An IBM Notes Traveler administrator wants to allow users to manage their own security, such as 'Wipe Device', and 'Deny Access'. What must the administrator do to allow this?
An administrator adds User A to an IBM Notes Traveler device settings document, which requires an alphanumeric password for Apple devices. The administrator then adds User A to Group A, which is listed in the Notes Traveler Policy Settings document. The Notes Traveler Policy Settings document requires Apple users to have a device password length of 6. What behavior will User A experience on the device?