Informatica mdm jobs
...screen-share session so I can replicate the changes on any future iOS updates. • Written rollback steps in case something breaks essential connectivity. I’ll choose a freelancer who can briefly outline relevant iOS security or network-hardening experience—no long proposals needed, just enough detail to show you have tackled similar restrictions on Apple hardware before. *****I need a complete MDM environment setup for my company from ground up for enterprise security level protection. Core requirements include auto provisioning, deployment and configured full Stack (Server, certifications, profiles, Compliance policies) with cross platform policies including beacon protection. *****Enterprise-grade security policies for encryption, vpn, firewall and patch ...
...• Experience in Windows 10/11, desktop/laptop hardware troubleshooting. • Proficiency with Microsoft Office 365 tools and ecosystem. • Good knowledge of Active Directory – user account management, password reset, and access requests. • Familiarity with ticketing systems (e.g., BMC Remedy 7.5+, Wired). • Understanding of network basics – TCP/IP, DNS, DHCP, LAN, WAN, Wi-Fi. • Exposure to Intune / MDM tools is a plus. • Awareness of ITIL practices and service-level standards. ________________________________________ Soft Skills Required: • Strong verbal and written communication skills. • Customer-focused attitude with proactive problem-solving. • Ability to remain calm under pressure and manage multiple priorities. &bull...
we want to install & maintain remote access to android devices, i have already setup Headwind MDM on our server and able to assign the device a corporate device, but when i click on any app, they do not open. If you have already worked on such open source apps, please bid, otherwise, dont waste time by starting your offer with word opensource, or we delete your bid without readying
...that relies on Informatica IDMC MDM, and I want an experienced specialist (around 7–12 years in the MDM space) who can jump in right away. The work centres on material master data: pulling existing material records from IDMC through the platform’s APIs, allowing a user to modify or enrich that data in real time, and finally creating brand-new material entries via the same service layer. You’ll be the point person for every technical decision, comfortable debating approaches with our Data Architects and translating those ideas straight into working configurations. Hands-on knowledge of the native MDM APIs is essential; exposure to cloud or ERP endpoints such as GCP or SAP will make integration smoother and is therefore preferred. A soli...
...Admin, Master & Distributor web panels - Laravel/Symfony backend with all APIs - Database schema & migrations - API documentation - Deployment guide - 1 month post-delivery bug fix support --- ## Additional Notes - **Annual AMC (Annual Maintenance Contract)** will be offered to the developer after successful project completion every year. - We prefer developers who have **prior experience with MDM (Mobile Device Management)** or similar device control systems. - NDA signing may be required before project start. - Milestone-based payment preferred. --- ## To Apply, Please Include 1. Your relevant **past projects** (especially Android + Laravel/Symfony) 2. Your **proposed timeline** for delivery 3. Short **technical approach** — how you will handle remote lock/u...
...native device-management APIs (Device Admin / MDM for Android, Managed App Configuration or similar for iOS) to guarantee the screen is completely inaccessible until the user hits our “Pay Now” button and the payment gateway or UPI callback confirms success. Acceptance criteria 1. A test borrower added from the dashboard is auto-locked within 60 seconds of a missed due date on both Android 11+ and iOS 15+. 2. Successful payment through the integrated gateway removes the lock without reinstalling the app. 3. All events—lock, unlock, payment—are timestamped and visible in the dashboard log. 4. Code passes a security review and is documented well enough for my in-house team to continue development. If you have shipped Device Admin or MDM-styl...
...native device-management APIs (Device Admin / MDM for Android, Managed App Configuration or similar for iOS) to guarantee the screen is completely inaccessible until the user hits our “Pay Now” button and the payment gateway or UPI callback confirms success. Acceptance criteria 1. A test borrower added from the dashboard is auto-locked within 60 seconds of a missed due date on both Android 11+ and iOS 15+. 2. Successful payment through the integrated gateway removes the lock without reinstalling the app. 3. All events—lock, unlock, payment—are timestamped and visible in the dashboard log. 4. Code passes a security review and is documented well enough for my in-house team to continue development. If you have shipped Device Admin or MDM-styl...
