Email Plusi OSGuide
Email Plusi OSGuide
Any reproduction or redistribution of part or all of these materials is strictly prohibited. Information in this publication
is subject to change without notice. MobileIron, Inc. does not warrant the use of this publication. For some phone
images, a third-party database and image library, Copyright © 2007-2009 Aeleeta's Art and Design Studio, is used.
This database and image library cannot be distributed separate from the MobileIron product.
“MobileIron,” the MobileIron logos and other trade names, trademarks or service marks of MobileIron, Inc.
appearing in this documentation are the property of MobileIron, Inc. This documentation contains additional trade
names, trademarks and service marks of others, which are the property of their respective owners. We do not
intend our use or display of other companies’ trade names, trademarks or service marks to imply a relationship
with, or endorsement or sponsorship of us by, these other companies.
The following provide an overview of the Email+ app for iOS devices:
• About Email+ for iOS
• Where to find Email+ for iOS
• About Email+ for iOS configuration
• What users can do in Email+ for iOS
Email+ for iOS is an AppConnect-enabled app. AppConnect is a MobileIron feature that containerizes apps to
protect content on iOS and Android devices. Each AppConnect app becomes a secure container whose content is
encrypted and, protected from unauthorized access. Because each user has multiple business apps, each app
container is also connected to other secure app containers. This connection allows the AppConnect apps to share
content. AppConnect apps are managed using policies configured in a MobileIron Enterprise Mobility Management
(EMM) platform. The EMM platform is either MobileIron Core or MobileIron Cloud.
As an AppConnect app, all Email+ content is secured. The app interacts with other apps according to the data loss
prevention policies that you specify. The app has the following secure features:
• Secure apps passcode: A secure apps passcode, if you require one, protects access to all secure apps. This
is the AppConnect passcode, which you define in MobileIron EMM. The AppConnect passcode provides an
additional layer of security for secure apps, beyond the device passcode.
• Data encryption: AppConnect encrypts all AppConnect-related data on the device, such as Email+ app data,
app configurations, and policies. This means app data is secure even if a device is compromised.
• Data loss prevention: You determine whether Email+ for iOS can use the iOS copy/paste or open-in features.
AppConnect data loss prevention policies control if users can copy/paste data out of Email+ and control how
email attachments can be shared with other apps via open-in.
For information about AppConnect features and configuration beyond Email+ for iOS, see the AppConnect and
AppTunnel Guide.
For supported versions see the MobileIron Email+ for iOS Release Notes.
A device user who launches Email+ for iOS without MobileIron’s EMM platform will be running Email+ for iOS as
an unsecured standalone app during a 30 day trial.
NOTE: If a device user has already launched Email+ for iOS as a standalone trial app, the device user must
uninstall and reinstall Email+ for iOS to use it as a secure AppConnect-enabled app.
NOTE: You do not configure a separate Exchange setting for the device as you do for other email apps. The
AppConnect app configuration provides the necessary information.
Procedure
1. In the Admin Portal, go to Apps > App Catalog.
2. From the Quick Import drop-down list, select iOS.
3. Enter MobileIron Email+ in the Application Name text box.
4. Click Search.
5. Select the app from the list that is displayed.
6. For MobileIron Email+, click Import.
7. Click OK on the pop-up message, and close the Quick Import dialog.
MobileIron Email+ is now listed in the App Catalog. Information included in the app, such as the name, is
automatically configured. All other settings, such as the App Category and whether the app is a free app, are
set to default settings.
TIP: To view and edit the settings for the app, click on the app name in the App Catalog.
8. Select the app to apply the app to a label:
a. Click Actions > Apply to Label.
b. Select the label that represents the iOS devices for which you want the selected app to be displayed.
c. Click Apply.
Next steps
Related topics
• For more information on adding iOS apps to the app distribution library, see “Working with apps for iOS
devices” in the Apps@Work Guide. See also, “Setting per app VPN priority” in the Apps@Work Guide.
• For information on creating a MobileIron Tunnel VPN setting, see the MobileIron Tunnel for iOS Guide for
Administrators.
Procedure
1. In the Admin Portal, go to Settings > System Settings.
2. Click Additional Products > Licensed Products.
3. Select AppConnect For Third-party And In-house Apps.
4. Click Save.
Next steps
Procedure
1. In the Admin Portal, go to Policies & Configs > Policies.
2. Select the Default AppConnect Global Policy and click Edit.
NOTE: If you create a new AppConnect Global Policy, you must apply it to the appropriate labels. You do
not need to apply the Default AppConnect Global Policy to a label.
Next steps
Related topics
For more information about the AppConnect Global policy, see the “Configuring the AppConnect global policy”
section in the AppConnect and AppTunnel Guide for detailed description of each field.
The AppConnect container policy authorizes an AppConnect app and specifies the data loss prevention settings.
The container policy overrides the corresponding settings in the AppConnect Global Policy.
NOTE: Make sure to apply only one AppConnect container policy for Email+ for iOS.
Procedure
1. In the Admin Portal, select Policy & Configs > Configurations.
2. Select Add New > AppConnect > Container Policy.
3. Enter a name for the policy.
4. Enter a description for the policy.
5. In the Application field, enter the bundle ID for the app:
[Link]
6. Configure the iOS data loss prevention policies according to your requirements.
7. Click Save.
8. Select the container policy.
9. Select More Actions > Apply To Label.
10. Select the labels to which you want to apply the policy.
11. Click Apply.
Next steps
The AppConnect app configuration for Email+ for iOS also includes the bundle ID for the app and key-value pairs
used to configure app settings.
IMPORTANT: Make sure to apply only one AppConnect app configuration for Email+ for iOS to each device.
NOTE: If you make a mistake in the configuration, the app shows a message to the device user indicating
an error in configuration.
Procedure
1. In the MobileIron Core Admin Portal, go to Policy & Configs > Configurations.
2. Click Add New > AppConnect > Configuration to create a new AppConnect configuration.
3. In the Name field, enter brief text that identifies this AppConnect app configuration.
Example: Email+ for iOS
4. In the Description field, enter additional text that clarifies the purpose of this AppConnect app configuration.
5. In the Application field, enter the bundle ID for the app:
[Link]
6. In the App-specific Configurations section enter the following required key-value pairs:
Key Value
email_ssl_required Enter true to secure communication using https to the server that you
specified in email_exchange_host. Otherwise, enter false.
