Mac in the Enterprise IT Configuration Guide

Total Page:16

File Type:pdf, Size:1020Kb

Mac in the Enterprise IT Configuration Guide ! ! ! ! ! ! ! Mac in the Enterprise IT Configuration Guide For Your Mac Evaluation and Deployment (Version 6.0) IT Configuration Guide—For Your Mac Evaluation and Deployment (Version 6.0) Table of Contents Introduction i 1 Packaging and Thin Imaging .................................................ii 1.1 Image Mac Computers iii 1.2 Create Packages iv 1.2.1 Create Packages Using Third-Party Utilities .............................................................v 1.3 Manage Local Images 6 1.3.1 Create Images with Disk Utility 7 1.3.2 Create a Disk Image from the Command Line ....................................................12 1.3.3 Deploy Images with Disk Utility 13 1.4 Network Images 14 1.4.1 Create a Bootable NetBoot Disk 15 1.4.2 Create NetInstall Images 19 1.4.3 Configure a NetInstall Server 22 1.4.4 Start Up to a NetInstall Image 26 1.4.5 Unicast Apple Software Restore 28 1.4.6 Multicast Apple Software Restore 29 1.4.7 Third-Party Deployment Solutions 31 1.5 Prepare Networks for Image Deployment .............................................................32 1.5.1 Set Clients to NetBoot Using the bless Command ............................................33 1.5.2 Use NetBoot DHCP Helpers 34 1.5.3 Relay bootpd 35 1.6 Minimal Touch Deployments 36 1.6.1 Streamlined Device Enrollment 37 2 Support and Maintenance 38 2.1 Use Asset Tags 39 2.2 Configure the OS X Server Caching Service .........................................................40 2.3 Configure the OS X Server Software Update Service .......................................42 2.3.1 Configure Software Update Server Clients ...........................................................44 2.3.2 Cascade Software Update Services 46 2.4 Leverage Third-Party Software Update Services .................................................48 2.5 Acquire Client Management Suites 49 3 Directory Services 50 3.1 Local Directory Services 51 3.1.1 Create Local Administrative Accounts ...................................................................53 3.1.1.1 Create Local Administrative Accounts in System Preferences ......................54 3.1.1.2 Create Local Administrative Accounts from the Command Line .................57 3.1.1.3 Change Local Administrative Accounts from the Command Line ..............59 3.1.2 Nest Network Administrators from Active Directory in a Local Administrative Group 60 3.1.3 Create Local Administrative Accounts with a Package or Script ................62 3.2 Active Directory 63 3.2.1 Bind to Active Directory 64 3.2.1.1 Bind to Active Directory Using Directory Utility .................................................65 !i IT Configuration Guide—For Your Mac Evaluation and Deployment (Version 6.0) 3.2.1.2 Bind to Active Directory with a Profile ....................................................................70 3.2.1.3 Bind to Active Directory from the Command Line ............................................76 3.2.1.4 Bind to Active Directory Using a Script .................................................................78 3.2.1.5 Bind to Active Directory Using a Post-Install Script ..........................................79 3.2.1.6 Active Directory Plug-in Troubleshooting Commands ...................................80 3.2.2 Set a User Home Directory 84 3.2.3 Namespace Support 89 3.2.4 Active Directory Packet Encryption Options ........................................................90 3.2.5 SSL Binding Instructions 91 3.2.6 Manage Certificates from the Command Line ....................................................93 3.2.7 Change Active Directory Computer Passwords ..................................................94 3.3 Third-Party Active Directory Plug-ins ......................................................................95 3.4 Kerberos 96 3.5 LDAP 97 3.6 Open Directory 98 3.7 Distributed File Sharing 99 3.7.1 Connect to DFS Shares 100 3.7.2 View DFS Shares with smbutil 101 3.7.3 Third-Party DFS Solutions 102 3.8 SMB2 Support 103 3.9 Smart Card Support 105 3.9.1 Third-Party Smart Card Service Options ..............................................................106 4 Configuration Management .............................................107 4.1 Configure a Profile Manager Server 108 4.1.1 Configure Network Settings 109 4.1.2 Configure Users 112 4.1.3 Add Groups 114 4.1.4 Review Certificates 116 4.1.5 Acquire Apple Push Notification Certificates .....................................................119 4.1.6 Enable Profile Manager 121 4.1.7 Automatic Push versus Manual Download Profiles ........................................125 4.1.8 Edit Management Profiles 126 4.1.9 Create Device Groups 130 4.1.10 Use Device Placeholders 133 4.1.11 Enroll OS X Devices 135 4.1.12 Lock a Device via the User Portal 139 4.1.13 Wipe a Device from the User Portal 141 4.1.14 Lock a Device Using Profile Manager ...................................................................143 4.1.15 Wipe a Device Using Profile Manager ..................................................................146 4.1.16 Remove a Mac from Management via the User Portal ..................................149 4.1.17 Remove Management via Profile Manager .........................................................151 4.1.18 Profile System Preferences 153 4.1.19 Non-Removable Configuration Profiles ...............................................................155 4.1.20 Restrict Access to System Preferences ..................................................................157 4.1.21 profiles Command 160 4.1.22 dscl Command 161 4.2 Manage Profiles 162 4.2.1 View