I need an IBM Infosphere MDM specialist who can take ownership of our data-integration layer and help me raise accuracy and consistency across the platform. The engagement is fully remote but you must sit somewhere in Europe so we can work within a comfortable time-zone overlap; fluent English is essential for day-to-day collaboration. My priority is Data Integration. Multiple operational databases, several cloud services and a growing set of partner-facing APIs all need to flow cleanly into the MDM hub. I already have core MDM services online, yet duplicate records and mismatched attributes keep creeping in. Your job is to analyse the current ingestion routes, design (or redesign) the mappings, and configure the Infosphere components—Integration Hub, DataStag...
I would like a secure, reliable way to view a single Android phone remotely so I can monitor its call logs, text messages, app usage/activity and GPS location in real time. Here’s what I need accomplished: • Recommend and configure the most appropriate remote-monitoring solution (MDM platform, custom script over ADB, or any proven third-party tool that supports live dashboards). • Set the target device up so all four data streams—calls, messages, app activity and location—sync continuously without noticeable lag. • Walk me through granting the required permissions on the phone and any server or web console setup on my side. • Provide a short guide for reconnecting or troubleshooting should the device reboot or lose signal. Acceptance...
I am a Cybersecurity and IT Support professional with 9+ years of experience, and I need my resume professionally optimized for SOC Analyst, Cybersecurity Engineer, and IT Support roles. My experience includes: * Threat monitoring, incident response, and security analysis * Trend Micro EDR, XDR, Email Security, and MDM implementation and support * Cloud security and administration in Microsoft Azure, AWS, and Google Cloud * Network support including LAN, TCP/IP, routers, switches, and firewalls * Laptop, desktop, printer installation, configuration, and troubleshooting * CCTV installation, configuration, monitoring, and troubleshooting * IT infrastructure support, system troubleshooting, and endpoint security Certifications: * Microsoft Certified: Azure Administrator Associate (...
...an existing, valid in-house (enterprise) certificate. What I need from you • The .p12 file for an Apple enterprise certificate (with its password) • A distribution provisioning profile that allows installation of my single app or a wildcard profile, whichever you prefer How I will use it I will sign the IPA in Xcode/Fastlane and host it for over-the-air installation through our internal MDM. No App Store submission is involved. Minimum requirements • Certificate must be issued by Apple’s Enterprise Program and remain active for at least twelve months. • Provisioning profile must install on any corporate device running the current iOS version. • I will verify by installing the signed build on several test devices before releasing pay...
...has provided final answers only, with no clear working shown. I require complete, step-by-step worked solutions that clearly explain the reasoning and methodology so I can use them as a study and revision guide. Key Topics Covered 1. Flexibility Method (Force Method) • Degree of static indeterminacy • Clear identification and justification of redundant forces 2. Moment Distribution Method (MDM) • Full moment distribution table • Stiffness factors (K) • Distribution factors (DF) • Carry-over moments 3. Plastic Analysis • Collapse mechanism diagrams • Calculation of plastic moment capacity (Mₚ) and/or load factor 4. Asymmetric Bending • Calculation of principal axes • Orientation of the neutral axis 5. Materials Scie...
...scripts/workflow so another operator can step in without downtime. Acceptance criteria 1. At least 95 % of accounts remain unflagged after a seven-day stress test. 2. Target volume of likes/comments per account achieved with <5 % action errors. 3. Data exports arrive on schedule and match TikTok back-end numbers within a 2 % margin. If you already have experience juggling large fleets with ADB, MDM suites, or custom Python/Node automation, let’s talk; I’m ready to move quickly....
...JumpCloud. Because no formal SOPs exist yet, the first milestone is to document a lightweight but complete runbook that covers onboarding, off-boarding, patch cadence, escalation paths, and routine health checks. Once that foundation is in place, the work shifts to ongoing weekly maintenance, ad-hoc support, and quarterly reviews of the security posture. Tooling JumpCloud Admin Portal, built-in MDM/patch features, plus any complementary scripting (PowerShell, Bash) you find useful. Git or a shared drive can hold the living documentation. Acceptance criteria 1. Runbook delivered in shareable format and agreed upon. 2. All current PCs report 100 % policy compliance and up-to-date software within the first two weeks. 3. A clear change log maintained for every account or...
