Special Interchange Edition: Ivanti Apple Administrator Base Camp Course

artboard-1

In April of this year, Nine41 Consulting is launching as an Ivanti Expert Solution Provider, specializing in Apple device management for UEM.  As part of that effort, Nine41 Consulting will be hosting a 4-day training course, May 5th – May 8th, just prior to Ivanti Interchange 17.  If you’re interested, register at http://www.nine41consulting.com/training-calendar/

Assigning DEP Enabled Devices to an Apple MDM Server

The Holy Grail

Zero-touch configuration for IT, the holy grail of device management!  This is the promise of a DEP enabled device.  Just buy it and turn it on, it’ll pull down your designated management profile once the device has an established Internet connection and all of the associated settings and applications assigned will be deployed to the device.

Easy, right?  For the most part, yes it is.  All you need to do is make sure your DEP enabled devices, purchased from Apple or from an authorized DEP reseller, are associated with an Apple MDM server.  In turn, that Apple MDM server needs to be configured with your MDM management service.  To configure LANDESK as your preferred MDM server, see my previous blog post.

Today’s discussion will simply focus on getting those Apple devices enrolled with Apple’s MDM server.  While the process only takes a few minutes, it is a required step for that zero-touch configuration; so don’t skip it.

Adding an Apple Device to an Apple MDM Server

  1. Browse to https://deploy.apple.com from your browser of choice deplogin
  2. Provide your Apple ID associated with your DEP account – enroll with Apple here if you have not yet performed this step
  3. Provide your two-factor authentication verification code; this is required by Apple for DEP management2factor
  4. From the menu bar on the left, select Manage Devices
  5. Select your desired radio button to add devices by Serial Number, Order Number or via a CSV Uploadserialnumber-assign
  6. Select the action Assign to Server under Step 2 and find your appropriate server from the drop down list and hit OKassign-complete

And that’s it.  Now when you unbox your shiny new Apple device, whether it be an iOS or macOS device, once it has an Internet connection (the touch part in the zero-touch process 🙂 ), it’ll pull down the assigned profile from your MDM server.  Then, anytime the device is reset, the process will re-enage, ensuring that device always has your MDM profile assigned.

Set and Maintain a Desired Security State for MDM Managed Devices

LANDESK Management and Security Suite 2016.3 has MDM management built into its core functionality.  Once a device is enrolled, you’ll have access to apply a number of different “Agent Settings” commonly known as Configuration Profiles in the Apple world.

LDMS 2016.3 has 4 out-of-the-box editable agent settings that can be built and assigned to a Mac or iOS device; Mobile Compliance, Mobile Connectivity, Mobile Exchange/Office 365 and Mobile Security.  You’ll find all of these profile in the Agent Settings tool within the Configuration toolbar of the Management Suite console.

Mobile Compliance can be used to ensure the device’s integrity.  For example, you can enable a compliance rule to detect if the device has been jailbroken and if it has, choose to selectively wipe it removing access to everything you’ve deployed to the device. mdm-mobilecompliance

Mobile Connectivity is where you would upload certificates to be used to bind to WiFi as well as the appropriate settings for the device to access your corporate WiFi. mdm-wifi-cert

Mobile Exchange/Office 365 should be self-explanatory.  Within this setting you’ll configure how your MDM devices will be configured to access your corporate email. mdm-o365

Mobile Security has the real meat and potatoes for the agent settings.  You can set a password policy, restrict the device functionality such as access to FaceTime, block access to the iTunes store, set the accessible ranges for content and ratings, control the behavior of iCloud and even block TouchID from unlocking the device.  mdm-mobilesecurity

Mix and match the agent settings as desired, when deploying them out you do not need to employ a “one-size-fits-all approach.”   When you create your Agent Settings task, you can select one of each to deploy at, giving you a ton of available combinations of configurations.

Once you have all of your Agent Settings created as desired, just create a Change Agent Settings task and target your MDM devices.

  1. While still in the Agent Settings window, click on the Calendar/Clock icon, it’s the second one in the menu bar and then select Change Settings.change-settings
  2. Give your task an appropriate name, I named mine “Passcode”
  3. Find the “Mobile …” from the list on the right hand side of the panel and click on the corresponding Keep agent’s current settings window area.
  4. Find your newly created Mobile Agent Setting and select it.mdm-changeagentsettings
  5. Now set your desired Task Settings (policy, push, policy supported push) and desired portal settings (required, recommended, optional). I used a policy-supported push and required.
  6. Add in your Targets
  7. Schedule your Change Settings task

Once a device is added to a task and the task is started, every time the device “syncs” with the LANDESK Management Suite server, it will compare itself against the current scheduled tasks on the core with what it currently has applied and will add/remove profiles accordingly.  So don’t delete your task once you’ve successfully applied an agent setting, so doing would in effect tell LANDESK to remove the agent setting from the device the next time it syncs.

