file.
2. Tap Extract Here. (This step is only for a .zip file in a content repository.)
The .zip file and the extracted files are downloaded directly to My Files or to the folder in My Files that you
specified. The files are extracted into a folder with the same name as the .zip file.
NOTE: If the .zip file contains a single file, a folder is not created for the extracted file.
Procedure
1. In Docs@Work, tap My Files.
4. Tap Folder to create a new folder or tap one of the document types to create a new file.
Procedure
1. In Docs@Work, tap My Files.
4. Enter a new name for the file or folder and tap Rename.
Procedure
4. Select the file and folders to move, then tap the move icon .
Device users can select multiple files or folders to move.
5. Tap a folder, or tap Create Folder, or tap Move Here to move the selected files and folders to a different
location.
The Locate function allows the device user to quickly and easily navigate to the actual location of the file or folder.
Procedure
1. Download, upload, or move the file or folder.
Click on Sort Files in the menu, then select the method to sort.
Docs@Work checks for updates at the update interval set for the Published site and provides background
notification if there are any changes. If other processes are running on the device at the update interval, the check
by Docs@Work for updates might be delayed. Internet connectivity is required for Docs@Work to check for
Published site updates.
TABLE 1. BACKGROUND NOTIFICATION TYPES FOR PUBLISHED SITES
Single document updates Only one new or updated file is Docs@Work will be launched into the
available in any Published site foreground and start downloading the
new or updated file
Grouped document Multiple files were added or Docs@Work will be launched into the
updates modified in any Published sites foreground and start downloading the
new or updated files.
Please sign / published One of the Published sites requires Docs@Work will be launched into the
sites the user to enter their credentials foreground, start downloading files and
prompt the user for authentication
Published site updates A new Published site is added by Docs@Work will be launched into the
the administrator foreground, start downloading files for
the newly added Published site as well
as any newly added or updated files from
other Published sites
Procedure
1. Launch Docs@Work.
3. Tap Notifications.
4. Use the switch for the notification to either enable or disable the notification.
Procedure
1. In My Files, tap on ....
4. In the Add Media text box, enter a name for the image.
5. Tap on Add.
Procedure
1. In Docs@Work, tap to add a site.
2. Enter the SharePoint URL in the browse search box, and tap Go.
The URL should include the http:// or https:// prefix.
Depending on the authentication requirements, you might be asked to enter your corporate credentials.
Single Sign On
Single Sign On (SSO) for Docs@Work is supported. The device user registers with MobileIron Core using
Mobile@Work. Then, the device user can use Docs@Work to access content servers without having to enter any
further credentials.
To use SSO:
• The content server must support authentication using Kerberos.
• Docs@Work must use the AppTunnel feature, configured so that the Standalone Sentry uses Kerberos
Constrained Delegation (KCD) to authenticate the user to the content server.
• The content server must be either a Microsoft SharePoint server or IIS-based WebDAV content repository or
Apache-based content repository.
• When you configure the content site in the Docs@Work configuration setting, Authentication must be
unchecked.
Configuration-1: DISABLE_EDITING=true
Configuration-2: DISABLE_EDITING=false
Watermark text
The files and documents that are viewed or edited using Docs@Work are marked with a customized watermark.
Any string can be used to create the watermark. Use a user identifying variables as values such as, $USERID$
and $EMAIL$. These values will create watermark strings that are unique to each user.
Other features
Device users can do the following:
• Track changes in .doc and .docx files.