Multi-persona enrollment management

ABSTRACT

Examples of multi-persona account management in client devices are described. A client device can host a personal workspace, such as for personal data and applications of a user, along with a separate alternate persona workspace for work-related data and applications of the user. The client device interfaces with a management computing environment to enroll in device management services and establish the alternate persona workspace on the client device. In one example, the client device queries a management computing environment to establish an alternate persona workspace in the client device. The client device then creates the alternate persona workspace in the client device based on a response from the management computing environment, associates an alternate persona account with the alternate persona workspace, and receives a notification to install at least one application in the alternate persona workspace from an account administration environment of the alternate persona account.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No.15/824,167, titled “Multi-Persona Enrollment Management,” filed Nov. 28,2017, the complete disclosure of which is hereby fully incorporatedherein by reference.

BACKGROUND

Mobile devices are being used for access to enterprise computing systemsand resources with greater frequency. With the growing number ofdifferent mobile devices, platforms, and operating systems available foradoption by users, various challenges can arise in the management of themobile devices.

Mobile device management platforms can be relied upon to facilitatecertain challenges associated with the management of large numbers ofmobile devices using a central administration console. For example, thedistribution, installation, and access to a suite of applications on anumber of mobile devices can be managed using the administrationconsole. Further, access to the functions performed and data processedby the applications can be managed through the administration of thesuite of applications based on a set of management policies, compliancerules, and configuration data which is defined and enforced by theadministration console.

In many cases, employees and personnel can be ahead of the curve when itcomes to the adoption of new mobile devices and related technology. Theproliferation of tablet and smartphone devices, for example, hasresulted in a number of companies and organizations allowing employeesto bring their own devices to work. The use of these personal devicescan be associated with productivity gains and cost savings. The concept“bring your own device” (BYOD) for access to enterprise computingsystems may have met initial resistance due to security concerns, butmore and more companies are now looking to incorporate BYOD policies.

BRIEF DESCRIPTION OF THE DRAWINGS

Many aspects of the present disclosure can be better understood withreference to the following drawings. The components in the drawings arenot necessarily drawn to scale, with emphasis instead being placed uponclearly illustrating the principles of the disclosure. In the drawings,like reference numerals designate corresponding parts throughout theseveral views.

FIG. 1 illustrates an example networked environment for multi-personaenrollment management according to various examples described herein.

FIG. 2 illustrates a process for multi-persona enrollment managementaccording to various examples described herein.

FIG. 3 further illustrates the process for multi-persona enrollmentmanagement shown in FIG. 2 according to various examples describedherein.

FIG. 4 further illustrates the process for multi-persona enrollmentmanagement shown in FIGS. 2 and 3 according to various examplesdescribed herein.

DETAILED DESCRIPTION

As noted above, mobile devices are being used for access to enterprisecomputing systems and resources with greater frequency, and mobiledevice management platforms can be relied upon to manage large numbersof mobile devices using a central administration console. For example,the distribution, installation, and access to a suite of applications ona number of mobile devices can be managed using the administrationconsole. Further, access to the functions performed and data processedby the applications can be managed through the administration of thesuite of applications based on a set of management policies, compliancerules, and configuration data which is defined and enforced by theadministration console.

Some organizations permit personnel to use their own devices (e.g.,“bring your own device” (BYOD)) for access to enterprise computingsystems. These users may desire to maintain separate workspaces tosegregate their personal applications and data, for example, from theirwork-related applications and data. To that end, a mobile device caninstantiate a secondary, alternate persona workspace that existsseparately from the primary, personal persona workspace for the user ofthe mobile device. In this case, the mobile device management platformshould be capable of administering the suite of applications installedon the alternate persona workspace, in addition to controlling access tothe functions performed and data processed by the applications, whichcan be challenging based on access restrictions maintained for alternatepersona workspaces in the operating system platforms of mobile devices.

In the context outlined above, examples of multi-persona accountmanagement in client devices are described. In one example, a clientdevice can host a personal workspace, such as a workspace for personaldata and applications, along with a separate, alternate personaworkspace for work-related data and applications. To achieve andfacilitate that arrangement, the client device can interface with amanagement computing environment to enroll in device managementservices. Based on the direction of an administrator of the managementservices, for example, and a request or query from a user of the clientdevice, the management computing environment can direct the clientdevice to create an alternate persona workspace on the client device.

According to one example, when a user of a client device seeks toestablish an alternate persona workspace on the client device, themanagement computing environment can create or establish an alternatepersona account for the user. The alternate persona account can beestablished in part through network communications with an accountadministration environment separate from both the client device and themanagement computing environment. The management computing environmentcan conduct network communications with the account administrationenvironment to create a new user account for the alternate persona. Whenthe account is created, the management computing environment can receivea token associated with the new account from the account administrationenvironment and forward the token to the client device.

