
BlackBerry Enterprise Solution Security
Messaging server ...............................................................................................................................................25
BlackBerry configuration database.................................................................................................................26
BlackBerry MDS Services databases ..............................................................................................................28
Protecting the BlackBerry Infrastructure connections ....................................................................................28
SRP authentication ............................................................................................................................................28
BlackBerry Router protocol authentication...................................................................................................30
Wireless enterprise activation authentication ..............................................................................................30
TCP/IP connection.............................................................................................................................................32
Messaging server to desktop email program connection ........................................................................... 33
BlackBerry Mobile Data System connections ...............................................................................................33
WAP gateway connections ...............................................................................................................................34
Authenticating a user ............................................................................................................................................34
Authenticating a user to a BlackBerry device using a password...............................................................34
Authenticating a user using a smart card......................................................................................................35
Controlling BlackBerry devices............................................................................................................................36
Controlling BlackBerry device behaviour using IT policy rules..................................................................36
Enforcing device and desktop security........................................................................................................... 37
Controlling BlackBerry device access to the BlackBerry Enterprise Server.............................................38
Protecting Bluetooth connections on BlackBerry devices ..........................................................................38
Protecting third-party applications on the BlackBerry device...................................................................39
Protecting lost, stolen, or replaced BlackBerry devices...................................................................................40
Erasing data from BlackBerry device memory and making the BlackBerry device unavailable ...........41
Unbinding the smart card from the BlackBerry device................................................................................41
Related resources...................................................................................................................................................42
Appendix A: RIM Cryptographic Application Programming Interface..........................................................44
Cryptographic functionality that the RIM Crypto API provides.................................................................44
Appendix B: TLS and WTLS standards that the RIM Crypto API supports....................................................46
Key establishment algorithm cipher suites that the RIM Crypto API supports ......................................46
Symmetric algorithms that the RIM Crypto API supports...........................................................................47
Hash algorithms that the RIM Crypto API supports ....................................................................................47
Appendix C: Previous version of wired master encryption key generation..................................................48
Previous version of wired master encryption key generation process......................................................48
Appendix D: BlackBerry device wipe process................................................................................................... 49
Appendix E: Ephemeral AES encryption key derivation process.....................................................................51
© 2006 Research In Motion Limited. All rights reserved.
www.blackberry.com
Comentarios a estos manuales