Typically, set this field to true unless you are working in a test
environment.
7. Click Save.
When you save an app configuration with the bundle ID [Link], MobileIron Core
automatically applies the following key-value pairs to the app configuration:
- email_exchange_username with value $USERID$
- email_device_id with value $DEVICE_UUID_NO_DASHES$
- email_address with value $EMAIL$
Email+ for iOS synchronizes all emails, contacts, calendar, and task items with the ActiveSync server when the
device user first launches Email+ for iOS. It also does a full synchronization if you change the values of the
following keys in the app configuration:
• email_address
• email_exchange_host
• email_exchange_username
After you have changed one of these values, the full synchronization occurs the next time Email+ for iOS receives
the updated app configuration. Email+ for iOS receives the update the next time it runs after the AppConnect app
checkin interval has expired.
WARNING: The first Email+ for iOS synchronization with the ActiveSync server may require considerable time
and bandwidth, as does changing the values of the keys mentioned here.
Administrators can customize Email+ app behavior by configuring key-value pairs in the App-specific
Configurations section of AppConnect app configuration for Email+ for iOS. These key-value pairs define app
behavior such as providing detailed notifications to device users and export contacts from Email+. See “Additional
configurations using key-value pairs” on page 20 for the complete list of custom key-value pairs.
Therefore, when using secure email apps, you typically configure Standalone Sentry to use the email attachment
control setting called Open With Secure Email App.
Procedure
1. Go to Settings > Sentry in the MobileIron Core Admin Portal.
2. Select the Standalone Sentry that handles email for the devices.
3. Click the edit icon.
4. In the section Attachment Control Configuration, select Enable Attachment Control.
5. For iOS And Android Using Secure Email Apps, select Open With Secure Email App.
6. Click Save.
Related topics
• For more information about email attachment control, see the MobileIron Sentry Guide for MobileIron Core.
As with badge notifications, updates are determined by comparing the version number of the installed app with that
of the update.
NOTE: The notification feature applies only to apps designated as Featured apps.
Procedure
1. In the Admin Portal, go to Apps > App Distribution Library.
2. Select iOS from the Select Platform list.
3. Select the featured app you want to work with.
4. Click Message.
FIGURE 3. SEND APP INSTALLATION REQUEST
Item Description
Send request for new Prompts the device user to install the app if it is not already installed.
installations
Send request for updates Prompts the device user to update the app if it is not already updated.
Send request for both new Prompts the device user to install or update the app.
installations and updates
Use iOS managed app Ignore the Apps@Work display and immediately install or update the app.
install/update action
Following are the main steps for configuring Email+ for iOS on MobileIron Cloud:
1. Adding Email+ for iOS on MobileIron Cloud
2. Configuring Email+ for iOS on MobileIron Cloud
Procedure
1. In MobileIron Cloud, go to Apps > App Catalog > +Add.
2. In Business Apps, click Email+ (iOS).
3. Make any updates as necessary and click Next
You can change the category and add a description.
4. Choose a distribution option for the app and click Next.
5. Update the default install settings or add install settings as necessary.
6. Update the promotion settings or add promotion settings as necessary.
7. For Email+ configuration, click + to add an Email+ configuration.
Next steps
• “Configuring Email+ for iOS on MobileIron Cloud” on page 15.
NOTE: Make sure that only one Email+ for iOS configuration is distributed to a device.
NOTE: If you make a mistake in the configuration, the app shows a message to the device user indicating
an error in configuration.
Procedure
1. In the MobileIron Email+ configuration, enter a name for the configuration.
2. Configure the Email+ settings as needed.
3. Add any custom configurations for the app in AppConnect App Configurations.
4. Add any certificates that are required.
5. Choose a distribution option for the configuration and click Done.
The configuration is distributed to the subset of the devices to which the app is distributed.
Related topics
• See “Email+ configuration field description (Cloud)” on page 17 for a description of the fields.
• See “Additional configurations using key-value pairs” on page 20 for a complete list of custom key-value pairs.
• See the Certificates and S/MIME sections in “Additional configurations using key-value pairs” on page 20.
After importing Email+ for iOS into the app distribution library, the app appears in Apps@Work on the device. Tap
the entry for Email+ and follow the prompts to install the app.
Item Description
Email Password Enter the user’s password for the ActiveSync server. If you provide a
password, Email+ for iOS does not prompt the device user for the
password.
You can use the variable ${PASSWORD}
Exchange Host (Required) Enter the fully qualified domain name of the ActiveSync server or the
external hostname or IP address for Standalone Sentry.
Minimum Characters for GAL Enter the minimum number of characters for Email+ for iOS to use for
Search automatic Global Address List (GAL) lookup in Mail and Contacts.
When the device user enters the specified number of characters of a
particular name, Email+ for iOS searches the GAL and presents any
matches to the device user.
NOTE: To enable GAL search, you must set the minimum number of
characters for GAL search in your Microsoft Exchange server
to the same value you set for this Email+ for iOS key.
The default is 4.
Item Description
App Identity Certificate Select the App Identity Certificate created for Sentry. This field is
required only if you are deploying Standalone Sentry that uses an identity
certificate for device authentication.
Trust All Certificates Check if you want Email+ for iOS to automatically accept untrusted
certificates.
Typically, you select the check box only if you are working in a test
environment.
Prompt for Password Before Check if Email+ for iOS should prompt the user for the email password
Connecting to Server before attempting to connect to the email server. When it first launches
and connects to the email server, Email+ for iOS provides the user’s
email password to the email server.
If the field is unchecked, when Email+ for iOS first launches and
connects to the email server, it does not provide the device user’s email
password to the server. After establishing a connection with the email
server, Email+ for iOS prompts the user for an email password. If the
email server limits the number of password attempts, it counts the
connection as one failed attempt.
MobileIron recommends checking this field if the email server allows only
a small number of password attempts. For example, if the email server
allows only three login attempts, setting this value to true means the
device user gets three login attempts as specified by the email server.
IBM Lotus Notes Traveler Check if your email server is IBM Lotus Notes Traveler.
Allow Detailed Notifications Check if you want Email+ for iOS to show the device user detailed
(Required) notifications. The details can include sensitive information such as email
subject, or event titles and times.