In turn, the client device can receive the token for the alternatepersona workspace from the management computing environment, create thealternate persona workspace in the client device, and install aninterface service in the alternate persona workspace. The client devicecan also associate the alternate persona account with the alternatepersona workspace using the token and return a service identifier to themanagement computing environment. The management computing environmentcan remotely administer applications installed in the alternate personaworkspace using the service identifier.

Turning to the drawings, the following paragraphs provide an outline ofa networked environment for multi-persona enrollment management followedby a discussion of the operation of the same. FIG. 1 illustrates anexample networked environment 10 for multi-persona enrollment managementaccording to various examples described herein. The networkedenvironment 10 includes an enterprise computing environment 100, anaccount administration environment 130, a number of client devices 160,and a network 190.

The enterprise computing environment 100 can be embodied as one or morecomputers, computing devices, or computing systems. In certainembodiments, the enterprise computing environment 100 can include one ormore computing devices arranged, for example, in one or more server orcomputer banks. The computing device or devices can be located at asingle installation site or distributed among different geographicallocations. The enterprise computing environment 100 can include aplurality of computing devices that together embody a hosted computingresource, a grid computing resource, or other distributed computingarrangement. In some cases, the enterprise computing environment 100 canbe embodied as an elastic computing resource where an allotted capacityof processing, network, storage, or other computing-related resourcesvaries over time. As further described below, the enterprise computingenvironment 100 can also be embodied, in part, as certain functional orlogical (e.g., computer-readable instruction) elements or modules asdescribed herein.

The enterprise computing environment 100 can operate as an environmentfor mobile device management environment of the client devices 160. Inthat context, the computing environment 100 includes a data store 110and a management service 120. The data store 110 includes areas inmemory for the storage of device data 112 and management data 114, amongother types of data. The management service 120 includes an enrollmentservice 122 and a management console 124, among other functionalcomponents.

The enrollment service 122 can enroll a number of the client devices 160for mobile device management services. To begin enrollment, theenrollment service 122 can identify and authenticate one of the clientdevices 160 and store data related to the client device 160 in thedevice data 112 for later reference. In some cases, the managementservice 120 (or a management client agent executing on the client device160) can also be registered as a device administrator (at least in part)of the client device 160, permitting the management service 120 toconfigure and manage certain operating aspects of the client device 160as described in further detail below.

Once the client device 160 is enrolled for device management by themanagement service 120, the management service 120 can direct theinstallation of various software components or applications on theclient device 160. The software components can be configured on theclient device 160 at the direction of the management service 120. Suchsoftware components can include, for example, applications, resources,libraries, and other related components.

The management service 120 can also transfer various managementpolicies, compliance rules, and configuration data for execution byand/or enforcement on the client device 160. In that context, during orafter enrollment, the management service 120 can retrieve a set ofmanagement policies, compliance rules, and configuration data for theclient device 160 from the management data 114 and transfer thosepolicies, rules, and data to the client device 160 for reference by theoperating system and certain applications executing on the client device160.

The management console 124 can be embodied as an engine and consoleinterface for device management of the client devices 160. Aninformation technology administrator or user, for example, can view,administer, and update the management policies, compliance rules, andconfiguration data on the client devices 160 using the managementconsole 124. The policies, rules, and configuration data can becollectively administered for a number of the client devices 160 byorganizing the client devices 160 into a number of different groups orcategories of devices according to organizational or other factors orconsiderations. The management console 124 can also be relied upon tocreate and administer additional personas or workspaces on the clientdevices 160, such as for those of the client devices 160 that are BYODdevices. The management console 124 can further administer theapplications installed the different workspaces on the client devices160. The operations of the management console 124 in the context ofmulti-persona enrollment management are described in further detailbelow.

The account administration environment 130 can be embodied as one ormore computers, computing devices, or computing systems. Similar to theenterprise computing environment 100, the account administrationenvironment 130 can include one or more computing devices arranged, forexample, in one or more server or computer banks. The computing deviceor devices can be located at a single installation site or distributedamong different geographical locations. The account administrationenvironment 130 can include a plurality of computing devices thattogether embody a hosted computing resource, a grid computing resource,or other distributed computing arrangement. The account administrationenvironment 130 can also be embodied, in part, as certain functional orlogical (e.g., computer-readable instruction) elements or modules asdescribed herein.

The account administration environment 130 can be embodied as acomputing environment for the administration of user accounts associatedwith users of the client devices 160. The account administrationenvironment 130 includes a data store 140 and an account administrator150. The data store 140 includes areas in memory for the storage ofaccount data 142 and applications 144, among other types of data. Theaccount administrator 150 includes an account manager 152 and anapplication manager 154, among other functional components. Althoughshown together in one environment, the functions performed by theaccount manager 152 and the application manager 154 can be split amongdifferent computers, computing devices, or computing systems.