...confirmations with Apple MDM workflows so a newly sold device is instantly and automatically unlocked for the customer. Scope – Design the end-to-end automation using n8n or another self-hostable low-/no-code platform of your choice (no SaaS lock-in). – Implement the API logic: listen to Stripe webhooks from the POS, validate payment, then hit the Apple MDM/DEP/ABM endpoints to push the “fully unlock device” command - you can suggest MDM provider if you have past experience. – Ensure the flow is scalable and easy to extend later to SumUp or other payment providers. – Deliver concise technical documentation covering install, environment variables, key nodes, and how to add future triggers. What I’m bringing &b...
...privacy-preserving transformations so that multiple parties can collaborate on sensitive datasets without risk. What I expect from you is a focused, hands-on transfer of know-how rather than a generic primer. Walk me through real-world patterns, preferred storage layers, and the way you wire up connectors and workflow engines. If you have battle-tested approaches using platforms such as Apache NiFi, Talend, Informatica—or any equivalent stack—please weave those in, but feel free to recommend superior alternatives if they serve the clean-room model better. Deliverables • 3–4 live or recorded sessions (screen-share) illustrating architecture, pipeline setup, and governance checkpoints • A concise reference document summarising the clean-room componen...
Project Description We need a person to work on ETL development, Informatica IDMC) Work Type Full-time or Part-time 3–5 days per week Around 4 hours per day Remote work Required Skills Informatica PowerCenter & IDMC ETL development SQL Payment Payment based on work More pay if performance is very good
Project Title Data Integration & Visualization Specialist Project Description We need a person to work on ETL development, Informatica IDMC) Work Type Full-time or Part-time 3–5 days per week Around 4 hours per day Remote work Required Skills Informatica PowerCenter & IDMC ETL development SQL Payment Payment based on work More pay if performance is very good
...iPhones should be able to dial or message it either. I’m open to whatever approach you believe is most reliable—an MDM configuration profile created with Apple Configurator or Jamf, a carrier-level restriction, or another verifiable method—so long as it stays in place and can be rolled out to each handset without physically collecting them. Deliverables • A working solution that blocks the target number for calls and messages on every device involved • Step-by-step deployment instructions (plus any configuration profiles or scripts) so I can repeat the process on new iPhones • A quick test plan we can run together to confirm the block is airtight Experience with Apple’s MDM framework, Apple Configurator, Jamf, or equivalen...
Project Title: Data Integration & Visualization Specialist for ETL, IDMC, Informatica & Qlik Project Description: We are seeking an experienced Data Integration & Visualization Specialist for a project involving ETL development, Informatica, IDMC, and Qlik. The goal of the project is to design, implement, and maintain data pipelines and dashboards for seamless data processing and reporting. Responsibilities: Design and develop ETL pipelines for data extraction, transformation, and loading. Work with Informatica PowerCenter and IDMC to manage and optimize data workflows. Develop and maintain Qlik dashboards and reports for data visualization. Ensure data quality, accuracy, and consistency across systems. Collaborate with project stakeholders to meet r...
I need help fully removing a Mobile Device Management (MDM) profile from my Android handset that is still operational and in daily use. I suspect the profile is giving someone unauthorized access, so the job isn’t just about clearing a configuration—my goal is to regain complete control and ensure there are no lingering admin privileges or hidden backdoors afterward. The ideal approach will: • Safely disable and delete the existing MDM profile without triggering a factory reset (unless absolutely necessary). • Verify that all device-admin, work-profile, or enterprise-enrollment remnants are gone. • Provide a concise list of any follow-up steps I should take (patches, settings, or security apps) to keep the phone clean. Please outline the met...
...an existing, valid in-house (enterprise) certificate. What I need from you • The .p12 file for an Apple enterprise certificate (with its password) • A distribution provisioning profile that allows installation of my single app or a wildcard profile, whichever you prefer How I will use it I will sign the IPA in Xcode/Fastlane and host it for over-the-air installation through our internal MDM. No App Store submission is involved. Minimum requirements • Certificate must be issued by Apple’s Enterprise Program and remain active for at least twelve months. • Provisioning profile must install on any corporate device running the current iOS version. • I will verify by installing the signed build on several test devices before releasing pay...
...Access Control Configure company-managed user identities (Microsoft Entra ID / Azure AD or equivalent). Enforce: Multi-Factor Authentication (MFA) Strong password policies Account lockout and session controls Ensure only compliant, managed devices can access company email, files, and repositories. Prevent adding personal email or cloud accounts to company devices or browsers. 2️⃣ Device Management (MDM) Enrol all 3 Windows laptops into a central device-management platform (preferably Microsoft Intune or equivalent). Enforce: Full disk encryption (BitLocker) Screen lock and inactivity timeout OS and security updates Baseline security configuration policies Enable remote lock and remote wipe for lost or off-boarded devices. 3️⃣ Endpoint Security Deploy and configure enterpris...
