You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
device-mgt-core/modules/distribution
Geeth Munasinghe cde8456f8d
Fixing distribution pom
10 years ago
..
src initial commit 10 years ago
INSTALL.txt initial commit 10 years ago
LICENSE.txt initial commit 10 years ago
README.txt initial commit 10 years ago
pom.xml Fixing distribution pom 10 years ago
release-notes.html initial commit 10 years ago

README.txt

WSO2 Enterprise Mobility Manager (EMM)
----------------------
Welcome to the WSO2 Enterprise Mobility Manager (EMM) ${product.version} release
=======

Key Features
------------
1. Self-service device enrollment and management with end-user MDM console
2. Policy-driven device management for security, data, and device features (Camera, Password Policy)
3. Deploy policies over-the-air
4. Compliance monitoring for reporting, alerting, and device deprovisioning
5. Role based permissions for device management
6. Provisioning and deprovisioning applications to enrolled devices
7. Blacklisting of applications for Android
8. Supports App management
9. App approval process through a lifecycle
10. Discover mobile apps through an Enterprise App Store
11. Self-provisioning of mobile apps to devices


Installation & Running
----------------------
1. extract the downloaded zip file
2. Run the wso2server.sh or wso2server.bat file in the bin directory
3. Once the server starts, point your Web browser to
https://localhost:9443/

For more details, see the Installation Guide

System Requirements
-------------------

1. Minimum memory - 2GB
2. Portal app requires full Javascript enablement of the Web browser

For more details see
https://docs.wso2.org/display/EMM110/Prerequisites

For known issues see
https://wso2.org/jira/issues/?filter=11791

WSO2 Enterprise Mobility Manager (EMM) Binary Distribution Directory Structure
-----------------------------------------------------

EMM_HOME
.
├── bin //executables
├── dbscripts //DBScripts
├── INSTALL.txt
├── lib
├── LICENSE.txt
├── modules //Jaggery Modules
├── README.txt
├── release-notes.html
├── repository // repository
├── tmp
├── webapp-mode


- bin
Contains various scripts .sh & .bat scripts.

- dbscripts
Contains the database creation & seed data population SQL scripts for
various supported databases.

- lib
Contains the basic set of libraries required to startup WSO2 Enterprise Mobility Manager
in standalone mode

- repository
The repository where Carbon artifacts & Axis2 services and
modules deployed in WSO2 Carbon are stored.
In addition to this other custom deployers such as
dataservices and axis1services are also stored.

- carbonapps
Carbon Application hot deployment directory.

- components
Contains all OSGi related libraries and configurations.

- conf
Contains server configuration files. Ex: axis2.xml, carbon.xml

- data
Contains internal LDAP related data.

- database
Contains the WSO2 Registry & User Manager database.

- deployment
Contains server side and client side Axis2 repositories.
All deployment artifacts should go into this directory.

- logs
Contains all log files created during execution.

- resources
Contains additional resources that may be required.

- tenants
Directory will contain relevant tenant artifacts
in the case of a multitenant deployment.

- tmp
Used for storing temporary files, and is pointed to by the
java.io.tmpdir System property.

- webapp-mode
The user has the option of running WSO2 Carbon in webapp mode (hosted as a web-app in an application server).
This directory contains files required to run Carbon in webapp mode.

- LICENSE.txt
Apache License 2.0 under which WSO2 Carbon is distributed.

- README.txt
This document.

- INSTALL.txt
This document contains information on installing WSO2 Enterprise Mobility Manager.

- release-notes.html
Release information for WSO2 Enterprise Mobility Manager ${product.version}

Secure sensitive information in carbon configuration files
----------------------------------------------------------

There are sensitive information such as passwords in the carbon configuration.
You can secure them by using secure vault. Please go through following steps to
secure them with default mode.

1. Configure secure vault with default configurations by running ciphertool
script from bin directory.

> ciphertool.sh -Dconfigure (in UNIX)

This script would do following configurations that you need to do by manually

(i) Replaces sensitive elements in configuration files, that have been defined in
cipher-tool.properties, with alias token values.
(ii) Encrypts plain text password which is defined in cipher-text.properties file.
(iii) Updates secret-conf.properties file with default keystore and callback class.

cipher-tool.properties, cipher-text.properties and secret-conf.properties files
can be found at repository/conf/security directory.

2. Start server by running wso2server script from bin directory

> wso2server.sh (in UNIX)

By default mode, it would ask you to enter the master password
(By default, master password is the password of carbon keystore and private key)

3. Change any password by running ciphertool script from bin directory.

> ciphertool -Dchange (in UNIX)

For more details see
http://docs.wso2.org/wiki/display/Carbon410/WSO2+Carbon+Secure+Vault

Training
--------

WSO2 Inc. offers a variety of professional Training Programs, including
training on general Web services as well as WSO2 Enterprise Store, Apache Axis2,
Data Services and a number of other products.

For additional support information please refer to
http://wso2.com/training/


Support
-------

We are committed to ensuring that your enterprise middleware deployment is completely supported
from evaluation to production. Our unique approach ensures that all support leverages our open
development methodology and is provided by the very same engineers who build the technology.

For additional support information please refer to http://wso2.com/support/

---------------------------------------------------------------------------
(c) Copyright 2013 WSO2 Inc.