the Contents of Profiles 163 4.2.2 Configure the Location of the Dock 164 4.2.3 Manage Third-Party Application Preferences .....................................................168 !ii IT Configuration Guide—For Your Mac Evaluation and Deployment (Version 6.0) 4.2.4 Manage Printers 172 4.2.5 Restrict Applications Using Profile Manager ......................................................176 4.2.6 Deploy VPN Connections Using Profile Manager .............................................181 4.2.7 Force Password Policies Using Profile Manager ................................................184 4.2.8 Configure Single Sign-On Using Profile Manager ............................................186 4.2.9 Limit Access to Sites Using Profile Manager .......................................................189 4.3 Password Policies 192 4.3.1 Audit Local Password Policies 193 4.3.2 Configure Local Password Policies 196 4.4 Use the Volume Purchase Program to Deploy Apps ......................................197 5 Security 198 5.1 Use Security Resources 199 5.2 Use Gatekeeper 200 5.2.1 Use Gatekeeper to Validate Application Downloads ......................................201 5.3 Enforce Firmware Passwords 204 5.4 Manage Remote Logins 205 5.5 Use Key-Based SSH Access 207 5.6 Use FileVault 2 209 5.6.1 Enable FileVault from the Command Line ...........................................................217 5.6.2 Use fdesetup to Validate Escrowed Recovery Keys ..........................................218 5.6.3 Enable FileVault on an External Volume ..............................................................220 5.6.4 Configure Master Passwords 222 5.6.5 Manage FileVault 2 Keys 224 5.7 Use Third-Party Full Disk Encryption .....................................................................228 5.8 Manage the Network Firewall 229 5.8.1 Use the Application-Layer Firewall 230 5.8.1.1 Configure the Application-Layer Firewall ............................................................231 5.8.1.2 Manage the Application-Layer Firewall from Terminal ..................................235 5.8.2 Use the pf Firewall 237 5.9 Manage Keychains 239 5.9.1 View Keychain Contents 241 5.9.2 Install Certificates Using Profile Manager ............................................................243 5.9.3 Enable Directory Services Searching for Certificates ......................................247 5.9.4 Enable Certificate Revocation Checking ..............................................................248 5.9.5 Import Items into a Keychain 250 5.9.6 Export Items from a Keychain 251 5.9.7 Configure iCloud Keychain 253 6 Networking/Wireless 255 6.1 Manage IPv4 Settings 256 6.2 Manage IPv6 Settings 266 6.3 Set Up Wired and Wireless Connections Using the Network Setup Assistant 269 6.4 Run Network Diagnostics 272 6.5 Configure Networking from the Command Line .............................................275 6.6 Configure VPN Settings 281 6.7 802.1x and Network Security Overview ..............................................................296 6.7.1 Configure WPA / TKIP — PSK 297 6.7.2 Configure WPA2 / AES — PSK 300 6.7.3 Create 802.1x Profiles 303 !iii IT Configuration Guide—For Your Mac Evaluation and Deployment (Version 6.0) 6.8 Import and Export 802.1x Profiles 309 6.9 Configure 802.1x to Join Corporate Networks ....................................................312 6.10 Obtain a Certificate from a Windows CA ..............................................................314 6.11 Trust Certificates from the Command Line ..........................................................317 6.12 Create Active Directory Certificates 318 7 Collaboration 322 7.1 Integrate with Microsoft Exchange 323 7.1.1 Use Mail, Contacts, and Calendar with Exchange ............................................324 7.1.2 Enable S/MIME in Mail 327 7.1.3 Enable Out-of-Office Responses in Mail ...............................................................328 7.1.4 Configure Exchange ActiveSync Certificate-Based
Recommended publications
  • Release Notes
    EgoSecure Full Disk Ecnryption Release Notes Version 14.4.941.3 29/01/2020 Release Notes EgoSecure Full Disk Encryption 14.4.941.3 Contents Introduction .................................................................................................. 3 System Requirements ................................................................................. 3 Hardware Requirements ........................................................................................................... 3 Software Requirements ............................................................................................................ 3 Installation & Usage .................................................................................... 4 Setup .......................................................................................................................................... 4 Administration ........................................................................................................................... 4 Support ......................................................................................................... 4 Hotline ........................................................................................................................................ 4 Online Resources ...................................................................................................................... 4 Release Notes .............................................................................................. 5 14.4.941.3 ..................................................................................................................................
