User guide

EAP authentication methods that a Wi-Fi enabled BlackBerry device supports..................................................................... 113
LEAP authentication............................................................................................................................................................... 113
PEAP authentication.............................................................................................................................................................. 114
EAP-TLS authentication......................................................................................................................................................... 114
EAP-TTLS authentication....................................................................................................................................................... 114
EAP-FAST authentication...................................................................................................................................................... 115
EAP-SIM authentication........................................................................................................................................................ 115
Encryption keys that a Wi-Fi enabled BlackBerry device supports for use with layer 2 security methods.......................... 115
EAP authentication methods that a BlackBerry device supports the use of CCKM with....................................................... 116
Using certificates with PEAP authentication, EAP-TLS authentication, or EAP-TTLS authentication................................. 116
18 Protecting a third-party application on a BlackBerry device............................................................................................... 117
Creating a third-party application for a BlackBerry device....................................................................................................... 117
Specifying the resources third-party applications can access on a BlackBerry device.......................................................... 117
Managing third-party applications on a BlackBerry device using application control policy rules............................. 117
Managing BlackBerry Java Applications on a BlackBerry device using code signing................................................... 118
Permitting a third-party application to encode data on a BlackBerry device......................................................................... 119
Removing third-party applications when a user deletes all BlackBerry device data.............................................................. 119
19 RIM Cryptographic API............................................................................................................................................................... 120
Cryptographic algorithms and cryptographic codes that the RIM Cryptographic API supports.......................................... 120
Symmetric block algorithms that the RIM Cryptographic API supports.......................................................................... 120
Stream encryption algorithms that the RIM Cryptographic API supports...................................................................... 120
Asymmetric encryption algorithms that the RIM Cryptographic API supports.............................................................. 121
Key agreement scheme algorithms that the RIM Cryptographic API supports............................................................. 121
Signature scheme algorithms that the RIM Cryptographic API supports....................................................................... 121
Key generation algorithms that the RIM Cryptographic API supports............................................................................ 122
Message authentication codes that the RIM Cryptographic API supports..................................................................... 122
Message digest codes that the RIM Cryptographic API supports.................................................................................... 122
TLS and WTLS protocols that the RIM Cryptographic API supports......................................................................................... 122
Cipher suites for the key establishment algorithm that the RIM Cryptographic API supports.................................... 123
Symmetric algorithms that the RIM Cryptographic API supports.................................................................................... 123
Hash algorithms that the RIM Cryptographic API supports............................................................................................. 123
Limitations of RIM Cryptographic API support for cipher suites for the key establishment algorithm................................ 124
20 Related resources........................................................................................................................................................................ 125