Apple iPod and iPod Touch manuel d'utilisation
- Voir en ligne ou télécharger le manuel d’utilisation
- 58 pages
- 0.71 mb
Aller à la page of
Les manuels d’utilisation similaires
-
Cell Phone
Apple MC537LL/A
274 pages 19.25 mb -
Cell Phone
Apple 2006
72 pages 1.18 mb -
Cell Phone
Apple ME493LL/A
162 pages 26.5 mb -
Cell Phone
Apple MC637LL/A
217 pages 13.35 mb -
Cell Phone
Apple A1324
217 pages 13.35 mb -
Cell Phone
Apple MB702LL/A
32 pages 1.15 mb -
Cell Phone
Apple MC319LL/A
162 pages 26.5 mb -
Cell Phone
Apple ME344LL/A
162 pages 26.5 mb
Un bon manuel d’utilisation
Les règles imposent au revendeur l'obligation de fournir à l'acheteur, avec des marchandises, le manuel d’utilisation Apple iPod and iPod Touch. Le manque du manuel d’utilisation ou les informations incorrectes fournies au consommateur sont à la base d'une plainte pour non-conformité du dispositif avec le contrat. Conformément à la loi, l’inclusion du manuel d’utilisation sous une forme autre que le papier est autorisée, ce qui est souvent utilisé récemment, en incluant la forme graphique ou électronique du manuel Apple iPod and iPod Touch ou les vidéos d'instruction pour les utilisateurs. La condition est son caractère lisible et compréhensible.
Qu'est ce que le manuel d’utilisation?
Le mot vient du latin "Instructio", à savoir organiser. Ainsi, le manuel d’utilisation Apple iPod and iPod Touch décrit les étapes de la procédure. Le but du manuel d’utilisation est d’instruire, de faciliter le démarrage, l'utilisation de l'équipement ou l'exécution des actions spécifiques. Le manuel d’utilisation est une collection d'informations sur l'objet/service, une indice.
Malheureusement, peu d'utilisateurs prennent le temps de lire le manuel d’utilisation, et un bon manuel permet non seulement d’apprendre à connaître un certain nombre de fonctionnalités supplémentaires du dispositif acheté, mais aussi éviter la majorité des défaillances.
Donc, ce qui devrait contenir le manuel parfait?
Tout d'abord, le manuel d’utilisation Apple iPod and iPod Touch devrait contenir:
- informations sur les caractéristiques techniques du dispositif Apple iPod and iPod Touch
- nom du fabricant et année de fabrication Apple iPod and iPod Touch
- instructions d'utilisation, de réglage et d’entretien de l'équipement Apple iPod and iPod Touch
- signes de sécurité et attestations confirmant la conformité avec les normes pertinentes
Pourquoi nous ne lisons pas les manuels d’utilisation?
Habituellement, cela est dû au manque de temps et de certitude quant à la fonctionnalité spécifique de l'équipement acheté. Malheureusement, la connexion et le démarrage Apple iPod and iPod Touch ne suffisent pas. Le manuel d’utilisation contient un certain nombre de lignes directrices concernant les fonctionnalités spécifiques, la sécurité, les méthodes d'entretien (même les moyens qui doivent être utilisés), les défauts possibles Apple iPod and iPod Touch et les moyens de résoudre des problèmes communs lors de l'utilisation. Enfin, le manuel contient les coordonnées du service Apple en l'absence de l'efficacité des solutions proposées. Actuellement, les manuels d’utilisation sous la forme d'animations intéressantes et de vidéos pédagogiques qui sont meilleurs que la brochure, sont très populaires. Ce type de manuel permet à l'utilisateur de voir toute la vidéo d'instruction sans sauter les spécifications et les descriptions techniques compliquées Apple iPod and iPod Touch, comme c’est le cas pour la version papier.
Pourquoi lire le manuel d’utilisation?
Tout d'abord, il contient la réponse sur la structure, les possibilités du dispositif Apple iPod and iPod Touch, l'utilisation de divers accessoires et une gamme d'informations pour profiter pleinement de toutes les fonctionnalités et commodités.