    [Show full text]
  • Smart Card Fundamentals
    Module 1: Smart Card Fundamentals Smart Card Alliance Certified Smart Card Industry Professional Accreditation Program Smart Card Alliance © 2010 CSCIP Module 1- Fundamentals Final - Version 3 - October 8, 2010 1 For CSCIP Applicant Use Only About the Smart Card Alliance The Smart Card Alliance is a not-for-profit, multi-industry association working to stimulate the understanding, adoption, use and widespread application of smart card technology. Through specific projects such as education programs, market research, advocacy, industry relations and open forums, the Alliance keeps its members connected to industry leaders and innovative thought. The Alliance is the single industry voice for smart cards, leading industry discussion on the impact and value of smart cards in the U.S. and Latin America. For more information please visit http://www.smartcardalliance.org . Important note: The CSCIP training modules are only available to LEAP members who have applied and paid for CSCIP certification. The modules are for CSCIP applicants ONLY for use in preparing for the CSCIP exam. These documents may be downloaded and printed by the CSCIP applicant. Further reproduction or distribution of these modules in any form is forbidden. Copyright © 2010 Smart Card Alliance, Inc. All rights reserved. Reproduction or distribution of this publication in any form is forbidden without prior permission from the Smart Card Alliance. The Smart Card Alliance has used best efforts to ensure, but cannot guarantee, that the information described in this report is accurate as of the publication date. The Smart Card Alliance disclaims all warranties as to the accuracy, completeness or adequacy of information in this report.
    [Show full text]
  • How to Set up IP Camera by Using a Macintosh Computer
    EDIMAX COMPUTER INC. Edimax IP Camera series How to set up IP Camera by using a Macintosh computer 2011 Edimax Computer 3350 Scott Blvd., Building #15 Santa Clara, California 95054, USA Phone 408-496-1105 • Fax 408-980-1530 www.edimax.us How to setup Edimax IP Camera by a Macintosh computer Introduction The most important thing to setup IP Camera is to assign a static IP address so the camera can work with your network. So far the Edimax IP Cam Admin utility is Windows based only and the program can not work for Macintosh computers. Macintosh users can follow this guide to set up Edimax IP camera. Step 1. Understand the IP address used in your network. Have your Macintosh computer operate as usual. Go into System Preferences. In System Preferences, Go to Network. Select the adapter you are using. It could be an Airport card, a third- party Wireless card, or an Ethernet Adapter. Write down the IP address, subnet mask, Router, and DNS server address. We have a usb wireless card in this example. Its IP address 10.0.1.2 told us that the IP addresses used in the network are 10.0.1.x. All the devices in the network have the first three octets the same, but the last octet number must be different. We decide to give our new camera an IP address 10.0.1.100 because no other computer device use 10.0.1.100. We temporarily disconnect the wireless adapter. You can turn off your Airport adapter if you use it to get on Internet.
