-
How does everyone handle Apple devices on the network?
I am getting more and more pressure to relax our network security (authenticating proxy mostly) in order to have Macs, iPad and iPhones work smoother on the internal network (appently prox authentication does not play well with the Apple Store).
How does everyone else deal with this. Also, how do you deal with the single user only "feature" of iOS when it is used by several users?
Thanks,
Kevin -