HCL Connections for AirWatch

The HCL Connections for AirWatch app builds in support for AirWatch security policies, custom settings, and administrator actions by using an AirWatch provided toolkit. This app provides all of the same features you know from the regular Connections mobile app, but with more security and management capabilities.

Managing versions

It is possible to enforce that only managed versions of HCL Connections mobile apps are allowed to connect to your company’s Connections servers (or your company’s Connections data in HCL Connections Cloud). The Mobile Server application Management Required policy makes this possible. This policy must be enabled at both the Connections server and from the AirWatch console by using custom configuration settings. To enforce this policy, you first need to generate a MAM Required Signature and a MAM Required Signature key using the MAM Required Policy Generator utility. For more information on using the MAM Required policy and how to configure it on your HCL Connections server, see Configuring the Mobile Server application Management Required policy for Connections Mobile.

Features of HCL Connections for AirWatch

Table 1. Features of HCL Connections for AirWatchThe following table shows the list of AirWatch Mobile Server application management features that are available for use with the HCL Connections for AirWatch mobile app for Android and iOS.
Feature Description
Enterprise app data wipe AirWatch administrator can remotely wipe all app data
Enterprise app lock AirWatch administrator can remotely lock the app.
App Custom Settings AirWatch administrator can automatically configure the server, user ID, and some other parameters.
App Authentication Passcode or Username/Password. If this is enabled, ensure that Single Sign On (SSO) is also enabled. Single Sign On must be enabled if App Authentication is set to anything except disabled.
SSO All AirWatch apps share authentication tokens.
Compromised protection Automatically perform an enterprise wipe if the device is compromised.
VMWare Tunnel Use VMWare Tunnel to provide secure tunneling to on-premises servers. See more information from VMWare:
  • Windows: https://docs.vmware.com/en/VMware-AirWatch/9.1/VMware%20Tunnel%20Guide%20for%20Windows%20v9_1.pdf
  • Linux: https://docs.vmware.com/en/VMware-AirWatch/9.2/VMware%20Tunnel%20Guide%20Linux%20v9_2.pdf
Restrict Copy/Paste If restricted, Copy/Paste can be used within the connections app, but data that is copied from Connections cannot be pasted into other apps.
Restrict Camera access Prevents the HCL Connections for AirWatch app from accessing the camera. This setting is only available when the Default Profile is used and is not with custom SDK Profiles.
Restrict Data Backup Prevents app data from being backed up.
Restrict Open In for Files Documents can only be opened in whitelisted applications.
Restrict Printing Prevents printing from within the HCL Connections for AirWatch app. This feature is only available for HCL Connections for Airwatch on iOS. There is never an option to print from within the HCL Connections for AirWatch on Android app.
Restrict Compose Email Prevents the HCL Connections for AirWatch app from sending data to email. This feature is only available for HCL Connections for Airwatch on iOS.
Restrict Location Services Prevents the use of location services within the application. This feature is only available for HCL Connections for Airwatch on iOS.
Restrict Screen Capture Prevents the screen capture function. This feature is only available for Android.