Show Pictures by Default Check to enable the Show Pictures option. Device users automatically
see images when opening an email.
Device users can override the value you configure by toggling the Show
Pictures option on or off.
NOTE: When changing the value of this key, Email+ does not
change the Show Pictures option until after completing a full
synchronization. A full synchronization occurs only when you
change certain fundamental key-value pairs, like
email_address, or when the device user uninstalls and reinstalls
Email+ for iOS.
Item Description
Allow Export Contacts Check if you want to allow Email+ for iOS users to export Email+ for iOS
contacts to an Email+ for iOS contacts group on the personal side of the
device. Otherwise, enter false.
When device users export Email+ contacts, device users can see the
caller ID of incoming calls from phone numbers in the list of corporate
contacts. Third-party apps can also access the corporate contacts.
Limit Contact Export to Name Check to limit export of Email+ contacts to only the name and number of
and Number only the contacts.
This option is available only if Allow Export Contacts is checked.
Allow Logging Check if you want Email+ to log data to the device console, and allow the
log file to be attached to a feedback email.
This option is useful for problem diagnosis.
Allow Send Feedback Enter the email address to which app feedback is to be delivered.
Use this key to send Email+ for iOS log messages to a particular email
address.
The following describe how to customize Email+ for iOS app behavior:
• Key-value pairs for customizing Email+ for iOS
• S/MIME support in Email+ for iOS
• Background email checks and user notifications
• Configuring Web@Work for iOS to open mailto links in Email+ for iOS
• Allow copy from Email+ for iOS to other AppConnect apps only
TIP: Key-value pairs marked as Core only are not applicable to MobileIron Cloud. For MobileIron Cloud
deployments, these key-value pairs are either provided as fields in MobileIron Cloud or are set
automatically and do not require action from the administrator. See “Email+ configuration field
description (Cloud)” on page 17 for a description of the fields in MobileIron Cloud.
NOTE: Some values can use MobileIron Core variables, such as $EMAIL$. MobileIron Core substitutes the
device user’s value when sending the app configuration to the device.
You can configure and customize the following features with key-value pairs:
• Required key-value pairs
• Background email check and user notifications
• Certificates
• S/MIME
• Manage contacts
• Syncing
• Maximum size for email
• Email attachments
• Open links in a browser
• Default signature
• IBM Lotus Notes Traveler
• SSL
• GAL search
• Prompt the device user for password
• Keyboard extension
TABLE 1. KEY-VALUE PAIRS FOR CONFIGURING EMAIL+ FOR IOS APP BEHAVIOR
Value: Enter/
Key Select one Description
email_address Email address Typically, this field uses the MobileIron Core variable
(Core only) of the device $EMAIL$.
user
You can also use combinations of these MobileIron Core
variables, depending on your ActiveSync server requirements:
$USERID$, $USER_CUSTOM1$,
$USER_CUSTOM2$, $USER_CUSTOM3$,
$USER_CUSTOM4$.
email_exchange_host FQDN of the The fully qualified domain name of the ActiveSync server. If
ActiveSync you are using a Standalone Sentry, enter the fully qualified
(Core only)
server or domain name (FQDN) of Standalone Sentry.
Standalone
Example:
Sentry
[Link]
TABLE 1. KEY-VALUE PAIRS FOR CONFIGURING EMAIL+ FOR IOS APP BEHAVIOR
Value: Enter/
Key Select one Description
email_exchange_username User ID for the The user ID for the ActiveSync server.
ActiveSync
(Core only) Typically, you use the MobileIron Core variable
server
$USERID$.
If your ActiveSync server requires a domain, use <domain
name>\$USERID$. For example: mydomain\$USERID$.
You can also use combinations of these MobileIron Core
variables, depending on your ActiveSync server requirements:
$EMAIL$,
$USER_CUSTOM1$, $USER_CUSTOM2$, $USER_CUSTOM3$,
$USER_CUSTOM4$.
allow_detailed_notifications • true true: Device user sees detailed notifications. The details can
• false include sensitive information such as email subject, or event
(Core only)
titles and times.
false: Notifications do not include any details.
Default if key-value is not configured: false.
Certificates
allow_device_keychain • true true: Email+ stores the decryption key received from the EMM
• false client in the device keychain. This allows Email+ to access its
credentials and check email when iOS launches it in the
background, thus improving background email notifications.
false: The AppConnect content decryption key is not stored on
the device.
MobileIron recommends that customers set this to true in
conjunction with a strong device passcode. For more
information see “Background email checks and user
notifications” on page 39.
Default if key-value is not configured: false
TABLE 1. KEY-VALUE PAIRS FOR CONFIGURING EMAIL+ FOR IOS APP BEHAVIOR
Value: Enter/
Key Select one Description
email_login_certificate From the The device uses the certificate for authentication.
dropdown list
(Core only) See the MobileIron Core Device Management Guide for your
deivce platform for information on configuring Certificate
Enrollment settings.
If the certificate is password-encoded, MobileIron Core
automatically also sends another key,
email_login_certificate_MI_CERT_PW, with the password as
the certificate’s value.
This key is required if Sentry is configured to require
certificates.
Default if key-value is not configured: Certificates are not
used.
TABLE 1. KEY-VALUE PAIRS FOR CONFIGURING EMAIL+ FOR IOS APP BEHAVIOR
Value: Enter/
Key Select one Description
email_certificate_X From the You can designate up to ten certificate authority (CA) root
dropdown list certificates as trusted. Email+ imports the certificate into its
where X is 1 through 10
keychain of trusted certificates, and trusts any certificates
derived from the CA root certificate in its keychain.
Designating a CA root certificate as trusted is necessary for
the following:
• You have configured device authentication in
Standalone Sentry to require a certificate whose certificate
authority is not a trusted CA.
A common scenario for this case is if you are using a self-
signed certificate or a certificate that is not derived from a
well-known certificate authority.
NOTE: You specify this certificate to Email+ in the key
email_login_certificate. It corresponds to the
certificate you specified for device
authentication in Standalone Sentry
configuration in the MobileIron Core Admin
Portal.
• You have configured certificates for encrypting or signing
S/MIME emails and these certificates are self-signed or
not derived from a well-known certificate authority.
NOTE: You specify these certificates in the keys
email_encryption_certificate and
email_signing_certificate.