    [Show full text]
  • Deploying Ios and Tvos Devices Using Apple Configurator 2 and Jamf Pro
    Deploying iOS and tvOS Devices Using Apple Configurator 2 and Jamf Pro Technical Paper Jamf Pro 10.9.0 or Later 7 October 2020 © copyright 2002-2020 Jamf. All rights reserved. Jamf has made all efforts to ensure that this guide is accurate. Jamf 100 Washington Ave S Suite 1100 Minneapolis, MN 55401-2155 (612) 605-6625 Jamf, the Jamf Logo, JAMF SOFTWARE®, and the JAMF SOFTWARE Logo® are registered or common law trademarks of JAMF SOFTWARE, LLC in the U.S. and other countries. Apple, Apple Configurator 2, the Apple logo, Apple TV, iTunes, Mac, macOS, OS X, and tvOS are trademarks of Apple Inc., registered in the United States and other countries. IOS is a trademark or registered trademark of Cisco in the U.S. and other countries. All other product and service names mentioned herein are either registered trademarks or trademarks of their respective companies. Contents Contents 4 Introduction 4 What's in This Guide 4 Additional Resources 5 Choosing a Deployment Method 6 Supervision Identities 6 Use a Supervision Identity from Apple Configurator 2 7 Create and Use a Supervision Identity from Jamf Pro 8 Automated Enrollment 8 Requirements 8 Deploying Devices Using Automated Enrollment 11 Manual Enrollment with an Enrollment URL 11 Requirements 11 Deploy Devices Using Manual Enrollment with an Enrollment URL 13 Further Considerations 14 Manual Enrollment with an Enrollment Profile 14 Requirements 14 Create an Enrollment Profile 14 Create and Upload the Supervision Identity 14 Create the "Prepare" Blueprint 15 Create the "Enroll" Blueprint 15 Deploy Devices Using Manual Enrollment with an Enrollment Profile 3 Introduction What's in This Guide This guide provides step-by-step instructions for deploying iOS and tvOS devices using Apple Configurator 2 and Jamf Pro.
    [Show full text]
  • Deploying Ipad to Patients Setup Guide
    Deploying iPad to Patients Setup Guide Contents Overview Overview Healthcare institutions are increasingly focused on engaging patients and Getting Prepared delivering a great experience throughout their stay in hospital. Deploying iPad Evaluate your infrastructure with patient-centred apps enables hospitals to enhance each step of the patient Create a configuration journey, from admission to discharge. With third-party iOS apps, hospitals can Automate device setup empower patients to access their daily schedule, connect with their care team, Distribute apps track their progress, get educated on their treatment plan and personalise In-Room Storage their entertainment — putting patients at the centre of care. Initial setup This Setup Guide offers guidance to hospital IT staff who are configuring and Reset your device deploying iPad for patients to use. iPad can be preconfigured with minimal setup Centralised Storage so patients have access to iOS apps, and IT can use mobile device management Set up Apple Configurator (MDM) to protect patient data while also preserving a great user experience. Automate device refresh Once a patient has been discharged, iPad can be securely wiped, so all Install Apple Remote Desktop patient-generated data is removed, and reset to factory settings so it’s ready for the next patient to use. Summary A key decision when deploying iPad to patients is to choose between in-room versus centralised storage of the device (described in the In-Room Storage and Centralised Storage sections). In-room storage is enabled by over-the-air (OTA) wiping and resetting of iPad, which allows devices to stay in the patient room at all times.
    [Show full text]
  • Filenet Image Services Installation and Configuration Procedures
    IBM FileNet Image Services 4.1.2 Installation and Configuration Procedures SC19-2680-01 IBM FileNet Image Services 4.1.2 Installation and Configuration Procedures SC19-2680-01 Note Before using this information and the product it supports, read the information in .“Notices” on page 273 This edition applies to version 4.1.2 of IBM FileNet Image Services (product number 5724-R95) and to all subsequent releases and modifications until otherwise indicated in new editions. © Copyright International Business Machines Corporation 1984, 2008. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Table of Contents About this document. 15 Revision Log . 15 Typographical Conventions. 16 Accessing IBM FileNet documentation . 16 Feedback . 17 Documentation feedback . 17 Product consumability feedback. 17 Installation Checklists and Required Skills. 18 Installation Checklist for AIX Servers . 18 Installation Checklist for HP-UX Servers. 20 Installation Checklist for Solaris Servers. 21 Installation Checklist for Windows Servers. 22 Required Skills . 23 Installation Planning Considerations. 24 Hardware Requirements . 24 Server Memory . 24 Total Swap Space . 24 Total Disk Space . 25 Multicultural support . 25 Additional Requirements for AIX . 26 Additional Requirements for HP-UX . 26 Additional Requirements for Solaris . 28 Additional Requirements for Windows Server . 28 Software Requirements. 29 Server Naming Convention . 29 Object Name . 29 Domain Name . 29 Organization Name . 29 Image Services software image . 29 RDBMS software . 30 IBM DB2 RDBMS Software . 30 Oracle RDBMS Software (FileNet-controlled) . 30 Oracle RDBMS Software (Site-controlled) . 30 MS-SQL RDBMS Software . 30 Debugging Software . 30 Debugger - AIX . 30 Debugger - HP-UX .
