Managed Open-In / File Sharing

For apps used in more regulated industries, it may be important for IT to prevent applications from openly sharing data with each other.

Apps containing sensitive files can be controlled to only share files across managed corporate applications to prevent private information from leaking into unmanaged apps.

Implementation Summary:

  • The recommended approach is to use the AppConfig Community practices to configure restrictions profiles for the device to protect sharing of files with unmanaged apps.

  • An alternative is to use the AirWatch SDK or App Wrapping to prevent files from being shared with unmanaged apps.

Platform AppConfig Community AirWatch SDK AirWatch App Wrapping
iOS Recommended Supported Supported
Android Recommended Supported Supported

AppConfig Community (Recommended):

  • Configure an iOS MDM Restriction Profile or Android for Work restriction profile to restrict open-in to only occur within managed applications.

  • Requires enrollment into MDM.

  • Requires no coding.

  • Requires iOS 7+ or Android 5.0+ with Android for Work device.

SDK (Supported):

  • Integrate the AirWatch SDK into your application and configure a SDK profile with a copy / paste DLP restriction and assign it to your application.

  • Write your open-in logic to read the SDK profile settings first to ensure the sharing is permitted before executing the open-in.

  • Requires coding.

  • Supports non-MDM enrollment modes.

Wrapping (Supported):

  • Requires neither coding nor MDM, only device entry in AirWatch system.

  • Verify that the app is only using an approved MADP platform and coding techniques.

  • Develop and compile your application.

  • Run the compiled binary through the AirWatch App Wrapping engine.

  • Assign a wrapping profile to your application with an open-in DLP restriction.

+

Questions? Comments? Leave them for us here.