S/MIME
email_encryption_certificate From the Specifies the certificate to use for encrypting S/MIME emails.
dropdown list
The MobileIron EMM sends the contents of the certificate as
the value.
Email+ imports the key into the keystore and selects the
certificate as the encryption certificate.
If you change the certificate, Email+ imports the new
certificate into the keychain and selects the new certificate as
the encryption certificate. It leaves the previous certificate in
the keychain.
If you delete the key-value pair, Email+ leaves the certificate in
the keychain, while changing its settings to specify that no
certificate is selected as the encryption certificate.
For more information about configuring S/MIME for Email+ for
iOS, see “S/MIME support in Email+ for iOS” on page 37.
Default if key-value is not configured: Certificate is not
configured.
TABLE 1. KEY-VALUE PAIRS FOR CONFIGURING EMAIL+ FOR IOS APP BEHAVIOR
Value: Enter/
Key Select one Description
email_signing_certificate From the Specifies the certificate to use for signing S/MIME emails.
dropdown list
The MobileIron EMM sends the contents of the certificate as
the value.
Email+ imports the key into the keychain and selects the
certificate as the signing certificate.
If you change the certificate, Email+ imports the new
certificate into the keychain and selects the new certificate as
the signing certificate. It leaves the previous certificate in the
keychain.
If you delete the key-value pair, Email+ leaves the certificate in
the keychain and changes its settings to specify that no
certificate is selected as the signing certificate.
For more information about configuring S/MIME for Email+ for
iOS, see “S/MIME support in Email+ for iOS” on page 37.
Default if key-value is not configured: Certificate is not
configured.
Manage contacts
TABLE 1. KEY-VALUE PAIRS FOR CONFIGURING EMAIL+ FOR IOS APP BEHAVIOR
Value: Enter/
Key Select one Description
email_safe_domains A comma- Ensure that there are no spaces before or after the comma. A
separated list wildcard in the domain name is supported. The only format
of safe supported for domain names with a wildcard is
domains *.[Link]. Entering * only will make all domains
safe.
Email addresses not in the safe domain list are displayed in
red color in Email+.
This configuration minimizes the risk that a user will
accidentally send internal emails to external email addresses.
You may want to use this key-value pair:
• if your company policy requires this risk mitigation step.
• if your company has multiple domains and you want to
identify your company’s domains as opposed to domains
that are not your company domains.
Example:
[Link],[Link],[Link]
Default if key-value is not configured: Only the domain of the
email account is safe.
TABLE 1. KEY-VALUE PAIRS FOR CONFIGURING EMAIL+ FOR IOS APP BEHAVIOR
Value: Enter/
Key Select one Description
Syncing
email_max_sync_period • 0 Controls the maximum number of days for which emails are
• 1 synced:
• 2 • 0 = Download all emails.
• 3 • 1 = Download emails received over the last day.
• 4 • 2 = Download emails received over the last 3 days.
• 5 • 3 = Download emails received over the last week.
• 4 = Download emails received over the last 2 weeks.
• 5 = Download emails received over the past month.
MobileIron does not recommend setting the value as 0, as
downloading all emails could take a very long time, and take
up too much space on the device.
Device users can change the interval to a value less than the
default maximum. This feature is useful for regulatory
purposes, if an organization requires device users to have no
more than n days of emails on their devices.
email_default_sync_period • 1 Controls the default time interval for which emails are
• 2 downloaded:
• 3 • 1 = Download emails received over the last day.
• 4 • 2 = Download emails received over the last 3 days.
• 5 • 3 = Download emails received over the last week.
• 4 = Download emails received over the last 2 weeks.
• 5 = Download emails received over the past month.
TABLE 1. KEY-VALUE PAIRS FOR CONFIGURING EMAIL+ FOR IOS APP BEHAVIOR
Value: Enter/
Key Select one Description
email_max_body_size A number Specifies the maximum size in megabytes permitted for each
email that is received.
Email attachments
email_max_attachment A number Specifies the maximum size in megabytes permitted for each
email attachment for incoming emails. The key-value pair is
applied to incoming emails only.
TABLE 1. KEY-VALUE PAIRS FOR CONFIGURING EMAIL+ FOR IOS APP BEHAVIOR
Value: Enter/
Key Select one Description
Links in Email+ are opened by default in Web@Work. If Web@Work is not installed on the device, Email+ for iOS
displays an error. However, administrators can specify the default browser to use when device users click links in
Email+.
Administrators can configure the default browser to be used for both HTTP and HTTPS links, using customized URL
schemes. This allows finer control over the browser used to open HTTP and HTTPS links, respectively. Additionally,
this key can be used to configure a customized browser as the one that launches when a device user clicks a link in
Email+.
allow_safari_browser • true true: Allows Email+ to open URLs (included, for example, in
(Core only) • false an email) in Safari.
TABLE 1. KEY-VALUE PAIRS FOR CONFIGURING EMAIL+ FOR IOS APP BEHAVIOR
Value: Enter/
Key Select one Description
Default signature
email_default_signature The default The value of this key is the default email signature for all
(Core only) email signature emails. However, the device user can define the default email
signature at any time, overriding this key’s value. After the
user defines the default email signature, Email+ does not use
the value in the key, even if you update it.
Default if no key-value is configured: empty string
email_enable_lotus • true Enter true only if your email server is IBM Lotus Notes
(Core only) • false Traveler.
Default if key-value is not configured: false
SSL
TABLE 1. KEY-VALUE PAIRS FOR CONFIGURING EMAIL+ FOR IOS APP BEHAVIOR
Value: Enter/
Key Select one Description
GAL search
gal_search_minimum_characters A number The minimum number of characters Email+ uses for automatic
(Core only) Global Address List (GAL) lookup in Mail and Contacts.
When device users enter the specified number of characters
of a name, Email+ searches the GAL and presents the
matches that it finds.
gal_search_display_name • true true: Enables Display Name in Email+ Settings > Contacts
• false by default.
false: Disables Display Name in Email+ Settings > Contacts
by default.
Default if key-value is not configured: true
contacts_display_order • first_last Sets the default display order for contact names in search
• last_first results. Device users can change the display order in Email+
in Settings > Contacts.
