WSO2 Enterprise Mobility Manager (EMM) comprises of two key aspects: Mobile Device Management (MDM) and Mobile Application Management (MAM). WSO2 EMM is 100% open source and is developed on top of WSO2 Carbon for greater scalability and interoperability. EMM enables organizations to secure, manage and monitor Android, iOS and Windows devices (i.e., smartphones, iPod touch devices and tablet PCs), on both corporate and personal (employee-owned) devices, irrespective of the mobile operator, service provider or the organization. The WSO2 EMM architecture diagram is as follows:
The following table lists out the modules pertaining to the architecture of WSO2 EMM, which is depicted in the above figure:
Mobile Device Management (MDM) | The Mobile Device Management (MDM) module enables the administrator to manage the devices that are registered with EMM. WSO2 EMM is designed to have a plugin architecture giving it the ability to implement new device platforms and plug them easily. As a result, WSO2 EMM has the Android, iOS, and Windows platforms plugged into the MDM core. | ||
---|---|---|---|
Policy management | The Policy management module that is in the Mobile Device Management core is used to manage the EMM policies. Policies created by the EMM administrator will be applied on the devices that register with WSO2 EMM based on the policy enforcement criteria.
| ||
Operation management | The Operation management module manages the operations that take place in the EMM, such as device lock, enterprise wipe, clear password and much more.
| ||
Mobile Application Management (MAM) | The app management module enables organizations to control the corporate applications on mobile devices that are registered with EMM. The following consoles are used to manage mobile applications:
| ||
User management | The user management module enables administrators to manage the WSO2 EMM users. If required, administrators can connect their own user store to WSO2 EMM. | ||
Configuration management | The configuration management module enables the tenant administrators to customize their general, Android, iOS, and Windows settings. | ||
Compliance monitoring | Compliance monitoring is done so that the EMM can check if the devices violate any of the policies applied and take necessary actions. | ||
EMM Management Console | Administrators can use the EMM Console to manage users, policies, apply operations and more. |