I need to raise our overall security posture before a forthcoming SOC 2 audit and the fastest way there is to tighten every endpoint. Our fleet is an even split of MacBooks and Windows laptops, all licensed for Microsoft 365 Business Premium. Intune is switched on but only lightly configured—my goal is to make it the single source of truth for MDM, with full macOS support, rock-solid Windows policies, and seamless Defender integration. Alongside the Microsoft stack we already use NinjaRMM for monitoring and HaloPSA for ticketing, so any solution has to fit neatly into that workflow. A background in an MSP environment will help you understand the operational pressure and documentation detail I expect. Key outcomes I’m after: • A SOC 2-aligned hardening baseline a...
...confirmed. The core workflow is straightforward: the user registers a repayment schedule, the app monitors due dates, sends an email reminder ahead of each one, and—if no payment confirmation is received—activates a lock screen that limits access to non-essential apps until the account is up-to-date. Key behaviour I need implemented: • Lock phone on missed payments – preferably by leveraging Apple MDM / DeviceManagement or the Guided Access API so the solution stays within Apple’s security guidelines (no jailbreak work-arounds). • Email payment reminders – configurable lead time (e.g., 1 day, 3 days). • Usage reports – daily and monthly CSV or PDF summarising lock events, total restricted hours, and reminder history. ...
I need a full-scale Android EMM/MDM platform built from scratch with device security as its core mission. The solution must let an administrator enrol phones and tablets, push policies instantly, and—most critically—perform a remote wipe the moment a device is lost or compromised. Continuous, real-time threat detection has to run quietly in the background, reporting anomalies to a central console and triggering automated counter-measures without user intervention. Authentication starts simple: every managed device must, at minimum, enforce a Password or PIN at the lock screen and for any privileged action inside the agent app. Keep the design flexible so we can layer other factors later if we choose. Back-end and dashboard • Cloud-hosted (I’m open on stack...
Boot directly into kiosk app Android TV WINDOWS (Enterprise-grade) MDM Authority (Intune-style) Azure AD / Local AD binding Auto-enroll on first boot Lockdown BitLocker (TPM required) Secure Boot enforced BIOS/UEFI password Boot from USB disabled 3. User Restriction Remove local admin rights Disable CMD, PowerShell, Registry Disable Windows Recovery reset Block safe mode access 4. Remote Control Remote lock Remote wipe Device compliance check Tamper alert All Platform neded Server Side Policy engine (JSON-based) Command queue (offline supported) Certificate lifecycle management Device heartbeat & integrity report Security Mutual TLS Certificate pinning No hardcoded secrets API rate limiting MUST Device Owner / Supervised Factory Reset Block
...hardening and security baseline User separation and permission model Secure RDP configuration Firewall and network isolation Controlled Internet access (Owner only) Toolchain installation Logging and audit configuration LAN-only file transfer for Owner Documentation and acceptance testing Final handover and verification Excluded (unless explicitly agreed) Software licenses Enterprise DLP solutions MDM / Intune Source code migration Ongoing maintenance after delivery 3. Architecture (Required) Recommended Architecture (Preferred) VPN + RDP (no public RDP exposure) VM does NOT expose RDP to the Internet Access is allowed only through: VPN (WireGuard / OpenVPN / IPsec), or Bastion / jump host RDP listens only on internal/VPN interface This is the preferred and expected solution. Al...
...pause/stop/delete) Background operation (silent & invisible) Secure upload to server Centralized admin access Scalable for 100s–1000s of users Legally compliant & auditable 3. System Architecture (High Level) Android Device ├─ Call Listener (Telephony API) ├─ Call Recording Service (Foreground + Background) ├─ Local Encrypted Storage (Temporary) ├─ Auto Upload Service └─ Device Lockdown (MDM / Admin) ↓ HTTPS (TLS) Cloud / On-Prem Server ├─ REST API (Auth + Upload) ├─ Audio Storage (Encrypted) ├─ Database (Metadata) ├─ Admin Web Dashboard └─ AI Processing (Optional) 4. Android Application – Detailed Scope 4.1 Call Recording Functionality Recording Mode Records both incoming and outgoing calls Starts automatically when call...
