Late last week, LinkedIn released a new iOS app, LinkedIn Intro. The move itself was not overly surprising, given the Mountain View company’s acquisition of Rapportive in February of last year. The Intro app is designed to show users contextual information about who they are communicating over email with, and in doing so, enhance their ability to communicate meaningfully.
A number of customers have reached out to our support team recently, asking us what our position was regarding Intro in light of its unusual install path. Intro is not driven from the App Store, but rather, via a unique workflow that sends an SMS to an iOS device, containing a link to an installation that prompts the device’s owner to accept an OAUTH workflow that grants Intro mailbox access and permissions.
While CloudLock does not provide per-app reviews, or have a specific position regarding the use of Intro, we do suggest that our customers consider the potential risk of allowing any application to access Google Apps accounts. We ran a test to determine if Intro would be detected by Apps Firewall, and found that it is both identified and can be controlled via the CloudLock platform.
If you are an Apps Firewall customer and wish to see which of your users have granted LinkedIn Intro access to your Google Apps accounts, the process is straightforward. After a scan is completed, look for LinkedIn Intro in the End User Installed Apps panel:
You can easily see which users have authorized the application via the users list (the “1” in the screenshot above); you can also immediately select the application and revoke its access via the Actions menu, if you wish to restrict its use to personal accounts.