Installation guide

BlackBerry Enterprise Solution Security
Messaging server ...............................................................................................................................................26
BlackBerry configuration database.................................................................................................................26
BlackBerry MDS Services databases ..............................................................................................................28
Protecting the BlackBerry Infrastructure connections ....................................................................................28
SRP authentication ............................................................................................................................................29
BlackBerry Router protocol authentication...................................................................................................30
Wireless enterprise activation authentication ...............................................................................................31
TCP/IP connection.............................................................................................................................................32
Messaging server to desktop email program connection ........................................................................... 33
BlackBerry Mobile Data System connections ...............................................................................................34
WAP gateway connections ...............................................................................................................................35
Authenticating a user ............................................................................................................................................35
Authenticating a user to a BlackBerry device using a password...............................................................35
Authenticating a user using a smart card......................................................................................................35
Controlling BlackBerry devices............................................................................................................................ 37
Controlling BlackBerry device behaviour using IT policy rules.................................................................. 37
Enforcing device and desktop security...........................................................................................................38
Controlling BlackBerry device access to the BlackBerry Enterprise Server.............................................39
Protecting Bluetooth connections on BlackBerry devices ..........................................................................39
Protecting the BlackBerry device against malware .....................................................................................40
Protecting lost, stolen, or replaced BlackBerry devices...................................................................................42
Erasing data from BlackBerry device memory and making the BlackBerry device unavailable ..........43
Unbinding the smart card from the BlackBerry device...............................................................................43
Related resources...................................................................................................................................................44
Appendix A: RIM Cryptographic Application Programming Interface..........................................................46
Cryptographic functionality that the RIM Crypto API provides.................................................................46
Appendix B: TLS and WTLS standards that the RIM Crypto API supports....................................................48
Key establishment algorithm cipher suites that the RIM Crypto API supports ......................................48
Symmetric algorithms that the RIM Crypto API supports.......................................................................... 49
Hash algorithms that the RIM Crypto API supports ................................................................................... 49
Appendix C: Previous version of wired master encryption key generation..................................................50
Previous version of wired master encryption key generation process......................................................50
Appendix D: BlackBerry device wipe process.....................................................................................................51
Appendix E: Ephemeral AES encryption key derivation process....................................................................53
© 2006 Research In Motion Limited. All rights reserved.
www.blackberry.com