Après un achat réussi de l’équipement/dispositif, prenez un moment pour vous familiariser avec toutes les parties du manuel d'utilisation Apple iPod and iPod Touch. À l'heure actuelle, ils sont soigneusement préparés et traduits pour qu'ils soient non seulement compréhensibles pour les utilisateurs, mais pour qu’ils remplissent leur fonction de base de l'information et d’aide.
Table des matières du manuel d’utilisation
-
Page 1
iPhone and iP od touch En terprise Deploymen t Guide[...]
-
Page 2
K Apple Inc. © 2008 Apple Inc. All rights reserved. This manual may not be copied , in whole or in part, without the written consent of Apple . The Apple logo is a trademark of Apple Inc ., registered in the U.S. and other countries. Use of the “keyboard” Apple logo (Option-Shift-K) for commercial purposes without the prior written consent of [...]
-
Page 3
3 3 C onten ts Prefac e 5 iPhone in the Enterprise 5 System Requiremen ts 6 Microsoft Exchange ActiveSync 8 VPN 8 Network Security 9 Certificates 9 Email accounts 9 Additional Resour ces Chapter 1 1 0 Deploying iPhone and iP od touch 10 Activating Devices 11 Pr eparing Access t o Network Services and Enterprise Data 14 Determining Device P asscode [...]
-
Page 4
4 Contents 39 Setting iT unes Restrictions Chapter 5 42 Deploying iPhone Applications 42 Register for A pplication Development 43 Signing Applications 43 Creating the Distribution P rovisioning P rofile 43 Installing Pr ovisioning P rofiles using iT unes 44 Installing Pro visioning Profiles using iPhone Configuration Utility for Mac OS X 44 Install[...]
-
Page 5
5 Prefac e iPhone in the Ent erprise Learn ho w to int egrate iPhone and iP od touch with your enterprise syst ems. This guide is for system administrat ors. It provides information about deploying and supporting i Phone and iP od touch in enterprise environmen ts. Syst em Requirements Read this section for an overview of the system requirements an[...]
-
Page 6
6 Preface iPhone in the Enterprise Windows c omputers  Windows XP Ser vice P ack 2 or Windo ws V ista  500 MHz P entium processor or faster  256 MB of RAM  Quick Time 7 . 1 .6 or later Some features of iT unes, such as use of the iT unes Store, have additional requir ements. See the documentation included with the iT unes installer for more[...]
-
Page 7
Preface iPhone in the Enterprise 7 Remote Wipe Y ou can remotely wipe the contents of an iPhone or iP od touch. Doing so quick ly remove s all data and configuration information from the devic e, then the device is securely erased and restor ed to original, factor y settings. I t can take approximately one hour for each 8 GB of device capacity for [...]
-
Page 8
8 Preface iPhone in the Enterprise Exchange A c tiveSync F eatures Not Supported Not all Exchange f eatures are supported, including, for example:  F older management  Opening links in email to documents stor ed on Sharepoint servers  T ask synchronization  Setting an “ out of office ” a utoreply message  Creating meeting invitations [...]
-
Page 9
Preface iPhone in the Enterprise 9 Certificates iPhone and iP od touch can use certificates in the following ra w formats: Â PKCS1 (.cer , .cr t, .der) Â PKSC1 2 (.p1 2, .pfx) Email accounts iPhone and iP od touch support industr y-standard IMAP4- and POP3-enabled mail solutions on a range of ser ver platforms including Windows, UNIX, Linux, and [...]
-
Page 10
1 10 1 Deploying iPhone and iP od touch This chapter pr ovides an o ver view of how to deploy iPhone and iP od touch in your ent erprise. iPhone and iP od touch are designed t o easily integrate with y our enterprise systems including Microsoft Exchange 2003 and 2 007 , 802. 1X-based secure wireless networks , and Cisco IPSec vir tual private netw [...]
-
Page 11
Chapter 1 Deploying iPhone and iPod touch 11 Although there is no cellular service or SIM card for iP od touch, it must also be connected to a computer with iT unes for unlocking. Because iT unes is required to c omplete the activation proce ss for both iPhone and iP od touch, y ou must decide whether you want t o install iT unes on each user ’ s[...]
