{"id":6218,"date":"2012-09-28T10:48:25","date_gmt":"2012-09-28T17:48:25","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=6218"},"modified":"2020-05-04T23:50:24","modified_gmt":"2020-05-05T06:50:24","slug":"a-look-at-guided-access-in-apple-ios-6","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/a-look-at-guided-access-in-apple-ios-6\/","title":{"rendered":"Can&#8217;t Touch This! A Look at Guided Access in Apple iOS 6"},"content":{"rendered":"<p>Apple has consistently improved the security that underpins iOS in every successive version they&#8217;ve released, but not much has changed recently with regard to actual on-device security controls. These can be particularly important for parents of young children who want to control access to spending or content, but also have wide application in Enterprise and Retail environments as well. Many restaurants, for example, are starting to use iPads as menus, drink lists, and interactive ordering stations, but in order to keep customers from navigating away from the intended information, they often have to lock up the beautiful hardware of the iPad inside bulky cases that hide all the hardware buttons.<\/p>\n<p>Now, however, with Apple&#8217;s new Guided Access feature, certain parts of the screen and even the hardware controls can be disabled to the user and kept securely off-limits with a passcode. This first layer of security is often overlooked, but this feature is very important because it allows businesses to distribute devices without having to worry about what a user might do once they get them in their hands.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/05\/Accessibility-Guided-Access-Configuration-iPad-iOS-6.jpg\" alt=\"Guided Access\" width=\"660\" height=\"495\" \/><\/p>\n<p>Guided Access controls are found in Settings &gt; General &gt; Accessibility, and can be called up in any app with a triple-tap of the Home Button. A passcode can be applied, and hardware controls or touch entirely can be disabled (or just selected sections of the screen). This has far-reaching applications from simply giving some kids a movie to watch on an iPad to training materials in education or business.<\/p>\n<p>Apple continues to push iOS forward, and as more and more features are added, the iPad looks better and better every day as a replacement for traditional computers. They&#8217;re low-cost, have excellent battery life, are very lightweight, and now are even more secure than ever.<\/p>\n<p>Here&#8217;s a great video we found that walks through the process of enabling and using Guided Access:<\/p>\n<p align=\"center\"><object width=\"560\" height=\"315\" classid=\"clsid:d27cdb6e-ae6d-11cf-96b8-444553540000\" codebase=\"http:\/\/download.macromedia.com\/pub\/shockwave\/cabs\/flash\/swflash.cab#version=6,0,40,0\"><param name=\"allowFullScreen\" value=\"true\" \/><param name=\"allowscriptaccess\" value=\"always\" \/><param name=\"src\" value=\"http:\/\/www.youtube.com\/v\/US6jrcZJlNs?version=3&amp;hl=en_US\" \/><param name=\"allowfullscreen\" value=\"true\" \/><\/object><\/p>\n<p>Let us know in the comments if you plan on using this new feature in an interesting way.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Apple has consistently improved the security that underpins iOS in every successive version they&#8217;ve released, but not much has changed recently with regard to actual on-device security controls. These can be particularly important for parents of young children who want to control access to spending or content, but also have wide application in Enterprise and [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":9021,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[7],"tags":[3151,69,8],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Apple has consistently improved the security that underpins iOS in every successive version they&#039;ve released, but not much has changed recently with\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/a-look-at-guided-access-in-apple-ios-6\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Can&#039;t Touch This! A Look at Guided Access in Apple iOS 6 - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Apple has consistently improved the security that underpins iOS in every successive version they&#039;ve released, but not much has changed recently with\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/a-look-at-guided-access-in-apple-ios-6\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2012-09-28T17:48:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-05T06:50:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/10\/ios-6-thumb.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sam Lawrence\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/a-look-at-guided-access-in-apple-ios-6\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/10\/ios-6-thumb.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/10\/ios-6-thumb.jpg\",\"width\":\"400\",\"height\":\"260\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/a-look-at-guided-access-in-apple-ios-6\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/a-look-at-guided-access-in-apple-ios-6\/\",\"name\":\"Can't Touch This! A Look at Guided Access in Apple iOS 6 - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/a-look-at-guided-access-in-apple-ios-6\/#primaryimage\"},\"datePublished\":\"2012-09-28T17:48:25+00:00\",\"dateModified\":\"2020-05-05T06:50:24+00:00\",\"description\":\"Apple has consistently improved the security that underpins iOS in every successive version they've released, but not much has changed recently with\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/a-look-at-guided-access-in-apple-ios-6\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/a-look-at-guided-access-in-apple-ios-6\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/a-look-at-guided-access-in-apple-ios-6\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Can&#8217;t