The account manager 152 can be embodied as an engine to facilitate thecreation of user accounts associated with the client devices 160. Forexample, when a user first activates one of the client devices 160, theclient device 160 can request that the user create a logon, including ausername and password, for access to the client device 160 and theapplications 144 available for installation on the client device 160.The account manager 152 can ensure that unique usernames and passwordsare maintained for different users and devices, and store data relatedto the users, the client devices 160 associated with those users, andother relevant data in as the account data 142.

The application manager 154 can be embodied as an engine and interfaceto allow the client devices 160 to search for and install theapplications 144. The applications 144 can include any type ofapplications, such as e-mail clients, messaging clients, documenteditors or viewers, file browsers, and other applications. Users of theclient devices 160 can interface with network pages, for example,generated by the application manager 154 to search among theapplications 144 for download and installation. Alternatively, theclient devices 160 can include a standalone application (e.g., anapplication store) to interface with the application manager 154 tosearch among the applications 144. In certain cases, the applicationmanager 154 can push applications and application updates down to theclient devices 160, possibly using a notification service.

As a mobile device management function, the enterprise computingenvironment 100 can interface with the account administrationenvironment 130 to control which applications are visible or availableto users of the client devices 160. For example, the management service120 can interface with the application manager 154 to control which onesof the applications 144 are visible (or not visible) to the clientdevices 160 during searches. This type of control can be directed by amobile device administrator using the management console 124. Asdirected through the management console 124, the management service 120can interface with the application manager 154 to control theavailability of the applications 144 individually for each client device160 or collectively for groups of the client devices 160. The managementservice 120 can also control which ones of the applications 144 areavailable for download and installation, required to be installed, andcapable or permitted to be uninstalled on the client devices 160. Themanagement service 120 can also control which ones of the applications144 are pushed down for installation on the client devices 160, possiblyusing a notification service. The management can take place, in part,using one or more application blacklists, whitelists, or other types ofmanifests of permitted and/or unpermitted applications.

As described in further detail below, the management service 120 candirect the application manager 154 to administer the installation of oneor more of the applications 144 to a number of different workspaces onthe client devices 160, including personal and work-related workspaces.The management service 120 can also direct the application manager 154to control which applications 144 are available for download andinstallation to personal workspaces, for individual ones or groups ofthe client devices 160, in a manner that is different than forwork-related workspaces on those client devices 160.

The client devices 160 are representative of one or more client devices.Each client device 160 can be embodied as any computing device,processing circuit, or processor based device or system, including thosein the form of a desktop computer, a laptop computer, a tablet computer,a personal digital assistant, a cellular telephone, a wearable computingdevice, or a set-top box, among other example computing devices andsystems. Depending upon its primary purpose or function, for example,the client devices 160 can include various peripheral devices orcomponents. The peripheral devices can include input or communicationsdevices or modules, such as keyboards, keypads, touch pads, touchscreens, microphones, cameras, wireless communications modules (e.g.,infra-red, WI-FI, or BLUETOOTH®), buttons, switches, or sensors. Theperipheral devices can also include a display, indicator lights,speakers, global positioning system (GPS) circuitry, accelerometers,gyroscopes, or other peripheral devices depending upon the primarypurpose or function of the client devices 160.

As illustrated in FIG. 1, an example client device 160 includes a datastore 162, having an area for the storage of management data 164, amongother types of data. The client device 160 also includes a primaryworkspace 170, a secondary workspace 180, and one or more operatinginterconnect services 186. The primary workspace 170 includes a clientagent 172, an interface service 174, and a number of primaryapplications 176. The secondary workspace 180 includes an interfaceservice 182 and a number of secondary applications 184.

In the data store 162, the management data 164 can include managementpolicies, compliance rules, configuration data, and other data receivedfrom the enterprise computing environment 100 for management of theclient device 160. The management data 164 can also include accounttokens and account service identifiers for the creation andadministration of the secondary workspace 180 as described below.Although not separately shown in FIG. 1, the data store 162 can alsostore other data, such as the primary applications 176 and the secondaryapplications 184, among other executable code. The primary applications176 are illustrated in FIG. 1 as applications for execution in theprimary workspace 170, and the secondary applications 184 areillustrated as applications for execution in the secondary workspace180.

In the primary workspace 170, the client agent 172 can be embodied as anagent of the enterprise computing environment 100 for mobile devicemanagement of the client device 160. Additionally, the interface service174 can be embodied as a type of service agent of the client agent 172.In that role, the interface service 174 can extend the reach of mobiledevice management from the primary workspace 170 to the secondaryworkspace 180. For example, the interface service 174 can be relied uponby the client agent 172 to create the secondary workspace 180, installthe associated interface service 182 in the secondary workspace 180, andinterface with the secondary workspace 180. Once the secondary workspace180 is created and the interface service 182 installed, the interfaceservice 174 can conduct inter-process communications with the interfaceservice 182.