The values are case sensitive; enter in lower case.
first_last: Contact names in search results are displayed with
first name followed by the last name.
last_first: Contact names in search results are displayed with
last name followed by the first name.
Default if key-value is not configured: first_last.
TABLE 1. KEY-VALUE PAIRS FOR CONFIGURING EMAIL+ FOR IOS APP BEHAVIOR
Value: Enter/
Key Select one Description
prompt_email_password • true true: Email+ prompts the user for the email password before
(Core only) • false attempting to connect to the email server. When Email+ first
launches and connects to the email server, Email+ provides
the user’s email password to the email server.
false: When Email+ first launches and connects to the email
server, it does not provide the device user’s email password to
the server. After establishing a connection with the email
server, Email+ prompts the user for an email password. If the
email server limits the number of password attempts, it counts
the connection as one failed attempt.
Set the value of this key to true if the email server allows only
a small number of password attempts. Example: It he email
server allows only three attempts, setting this value to true
ensures that device users get three attempts, not two
attempts.
Default if key-value is not configured: false
email_password User’s If configured, Email+ does not prompt user s for a password.
(Core only) password for
You can use the MobileIron Core variable $PASSWORD$ if you
the ActiveSync
have checked Save User Password in Settings >
server
Preferences. MobileIron Core then passes the user’s
password as the value to the device.
TABLE 1. KEY-VALUE PAIRS FOR CONFIGURING EMAIL+ FOR IOS APP BEHAVIOR
Value: Enter/
Key Select one Description
Keyboard extension
show_pictures_default • true true: Enables the Show Pictures option. Device users
(Core only) • false automatically see images when opening an email.
false: Disables the Show Pictures option. Device users must
tap Show Pictures to view images when opening an email.
Device users can override the value you configure by toggling
the Show Pictures option on or off.
Photo library
allow_photo_library_access • true • true: Users can attach photos and video files from their
• false personal photo library on the device.
• false: Disables access to the personal photo library,
including video files, from Email+. Device users cannot
attach photos or videos from their personal photo library.
However, users can take new photos or videos directly
from the email they are composing in Email+ and attach to
the email.
This feature allows administrators to clearly separate work-
related and personal content on device.
Default if key-value is not configured: true.
TABLE 1. KEY-VALUE PAIRS FOR CONFIGURING EMAIL+ FOR IOS APP BEHAVIOR
Value: Enter/
Key Select one Description
Calendar customization
calendar_reset_view_threshold A number Sets the inactivity threshold after which the calendar view is
reset to the default view.
The inactivity threshold is measured in seconds.
If the device screen is auto-locked or the app is in background
for more than the configured time, the default view is loaded
when users launch Calendar.
Default if key-value is not configured: 120 seconds.
TABLE 1. KEY-VALUE PAIRS FOR CONFIGURING EMAIL+ FOR IOS APP BEHAVIOR
Value: Enter/
Key Select one Description
Notes customization
allow_notes_title • true true: Email+ users are presented with a separate title field to
• false add a title to a note.
false: A separate title field for a notes is not available, instead,
the first line of the note is used as a title.
Default if key-value is not configured: false.
default_network_timeout A positive Sets the app’s default timeout for all ActiveSync network
integer requests. The value is measured in seconds.
Example: 30. In this example, for ActiveSync network
requests, Email+ will timeout after 30 seconds.
Default if key-value is not configured: 90 seconds
App feedback
feedback_email_address An email Device user app feedback and log messages are sent to the
(Core only) address email address.
Default if key-value is not configured: App feedback is not
available to Email+ users.
Troubleshooting
allow_logging • true true: Email+ logs data to the device console, and allows the
(Core only) • false log file to be attached to a feedback email. Entering true is
useful for problem diagnosis.
Default if key-value is not configured: false.
TABLE 1. KEY-VALUE PAIRS FOR CONFIGURING EMAIL+ FOR IOS APP BEHAVIOR
Value: Enter/
Key Select one Description
exit_on_configuration_error • true • true: Email+ simply shuts down without any notification if
• false there is an error in the Email+ configuration that is pushed
to the device.
• false: If Email+ encounters an error in the configuration,
device users are provided with the option to email the
Email+ logs. The Email+ logs are helpful in debugging
configuration errors.
NOTE: Not all configuration errors are considered
critical.
Example: A missing S/MIME signing or encryption
certificate is not considered a critical error.
Default if key-value is not configured: true
enable_calendar_dump • true • true: Enables calendar dump to Email+ feedback logs for
• false troubleshooting. Calendar data is encrypted.
• false: Disables calendar dump to Email+ feedback logs.
Default if key-value is not configured: false
Miscellaneous
Using S/MIME requires a user certificate on the device running Email+ for iOS. You can import encryption
certificates in one of two ways:
• Pushing S/MIME certificates from MobileIron Core
OR
• Importing S/MIME certificates to the device through email
See the “Enabling per-message S/MIME for iOS” section in the MobileIron Device Management Guide for iOS
device to set up the encryption and signing certificates for S/MIME.
The key-value pairs define the encryption and signing certificates to be used in Email+. The value for each key is
the certificate enrollment setting you created. You enter the key-value pairs in the AppConnect app configuration
you created for Email+ for iOS.
Procedure
1. In the MobileIron Core Admin Portal, go to Policy & Configs > Configurations.
2. Select the app configuration you created in “Creating an AppConnect app configuration for Email+” on page 11.
3. Click Edit.
4. Add the following key-value pairs in the App-specific Configurations section:
- email_encryption_certificate: This key specifies the certificate to use for encrypting S/MIME emails.
Select the SCEP setting you want to use from the dropdown list.
- email_signing_certificate: This key specifies the certificate to use for signing S/MIME emails. Select the
SCEP setting you want to use from the dropdown list.
Procedure
1. Set up certificates.
Create a Certificate or Identity Certificate setting from Configurations > +Add.
Before creating an Identity Certificate, you must have also added a certificate authority in Admin >
Certificate Authority. See MobileIron Cloud Help for information about setting up certificates in
MobileIron Cloud.
2. Configure the S/MIME key-value pairs in the Email+ configuration.
The key-value pairs define the encryption and signing certificates to be used in Email+ for iOS. The value for
each key is the certificate setting you created in Step 1.
Related topics
See the “key-value pairs for configuring Email+ for iOS app behavior” on page 21, for the S/MIME key-value pairs
for the encryption and signing certificates.
