Microsoft Endpoint Manager - Android Enterprise Shared device mode user experience

Intune Support Team
26 Apr 202101:34

Summary

TLDRThe script showcases a streamlined user experience for a salesperson named Jill. She signs in to a device using SMS, sets a session-specific PIN, and accesses productivity tools like Teams on a compliant device, bypassing conditional access policies. At the end of her shift, Jill can quickly log out, clearing all data for the next user. An automated sign-out timer ensures data security even if she forgets to sign out, making the device ready for the next worker.

Takeaways

  • 📱 Jill uses a device to sign in at the start of her shift using SMS.
  • 🔒 She receives a notification to complete sign in without the need for a username and password.
  • 🔓 After signing in, Jill is prompted to set a session-specific PIN for resuming her session.
  • 🚫 If Jill's device were not compliant, she would be blocked by conditional access policies.
  • 💼 Jill uses Microsoft Teams for productivity during her shift, which offers frontline worker features.
  • 🔄 Compliant device access is crucial for Jill to utilize Teams and other tools effectively.
  • 🏢 The device is designed for easy log out and data clearance at the end of Jill's shift.
  • 🕒 An automated sign-out timer is set up by Eric to ensure data clearance if Jill forgets to sign out.
  • 🔄 The device is ready for the next user immediately after sign out or automated sign out.
  • 🛡️ Compliance is a key factor in ensuring security and productivity for frontline workers like Jill.
  • 🔄 The script highlights the importance of a seamless and secure user experience for frontline workers.

Q & A

  • What is the method Jill uses to sign in to her device at the beginning of her shift?

    -Jill signs in to her device using an SMS-based authentication method, which sends a notification to her personal device to complete the sign-in process without needing to enter her username and password on the device's small keyboard.

  • Why is Jill prompted to define a PIN after signing in?

    -Jill is prompted to define a PIN to enable her to resume her session when the screen saver kicks in, which provides a more convenient way to access her session without having to re-enter her credentials throughout her shift.

  • What application does Jill use to stay productive during her shift, and what features does it offer for frontline workers?

    -Jill uses Microsoft Teams to stay productive during her shift. Teams offers a whole array of frontline worker features designed to enhance communication and collaboration for employees working on the front lines.

  • How does the device ensure compliance with security policies?

    -The device ensures compliance by blocking access if it is not compliant with the conditional access policies. This ensures that only compliant devices can access sensitive information and services.

  • What happens if Jill's device is not compliant with the security policies?

    -If Jill's device is not compliant, she would be blocked by conditional access policies until the compliance issues are rectified.

  • How does Jill log out of her session at the end of her shift?

    -Jill can easily log out of her session, which clears all the data and prepares the device for the next user.

  • What is the consequence if Jill forgets to sign out at the end of her shift?

    -If Jill forgets to sign out, an automated sign-out timer configured by Eric ensures that the data is still cleared and the device is ready for the next worker.

  • What is the purpose of the automated sign-out timer configured by Eric?

    -The automated sign-out timer is designed to clear the data and prepare the device for the next user in case the current user forgets to sign out, ensuring security and efficiency in device usage.

  • How does the script highlight the importance of device compliance in a work environment?

    -The script highlights the importance of device compliance by showing that non-compliant devices are blocked from accessing services, which is crucial for maintaining security and data protection in a work environment.

  • What is the significance of using a PIN for resuming sessions in the context of the script?

    -Using a PIN for resuming sessions, as shown in the script, adds an extra layer of security and convenience for the user, allowing for quick access without the need to repeatedly enter full credentials.

Outlines

00:00

📱 Secure and Convenient Sign-In Process

The script introduces Jill, a salesperson, who begins her shift by signing into a device using SMS. Instead of a traditional username and password, she receives a notification on her personal device to complete the sign-in process. This eliminates the need for manual entry on the device's keyboard. After signing in, Jill is prompted to set a session-specific PIN for resuming her session when the screen saver activates, enhancing security without the need for continuous credential entry. She then launches Teams, a productivity tool with features tailored for frontline workers, which she can access due to her device's compliance with security policies. Non-compliant devices would be blocked until issues are resolved. The script also mentions an automated sign-out timer set by Eric, ensuring data clearance and device readiness for the next user, even if Jill forgets to sign out.

Mindmap

Keywords

💡End User Experience

End user experience refers to the interaction and overall experience a user has with a product or service. In the video, this concept is central as it describes how Jill, the salesperson, interacts with the device at her workplace. The ease with which she signs in, uses the device, and logs out reflects the importance of a positive end user experience in ensuring productivity and security.

💡Salesperson

A salesperson is an individual who sells goods or services to customers, often in a retail setting. Jill is a salesperson at a resort shop, and her role is to provide a service to customers while using the device, which is the focus of the video's narrative. Her experience with the device directly impacts her ability to perform her sales duties effectively.

💡Sign In

Sign in is the process of identifying oneself to a system or device to gain access to its features or data. In the script, Jill uses her SMS to sign in, which is a method of authentication that enhances security by not requiring a traditional username and password. This process is crucial for the beginning of her work shift and is a key part of the user experience.