The primary applications 176 and the secondary applications 184 arerepresentative of various types of applications or application-relatedcomponents that can be executed on the client device 160. As examples,the primary applications 176 and the secondary applications 184 caninclude hypertext-based network browsers, e-mail clients, messagingclients, document editors or viewers, file browsers, among otherapplications for other purposes.

The primary workspace 170 can be a logically separate personalworkspace, such as a workspace for personal data and applications of auser of the client device 160, as compared to the secondary workspace180, which can be used for work-related data and applications of theuser. The logical separation (e.g., separate memory spaces, limitedinterface calls, limited inter-process communications, and otherseparations) between the primary workspace 170 and the secondaryworkspace 180 can be maintained in part by the operating systemexecuting on the client device 160, such as by enforcement through theoperating interconnect services 186, which can be embodied as variousservices provided by the operating system of the client device 160.

As noted above, the client device 160 can be enrolled by the managementservice 120 for device management. Through network communicationsbetween the enterprise computing environment 100 and the client device160, the enrollment service 122 can identify and authenticate the clientdevice 160 and store data related to the client device 160 in the devicedata 112 for later reference.

As part of the enrollment process, the management service 120 and/orclient agent 172 can be registered as a device administrator of theclient device 160, permitting the management service 120 and/or clientagent 172 to manage certain operating aspects of the client device 160.In either case, the management service 120 can remotely configure theclient device 160 by interacting with the client agent 172. Themanagement service 120 can also transfer various software components tothe client device 160, and those software components can be installedand/or configured on the client device 160 at the direction of theclient agent 172. Such software components can include, for example,applications, resources, libraries, drivers, device configurations, orother related components. The management service 120 can also transfervarious management policies, compliance rules, and configuration datafor enforcement on the client device 160, and those policies, rules, anddata can be stored as the management data 164. The management service120 can then instruct the client agent 172 and the operating system ofthe client device 160 to enforce the management policies, compliancerules, and configuration data stored in the device management data 36.

The network 190 can include the Internet, intranets, extranets, widearea networks (WANs), local area networks (LANs), wired networks,wireless networks, cable networks, satellite networks, other suitablenetworks, or any combinations thereof. As one example, the computingenvironment 100 and the client devices 160 can be respectively coupledto one or more public or private LANs or WANs and, in turn, to theInternet for communication of data among each other. Although not shownin FIG. 1, the network 190 can also include communicative connections toany number and type of network hosts or devices, such as websiteservers, file servers, cloud computing resources, databases, datastores, or any other network or computing architectures.

In the networked environment 10, the enterprise computing environment100, the account administration environment 130, and the client devices160 can communicate data among each other over the network 190 using oneor more network transfer protocols or interconnect frameworks, such ashypertext transfer protocol (HTTP), simple object access protocol(SOAP), representational state transfer (REST), real-time transportprotocol (RTP), real time streaming protocol (RTSP), real time messagingprotocol (RTMP), user datagram protocol (UDP), internet protocol (IP),transmission control protocol (TCP), other protocols and interconnectframeworks, and combinations thereof.

According to the concepts of multi-persona enrollment managementdescribed herein, the example client device 160 shown in FIG. 1 can be adevice owned by a user in which the primary workspace 170 has beenestablished and populated with the primary applications 176 and otherdata for personal use of the user. The client device 160 can be enrolledwith the enterprise computing environment 100 for mobile devicemanagement after the primary workspace 170 has been established. In thatscenario, the user of the client device 160 may wish to create thesecondary workspace 180 on the client device 160 to maintain separationbetween personal and work-related applications and data.

Depending upon the scenario, the secondary workspace 180 can be createdwhen the client device 160 is first enrolled with the enterprisecomputing environment 100, or the secondary workspace 180 can be createdat some time after the client device 160 is enrolled with the enterprisecomputing environment 100. The secondary workspace 180 can be created orapproved for creation, in either case, at the direction of the user ofthe client device 160 and/or the administrator of the management service120 through the management console 124.

To create the secondary workspace 180, the management service 120 isconfigured to communicate with the account administrator 150 using oneor more application programming interfaces (API), for example, to createan alternate persona account to be associated with the secondaryworkspace 180. The alternate persona account can be established for theparticular purpose of the administration of the secondary workspace 180.The alternate persona account can be established using a newly-createdlogon associated with a username, password, certificate, or otheridentifying information defined or determined by the management service120. Once created, the management service 120 can use the logon tocontrol which ones of the applications 144 are available for downloadand installation to the secondary workspace 180 on the client devices160. The account administrator 150 can return a token related datapackage to the management service 120. The token can be embodied as dataincluding an identifier of the newly-created alternate persona account.In some cases, the token can also include data to authenticate the useror owner of the newly-created alternate persona account. The token canbe stored in the device data 112.