-
Page 12
12 Chapter 1 Deploying iPhone and iPod touch Network C onfiguration  Make sure por t 443 is open on the firewall. I f your company use s Outlook Web Access , port 443 is most likely already open.  V erify that a ser ver cer tificate is installed on the Exchange fron tend server and enable Require Basic SSL for the Ex change ActiveSync vir tual [...]
-
Page 13
Chapter 1 Deploying iPhone and iPod touch 13 WP A/WP A2 Enterprise Network C onfiguration  V erify network appliances for compatibility and select an authentication type (EAP type) suppor ted by iPhone and iP od touch. Make sure that 802. 1X is enabled on the authentication server , and if nece ssar y , install a ser ver cer tificate and assign n[...]
-
Page 14
14 Chapter 1 Deploying iPhone and iPod touch IMAP Email If you don ’t use Microsof t Exchange , y ou can still implement a secure , standards-based email solution using any email server that suppor ts IMAP and is configured to requir e user authentication and SSL. The se servers can be located within a DMZ subnetwork, behind a corporate firewall,[...]
-
Page 15
Chapter 1 Deploying iPhone and iPod touch 15 If you don ’t use Microsof t Exchange , y ou can set similar policies on your device s by creating configuration profiles . Y ou distribute the profiles via email or a web site that is accessible using the device . If you want to change a policy , you must post or send an updated profile to users f or [...]
-
Page 16
2 16 2 Creating and Deplo ying C onfiguration P rofile s Configur ation profile s define how iPhone and iP od touch work with y our enterprise syst ems. Configuration profiles ar e XML files that, when installed, provide information that iPhone and iP od touch can use to connect to and communicat e with your enterprise systems. They contain VPN con[...]
-
Page 17
Chapter 2 Creating and Deploying Configuration Profiles 17 When you open iPhone Configuration Utility , a window similar t o the one shown below appears. The cont ent of the main section of the window changes as you select items in the sidebar . The sidebar displa ys the Librar y , which contains the following categorie s: Â Devices shows a list o[...]
-
Page 18
18 Chapter 2 Creating and Deploying Configuration Profiles iPhone Configur ation Utility for the W eb The web-based version of iPhone C onfiguration Utilit y lets you create configuration profiles for y our devices. Follow the instructions below for the platf orm you’ re using. Installing on Mac OS X T o install the utilit y on Mac OS X v1 0.5 Le[...]
-
Page 19
Chapter 2 Creating and Deploying Configuration Profiles 19 A screen similar to the one shown here will appear . F or information about using the utility , see “Creating Configuration P rofiles,” below . Changing the User name and P assword for iPhone C onfiguration Utility W eb T o change the user name and password for accessing the utility , e[...]
-
Page 20
20 Chapter 2 Creating and Deploying Configuration Profiles T o restar t the utility on Windo ws 1 Go to Con trol P anel > Administrative T ools > Ser vices. 2 Select Apple iPhone Configuration Web Utility . 3 Select Restar t from the Action menu. T o restar t the utility on Mac OS X 1 Open T erminal. 2 Enter sudo -s and authen ticate with an [...]
-
Page 21
Chapter 2 Creating and Deploying Configuration Profiles 21 General Settings This is where you pr ovide the name and identifier of this profile . A configuration name is required . The name you specify appears in the profiles list and is display ed on the device after the configuration profile is installed . Although the name doesn ’t have to be u[...]
-
Page 22
22 Chapter 2 Creating and Deploying Configuration Profiles T o sign a profile, click Apply Signature in the Signature section of the General pane. In the Configuration Signing window that appears , add the digital certificates necessary to authenticat e your signature . (Cer tificates in raw f ormats 1 and 1 2 are suppor ted.) Then select your priv[...]