Create and Deploy a VPP Software Package to a macOS or iOS Device

Creating and deploying a VPP software package to either a macOS or iOS device is a very simple process within LANDESK Management Suite 2016.3.  See the instructions below or watch the short video vignettes to be off and racing down the VPP software distribution track.

macOS VPP Package Creation and Deployment

  1. Open the LANDESK Management Suite Console
  2. Navigate to the top menu bar, select Tools > Distribution > Distribution Packages.
  3. In the lower left menu tree, highlight My Packages or Public Packages from within the Distribution Packages window
  4. On the Distribution menu bar, press the New Package button and select Macintosh > Macintosh MDM macmdmbutton
  5. Give the package a name
  6. Press the arrow button surrounded by the blue circle next to your Token alias mdmpackagecreation
  7. Highlight the desired VPP app and hit the Select button – note only macOS apps will display in this window mdmpackage
  8. Save the package
  9. Right click on the resultant package and select Create Scheduled Task(s)…
  10. Add one or more macOS devices that have been enrolled with MDM
  11. Start the task

 

iOS VPP Package Creation and Deployment

The iOS package creation is nearly identical, so I won’t include screenshots in these steps.

  1. Open the LANDESK Management Suite Console
  2. Navigate to the top menu bar, select Tools > Distribution > Distribution Packages.
  3. In the lower left menu tree, highlight My Packages or Public Packages from within the Distribution Packages window
  4. On the Distribution menu bar, press the New Package button and select Mobile > iOS
  5. Give the package a name
  6. Select the VPP radio button in the right hand pane, select the appropriate token alias if you have more than one VPP token and then click the arrow within the blue circle
  7. Press the arrow button surrounded by the blue circle next to your Token alias
  8. Highlight the desired VPP app and hit the Select button – note only iOS apps will display in this window
  9. Save the package
  10. Right click on the resultant package and select Create Scheduled Task(s)…
  11. Add one or more iOS devices that have been enrolled with MDM
  12. Start the task

How To Enroll into LANDESK Management Suite’s MDM for both iOS and macOS

As mentioned in my previous post, LANDESK announced their 2016.3 release for Management Suite and with it comes the ability to completely manage macOS and iOS via via an MDM profile.  If you’re lucky enough to have all of your macOS and iOS devices participating in Apple’s DEP, getting the devices enrolled into the LANDESK Management Suite server will be pretty straight forward.  In a later blog post, I’ll cover how to configure DEP within LANDESK

If you’re asking how you place your devices into Apple’s DEP, it may be too late.  As discussed in Apple’s DEP FAQ, in order for a device to be enrolled into the DEP program, it’ll need to be purchased directly from Apple or from an authorized DEP reseller. Which means it’s likely that ship has already sailed for you.

Alas, all is not lost.  You can manually enroll any device into LANDESK, whether or not it’s participating in Apple’s DEP program.

Before you get started, make sure you have all of the architecture pieces in place as outlined here.  Also, if your Macs already have a LANDESK agent installed, at this time, do not place an additional MDM profile on it as well.

macOS Enrollment Steps

  1. Download the enrollment app here or get the latest and greatest version from the LANDESK Community and install it on the desired Macs.  In the future, we will place the enrollment app in the ldlogon/mac directory and possibly even have it available on the Mac App Store if Apple permits it.
  2. Enter a valid Active Directory user account and password.  If you’ve properly configured the DNS TXT entry, it should automatically discover the server URL.  If the enrollment app prompts for a server, enter “fully.qualified.cloudserviceappliancename/coreservername” enrollment-screen
  3. Enter an administrative username and password on the local Mac

iOS Enrollment Steps

  1. Download the LANDESK enrollment app from the iTunes store
  2. Enter a valid Active Directory user account and password.  If you’ve properly configured the DNS TXT entry, it should automatically discover the server URL.  If the enrollment app prompts for a server, enter “fully.qualified.cloudserviceappliancename/coreservername” img_0002

 

 

Configure LANDESK Management Suite 2016.3 for iOS and macOS MDM Management

LANDESK announced their 2016.3 Management Suite release this week and with it comes a number of enhancements to mobility management, including a number of enhancements to the iOS/macOS platforms for MDM management.  Included in the 2016.3 release is the ability to integrate with Apple’s Device Enrollment Program (DEP) and Apple’s Volume Purchase Program (VPP); including supporting multiple VPP tokens.