    [Show full text]
  • Apple Configurator Presentation-Full
    The software and tools we use to deploy our iPads •We use Apple Configurator (AC) ! •Under 90 days Apple suggests AC instead MDM (Mobile Device Management) ! •We use Apple’s VPP (Volume Purchasing Program) to be able to buy multiple copies of apps and use redeemable codes to sync with AC Apple’s VPP program (how you deploy an app to many iPads as each needs to be paid for) • To put apps onto the iPads we use VPP (volume purchasing program) • VPP requires an Agent (Old name program Manager)- to enroll the college in the program. The Agent manages Administrators and an Administrator (old name Facilitator) can then Purchases apps • The Administrator ID needs to be clean (in other words a new Apple ID not associated with other accounts) • Agent can link a CC to the account and Administrator can use this to purchase apps (old way was a coupon through snail mail!) • From here you can shop for Apps like in the App Store but the difference is you are purchasing quantity. You do this through the VPP portal not iTunes App Store • Some developers give the education discount which is 50% off normal price for the purchase of 20 or more • You then download an XLS file and receive your list of codes • You open it and redeem one of the codes in the App Store. Go to “redeem” on right hand side of App Store. This effectively puts the App into iTunes on the computer that is running AC • Throw away the old XLS file and then download another XLS which refreshes the one code you’ve just burned to put the app into iTunes • Add the app to AC by either dragging it into AC under the Apps tab within either Prepare or Supervision tabs or adding through the “+” button at bottom of AC.
    [Show full text]
  • Mac OS X Server Administrator's Guide
    034-9285.S4AdminPDF 6/27/02 2:07 PM Page 1 Mac OS X Server Administrator’s Guide K Apple Computer, Inc. © 2002 Apple Computer, Inc. All rights reserved. Under the copyright laws, this publication may not be copied, in whole or in part, without the written consent of Apple. The Apple logo is a trademark of Apple Computer, Inc., registered in the U.S. and other countries. Use of the “keyboard” Apple logo (Option-Shift-K) for commercial purposes without the prior written consent of Apple may constitute trademark infringement and unfair competition in violation of federal and state laws. Apple, the Apple logo, AppleScript, AppleShare, AppleTalk, ColorSync, FireWire, Keychain, Mac, Macintosh, Power Macintosh, QuickTime, Sherlock, and WebObjects are trademarks of Apple Computer, Inc., registered in the U.S. and other countries. AirPort, Extensions Manager, Finder, iMac, and Power Mac are trademarks of Apple Computer, Inc. Adobe and PostScript are trademarks of Adobe Systems Incorporated. Java and all Java-based trademarks and logos are trademarks or registered trademarks of Sun Microsystems, Inc. in the U.S. and other countries. Netscape Navigator is a trademark of Netscape Communications Corporation. RealAudio is a trademark of Progressive Networks, Inc. © 1995–2001 The Apache Group. All rights reserved. UNIX is a registered trademark in the United States and other countries, licensed exclusively through X/Open Company, Ltd. 062-9285/7-26-02 LL9285.Book Page 3 Tuesday, June 25, 2002 3:59 PM Contents Preface How to Use This Guide 39 What’s Included
    [Show full text]
  • Daniel Nashed "CSI Domino" Diagnostic Collection & NSD Analysis
    "CSI Domino" Diagnostic Collection & NSD Analysis Daniel Nashed AdminCamp 2016 – Sept. 19-21 in Gelsenkirchen About the presenter ● Nash!Com – German IBM® Business Partner/ISV – Member of The Penumbra group -- an international consortium of selected Business Partners pooling their talent and resources ● Focused on Cross-Platform C-API, IBM® Domino® Infrastructure, Administration, Integration, Troubleshooting and IBM® Traveler – Platform Focus: Microsoft® Windows® 32/64, Linux® and IBM AIX® ● Author of the Domino on Linux®/UNIX® Start Script – Note: Working on RHEL7 + SLES 12 “systemd” support Agenda ● Introduction – What is „Serviceability“ ● Automatic Data Collection (ADC), Configuration Collector ● NSD, Memcheck – Server Crashes, Hangs, Annotation of NSDs ● Memory Management ● Advanced Methods – Semaphore Debugging – Memory Dumps ● Performance Troubleshooting ● Q&A – Any time Useful Software & Tools ● Software – Notes Peek – Lotus Notes Diagnostics (LND) – 7Zip – open source ZIP tool – Ultraedit (commerical but great) or Notepad++ (free) – NashCom Tools ● nshcrash ● Nshmem ● C-API Toolkit – Great source of information What is Serviceability? ● RAS = Reliability Availability Serviceability ● RAS is the effort to improve the Domino Product suite so that: – Client/Server doesn’t crash or hang as often (Reliability) – Client/Server performs well, Server is available to clients (Availability) – The ability to quickly pin-point and fix problems (Serviceability) ● Ongoing effort in each incremental release – Some features are even back-ported