-
Page 23
Chapter 2 Creating and Deploying Configuration Profiles 23 Â Maximum passcode age (in days): Requires users to change their passcode at the interval you specify . Â Passc ode lock (in minutes): If the device isn’ t used for this period of time , it automatically locks. Entering the passcode unlocks it. Wi-F i Settings Use this pane to set how t[...]
-
Page 24
24 Chapter 2 Creating and Deploying Configuration Profiles VPN Settings Use this pane to ent er the VPN settings for connecting to your network. Y ou can add multiple sets of VPN connec tions by clicking the Add (+) button. F or information about supported VPN protocols and authentication methods , see “ VPN” on page 8. Email Settings Use this [...]
-
Page 25
Chapter 2 Creating and Deploying Configuration Profiles 25 Credentials Settings Use this pane to add certificates to the device . Cer tificates in raw f ormats PKCS1 (.cer , .der , .cr t) and PKCS1 2 (.p1 2, .pfx) ar e suppor ted . When installing an identity cer tificate on the device , make sure that the file contains a certificate and not just a[...]
-
Page 26
26 Chapter 2 Creating and Deploying Configuration Profiles The Configuration Iden tifier field in the General pane is used by the device to determine whether a profile is new , or an update to an existing profile. If you want the updated profile to replac e one that users have alr eady installed , don’t change the Configuration Identifier . Pr ep[...]
-
Page 27
Chapter 2 Creating and Deploying Configuration Profiles 27 IIS W eb S erver If your web server is IIS, add the MIME t ype in the Properties page of the ser ver using IIS Manager . The extension is mobileconfig and the file t ype is application/x-apple- aspen-config. Alternatively , you can add this information t o specific sites using the HTTP Head[...]
-
Page 28
28 Chapter 2 Creating and Deploying Configuration Profiles If the installation isn ’t completed succ essfully , perhaps beca use the Exchange server was unreachable or the user cancelled the proce ss, none of the information ent ered by the user is retained . Users may want t o change how many da ys worth of data is synced to the device. The defa[...]
-
Page 29
3 29 3 Manually C onfiguring D evice s This chapter de scribes how t o configure iPhone and iP od touch manually . If you don ’t provide automatic configuration pr ofiles, users can configure their devices manually . Some settings, such as passcode policies, can only be set by using a configuration profile. VPN Settings T o change VPN settings , [...]
-
Page 30
30 Chapter 3 Manually Configuring Devices Cisco IPSec Settings When you manually configure the device f or Cisco IPSec VPN, a screen similar to following appears: Use this chart to identify the settings and information you ent er: Field Description Description A descriptive title that identifies this group of settings . Ser ver The DNS name or IP a[...]
-
Page 31
Chapter 3 Manually Configuring Devices 31 PPTP Settings When you manually configure the device f or PPTP VPN, a screen similar to the following appears: Use this chart to identify the settings and information you ent er: Field Description Description A descriptive title that identifies this group of settings . Ser ver The DNS name or IP address of [...]
-
Page 32
32 Chapter 3 Manually Configuring Devices L2TP Settings When you manually configure the device f or L2TP VPN, a screen similar to the follo wing appears: Use this chart to identify the settings and information you ent er: Field Description Description A descriptive title that identifies this group of settings . Ser ver The DNS name or IP address of[...]
-
Page 33
Chapter 3 Manually Configuring Devices 33 Wi-F i S ettings T o change Wi-F i settings, go to Settings > G eneral > Network > Wi-Fi. If the network you ’re adding is within range , select it from the list of a vailable networks . O ther wise, tap Other . Make sure that your network infrastructure uses authen tication and encr yption suppo[...]
-
Page 34
34 Chapter 3 Manually Configuring Devices Exchange Settings Y ou can configure only one Exchange account per devic e. T o add an Exchange account, go to Settings > Mail, Contacts, Calendars, and then tap Add Account. On the Add Account scr een, tap M icrosoft Exchange. When you manually configure the device f or Exchange, use this char t to iden[...]
-
Page 35
Chapter 3 Manually Configuring Devices 35 iPhone and iP od touch support M icrosoft’ s Autodiscov er y service, which uses your user name and password to det ermine the address of the fron t-end Exchange server . I f the ser ver’ s address can ’t be determined, you’ll be asked to enter it. After the Exchange accoun t is successfully configu[...]