...Palette opens for any action across PC. Deliverables MVP (8–10 weeks) Global hooks, context detection, overlay, and Command Palette. Support for Chrome, Edge, Slack, WhatsApp Desktop, File Explorer, Teams, and basic Office apps. Pro version (additional 8–12 weeks) Gamified learning, user analytics, team dashboards, and cloud sync. Enterprise (optional future phase) Centralized deployment (MDM/Intune), telemetry control, advanced automation recipes. Ideal Candidate Deep Windows development experience (C++/Rust/Win32/UIA) Experience with overlay or input‑hook based applications Familiar with Electron app integrations (Slack, WhatsApp) Knowledge of browser extension APIs (Chrome, Edge) Experience shipping performance‑sensitive desktop apps Application Inst...
This proposal covers a fixed-price Bitrix24 implementation delivered as a two-phase project. The objective is to implement Bitrix24 as a central platform for multiple legally independent...preparation • GDPR-compliant configuration and ERP data migration • Architecture prepared for multi-company and on-premise use • Technical documentation PHASE 2 – MULTI-COMPANY ROLLOUT • Rollout to 4–5 legally independent companies/branches • Data separation, pipelines and permissions • Extension of warehouse structures • Optional Bitrix24 On-Premise setup (EU server) • Integration preparation (PIM/MDM, n8n, AI, e-invoicing) • Validation and updated documentation The project is delivered via two fixed-price milestones. Optional support an...
...confirmed. The core workflow is straightforward: the user registers a repayment schedule, the app monitors due dates, sends an email reminder ahead of each one, and—if no payment confirmation is received—activates a lock screen that limits access to non-essential apps until the account is up-to-date. Key behaviour I need implemented: • Lock phone on missed payments – preferably by leveraging Apple MDM / DeviceManagement or the Guided Access API so the solution stays within Apple’s security guidelines (no jailbreak work-arounds). • Email payment reminders – configurable lead time (e.g., 1 day, 3 days). • Usage reports – daily and monthly CSV or PDF summarising lock events, total restricted hours, and reminder history. ...
...upgrades, or enhancements. Ensure high levels of system availability, performance, and security. Required Skills & Experience Technical Expertise Deep knowledge of Salesforce platform (Sales, Service, Marketing, Experience Clouds) and development. Strong understanding of Apex, Lightning Web Components, SOQL/SOSL, and Salesforce APIs. Experience with integration platforms (MuleSoft, Informatica, Dell Boomi, etc.). Architecture & Design Proven track record in designing large-scale, complex Salesforce solutions. Familiarity with enterprise architecture principles and frameworks. Knowledge of data modeling, security architecture, and performance optimization. Leadership & Communication Strong ability to engage with executives, business users, and technical teams. Excell...
...verifies the code before opening the main dashboard. No email or social logins are required. I will provide: • Database credentials and table structure • Access to our SMS gateway for OTP delivery • UI wireframes showing the three main screens (login, task list, task detail) You will deliver: • Full Android Studio project (Java or Kotlin) • Signed APK plus install guide for our in-house MDM • Brief setup notes explaining how the connection string, OTP endpoint and any required ports are configured Acceptance criteria 1. Successful connection to the local SQL Server when the device is inside our LAN. 2. Tasks can be created, edited, filtered by status and synced instantly. 3. OTP flow completes in under 15 seconds, locking the use...
...multi-company structure for at least three independent companies/branches within one Bitrix24 instance (separate pipelines, data separation, permissions), and, depending on your expertise: either set up a new Bitrix24 On-Premise installation in the EU and migrate structures/data from Phase 1, or gradually migrate the existing cloud setup to On-Premise, optionally add further integrations, such as: MDM / product data system (e.g. Pimcore or similar), automation with n8n, AI-based workflows (text, translation, summarization), e-invoicing (e.g. ZUGFeRD, X Invoice) as far as feasible with Bitrix24 and add-on tools. The overall project explicitly includes both phases; implementation and billing can be split into two stages if needed, without re-negotiating the base contract. ...