Luckily, LANDESK has the documentation already available for this configuration.  For ease, I’m going to aggregate all of the needed information to get up and running with LANDESK MDM in one spot.

Architecture Requirement #1 – Cloud Service Appliance

The LANDESK Mobility Device Management does require a LANDESK Cloud Service Appliance.  This can be either a physical appliance you host in your DMZ or a virtual appliance.  If you do not have a CSA, contact your sales representative.  They’re inexpensive and give you the ability to manage devices off your network.

  1. Configure the LANDESK Cloud Service Appliance as discussed in the how-to articles on the LANDESK community page
  2. Ensure your on build 179 or greater – to do this login to your CSA by browsing to https://csa.fqdn/gsb and hit the System Tab on the left hand side.  Then select the Updates tab from the main page and hit Scan For Updates and apply the latest screen-shot-2016-10-20-at-11-27-05-am
  3. Purchase and apply a valid 3rd party SSL certificate for your CSA; see https://community.landesk.com/docs/DOC-32498

Architecture Requirement #2 – LANDESK Management Suite

  1. Install LANDESK Management Suite 2016.3 – https://community.landesk.com/docs/DOC-42261
  2. Import Apple’s APNS certificate to the Core Server – https://community.landesk.com/docs/DOC-39856

Optional Architecture Configurations

  1. Configure the Core server for DEP (optional) – https://community.landesk.com/docs/DOC-42090
  2. Configure the Core server for VPP (optional) – https://appleintheenterprise.com/2016/10/18/import-apples-vpp-token-into-landesk-management-suite/
  3. Configure a DNS TXT entry for easier enrollment (optional) – https://community.landesk.com/docs/DOC-39871

How to Configure iOS LANDESK Workspaces for LDMS and LDMO Integration

Introduction

LANDESK’s Workspaces application for iOS has the capability to integrate with LANDESK Management Suite; enabling users to see software catalog objects and Launchpad links published from Avalanche on Demand.  In addition, based on a user’s role, he/she can see other devices and users information, such as the asset information related to a device, remote control options, tasks applied to a device and even install software to a managed node, all from within the Workspaces app for iOS.

Overview

While the Workspaces app for iOS is powerful, it requires a few unique configuration steps in order to properly take advantage of all of the features. This white paper will discuss the steps required to obtain full integration with LANDESK Management Suite and LANDESK Mobility Manager.

Pre-Requisites

  • A fully functioning Avalanche On Demand (AOD) instance.  If you need to obtain one, you can click on https://billing.aod.wavelink.com/Account/Login.aspx and hit the register button.
  • iOS Devices enrolled into AOD
  • A Cloud Service Appliance
  • LANDESK Management Suite 9.6 or later or LANDESK Service Desk 7.8 or later installed with the BridgeIT services configured

Backend Configuration Overview

LANDESK Workspaces is driven by an HTML 5 backend service that is hosted on LANDESK Service Desk or LANDESK Management Suite.  You need to ensure you have the proper settings applied within the Configuration Center for the respective platform you’re using to host the Web Services.  If you own both LANDESK Management Suite and LANDESK Service Desk, you should host the service on LANDESK Management Suite so that it can properly integrate with the user/device based search.  For more details on the different types of configurations, seehttps://community.landesk.com/support/docs/DOC-34966

To properly apply the appropriate settings for LDMO integration, launch Configuration Center by going to  http://servername/ConfigurationCenter.  The default username is ‘sa’ and the default password is ‘administrator.’  Now you are also going to need to know your customer ID, generate a workspace public key then apply it and sync managed devices from AOD.  To do this, you’re also going to need to launch http://aod.wavelink.com or your own hosted instance and follow these steps:

  1. Login to Avalanche and click the ‘My Account’ link in the upper right corner.
  2. Select the ‘Company ID’ and copy it.
  3. On the server that you will run BridgeIT from, launch the configuration center and log in.
  4. Click the instance you are using.  For LDMS customers, the default instance will be named ‘My’configcenter - instance names.png
  5. Click the ‘Edit’ link on the BridgeIT application to access the configuration options, again for LDMS customers the default name will be ‘My.BridgeIT’configcenter - edit instance.png
  6. Fill in the dialogue with the below properties:
Configuration Parameter Value
Name Whatever this is already set to (My.BridgeIT)
Application Pool Whatever this is already set to (My AppPool1)
Logon Policy Token Only
LDSD Web API URL http://servicedeskservername/tokenonlyinstancename
LDMS Web API URL https://ldmsservername/ldapi/api
STS Issue Token URL https://ldmsservername/STS/issueToken (This may be set to the SD token server LDMS is not in the environment.  If LDMS is present, use it)
Avalanche Enterprise Server URL https://aod.wavelink.com (This server will be different if you’re hosting AOD in your own environment.  Refer to your ‘My Account’ page in AOD).
Avalanche Smart Device Server URL https://sds.aod.wavelink.com (This server will be different if you’re hosting AOD in your own environment.  Refer to your ‘My Account’ page in AOD).
Avalanche Company ID Paste your value from step 2 (aa1a1111a-aaa1-1111-11aa-1a1111a1111a)
Enable LDMS Agent Integration True (If using LDMS)

configcenter - all settings.png

  1. Click the ‘Generate’ link.
  2. Click the ‘Download Public Key’ link.
  3. Click ‘OK’.
  4. Go back to Avalanche, in the ‘Tools’ panel, click ‘System Settings’.
  5. In the ‘Public Key (BridgeIT Server)’ section, click ‘Add’ or ‘Replace’ and select the key you downloaded from Configuration Center.aod config - publickey.png
  6. Select the key generated from Configuration Center and click ‘Open’.
  7. Ensure the ‘LDMS Core Server’ section contains the right settings.
Core Fully-qualified server name
  1. Coreservername.domain.extension
LDMS Service account Domain\username
LDMS Password serviceaccountpassword
  1. Ensure your ‘LDAP Account’ section contains the right settings.
LDAP Server Address
  1. xxx.xxx.xxx.xxx
LDAP Username Domain\username
LDAP Password serviceaccountpassword
  1. Check the box for ‘Use Cloud Services Appliance’ and provide the proper public FQDN for your CSA.
Cloud Services Appliance Public Address https://cloudserviceappliancename.domain.extension

aod config - all settings.png

  1. Check the box for ‘Enable User Targeting (Requires LDAP Integration Services Configuration)’ under the User Targeting Mode heading
  2. Click ‘Test Connectivity’ on both the ‘LDMS Core Server’ and ‘LDAP Account Settings’ and validate the tests pass.
  3. At the top of the page, click ‘Save’.
  4. To sync the server certificates, open the ‘Inventory’ panel and click the ‘Needs Deployment’ link.
  5. In the ‘Server Deployment’ dialog, click ‘Finish’.

iOS Device Configuration for Workspaces

For proper integration with LDMO and LDMS, LANDESK Workspaces must be deployed from AOD itself.  Therefore, before any additional steps can be taken, you need to make sure your iOS devices are under management.  For more information on how to enroll an iOS device into AOD, see:

Create the Workspaces Software Payload

A payload is essentially a package with instructions for the mobile device.  Payloads can consist of specific settings such as restriction settings, app package information, certificates or links to files or services.  We are going to create a software payload that distributes LANDESK Workspaces to all managed nodes.

  1. Login to the Avalanche console (aod.wavelink.com)
  2. Select the profiles tab from the left-hand pane
  3. Click on the plus(+) button within the ‘Available Payloads’ section                                                                       payload - new payload button.png
  4. Ensure the radio button is set to iOS under the platform heading and then click on the ‘Software’ link for the payload type
  5. Give the payload a descriptive name, such as LANDESK Workspaces – iOS
  6. Leave the radio button set to ‘Automatically push to device’
  7. Leave the radio button set to ‘AppStore’ for the software hosting
  8. Click on the magnifying glass within the App input box
  9. In the Search box, enter LANDESK Workspaces and click the magnifying glass                                                  payload - application search.png
  10. From the Search Results, select LANDESK Workspaces app and then click the ‘Add Selected App’ button
  11. The App box should now be populated with an App ID number, something similar to 888025691 and you should see the LANDESK Workspaces icon and text in the Preview Box.  Leave all other settings as is and click Save.

payload - landesk workspaces.png

Create Optional Software, Links and Documents for the iOS Device

One of the primary purposes for the Workspaces application is to allow end-users the flexibility to install optional software titles, view documents published and to access links to external services.  Use this step to configure some optional objects so that when the user accesses Workspaces, content will be available to them.