💡Personal Device

A personal device is a piece of technology that an individual uses for their own purposes, often separate from work-issued equipment. In the video, Jill receives a notification on her personal device, which prompts her to complete the sign-in process on the work device. This illustrates the integration of personal and professional technology in the workplace.

💡Notification

A notification is an alert or message that informs a user of an event or action. In the context of the video, Jill receives a notification on her personal device that prompts her to complete the sign-in process. This is an example of how technology can streamline workflows and improve user engagement.

💡PIN

A PIN, or Personal Identification Number, is a secret numeric password used to authenticate a user to a system. In the video, Jill is prompted to define a PIN for her session, which allows her to resume her work without re-entering her credentials. This feature enhances security and convenience during her shift.

💡Session

A session refers to a period of time during which a user is actively engaged with a system or device. In the script, Jill defines a PIN for her session, which is specific to her work period. The concept of a session is important for managing access and ensuring that the device is ready for the next user after Jill's shift ends.

💡Compliance

Compliance refers to the adherence to rules, policies, standards, or laws. In the video, Jill's device must be compliant to access certain features like Teams. Non-compliance would result in being blocked by conditional access policies, which is a measure to ensure that only compliant devices can access sensitive information or services.

💡Conditional Access Policies

Conditional access policies are security measures that control access to resources based on certain conditions being met, such as device compliance. In the video, these policies would block Jill's access if her device were not compliant, emphasizing the importance of maintaining security standards in a work environment.

💡Log Out

To log out is the action of signing out of a system or device, typically to end a session. In the script, Jill can easily log out of her session, which clears all data and prepares the device for the next user. This is a crucial step in maintaining security and privacy, especially in a shared work environment.

💡Automated Sign Out Timer

An automated sign out timer is a feature that automatically logs a user out of a system after a period of inactivity. In the video, Eric has configured such a timer to ensure that if Jill forgets to sign out, the device still clears its data and is ready for the next worker. This adds an extra layer of security to the device usage process.

Highlights

Jill, a salesperson, uses a device to sign in at the start of her shift via SMS.

Jill receives a personal device notification to complete sign-in without using a username and password.

After signing in, Jill is prompted to define a PIN for session-specific access.

Jill launches Microsoft Teams to stay productive during her shift.

Teams offers an array of features for frontline workers.

Compliance with device policies is required for access to Teams.

Non-compliant devices would be blocked by conditional access policies until issues are resolved.

Jill can easily log out at the end of her shift, clearing all session data.

An automated sign-out timer is configured to clear data if Jill forgets to sign out.

The device is ready for the next user after Jill's session ends or is automatically signed out.

The system allows for a seamless transition between users with minimal manual intervention.

SMS authentication provides a secure and convenient sign-in method for Jill.

Defining a PIN enhances security by restricting access to the current session only.

Microsoft Teams integration supports productivity and communication for frontline workers.

Compliance with IT policies ensures the security and integrity of the workplace devices.

Automated logouts safeguard against data breaches in case of user oversight.

The system is designed for quick and efficient user turnover, optimizing device utilization.

Transcripts

play00:00

now let's take a look at the end user

play00:02

experience

play00:03

jill is a salesperson at one of the

play00:05

resort shops

play00:06

when she begins a shift she picks up a

play00:08

device

play00:10

and signs in using her sms

play00:13

she enters her phone she gets a

play00:16

notification on her personal device

play00:18

to complete the sign in without her

play00:20

username and password

play00:21

on the device's small keyboard

play00:24

now after signing in jill is prompted to

play00:27

define a pin

play00:28

specific to this session this enables

play00:31

her to resume her session whenever the

play00:33

screen saver kicks in

play00:34

rather than having to use her

play00:35

credentials throughout her shift

play00:38

now jill launches teams which she uses

play00:40

to stay productive

play00:41

during her shift

play00:45

now teams as you know has a whole array

play00:49

of frontline worker features

play00:51

and because she's working from a

play00:52

compliant device she's able to

play00:54

successfully gain access

play00:56

if jill's device were not compliant she

play00:59

would have been blocked by conditional

play01:00

access policies

play01:01

until the compliance issues were

play01:03

rectified

play01:08

now when jill's shift ends she can

play01:10

easily log out of her session which

play01:12

clears

play01:13

all the data and is immediately ready

play01:15

for the next user

play01:16

now let's say jill is in a rush and

play01:18

forgets to sign out

play01:20

she puts the device down and leaves the

play01:22

shop

play01:23

eric had configured an automated sign

play01:26

out timer

play01:26

so the data still gets cleared and the

play01:29

device is now ready for the next worker

play01:31

to pick up

play01:31

and sign in

Rate This

5.0 / 5 (0 votes)

相关标签
Frontline WorkSecure Sign-InAutomated LogoutCompliance PoliciesShift ManagementDevice SecurityProductivity ToolsUser ExperienceSession PINData Protection
您是否需要英文摘要?