I'm looking for an expert to set up Microsoft 365 Intune for Mobile Device Management (MDM) across various devices, including Windows PCs, iOS devices, Android devices, Apple PCs, and printers. Key Requirements: - Configure MDM in Intune for the specified devices. - Implement security policies to protect company data. - Ensure seamless device enrollment and management. - Provide documentation for ongoing management. Ideal Skills and Experience: - Proven experience with Microsoft 365 Intune. - Strong knowledge of MDM and security policies. - Experience with a variety of device types and operating systems. - Good documentation skills
...content and user data fully internal, I need the app distributed privately with Apple-approved in-house certificates rather than through the public App Store. Here’s what I’m after: • Guidance (or full setup) of an Apple Developer Enterprise Program account, including certificate and provisioning profile creation. • A signed IPA that my employees can install over the air or through a preferred MDM solution—whatever keeps the install process smooth and secure. • Clear, step-by-step documentation so we can renew certificates, push future builds, and add or retire devices without outside help. • A quick hand-off session to confirm everyone can install the build successfully on their iPhones and iPads. If you have already handled priv...
I have a brand-new Samsung S25 FE that was financed through my Bajaj EMI Card. During setup I discovered Bajaj’s Mobile Device Management (MDM) profile is pre-installed and actively blocks features such as Dual Messenger. I need detailed, fool-proof instructions to eliminate this MDM so the phone runs as a normal retail device without alerting Bajaj Fintech. Preferred approach – A complete, step-by-step guide I can follow myself. – No remote access sessions; everything must be executed locally on the handset or via my own PC. Key points to address • Proven method for fully removing or permanently disabling the MDM profile, concealing any traces that would flag a compliance check. • Compatibility with the S25 FE’s current An...
...remotely carry out—the complete unlock, factory reset, and fresh configuration of both units, then sideload and activate the Google Play Store so I can sign in with a new account. I’m open-minded about loading extra apps later, but for now the priority is simply getting each device clean and Play-ready. Because I have no credentials for the existing account, your solution must bypass or remove the FRP/MDM lock without compromising future OTA updates. Once finished, the devices should boot straight to a standard Android home screen, show Play Store in the app drawer, and pass basic Play Protect checks. Deliverables • Both devices operational, free of previous locks, and logged out of any old Google IDs • Google Play Store installed and working on each uni...
...implementations. We now need an additional senior engineer who will work closely with our lead developer and implement the low-level system components for the remaining platforms: Android: VpnService/TUN integration, tun2proxy pipeline, system networking APIs, DNS handling, per-app routing, performance optimization iOS: Network Extension (NEPacketTunnel and NEAppProxy), Per-App VPN, DNS proxying, Keychain and MDM integration Linux: iptables, nftables, TPROXY, eBPF or TC integration, per-user routing, Netlink communication, systemd services, packaging This requires a developer with real platform expertise so that the implementations reach a stable and professional level comparable to Proxifier. Why one senior developer (or a very small specialist team) is ideal for all three platf...
1. Project Overview The EMI Mobile Locker & Device Protection System is a cross-platform (Android + iOS) security application designed for Retail Mobile Shop Owners who provide smartphones on EMI. The system gives sellers the ability to remotely lock, track, restrict, and monitor buyer devices until EMI payments are completed. The solution functions similar to an MDM/DPC (Device Policy Controller) system with remote control features, tamper protection, and real-time monitoring, ensuring devices cannot be misused or reset until payments are cleared. The complete system includes: Android & iOS Buyer App Central Admin Web Dashboard Backend API, Authentication & Cloud Services The app uses Phone Number + OTP login, ensuring secure and smooth onboarding for buyers. 2....
1. Project Overview The EMI Mobile Locker & Device Protection System is a cross-platform (Android + iOS) security application designed for Retail Mobile Shop Owners who provide smartphones on EMI. The system gives sellers the ability to remotely lock, track, restrict, and monitor buyer devices until EMI payments are completed. The solution functions similar to an MDM/DPC (Device Policy Controller) system with remote control features, tamper protection, and real-time monitoring, ensuring devices cannot be misused or reset until payments are cleared. The complete system includes: Android & iOS Buyer App Central Admin Web Dashboard Backend API, Authentication & Cloud Services The app uses Phone Number + OTP login, ensuring secure and smooth onboarding for buyers. 2....