Create an Optional Software Payload

  1. Login to the Avalanche console (aod.wavelink.com)
  2. Select the profiles tab from the left-hand pane
  3. Click on the plus(+) button within the ‘Available Payloads’ section
  4. Ensure the radio button is set to iOS under the platform heading and then click on the ‘Software’ link for the payload type
  5. Give the payload a descriptive name for the application to be published
  6. Set the radio button set to ‘Display this option in the corporate portal’
  7. Leave the radio button set to ‘AppStore’ for the software hosting
  8. Click on the magnifying glass within the App input box
  9. In the Search box, enter the name of your app and click the magnifying glass
  10. From the Search Results, select your desired app and then click the ‘Add Selected App’ button after the preview has properly updated in the preview panel.
  11. The App box should now be populated with an App ID number and you should see the app icon and text in the Preview Box.
  12. Leave the Destination folder as is
  13. If you would like an installed application to show up in Launchpad within Workspaces, you need to supply the deep link url in the format of the linkname://.  Discovering the deep link name can be a challenge.  For additional information on deep links, see my blog post here.
  14. Click Save

Create a Link Payload

  1. Login to the Avalanche console (aod.wavelink.com)
  2. Select the profiles tab from the left-hand pane
  3. Click on the plus(+) button within the ‘Available Payloads’ section
  4. Set the radio button is set to iOS and Android under the platform heading and then click on the ‘Link’ object for the payload type
  5. Give the payload a descriptive name for the link to be published
  6. Give the payload the desired label you want the users to see
  7. Enter the appropriate URL or deep link
  8. Provide an icon if desired (this will not display at this time, but worth setting for the future)
  9. Check the additional options as desired
  10. Select the ‘Display this option in corporate portal’
  11. Leave the destination folder as is
  12. Select the ‘Default browser’ option for the desired application to launch the link
  13. Click Save

Create a Document/Media Payload

  1. Login to the Avalanche console (aod.wavelink.com)
  2. Select the profiles tab from the left-hand pane
  3. Click on the plus(+) button within the ‘Available Payloads’ section
  4. Set the radio button is set to iOS and Android under the platform heading and then click on the ‘Document/Media’ object for the payload type
  5. Give the payload a descriptive name for the link to be published
  6. Leave the destination folder as is
  7. Set any appropriate storage options
  8. Click Save

Create the Profile to Deploy the Workspaces Payload

A profile consists of one or more payloads that can be assigned to the mobile devices via group based targeting.  We now need to create a Profile that contains, at the minimum, the LANDESK Workspaces payload.  However, if you desire, you may also include other payload types, such as a passcode settings payload, wifi settings, certificates, links, documents as well as other optional or required applications.

  1. Login to the Avalanche console (aod.wavelink.com)
  2. Select the profiles tab from the left-hand pane
  3. Click on the plus(+) button within the ‘Available Profiles’ section
  4. Select the link for ‘Device settings and contents’                                                        deploy - new profile.png
  5. Give the profile a distinctive name
  6. From the available payloads section, scroll down to the ‘Software (iOS) section and select the LANDESK Workspaces payload or whatever you named your profile in step 5 of the previous section.  Include any additional payloads if desired and then click the Save button.

deploy - profile selection assignment.png

Assign the Profile to a Group or a User for Deployment

Profiles are targeted to a user, Active Directory group or mobile device group.  Mobile device groups allow you to group devices together based on selection criteria you configure. You can create dynamic or static groups. In both group types, new devices can be added to the group based on changes to the selection criteria.  For additional information on creating mobile device groups, click here.