Touch This! A Look at Guided Access in Apple iOS 6\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/a-look-at-guided-access-in-apple-ios-6\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/a-look-at-guided-access-in-apple-ios-6\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d733d3220f7deb2beaf2066b01c77d10\"},\"headline\":\"Can&#8217;t Touch This! A Look at Guided Access in Apple iOS 6\",\"datePublished\":\"2012-09-28T17:48:25+00:00\",\"dateModified\":\"2020-05-05T06:50:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/a-look-at-guided-access-in-apple-ios-6\/#webpage\"},\"wordCount\":340,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/a-look-at-guided-access-in-apple-ios-6\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/10\/ios-6-thumb.jpg\",\"keywords\":[\"Apple\",\"iOS\",\"iPad\"],\"articleSection\":[\"Apple\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/a-look-at-guided-access-in-apple-ios-6\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d733d3220f7deb2beaf2066b01c77d10\",\"name\":\"Sam Lawrence\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/288183e1b6940b1dd6abee01df079c36?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/288183e1b6940b1dd6abee01df079c36?s=96&d=mm&r=g\",\"caption\":\"Sam Lawrence\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/samlawrence\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Apple has consistently improved the security that underpins iOS in every successive version they've released, but not much has changed recently with","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/a-look-at-guided-access-in-apple-ios-6\/","og_locale":"en_US","og_type":"article","og_title":"Can't Touch This! A Look at Guided Access in Apple iOS 6 - The Mac Security Blog","og_description":"Apple has consistently improved the security that underpins iOS in every successive version they've released, but not much has changed recently with","og_url":"https:\/\/www.intego.com\/mac-security-blog\/a-look-at-guided-access-in-apple-ios-6\/","og_site_name":"The Mac Security Blog","article_published_time":"2012-09-28T17:48:25+00:00","article_modified_time":"2020-05-05T06:50:24+00:00","og_image":[{"width":"400","height":"260","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/10\/ios-6-thumb.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Sam Lawrence","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/a-look-at-guided-access-in-apple-ios-6\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/10\/ios-6-thumb.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/10\/ios-6-thumb.jpg","width":"400","height":"260"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/a-look-at-guided-access-in-apple-ios-6\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/a-look-at-guided-access-in-apple-ios-6\/","name":"Can't Touch This! A Look at Guided Access in Apple iOS 6 - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/a-look-at-guided-access-in-apple-ios-6\/#primaryimage"},"datePublished":"2012-09-28T17:48:25+00:00","dateModified":"2020-05-05T06:50:24+00:00","description":"Apple has consistently improved the security that underpins iOS in every successive version they've released, but not much has changed recently with","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/a-look-at-guided-access-in-apple-ios-6\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/a-look-at-guided-access-in-apple-ios-6\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/a-look-at-guided-access-in-apple-ios-6\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Can&#8217;t Touch This! A Look at Guided Access in Apple iOS 6"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/a-look-at-guided-access-in-apple-ios-6\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/a-look-at-guided-access-in-apple-ios-6\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d733d3220f7deb2beaf2066b01c77d10"},"headline":"Can&#8217;t Touch This! A Look at Guided Access in Apple iOS 6","datePublished":"2012-09-28T17:48:25+00:00","dateModified":"2020-05-05T06:50:24+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/a-look-at-guided-access-in-apple-ios-6\/#webpage"},"wordCount":340,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/a-look-at-guided-access-in-apple-ios-6\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/10\/ios-6-thumb.jpg","keywords":["Apple","iOS","iPad"],"articleSection":["Apple"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/a-look-at-guided-access-in-apple-ios-6\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d733d3220f7deb2beaf2066b01c77d10","name":"Sam Lawrence","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/288183e1b6940b1dd6abee01df079c36?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/288183e1b6940b1dd6abee01df079c36?s=96&d=mm&r=g","caption":"Sam Lawrence"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/samlawrence\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/10\/ios-6-thumb.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-1Ci","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/6218"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=6218"}],"version-history":[{"count":18,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/6218\/revisions"}],"predecessor-version":[{"id":91333,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/6218\/revisions\/91333"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/9021"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=6218"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=6218"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=6218"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}