The management service 120 is configured to forward the token receivedfrom the account administrator 150 to the client device 160. Once thetoken is received, the client agent 172 can direct the interface service174 to establish the secondary workspace 180. The interface service 174can establish the secondary workspace 180 through one or more servicesof the operating system of the client device 160, and the operatingsystem of the client device 160 can recognize the interface service 174as the administrator or owner of the secondary workspace 180. Theinterface service 174 can also direct the installation of the interfaceservice 182 within the secondary workspace 180 as a correspondingcomponent for execution in the secondary workspace 180.

When the secondary workspace 180 is established, the interface service174 can be configured to create a programming interface through (or aspart of) the operating interconnect services 186 for inter-processcommunications (IPC) between the interface service 174 and the secondaryworkspace 180. The programming interface can be defined using aninterface definition language, such as the Android® interface definitionlanguage (AIDL) or related interface definition language. Theprogramming interface can be agreed upon for communication by both theinterface service 174 and the operating interconnect services 186 andprovide a communications pathway between the interface service 174 andthe interface service 182.

After the secondary workspace 180 is established, it can be associatedwith the alternate persona account created by the management service120. The token for the alternate persona account, which was received bythe management service 120 from the account administrator and forwardedto the client device 160, can be passed by the interface service 174 tothe interface service 182. The interface service 182 can thencommunicate with the account administrator 150 to associate thealternate persona account with the secondary workspace 180 withreference to the token. As part of that association process, the accountadministrator 150 can return an account services identifier to theinterface service 182. The account services identifier is a uniqueidentifier for the secondary workspace 180 in association with thealternate persona account and can be tied to an account or devicecodename for the client device 160.

The interface service 182 is configured to return the account servicesidentifier to the interface service 174, and the interface service 174is configured to return it to the management service 120. The managementservice 120 can then use the account services identifier to remotelyadminister which ones of the applications 144 are visible or availablefor installation on the secondary workspace 180. The management service120 can also control which ones of the applications 144 are availablefor download and installation, required to be installed, and capable orpermitted to be uninstalled on the secondary workspace 180. Themanagement service 120 can also control which ones of the applications144 are pushed down for installation on the secondary workspace 180,possibly using a notification service. The management can take place, inpart, using one or more application blacklists, whitelists, or othertypes of manifests of permitted and/or unpermitted applications.

FIGS. 2-4 illustrate a process for multi-persona enrollment managementaccording to various examples described herein. Individual steps of theprocess shown in FIGS. 2-4 can be performed by the enterprise computingenvironment 100, the account administration environment 130, and theclient device 160 as described below. According to the example outlinedwith reference to FIGS. 2-4, the process results in the secondaryworkspace 180 being established on the client device 160. The processalso results in the ability for the management service 120 to control oradminister which of the applications 144 hosted by the accountadministration environment 130 are capable of being installed (or areinstalled) as the secondary applications 184 on the client device 160.The process can also be performed by other client devices and computingenvironments, however, and is not limited to use with the networkedenvironment 10. Additionally, although the flowcharts show an order ofexecution, the order of execution can differ from that which is shown.For example, the order of execution of two or more elements can beswitched relative to the order shown or as described below. Also, two ormore elements shown in succession can be executed concurrently or withpartial concurrence. Further, in some examples, one or more of theelements shown in the flowcharts can be skipped or omitted.

Turning to FIG. 2, the process can include the client device 160enrolling in mobile device management services with the managementservice 120 of the enterprise computing environment 100 at step 202. Theenrollment service 122 can enroll the client device 160 by identifyingand authenticating the client device 160 and storing data related to theclient device 160 in the device data 112 for later reference. Themanagement service 120 and/or the client agent 172 can also beregistered as a device administrator of the client device 160 at step202, permitting the management service 120 to configure and managecertain operating aspects of the client device 160 as described above.

At step 204, the process can include the client device 160 querying themanagement service 120 to establish an alternate persona workspace onthe client device 160. The query at step 204 sets into motion a numberof steps leading to the creation of secondary workspace 180 in theclient device 160 as described herein. In one example, the query can bedirected by a user of the client device 160 or automatically prompted bythe client agent 172 during or at any time after the enrollment at step202. Alternatively, the querying at step 204 can be omitted, and thecreation of secondary workspace 180 can be directed by a mobile deviceadministrator using the management console 124.

At step 206, the process includes the management service 120 creating analternate persona account to be associated with the secondary workspace180, which may not yet be created, on the client device 160. Thealternate persona account can be established by the management service120 through communication with the account administrator 150 using oneor more application programming interfaces (API) over the network 190.The alternate persona account can be established using a newly-createdlogon associated with a username, password, certificate, or otheridentifying information defined or determined by the management service120. At later steps in the process, the management service 120 can usethe logon to control which ones of the applications 144 are availablefor installation on the secondary workspace 180 of the client devices160.