Procedure
1. Device users email themselves the certificate they use for S/MIME as an attachment.
The certificate must be sent as a PFX file.
2. Open the email using Email+ for iOS on the device
3. Tap to open the attachment.
Email+ for iOS prompts the user for the certificate password.
4. Enter the certificate password.
Email+ for iOS imports the certificate into its keychain.
5. Enable S/MIME signing and encryption in the mail settings in Email+ for iOS.
a. In Email+ for iOS, tap Settings > Mail.
b. Tap Security.
c. Tap Sign. The user’s signing certificate is automatically selected.
Users may optionally tap Always Sign to always sign emails with their certificate, and Sign As Clear Text.
d. Tap Encrypt. The user’s signing certificate is automatically selected.
Users may optionally tap Always Encrypt to encrypt every email they send through Email+ for iOS.
When Email+ is in the background and attempts to check email, as an AppConnect app that encrypts its content,
Email+ must retrieve its encryption key from the EMM client. This requires an app flip to The EMM client, which
cannot happen in the background. As a result, Email+ cannot retrieve the encryption key and therefore cannot
check for new email.
To allow Email+ access to the encryption key even when it is in background, configure the allow_device_keychain
key-value pair to allow Email+ to store the key in the device keychain. This allows Email+ to check for new email
even when iOS launches it in the background.
NOTE: The allow_device_keychain key-value pair should only be used with a strong device passcode so as to
secure the decryption key.
user launches Email+ checks for new email and notifies the user of allows Email+ for iOS to run
new email as usual
app is in the background occasionally checks for new email and notifies might do a periodic
the user, depending on iOS background background refresh
refresh
Procedure
1. Select the Web@Work configuration in your EMM and click Edit.
- In the MobileIron Core Admin Portal, go to Policies & Configs > Configurations.
- In MobileIron Cloud, go to Apps.
2. For custom configurations, click Add to add a key-value pair.
3. Add the key mailto_prefix, and assign any of the following values:
Review your AppConnect for iOS DLP settings for copy/paste for Email+ for iOS. Ask these questions depending
on your current setting:
Copy/Paste To is not • Would your security needs still be met if you allowed copying only to other
allowed for Email+ for AppConnect apps, but not to all other apps?
iOS. • Does Email+ for iOS have content that a device user would want to copy to
another AppConnect app?
If you answered yes to these questions, change the Copy/Paste To setting for
Email+ for iOS to allow copying only to other AppConnect apps.
Copy/Paste To is • Would your security needs be better met by limiting copying only to other
allowed for Email+ for AppConnect apps, instead of all other apps?
iOS to all other apps. • Would the user feel limited if copying is allowed only to other AppConnect apps?
If so, is the more limited user experience, but tighter content security the right
trade-off for your needs?
If you answered yes to these questions, change the Copy/Paste To setting for
Email+ for iOS to allow copying only to other AppConnect apps.
Data loss prevention policies for Email+ for iOS are configured on the MobileIron Core Admin Portal in one of the
following places:
• the AppConnect container policy for Email+ for iOS
See “Configuring the AppConnect container policy” on page 11
• the AppConnect global policy if you allow apps to be authorized without an AppConnect container policy and
have no AppConnect container policy for Email+ for iOS.
See “Configuring the AppConnect global policy” on page 9
The device user can also see the Copy/Paste To data loss protection policy setting in Mobile@Work at Settings >
Secure Apps > Email+.
These sections provide information on how to configure real-time push notifications. With real-time push
notifications, notifications appear on the device as soon as a new email arrives on the Exchange server.
• About real-time push notifications for Email+ for iOS
• Standalone Sentry setup for real-time push notifications
• Deployment use cases for real-time push notifications
• Before you configure real-time push notifications
• Overview of configuration on MobileIron Core
• Description of configurations in MobileIron Core
• Overview of configuration on MobileIron Cloud
• Description of configurations in MobileIron Cloud
• Keys for real-time and interval-based push notifications (Core and Cloud)
• Verifying that the cloud notification service is working
• Using Kerberos Constrained Delegation with Email+ for real time notifications
You can also set up push notifications at specified intervals (interval-based) as opposed to real-time push
notifications. With interval-based push notifications the notification interval is configurable by the administrator. For
information on how to configure interval-based push notifications for MobileIron Core deployments, see MobileIron
Cloud Notification Service for Email+ for iOS at [Link]
The MobileIron cloud notification service (CNS) is a cloud-based service hosted on Amazon Web Services (AWS)
that provides real-time push notifications for Email+ for iOS users by using Microsoft’s Exchange Web Services
(EWS), Amazon’s SNS service, and Apple Push Notification Service (APNs).
• Need for a notification service
• How the notification service works
unlimited period of time in the background. Therefore, even though both native mail and Email+ use the ActiveSync
protocol, only the native mail app can get real-time notifications.
The MobileIron cloud-based notification service (CNS) addresses this limitation by using the Apple APNS push
notification service to notify users about new emails even when Email+ is running in the background on iOS
devices. New emails also include calendar invites.
No sensitive user data or email content is transferred from Exchange to CNS. No corporate data or user identity
information is stored on CNS, thus making the notification service safe and secure. Only the following information
is sent from EWS to CNS:
• The unique EWS subscription ID of the user.
• Watermark to avoid duplicate notifications.
• The folder ID of the sub folder from which the new email originated.
The notification service is configured via the MobileIron enterprise mobility management (EMM) platform using
key-value pairs added to the AppConnect app configuration for Email+ for iOS.
FIGURE 1. REAL TIME PUSH NOTIFICATION ARCHITECTURE
1. Subscription workflow:
a. Device registers with Apple APNs.
Certificate, NTLM Yes Setup per app VPN with MobileIron Tunnel.
ActiveSync + Yes No No
AppTunnel
Uses AppTunnel for EWS
NOTE: If your existing Email+ deployment uses a Standalone Sentry for ActiveSync and your Exchange Web
Service (EWS) is set up to use certificates, you have to disable ActiveSync on Standalone Sentry and
set up MobileIron Tunnel.
