product icon

Glossary of terms

the secure token

An account attribute allows some critical operations, such as FileVault disk encryption, on a device. The token is automatically granted to the first user account created via Setup Assistant or Automated Device Enrollment.


Android Debug Bridge

Android Enterprise

Android Enterprise is a Google-led initiative to enable the use of Android devices and apps in the workplace

Apple Push Notification service

Apple Push Notification service is a platform notification service that enables third-party application developers to send notification data to applications installed on Apple devices.


Application Programming Interface. Application refers to any software with a distinct function. The interface can be seen as a contract of service between two applications.

basic authentication

Basic authentication (also known as Legacy authentication) is a deprecating authentication method that uses a combination of a username and password for authentication.


Bring your own device means bringing your own phone and allowing to use one's personally owned device, rather than being required to use an officially provided device.


Comma-separated values file is a delimited text file that uses a comma to separate values.


Enterprise mobility management is a set of systems intended to prevent unauthorized access to enterprise applications and corporate data on mobile devices.

MAC address

Media Access Control (MAC) address, also known as the physical or hardware address, is a unique identifier assigned to a network device.

MAC address filtering

MAC address filtering is a security access control method whereby the physical MAC address assigned to each network device is used to determine its access to the network.


Mail for Exchange


Mobile device management is security software that enables policies to be implemented on mobile devices.

MDM profile

Mobile device management is security software that enables policies to be implemented on mobile devices.


Near-field communication is a set of communication protocols that creates a connection between two electronic devices over a distance of 4 cm or less.


Open Authorization (OAuth) authentication is a newer and safer, token-based authentication protocol available in Microsoft Exchange.


Secure Sockets Layer, a security protocol that creates an encrypted link between a web server and a web browser.

Apple Device Enrollment Program (DEP)

The Device Enrollment Program helps businesses deploy and configure Apple devices.

Android Application Packages (APK)

The file format used by the Android operating system for distribution and installation of mobile apps.


The General Data Protection Regulation is a regulation in EU law on data protection and privacy in the European Union and the European Economic Area.


The Lightweight Directory Access Protocol is an open, vendor-neutral, industry standard application protocol for using distributed directory information services over an Internet Protocol network.


The Volume Purchase Program makes it easy for businesses to purchase, distribute, and manage their apps in bulk


Virtual Private Network extends a private network across a public network and enables users to send and receive data across the networks as if their computing devices were directly connected to the private network.