At step 208, the process can include the account administrator 150returning a token or other data package to the management service 120 asan identifier for and/or access key to the alternate persona accountcreated at step 206. The management service 120 can store the token aspart of the device data 112 associated with the client device 160 forlater reference.

At step 210, the process can include the management service 120returning the token or other data package from the account administrator150 back to the client device 160. In the client device 160, the tokencan be stored as part of the management data 164, and the client agent172 and the interface service 174 can use the token to associate thealternate persona account with the secondary workspace 180, which maynot yet be created.

At step 212, the process can include the client agent 172 directing theinterface service 174 to create the secondary workspace 180. Theinterface service 174 can create the secondary workspace 180 byinterfacing with the operating interconnect services 186, which can beembodied as one or more services provided by the operating system of theclient device 160. Because it is created according to a request from theinterface service 174, the operating system of the client device 160 canrecognize the interface service 174 as the administrator or owner of thesecondary workspace 180. Alternatively, the client agent 172 can beconfigured to create the secondary workspace 180 directly, and theinterface service 174 can be omitted or combined with the client agent172.

When the secondary workspace 180 is established as part of step 212, theinterface service 174 can be configured to create a programminginterface through (or as part of) the operating interconnect services186 for inter-process communications (IPC) between the interface service174 and the secondary workspace 180. The programming interface can bedefined using an interface definition language, such as the Android®interface definition language (AIDL) or related interface definitionlanguage.

The secondary workspace 180 can be relied upon by a user of the clientdevice 160 as a separate, work-related space for applications and dataseparate from that of the primary workspace 170, which can be used forpersonal applications and data. The logical separation (e.g., separatememory spaces, limited interface calls, limited inter-processcommunications, and other separations) between the primary workspace 170and the secondary workspace 180 can be maintained in part by theoperating system executing on the client device 160, such as byenforcement through the operating interconnect services 186. For thepurpose of mobile device management, the management service 120 shouldbe capable of administering the suite of applications installed on thesecondary workspace 180, in addition to controlling access to thefunctions performed and data processed by the applications.

Continuing to FIG. 3, at step 214, the process can include the operatinginterconnect services 186 returning a callback to the interface service174 as a confirmation that the secondary workspace 180 was created. Thecallback can be returned to the client agent 172 or the interfaceservice 174 depending upon which requested the creation of the secondaryworkspace 180 at step 212.

At step 216, the process can include the interface service 174installing the interface service 182 in the secondary workspace 180.Because the interface service 174 is recognized in the client device 160as the administrator or owner of the secondary workspace 180, theinterface service 174 can be authorized by the operating system of theclient device 160 to install the interface service 182 in the secondaryworkspace 180. The interface service 182 is a corollary to the interfaceservice 174, but executes within the secondary workspace 180 rather thanin the primary workspace 170. Because it executes in the secondaryworkspace 180, the interface service 182 is capable configuring certainoperating characteristics for the secondary workspace 180, such as whichaccounts are associated with it. Once the interface service 182installed, the interface service 174 can conduct inter-processcommunications with the interface service 182, and the interface service174 can control or direct the operations of the interface service 182through inter-process communications.

After the secondary workspace 180 is established and the interfaceservice 182 installed, the secondary workspace 180 can be associatedwith the alternate persona account which was created by the managementservice 120 at step 206. The token for the alternate persona account wasreturned to the client device 160 at step 210. To that end, at step 218,the process can include the interface service 174 forwarding the tokenfor the alternate persona account to the interface service 182.

At step 220, the process can include the interface service 182associating the alternate persona account with the secondary workspace180. For example, the interface service 182 can communicate with theaccount administrator 150 to associate the alternate persona accountwith the secondary workspace 180 with reference to the token. As part ofthat association process, the account administrator 150 can return anaccount services identifier to the interface service 182 at step 222.The account services identifier is a unique identifier for the secondaryworkspace 180 in association with the alternate persona account and canbe tied to an account or device codename for the client device 160.

Continuing to FIG. 4, at step 224, the process can include the interfaceservice 182 returning the account services identifier to the interfaceservice 174. Here, the account services identifier, which is tied to anaccount associated with the secondary workspace 180 for the clientdevice 160, is passed from the secondary workspace 180 to the primaryworkspace 170 where the interface service 174 and the client agent 172execute. In turn, the process can include the client agent 172 returningthe account services identifier to the management service 120 at step226 using communications over the network 190. Alternatively, ratherthan the interface service 182 returning the account services identifierto the interface service 174 at step 224 before it is returned to themanagement service 120 at step 226, the interface service 182 candirectly return the account services identifier to the managementservice 120.