-
Page 36
36 Chapter 3 Manually Configuring Devices Important: When you configure a device to sync with Ex change, all existing calendar and contact information on the device is o verwritten. Additionally , iT unes no longer sync contacts and calendars with your desktop c omputer . Y ou can still sync your device wirelessly with MobileMe services. T o change[...]
-
Page 37
Chapter 3 Manually Configuring Devices 37 When a certificate is downloaded to the device, the Install Profile screen appears. The description indicate s the type of cer tificate: identity or cer tificate authority (root). T o install the cer tificate, tap Install. T o view or remove a certificate that has been installed, go to Settings > General[...]
-
Page 38
4 38 4 Deploying i T unes Y ou use iT unes to sync music and video , install applications, and more . This chapter describe s how to deploy iT unes and enterprise applications, and defines the settings and restrictions you can specify . Installing iT unes iT unes uses standard Macintosh and Windows installers. The latest version of iT unes is avail[...]
-
Page 39
Chapter 4 Deploying iTunes 39 Silently Installing on Windows T o push iTune s to client comput ers, extrac t the individual .msi files from iT unesSetup.ex e. T o Ex tract .msi files from iT unesSetup.ex e: 1 Run iT unesSetup.ex e. 2 Open %temp% and find a folder named IXP nnn .TMP , where %temp% is your temporar y director y (typically bootdrive :[...]
-
Page 40
40 Chapter 4 Deploying iTunes  Play iT unes media cont ent that is marked as explicit  Play movie s  Play T V shows  Play games Setting iT unes Restrictions for Mac OS X On Mac OS X, you control access by using keys in a plist file . On Mac OS X the k ey values sho wn above can be s pecified for each user by editing ~/Library/Pref erences/ [...]
-
Page 41
Chapter 4 Deploying iTunes 41 Updating iT unes and iPhone Software Manually If you turn off automat ed and user-initiated software update checking in iT unes, you’ll need to distribute software updates t o users for manual installation. T o update iT unes, see the installation and deployment steps described earlier in this document. It ’ s the [...]
-
Page 42
5 42 5 Deploying iPhone A pplications Y ou can distribute iPhone and iP od touch applications to your users . If you want to install iPhone OS applications that you ’ve developed , y ou distribute the application to your users , who install the applications using iT unes. Applications from the online App St ore work on iPhone and iP od touch with[...]
-
Page 43
Chapter 5 Deploying iPhone Applications 43 Signing Applications Applications you distribute t o users must be signed with your distribution certificate. F or instructions about obtaining and using a cer tificate, see the i Phone Developer Cent er at http://developer .apple.com/iphone . Creating the Distribution P rovisioning P rofile Distribution p[...]
-
Page 44
44 Chapter 5 Deploying iPhone Applications Windows Vista  bootdrive :Users username A ppDataRoamingApple Comput erMobileDevice Pr ovisioning P rofiles  bootdrive :P rogramDataApple ComputerMobileDeviceP rovisioning P rofiles  the path specified in the HK CU or HKLM by the P rovisioningP rofilesPath r egistery key SOFT W AREApple C[...]
-
Page 45
Chapter 5 Deploying iPhone Applications 45 Installing Applications using iPhone C onfiguration Utility for Mac OS X Y ou can use iPhone Configuration Utility for Mac OS X to install applications on connected devices. Follow these steps: 1 In iPhone Configuration Utility , choose File > Open and then select the application that you want to instal[...]
-
Page 46
46 Appendix A A Cisco VPN Ser ver C onfiguration Use these guideline s to configure your Cisco VPN ser ver for use with iPhone and iP od touch. Authen tication Methods iPhone suppor t the following a uthentication methods: Â Pre-shar ed key IPsec a uthentication with user authen tication via xauth. Â Client and server cer tificates for IP sec aut[...]