    [Show full text]
  • Dropdmg 3.6.2 Manual
    DropDMG 3.6.2 Manual C-Command Software c-command.com February 16, 2021 Contents 1 Introduction 4 1.1 Feature List..............................................4 2 Installing and Updating 6 2.1 Requirements.............................................6 2.2 Installing DropDMG.........................................7 2.3 Updating From a Previous Version.................................7 2.4 Reinstalling a Fresh Copy......................................8 2.5 Uninstalling DropDMG.......................................9 2.6 Security & Privacy Access......................................9 3 Using DropDMG 13 3.1 Basics................................................. 13 3.2 Making a Bootable Device Image of a Hard Drive......................... 14 3.3 Backing Up Your Files to CD/DVD................................ 16 3.4 Burning Backups of CDs/DVDs................................... 17 3.5 Restoring Files and Disks...................................... 18 3.6 Making Images With Background Pictures............................. 19 3.7 Protecting Your Files With Encryption............................... 20 3.8 Transferring Files Securely...................................... 21 3.9 Sharing Licenses and Layouts.................................... 21 3.10 Splitting a File or Folder Into Pieces................................ 22 3.11 Creating a DropDMG Quick Action................................ 22 4 Menus 23 4.1 The DropDMG Menu........................................ 23 4.1.1 About DropDMG...................................... 23 4.1.2 Software
    [Show full text]
  • Tinkertool System 7 Reference Manual Ii
    Documentation 0642-1075/2 TinkerTool System 7 Reference Manual ii Version 7.5, August 24, 2021. US-English edition. MBS Documentation 0642-1075/2 © Copyright 2003 – 2021 by Marcel Bresink Software-Systeme Marcel Bresink Software-Systeme Ringstr. 21 56630 Kretz Germany All rights reserved. No part of this publication may be redistributed, translated in other languages, or transmitted, in any form or by any means, electronic, mechanical, recording, or otherwise, without the prior written permission of the publisher. This publication may contain examples of data used in daily business operations. To illustrate them as completely as possible, the examples include the names of individuals, companies, brands, and products. All of these names are fictitious and any similarity to the names and addresses used by an actual business enterprise is entirely coincidental. This publication could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the publication. The publisher may make improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time without notice. Make sure that you are using the correct edition of the publication for the level of the product. The version number can be found at the top of this page. Apple, macOS, iCloud, and FireWire are registered trademarks of Apple Inc. Intel is a registered trademark of Intel Corporation. UNIX is a registered trademark of The Open Group. Broadcom is a registered trademark of Broadcom, Inc. Amazon Web Services is a registered trademark of Amazon.com, Inc.
    [Show full text]
  • Best Practices for Integrating OS X with Active Directory
    Apple Technical White Paper Best Practices for Integrating OS X with Active Directory OS X Mountain Lion v10.8 Contents Introduction ........................................................................................................................3 How to Integrate OS X with Active Directory .......................................................4 Enterprise Integration Challenges .............................................................................7 Deployment Strategies ..................................................................................................9 Home Directories ..............................................................................................................10 Conclusion ...........................................................................................................................11 Appendix A: More Information ....................................................................................12 Appendix B: Third-Party Add-on Solutions ............................................................13 2 Apple Technical White Paper Best Practices for Integrating OS X with Active Directory Introduction Apple’s support for Active Directory within OS X enables Mac clients and servers to integrate smoothly into existing Active Directory environments, and provides the option of deploying a single, directory services infrastructure that can support both Mac and Windows clients. Apple’s Built-in Solution Large organizations have a need to manage user identities and access across a variety
    [Show full text]