© The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature 2023
C. Edge, R. TroutonApple Device Managementhttps://doi.org/10.1007/978-1-4842-9156-6_12

12. Identity and Device Trust

Charles Edge1   and Rich Trouton2
(1)
Minneapolis, MN, USA
(2)
Middletown, MD, USA
 

Chapter 8 was about securing devices. Part of security is securing the connections between devices. Chapter 10 was about directory services. Most of the protocols for single sign-on for directory services were developed in a time when most of an organization’s devices were on a single network and most resources were located behind a firewall. Today, devices are spread all around the world, and devices access multiple sites built by multiple Software as a Service ...

Get Apple Device Management: A Unified Theory of Managing Macs, iPads, iPhones, and Apple TVs now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.