  1. Login to the Avalanche console (aod.wavelink.com)
  2. Select the profiles tab from the left-hand pane
  3. Highlight the user, Active Directory group or mobile device group to be used for device targeting
  4. Check the box left of the name for the profile created previously in the Available Profiles section
  5. While ensuring the proper user, Active Directory group or mobile device group is highlighted and the appropriate profile has been checked, click the checkbox (√) button in the Available Profiles sectiondeploy - profile assignment to group.png
  6. Apply any selection criteria if desired or simply click on the Schedule Deployment button to target the users or all devices assigned to the group
  7. From the Schedule Deployment window, select the Deploy Now option and hit Apply

Finalize the iOS Workspaces Configuration

On the iOS device, the end user should be prompted to install the ‘LANDESK’ app.  Proceed with the install on a device by device basis.  If this is the first time a device is receiving an application, additional prompts for VPP or other configuration settings may also prompt. Once the application is installed, we also need to force the devices to check in and sync their information two separate times in order to finalize the Workspaces app enrollment.

app install - landesk.PNG

  1. Login to the Avalanche console (aod.wavelink.com)
  2. Select the inventory tab from the left-hand pane
  3. Search for your desired device or highlight the device group that contains your desired devices
  4. Check the box for one or more of the devices in the list
  5. Click on the second icon, Update, from the menu bar, it has a down arrow surrounded by two circular arrowsupdate - icon press.png
  6. When prompted, click the Update Device(s) button                                                                                                          update - confirmation.png
  7. Wait for a short period of time and refresh the console to validate the device updated its Last Contact date
  8. Repeat the update process a second time

Login to the iOS Workspaces Configuration

You should be all set at this point and capable to login to Workspaces for iOS on your device.

  1. Launch Workspaces on the iOS device
  2. Enter your email or domain ID
  3. Supply your password
  4. Check the box to ‘Sign in Automatically’ if desired
  5. Provide the Workspaces server URL.  This should be something like https://coreservername/my.bridgeit or https://servicedeskservername/instancecreatedapp - login.PNG
  6. Click the ‘Sign In’ button                                                                                       workspace - launchpad

 

How to Add Apps to Launchpad inside of iOS Workspaces

Overview

The Launchpad feature inside of Workspaces for iOS can handle much more than just URL links, however, this process has not been documented and is a bit rough around the edges when it comes to the usability. Nevertheless, by adding the deep link path or URI information into the launch path of an app, once installed on the mobile device, Launchpad will display a tile for the app and if you’re lucky (dependent on the app vendor) an icon associated to the app.

In the screenshot of Workspaces below, I have created a deep link to the app Evernote, Hootsuite, LetMobile, iOS Mail, Salesforce1 and Twitter. I also have standard links to the LANDESK Community and one other site. If I were to click on Salesforce1, it would initially prompt me to allow (this only takes place the first time), and then open up into Salesforce1. However, because it was launched from Workspaces, you’ll see at the top left of Salesforce1 there is a link back to LANDESK.
As such, using this method, one could theoretically create a whitelist of approved apps and links, put an iOS device in supervised mode and only allow Workspaces to run. So doing would allow the admin complete control over the device and what is allowable to execute.

IMG_1338IMG_1339IMG_1340

Mobile Deep Linking

Mobile deep linking consists of using a hyperlink that links to a specific piece of content within an app or to just the app itself. For example, the deep link for Twitter is twitter://. Putting twitter:// into the launch path will open the app Twitter to it’s default home page. However, if you add twitter://timeline it will open up the app to the timeline feature. This deep link needs to be added to the Launch path section of the iOS software payload. For more in deep linking, see: Mobile deep linking – Wikipedia, the free encyclopedia

Configuring AOD for Deep Linking

Setting up a software package to be deep linked is quite simple. All you need to do is put the deep link into the Launch path on the software payload for the app. See the screenshot below for Hootsuite. However, if the app you’re trying to deep link is included within iOS, such as iOS Mail, you’ll need to use a Link Payload inside of AOD under the iOS and Android section.

Figuring out what the deep link is for a given app is going to require some patience as they’re not always published and not exactly obvious. You’ll need to employ a “try and see” approach or maybe even contact the vendor. In my limited testing, I was not able to discover Cisco AnyConnect or Cisco WebEx. As a tip, I would attempt to find the URI by searching for the name of the app combined with iOS to pull up the itunes web link. That web link will contain the app’s full name as well as the ID. I would take that full name and attempt to combine words to discover what the URI might be. This helped me figure out that 1Password’s URI is onepassword:// and not 1password://.

The deep links I’m aware of are:

  • 1Password – onepassword://
  • Audible – audible://
  • Apple Mail – message:// (this needs to be created as a Link package inside of AOD for iOS and Android and not a software package)
  • Ebay – ebay://
  • Evernote – evernote://
  • Facebook – fb://
  • Hootsuite – hootsuite://
  • LetMobile – letmobile://
  • Twitter – twitter://
  • Salesforce 1 – salesforce1://
  • Strava – strava://
  • YouTube – YouTube://