At this stage in the process, the management service 120 has created thealternate persona account, the secondary workspace 180 has beenestablished on the client device 160, and the alternate persona accounthas been associated with the secondary workspace 180 on the clientdevice 160. Further, the management service 120 has received the accountservices identifier, which uniquely identifies the secondary workspace180 in association with the alternate persona account, from the clientdevice 160. The management service 120 can now control whichapplications are visible or available for installation on the secondworkspace 180.

At step 228, the process can include the management service 120performing an application administration call to the accountadministrator 150. The application administration call can be conductedthrough an API call to the account administration environment 130. Theapplication administration call can be directed by an administratorusing the management console 124. The application administration callcan include the account services identifier of the secondary workspace180 to uniquely identify that the call is for the administration ofapplications for the secondary workspace 180 of the client device, inparticular, as opposed to the primary workspace 170.

As an example, the application administration call can identify, usingone or more application blacklists, whitelists, or other manifests,which ones of the applications 144 will be visible (or not visible) tothe client device 160 for installation to the secondary workspace 180during searches for the applications 144. The application administrationcall can also identify which ones of the applications 144 are availablefor download and installation, required to be installed, and capable orpermitted to be uninstalled to the secondary workspace 180. Theapplication administration call can also identify which ones of theapplications 144 are pushed down for installation to the secondaryworkspace 180, possibly using a notification service.

At step 230, the process can include the account administrationenvironment 130 installing one or more applications to the secondaryworkspace 180. The applications can be installed at the request of auser of the client device 160, pushed down for installation to thesecondary workspace 180, or both. One or more of the applications can bethose identified during the application administration call at step 228.The applications can be installed, in part, at the direction of theinterface service 182 of the secondary workspace 180.

The flowcharts in FIGS. 2-4 show examples of the functions and operationof the components described herein. The components described herein canbe embodied in hardware, software, or a combination of hardware andsoftware. If embodied in software, each element can represent a moduleor group of code that includes program instructions to implement thespecified logical function(s). The program instructions can be embodiedin the form of, for example, source code that includes human-readablestatements written in a programming language or machine code thatincludes machine instructions recognizable by a suitable executionsystem, such as a processor in a computer system or other system. Ifembodied in hardware, each element can represent a circuit or a numberof interconnected circuits that implement the specified logicalfunction(s).

Both the enterprise computing environment 100 and the accountadministration environment 130 can include at least one processingcircuit. Such a processing circuit can include, for example, one or moreprocessors and one or more storage or memory that are coupled to a localinterface. The local interface can include, for example, a data bus withan accompanying address/control bus or any other suitable bus structure.Similarly, the client devices 160 can each include at least oneprocessing circuit. Such a processing circuit can include, for example,one or more processors and one or more storage or memory devices thatare coupled to a local interface.

The storage or memory devices can store data or components that areexecutable by the processors of the processing circuit. For example, themanagement service 120, the account administrator 150, and/or othercomponents can be stored in one or more storage devices and beexecutable by one or more processors in the environments 100 and 130.Similarly, the agents, services, applications and/or other componentsdescribed herein can be stored in one or more storage devices and beexecutable by one or more processors in the client device 160.

The management service 120, the account administrator 150, and/or othercomponents described herein can be embodied in the form of hardware, assoftware components that are executable by hardware, or as a combinationof software and hardware. If embodied as hardware, the componentsdescribed herein can be implemented as a circuit or state machine thatemploys any suitable hardware technology. The hardware technology caninclude, for example, one or more microprocessors, discrete logiccircuits having logic gates for implementing various logic functionsupon an application of one or more data signals, application specificintegrated circuits (ASICs) having appropriate logic gates, programmablelogic devices (e.g., field-programmable gate array (FPGAs), and complexprogrammable logic devices (CPLDs)).

Also, one or more or more of the components described herein thatinclude software or program instructions can be embodied in anynon-transitory computer-readable medium for use by or in connection withan instruction execution system such as, a processor in a computersystem or other system. The computer-readable medium can contain, store,and/or maintain the software or program instructions for use by or inconnection with the instruction execution system.

A computer-readable medium can include a physical media, such as,magnetic, optical, semiconductor, and/or other suitable media. Examplesof a suitable computer-readable media include, but are not limited to,solid-state drives, magnetic drives, or flash memory. Further, any logicor component described herein can be implemented and structured in avariety of ways. For example, one or more components described can beimplemented as modules or components of a single application. Further,one or more components described herein can be executed in one computingdevice or by using multiple computing devices.