Procedure
1. On the Exchange server, launch IIS Manager.
2. Go to Server > Sites > Default Web Site > EWS.
3. Verify that the Authentication and Authorization Rules roles are added to IIS.
4. Open Authentication and Enable Basic Authentication.
5. Open Authorization Rules and add rule to Allow for All users if it was not added automatically.
Next steps
• If your setup uses MobileIron Tunnel and identity certificates to authenticate with EWS and ActiveSync, do the
additional setup on the Exchange server described in “Configuring additional Exchange setup for identity
certificates” on page 48.
• Once you have set up your Exchange environment, go to “Overview of configuration on MobileIron Core” on
page 49.
Procedure
1. On the Exchange server, launch IIS Manager.
2. Go to Server > Sites > Default Web Site > EWS.
3. Click on SSL Settings.
4. Check Require SSL.
5. For Client certificate, select Accept.
6. In the EWS directory, click on Configuration Editor and browse to the clientCertificateMappingAuth option.
Set the value for the option to True.
7. In the EWS directory, click on Authentication and enable the Windows Authentication option. Disable all
other authentication types.
Next steps
• Once you have set up your Exchange environment, go to “Overview of configuration on MobileIron Core” on
page 49.
Procedure
1. Set up MobileIron Tunnel.
NOTE: Email+ must be an MDM managed app so that it can use MobileIron Tunnel.
2. If your EWS setup uses either NTLM or identity certificates for authenticating to the EcWS service, create
a SCEP certificate enrollment setting. Skip this step if your EWS setup uses basic authentication.
3. Update the Email+ AppConnect app configuration.
Related topics
• See MobileIron Tunnel for iOS Guide for Administrators to set up MobileIron Tunnel on MobileIron Core.
• “Configuring SCEP settings” on page 50.
• “Updating the AppConnect app configuration for Email+” on page 51
Procedure
1. Add an <ANY> AppTunnel service in Standalone Sentry settings.
2. Update the Email+ AppConnect app configuration.
Related topics
• “Configuring an AppTunnel service” on page 50.
• “Updating the AppConnect app configuration for Email+” on page 51.
Procedure
1. In the Admin Portal, go to Policies & Configs > Configurations.
2. Select Add New > Certificate Enrollment > SCEP.
3. In the New SCEP Setting window, configure the settings based on your SCEP requirements.
4. Click Save to save the SCEP setting.
5. Click OK to dismiss the prompt indicating the successful creation of your SCEP setting.
You will reference this SCEP setting in the AppConnect app configuration for Email+ using the key
email_login_certificate.
Related topics
• “Configuring SCEP” in the MobileIron Core Device Management Guide for iOS devices.
Ensure that you have a Standalone Sentry that is set up for AppTunnel and the necessary device authentication is
also configured. See “Configuring Standalone Sentry for app tunneling” in the MobileIron Sentry Guide.
Procedure
1. In the MobileIron Core Admin Portal, go to Services > Sentry.
2. Edit the entry for the Standalone Sentry that supports AppTunnel.
3. In the App Tunneling Configuration section, under Services, click + to add a new service.
4. Use the following guidelines to configure an AppTunnel service:
Item Description
TLS Enabled NA
Proxy/ATC NA
5. Click Save.
Procedure
1. In the Core Admin Portal, go to Policy & Configs > Configurations.
2. Select the AppConnect app configuration you created for Email+.
3. Click Edit.
4. Add an AppTunnel rule that points to the Standalone Sentry on which you configured the AppTunnel service.
a. For URL Wildcard, enter the Exchange server’s IP address or FQDN.
5. For Identity Certificate, select the Certificate Enrollment setting you configured for Standalone Sentry.
You would have created the Certificate Enrollment setting as part of the Standalone Sentry setup for identity
certificate with Pass through.
6. Add the necessary key-value pairs.
7. Click Save.
8. Ensure that the configuration is applied to the labels that contain the devices to which you want to push the
configuration. The updated AppConnect app configuration for Email+ for iOS will be sent to devices at the next
sync interval.
Related topics
See “Key-value pairs for real-time push notifications” on page 55 for a list of key-value pairs.
Procedure
1. Set up MobileIron Tunnel.
See MobileIron Tunnel for iOS Guide for Administrators to set up MobileIron Tunnel on MobileIron Cloud.
NOTE: Email+ must be an MDM managed app so that it can use MobileIron Tunnel.
2. If your EWS setup uses either NTLM or identity certificates for authenticating to the EWS service, create a
SCEP certificate enrollment setting. Skip this step if your EWS setup uses basic authentication.
See “Configuring Identity certificate setting” on page 54.
3. Update the Email+ app configuration.
See “Updating the app configuration for Email+” on page 54.
Procedure
1. Add a custom HTTP service to the Standalone Sentry profile.
See “Configuring a custom HTTP service” on page 53.
2. Update the Email+ app configuration.
See “Updating the app configuration for Email+” on page 54.
Ensure that you have a Standalone Sentry that is set up for AppTunnel and the necessary device authentication is
also configured. See “Configuring Standalone Sentry for app tunneling” in the MobileIron Sentry Guide for
MobileIron Cloud.
Procedure
1. In MobileIron Cloud, go to Admin > Sentry.
2. Edit the entry for the Standalone Sentry profile that supports AppTunnel.
3. In Services, click Custom HTTP to add a new service.
4. Use the following guidelines to configure the service:
Item Description
5. Click Save.
Related topics
See “Configuring Standalone Sentry for app tunneling” in the MobileIron Sentry Guide for MobileIron Cloud for
more information on creating an AppTunnel service.
Procedure
1. In MobileIron Cloud, go to Configurations.
2. Click Add > Identity Certificate.
3. Fill in the following fields for the certificate configuration:
- Name: Enter brief text that identifies this certificate setting.
- Description: Enter additional text that clarifies the purpose of this SCEP setting.
- Certificate Distribution: Select Dynamically Generated.
- Source: Select the Certificate Authority you created in Admin > Certificate Authority.
- Subject: CN=${EMAIL}
- Key size: 2048
4. Test the configuration, and click Next.
5. Click Done to save the configuration.
You will reference the certificate configuration in the app configuration for Email+ using the key
email_login_certificate.
