Passcode
Published by Iru, Inc.
Configure passcode requirements and authentication policies for devices across all platforms to enforce security standards across your organization. Define passcode complexity rules including minimum length, character requirements, and expiration intervals. Control grace periods for passcode entry, failed attempt limits, and automatic device lock timeouts. Deploy this profile to ensure consistent authentication policies, protect sensitive data on managed devices, and maintain compliance with organizational security requirements for both local user accounts and device unlock scenarios.
Enforce passcode requirements for Android Enterprise work profiles to secure corporate data on employee devices. Configure passcode complexity rules including minimum length, character requirements, password history, and maximum failed attempts before profile removal. Set passcode expiration intervals and grace periods for device unlock. Deploy this profile to ensure consistent authentication standards across BYOD and corporate-owned devices with work profiles, protecting business applications and data while maintaining separation from personal device usage.
Configure login window behavior and authentication options for Mac devices, including automatic login settings, user list display, password hints, and login screen messages. Control access security by managing guest account access, fast user switching, and restart/shutdown button availability. Deploy this profile to standardize authentication workflows, enhance security posture by restricting login options, or display custom messages for compliance and user guidance. Settings apply to the Mac login window interface and affect all user accounts on managed devices.
Configure a firmware password recovery mechanism for Mac devices to enable authorized administrators to reset or recover forgotten firmware passwords without requiring physical device access or Apple support intervention. This profile establishes a secure recovery key that can be stored centrally, allowing IT teams to maintain control over firmware-level security while preventing device lockouts. Deploy to Mac devices where firmware password policies are enforced to ensure business continuity and reduce support overhead when password recovery is needed.