-
Page 47
Appendix A Cisco VPN Server Configuration 47 Certificates When setting up and installing certificates, make sure of the following: Â The server identity cer tificate must contain the server ’ s DNS name and/or IP address in the subject alternate name (SubjectAltName) field. The device uses this information to v erify that the certificate belongs[...]
-
Page 48
48 Appendix A Cisco VPN Server Configuration Other Suppor ted F eatures iPhone and iP od touch suppor t the following: Â Application V ersion: T he client software version is sent t o the server , allowing the ser ver to accept or r eject connections based on the device’ s software version. Â Banner: The banner , if configured on the server , i[...]
-
Page 49
49 B Appendix B C onfiguration P rofile F ormat This appendix specifie s the forma t of mobileconfig files f or those who want to cr eate their own t ools. This document assumes that y ou ’ re familiar with the Apple XML DTD and the general propert y list format. A general description of the Apple plist format is a vailable at www .apple.com/DTDs[...]
-
Page 50
50 Appendix B Configuration Profile Format P ayload Con tent The P ayloadConten t array is an array of dictionaries, where each dictionar y describes an individual payload of the profile . Each func tional profile has at least one or more entrie s in this array . Each dictionar y in this array has a few common properties, regardless of the payload [...]
-
Page 51
Appendix B Configuration Profile Format 51 P asscode P olic y Pa yload The P asscode P olicy payload is designated by the com.apple.mobiledevice .passwordpolic y P ayloadT ype value. The presence of this payload type prompts iPhone to presen t the user with an alphanumeric passcode entry mechanism, which allows the entr y of arbitrarily long and co[...]
-
Page 52
52 Appendix B Configuration Profile Format Email P ayload The email payload is designat ed by the com.apple .mail.managed P ayloadT ype value . This payload creat es an email account on the devic e. In addition to the settings common to all payloads , this pa yload defines the follo wing: Key V alue EmailAccountDescription String, optional. A user-[...]
-
Page 53
Appendix B Configuration Profile Format 53 APN P ayload The APN (Acce ss P oint Name) payload is designated by the c om.apple.apn.managed P ayloadT ype value . In addition to the settings common to all payloads , this payload defines the following: Exchange P ayload The Exchange pa yload is designated by the c om.apple.eas.acc ount P ayloadT ype va[...]
-
Page 54
54 Appendix B Configuration Profile Format VPN P ayload The VPN payload is designated by the com.apple .vpn.managed PayloadT ype value. In addition to the settings common to all pa yload types, the VPN pa yload defines the following keys. There are tw o possible dictionaries present at the top lev el, under the keys “PPP ” and “IPSec” . The[...]
-
Page 55
Appendix B Configuration Profile Format 55 IPSec Dic tionary Keys The follo wing elements are f or VPN payloads of t ype IPSec Wi-F i Pa yload The Wi-Fi payload is de signated by the com.apple .wifi.managed P ayloadT ype value. This describes v ersion 0 of the P ayloadV ersion value . In addition to the settings common to all payload types , the pa[...]
-
Page 56
56 Appendix B Configuration Profile Format F or 802. 1X enterprise netw orks, the EAP Client Configuration Dictionary must be provided . EAPClientC onfiguration Dic tionary In addition to the standard encryption t ypes, it is also possible to specify an en terprise profile for a giv en network via the “EAPClientConfiguration ” k ey . This key i[...]
-
Page 57
Appendix B Configuration Profile Format 57 EAP-F ast Suppor t The EAP-F AST module uses the following pr operties in the EAPClientConfiguration dictionar y . Thes keys are hierarchical in nature: if EAPF ASTUseP AC is false , the other two pr operties aren ’t consulted. Similarly , if EAPF ASTProvisionP AC is false , EAPF ASTPro visionP ACAnonymo[...]
-
Page 58
58 Appendix B Configuration Profile Format If EAPF ASTUseP AC is true , then an existing P AC is used , if it is present. The only way to get a P AC on the device currently is to allo w P AC provisioning . So, you need to enable EAPF ASTPro visionP AC, and if desired, also EAPF ASTProvisionP ACAnonymously . EAPF ASTPro visionP ACAnonymously has a s[...]