- What is BlackBerry Access?
- Getting started with BlackBerry Access
- Managing BlackBerry Access
- Making BlackBerry Access available to users
- Configuring BlackBerry Access app settings
- Configuring the BlackBerry Dynamics Launcher
- Configure single sign-on for BlackBerry Access in Good Control
- Configure single sign-on for BlackBerry Access in BlackBerry UEM
- Setting up a PAC file to manage a proxy infrastructure
- Configure RSA SecurID soft token authentication
- Kerberos authentication support
- Managing certificates
- Verify that BlackBerry Access can use certificates in BlackBerry UEM
- Verify that BlackBerry Access can use certificates in Good Control
- Upload certificates for users in BlackBerry UEM
- Upload certificates for users in Good Control
- Delete certificates for users in BlackBerry UEM
- Delete certificates for users in Good Control
- Security features
- Video support
- Configuring allowed Internet domains
- Changing communications protocols
- Allow users to open custom URL schemes
- Identifying BlackBerry Access in user agent
- Good Control cloud deployments and intranet servers
- Using BlackBerry Analytics to collect app data
- Configure a compliance rule for Windows antivirus detection in Good Control
- Configure support for FQDN resolution in Good Control
- Troubleshooting
- Feature support
- Browser support for HTML5 and CSS3
- Glossary
SSL and TLS
SSL transmission protocol employs a cryptographic system that uses two keys to
encrypt data: a public key known to everyone and a private, or secret, key known only to the
recipient of the message. TLS is the successor to SSL.
Both protocols use X.509 certificates and asymmetric cryptography to identify
the counterparty with whom they are talking, and to exchange a symmetric key. This session key is
then used to encrypt data flowing between the parties, providing data and message
confidentiality, along with message authentication codes for message integrity and message
authentication. An important characteristic is PFS, so the short term session key cannot be
derived from the long-term asymmetric secret key.