Further, any logic or applications described herein, including themanagement service 120, the account administrator 150, and/or othercomponents can be implemented and structured in a variety of ways. Forexample, one or more applications described can be implemented asmodules or components of a single application. Further, one or moreapplications described herein can be executed in shared or separatecomputing devices or a combination thereof. For example, a plurality ofthe applications described herein can execute in the same computingdevice, or in multiple computing devices. Additionally, terms such as“application,” “service,” “system,” “engine,” “module,” and so on can beused interchangeably and are not intended to be limiting.

The above-described examples of the present disclosure are merelypossible examples of implementations set forth for a clear understandingof the principles of the disclosure. Many variations and modificationscan be made without departing substantially from the spirit andprinciples of the disclosure. All such modifications and variations areintended to be included herein within the scope of this disclosure andprotected by the following claims.

Therefore, the following is claimed:
 1. A method for multi-personaenrollment management, comprising: querying, by a client device, amanagement computing environment to establish an alternate personaworkspace in the client device; creating the alternate persona workspacein the client device based on a response from the management computingenvironment; associating an alternate persona account with the alternatepersona workspace; and receiving, by the client device, a notificationto install at least one application in the alternate persona workspacefrom an account administration environment of the alternate personaaccount.
 2. The method according to claim 1, further comprising:receiving a token for the alternate persona workspace from themanagement computing environment; and forwarding the token from aprimary persona workspace in the client device to the alternate personaworkspace by inter-process communications.
 3. The method according toclaim 2, wherein associating the alternate persona account with thealternate persona workspace comprises accessing the alternate personaaccount through an account administration environment using the token.4. The method according to claim 1, further comprising receiving, fromthe account administration environment, an account services identifierfor the alternate persona account.
 5. The method according to claim 4,wherein the account services identifier comprises a unique identifierfor the alternate persona workspace.
 6. The method according to claim 4,further comprising forwarding the account services identifier from thealternate persona workspace to a primary persona workspace in the clientdevice by inter-process communications.
 7. The method according to claim6, wherein the alternate persona workspace is separate from the primarypersona workspace in the client device.
 8. The method according to claim1, wherein the management computing environment controls availability ofat least one application in the alternate persona workspace through anapplication administration call to the account administrationenvironment.
 9. A non-transitory computer-readable medium embodyingprogram code for multi-persona enrollment management that, when executedby a client device, directs the client device to at least: query amanagement computing environment to establish an alternate personaworkspace in the client device; create the alternate persona workspacein the client device based on a response from the management computingenvironment; associate an alternate persona account with the alternatepersona workspace; and receive a notification to install at least oneapplication in the alternate persona workspace from an accountadministration environment of the alternate persona account.
 10. Thenon-transitory computer-readable medium according to claim 9, whereinthe client device is further directed to at least: receive a token forthe alternate persona workspace from the management computingenvironment; and forward the token from a primary persona workspace inthe client device to the alternate persona workspace by inter-processcommunications.
 11. The non-transitory computer-readable mediumaccording to claim 10, wherein, to associate the alternate personaaccount with the alternate persona workspace, the client device isfurther directed to at least access the alternate persona accountthrough an account administration environment using the token.
 12. Thenon-transitory computer-readable medium according to claim 9, whereinthe client device is further directed to at least receive, from theaccount administration environment, an account services identifier forthe alternate persona account.
 13. The non-transitory computer-readablemedium according to claim 12, wherein the account services identifiercomprises a unique identifier for the alternate persona workspace. 14.The non-transitory computer-readable medium according to claim 12,wherein the client device is further directed to at least forward theaccount services identifier from the alternate persona workspace to aprimary persona workspace in the client device by inter-processcommunications.
 15. The non-transitory computer-readable mediumaccording to claim 14, wherein the alternate persona workspace isseparate from the primary persona workspace in the client device.
 16. Asystem for multi-persona enrollment management, comprising: a memorydevice configured to store computer-readable instructions thereon; andat least one processing device configured, through execution of thecomputer-readable instructions, to at least: query a managementcomputing environment to establish an alternate persona workspace in aclient device; create the alternate persona workspace in the clientdevice based on a response from the management computing environment;associate an alternate persona account with the alternate personaworkspace; and receive a notification to install at least oneapplication in the alternate persona workspace from an accountadministration environment of the alternate persona account.
 17. Thesystem according to claim 16, wherein the at least one processing deviceis further configured to at least: receive a token for the alternatepersona workspace from the management computing environment; and forwardthe token from a primary persona workspace in the client device to thealternate persona workspace by inter-process communications.
 18. Thesystem according to claim 17, wherein, to associate the alternatepersona account with the alternate persona workspace, the at least oneprocessing device is further configured to at least access the alternatepersona account through an account administration environment using thetoken.
 19. The system according to claim 16, wherein the at least oneprocessing device is further configured to at least receive, from theaccount administration environment, an account services identifier forthe alternate persona account.
 20. The system according to claim 19,wherein the account services identifier comprises a unique identifierfor the alternate persona workspace.