Procedure
1. In MobileIron Cloud, go to Apps > App Catalog.
2. In the App Catalog, click on MobileIron Email+.
3. Click App Configurations.
4. In App Configurations Summary, click on AppTunnel to add an AppTunnel rule.
a. Enter a name for the configuration.
b. Select the Sentry profile in which you configured the custom HTTP service.
c. Select the custom HTTP service you created for real-time push notifications in the Sentry configuration.
d. For URL Wildcard, enter the Exchange server’s IP address or FQDN.
e. Select the distribution for this configuration.
f. Click Save.
5. In App Configurations Summary, click on Email+ Configuration to add the necessary key-value pairs in
AppConnect Custom Configuration.
6. Select the app distribution.
7. Click Update.
Related topics
See “Key-value pairs for real-time push notifications” on page 55 for a list of key-value pairs.
The following table describes the key-value pairs applicable for real-time push notifications.
Value: Enter/
Key Select one Description
notification_server_host The URL of the The URL for the notification server for real-time push
notification notifications is [Link]/PROD.
server
Alternately, you can enter the following IP addresses:
[Link]
[Link]
Value: Enter/
Key Select one Description
email_ews_host Exchange Explicitly sets the EWS host address for real-time push
server address notifications, as opposed to the value configured for
email_exchange_host.
for the EWS
host Enter the IP address or DNS of the EWS host. The DNS
name must be in the following format: [Link].
Do not prepend https or full path name.
For Office 365, enter [Link].
This key-value pair is required if your Standalone Sentry is
the email host, i.e. the email_exchange_host key points to
the Standalone Sentry FQDN.
Value: Enter/
Key Select one Description
Add the following key-value pairs if you are using an identity certificate for authentication
email_exchange_host <exchange_re The fully qualified domain name of the ActiveSync server.
al_address>
email_login_certificate <name of the Core: Name of the SCEP setting in MobileIron Core.
identity
Cloud: Name of the Identity certificate configuration in
certificate
MobileIron Cloud
configuration>
email_ssl_required true Secures communication using https to the server that you
specified in email_exchange_host.
allow_logging true Email+ logs data to the device console, and allows the log
file to be attached to a feedback email.
feedback_email_address An email Device user app feedback and log messages are sent to
address the email address.
Add the following key-value pairs if your deployment includes Email+ versions 2.3.4 and less and the
devices require interval-based push notifications:
• notification_server_organization_id
• notification_server_authorization
For a description of the key-value pairs see “Key-value pairs for push notifications (interval-based)” on page 58.
NOTE: Email+ versions 2.3.4 and less do not get real-time notifications.
The following table describes the key-value pairs applicable for real-time push notifications.
Value: Enter/
Key Select one Description
notification_server_host The URL of the The URL for the notification server for real-time push
notification notifications is [Link]/PROD.
server
Procedure
1. Obtain a test iOS device with an email address you can access configured on it.
2. Ensure that Email+ for iOS is installed to the device.
3. In Email+, go to Settings > Notifications and verify that your device is subscribed with EWS.
The following message appears in the Mail Alerts section:
You are subscribed to real-time push notifications.
4. Place the Email+ app in the background without exiting the app.
5. From your desktop, send an email to yourself, using the email address configured on the test iOS device.
6. Watch for a new mail notification from Email+ for iOS on the test device.
The following describe some tools for troubleshooting Email+ for iOS:
• Setting up logging for Email+ for iOS (Core)
• Detailed logging for AppConnect apps for iOS (Core)
• Email+ crash recovery
Procedure
1. In the MobileIron Core Admin Portal, go to Policy & Configs > Configurations and select the AppConnect
configuration you created for Email+ for iOS.
2. Click Edit.
3. In the App-specific Configurations section, enter the key allow_logging with value as true.
This allows Email+ for iOS to log data to the device console.
4. Enter the key feedback_email_address with value as a valid email address which you can access.
Email+ for iOS sends the collected log data to the email address entered here.
5. If you are diagnosing a configuration, enter the key allow_show_configuration with value as true.
When set to true, Email+ for iOS shows all configured key-value pairs for diagnostic purposes. Disable this
setting after diagnosis is complete.
6. Click Save.
7. Force a check-in on the user’s device to ensure the modified AppConnect app configuration for Email+ for iOS
is sent to that device:
a. Go to Users & Devices > Devices.
b. Select the checkbox for the device.
c. Click Actions > Force Device Check-in.
The Force Device Check-In dialog appears.
d. In the dialog, confirm the user and device information and enter a note.
e. Click Force Device Check-in.
The device user will now see a Feedback icon in Email+ for iOS.
8. Ask the device user to reproduce the problematic action and tap the Feedback button.
Email+ for iOS log data will be collected and emailed to the address you provided.
Related topics
See “Key-value pairs for customizing Email+ for iOS” on page 20 for additional key-value pairs for troubleshooting.
The following sections describe the end user experience with Email+ for iOS:
• Real-time push notifications
Occasionally, the Email+ app is not able to sync new email in the background due to poor network connectivity or
because the app is no longer running in the background. If this happens, you may continue to receive the first
notification, which shows that you have new messages, but the second notification with the summary/unread email
count will not display. To correct this, move to an area with better network connectivity and launch Email+.
• Cellular Data option is disabled: If the Cellular Data option is disabled and the device is not connected to
WiFi, the device will not receive new email notification for Email+. Enable the Cellular Data option in your iOS
device Settings for Cellular > Cellular Data and for Email+ > Cellular Data, to get notifications when the device
is not connected to WiFi.
• Device is in Low Power Mode: If your device goes into Low Power mode when the battery is running low,
Background App Refresh gets disabled and the second notification will stop working. Charge your device,
disable low power mode, and launch Email+ to get notifications to work again.
iOS 9 introduced a new feature called Low Power Mode where the user can control whether a device can go
into a battery conservation state to extend battery life. This is typically used when the device battery is running
low and it is not possible to immediately recharge the device. In this state, iOS turns off background app refresh
and also prevents apps from running in the background. When this happens, Email+ will show the first
notification (“You have new messages”), but will not be able to fetch updated unread email summaries in the
background. So the second notification will not be displayed. To recover from this, charge your device fully and
disable low power mode. You may also need to launch Email+ to get notifications to work again.
If the Show Mail Details option is enabled, an individual notification is displayed for each unread email. If the
option is disabled, a single notification that shows the aggregate count of unread emails is displayed.
FIGURE 3. NOTIFICATIONS OPTIONS IN THE EMAIL+ SETTINGS