1. Project Overview The EMI Mobile Locker & Device Protection System is a cross-platform (Android + iOS) security application designed for Retail Mobile Shop Owners who provide smartphones on EMI. The system gives sellers the ability to remotely lock, track, restrict, and monitor buyer devices until EMI payments are completed. The solution functions similar to an MDM/DPC (Device Policy Controller) system with remote control features, tamper protection, and real-time monitoring, ensuring devices cannot be misused or reset until payments are cleared. The complete system includes: Android & iOS Buyer App Central Admin Web Dashboard Backend API, Authentication & Cloud Services The app uses Phone Number + OTP login, ensuring secure and smooth onboarding for buyers. 2....
I have a fresh Ubuntu VPS with WireGuard already running and tested. Next step is to stand up an open-source MDM so I can push a WireGuard VPN profile and manage installed apps on enrolled phones and tablets. Here’s the workflow I have in mind: • Install and fully configure a production-ready open-source MDM (Flyve-MDM, SOTI alternatives, or any other GPL-friendly stack you are comfortable with) on the server. • Enable application management: I need to be able to silently push, update, or remove APK/IPA packages from a web console. • Build an MDM configuration profile that delivers the existing WireGuard settings to Android and iOS devices on first enrollment, so users connect through the tunnel automatically. • Hand over a conc...
1. Project Overview The EMI Mobile Locker & Device Protection System is a cross-platform (Android + iOS) security application designed for Retail Mobile Shop Owners who provide smartphones on EMI. The system gives sellers the ability to remotely lock, track, restrict, and monitor buyer devices until EMI payments are completed. The solution functions similar to an MDM/DPC (Device Policy Controller) system with remote control features, tamper protection, and real-time monitoring, ensuring devices cannot be misused or reset until payments are cleared. The complete system includes: Android & iOS Buyer App Central Admin Web Dashboard Backend API, Authentication & Cloud Services The app uses Phone Number + OTP login, ensuring secure and smooth onboarding for buyers. 2....
...Pools = grouped proxies with costs, limits, and health metrics. Automatic switching based on: Ban rate, volume limit, latency degradation Fallback pools Optional AI-assisted rule/pool editing and natural language commands 8. Enterprise Features Central management: organizations, users, roles (Owner, Team Lead, Member) Permission-based pool access Admin panel for pools, teams, usage Managed mode via MDM/Intune config files Silent install Platform-specific binaries only 9. Licensing, Security, Authentication Central license server with plans, usage limits, device binding Login + 2FA Encrypted communication, token-based API Local SQLite DB for proxies, rules, logs, settings Optional “send logs / contact support” feature 10. Platform Integration Windows: WFP driver for pe...
1. Project Overview The EMI Mobile Locker & Device Protection System is a cross-platform (Android + iOS) security application designed for Retail Mobile Shop Owners who provide smartphones on EMI. The system gives sellers the ability to remotely lock, track, restrict, and monitor buyer devices until EMI payments are completed. The solution functions similar to an MDM/DPC (Device Policy Controller) system with remote control features, tamper protection, and real-time monitoring, ensuring devices cannot be misused or reset until payments are cleared. The complete system includes: Android & iOS Buyer App Central Admin Web Dashboard Backend API, Authentication & Cloud Services The app uses Phone Number + OTP login, ensuring secure and smooth onboarding for buyers. 2....
I want to build a production-ready Android Enterprise Mobility Management / Mobile Device Management platform that lets administrators enroll devices, push policies and apps, and view real-time status through a secure web console. The scope covers two main components: • An on-device agent (Android 10+) that handles enrollment, applies Device Policy Manager rules, and communicates with the backend via FCM or a comparable messaging channel. • A cloud-hosted admin dashboard where policies, apps, and compliance settings are created and synced to enrolled devices. Role-based access, audit logs, and API endpoints for future integrations must be included.
...Governance operating model and stewardship (roles, RACI, workflows) • Policy set, standards, procedures, and evidence templates required for DMO establishment • Compliance mapping to official NDMO controls Required outputs: 1. Full gap assessment mapped control-by-control against NDMO requirements. 2. Complete policy and standards pack (data quality, privacy/security, classification, metadata, MDM). 3. Governance operating model with stewardship roles, RACI, and escalation flows. 4. Evidence pack containing sample filled templates, control records, classification examples, data-quality examples, and compliance proofs. 5. All artefacts must be audit-ready and aligned to how DMO programmes are executed in KSA. 6. Only respond if you have previously delivered DMO co...