Access Manager enables you to provide web and mobile access to protected applications and resources through the MobileAccess feature. MobileAccess includes a configuration portion in Administration Console as well as the MobileAccess app for mobile devices. Configurable options in MobileAccess include the following:
Which applications users must be able to access through appmarks
Whether users can access an application through a desktop browser or a mobile device, or both
What the preferred viewer for the application on the mobile device is
Whether users are required to provide a PIN to use the MobileAccess app on their mobile device, and if so, whether they are required to re-enter the PIN after a period of inactivity
Appmarks are essentially bookmarks for Access Manager resources. After you have configured an Access Manager resource, you configure one or more appmarks to enable users to access the resource in different ways. You can create an appmark for:
The applications and service providers are different from other Access Manager resources. Access Manager provides connectors for the different applications that you import and configure to provide a single sign-on experience for the users. When you import and configure a connector, Access Manager automatically creates an appmark for the connector. You manage and configure the connectors in the Access Manager Applications Configuration Guide.page of Administration Console and manage and configure appmarks through the page. For more information, see the
The MobileAccess app that users install on their mobile devices enables them to access Access Manager resources from those devices. Administrators can also make the MobileAccess app available to users in a private corporate store. After users have installed the app and registered their device, they can access the resources using the assigned authentication methods.
Administrators can deregister user mobile devices through Administration Console on the User Devices page. So, if a registered mobile device is lost or stolen, or an employee leaves the company, you can ensure that unauthorized users cannot access corporate resources. Users can also deregister their own mobile devices if necessary, either from their device or from the User Portal page.