Data flow: Activating a BlackBerry 10 device
BlackBerry 10
device
- You perform the following actions:
- Add a user toBlackBerry UEMas a local user account or using the account information retrieved from your company directory
- Assign an activation profile to the user
- Use one of the following options to provide the user with activation details:
- Automatically generate a device activation password and send an email with activation instructions for the user
- Set a device activation password and communicate the username and password to the user directly or by email
- Don't set a device activation password and communicate theBlackBerry UEM Self-Serviceaddress to the user so that they can set their own activation password
- The user performs the following actions:
- Types the username and activation password on the device
- For a "Work and personal - Regulated" or "Work space only" activation, accepts the organization notice, which outlines the terms and conditions that the user must agree to
- If the activation is a "Work space only" activation, the device deletes all existing data and restarts. For other activation types, theEnterprise Management Agenton the device performs the following actions:
- Establishes a connection to theBlackBerry Infrastructure
- Sends a request for activation information to theBlackBerry Infrastructure
- TheBlackBerry Infrastructureperforms the following actions:
- Verifies that the user is a valid, registered user
- Retrieves theBlackBerry UEMaddress for the user
- Sends the address to theEnterprise Management Agent
- The device performs the following actions:
- Establishes a connection withBlackBerry UEM
- Generates a shared symmetric key that is used to protect the CSR and responseBlackBerry UEMusing the activation password and EC-SPEKE.
- Creates an encrypted CSR and HMAC as follows:
- Generates a key pair for the certificate
- Creates a PKCS#10 CSR that includes the public key of the key pair
- Encrypts the CSR using the shared symmetric key and AES-256 in CBC mode with PKCS#5 padding
- Computes an HMAC of the encrypted CSR using SHA-256 and appends it to the CSR
- Sends the encrypted CSR and HMAC toBlackBerry UEM
- BlackBerry UEMperforms the following actions:
- Verifies the HMAC of the encrypted CSR and decrypts the CSR using the shared symmetric key
- Retrieves the username, work space ID, and your organization’s name from theBlackBerry UEMdatabase
- Packages a client certificate using the information it retrieved and the CSR that the device sent
- Signs the client certificate using the enterprise management root certificate
- Encrypts the client certificate, enterprise management root certificate, and theBlackBerry UEMURL using the shared symmetric key and AES-256 in CBC mode with PKCS#5 padding
- Computes an HMAC of the encrypted client certificate, enterprise management root certificate, and theBlackBerry UEMURL and appends it to the encrypted data
- Sends the encrypted data and HMAC to the device
- The device performs the following actions:
- Verifies the HMAC
- Decrypts the data it received fromBlackBerry UEM
- Stores the client certificate and the enterprise management root certificate in its keystore
- BlackBerry UEMperforms the following actions:
- BlackBerry UEM Coreassigns the new device to aBlackBerry UEMinstance in the domain
- BlackBerry UEM Corenotifies the activeBlackBerry Affinity Managerthat a new device is assigned to theBlackBerry UEMinstance
- The activeBlackBerry Affinity Managernotifies theBlackBerry Dispatcheron thatBlackBerry UEMinstance that there is a new device
- TheBlackBerry UEM Coresends configuration information, including enterprise connectivity settings to the device
- BlackBerry UEM Coreand the device generate the device transport key using ECMQV and the authenticated long-term public keys from the client certificate and the server certificate forBlackBerry UEM. This key is used to encrypt work data when not usingBlackBerry Secure Connect Plusand push to IPPP data.
- The device sends an acknowledgment over TLS toBlackBerry UEMto confirm that it received and applied the IT policy and other data and created the work space. The activation process is complete.
The elliptic curve protocols used during the activation process use the NIST-recommended 521-bit curve.