User guide

Data flow: Authenticating a BlackBerry Enterprise
Server with the BlackBerry Infrastructure
1. The BlackBerry Enterprise Server sends a data packet that contains its unique SRP identifier to the BlackBerry
Infrastructure to claim the SRP identifier.
2. The BlackBerry Infrastructure sends a random challenge string to the BlackBerry Enterprise Server.
3. The BlackBerry Enterprise Server sends a challenge string to the BlackBerry Infrastructure.
4. The BlackBerry Infrastructure hashes the challenge string with the SRP authentication key using HMAC with the SHA-1
algorithm. The
BlackBerry Infrastructure sends the resulting 20-byte value to the BlackBerry Enterprise Server as a
challenge string.
5. The BlackBerry Enterprise Server hashes the challenge string with the SRP authentication key, and sends a challenge
response to the
BlackBerry Infrastructure.
6. The BlackBerry Infrastructure performs one of the following actions:
accepts the challenge response and sends a confirmation to the BlackBerry Enterprise Server to complete the
authentication process and configure an authenticated SRP connection
rejects the challenge response
If the BlackBerry Infrastructure rejects the challenge response, the authentication process is not successful. The
BlackBerry Infrastructure and BlackBerry Enterprise Server close the SRP connection. If a BlackBerry Enterprise
Server uses the same SRP authentication key and SRP identifier to connect to (and then disconnect from) the
BlackBerry Infrastructure 5 times in 1 minute, the BlackBerry Infrastructure deactivates the SRP identifier to help
prevent a potentially malicious user from using the SRP identifier to create conditions for a DoS attack.
How a BlackBerry Enterprise Server and
messaging server protect a connection to
each other
A BlackBerry Enterprise Server is designed to connect to the following messaging servers in a highly secure manner.
Messaging server Description
IBM Domino The BlackBerry Enterprise Server and the Domino server communicate using
the Notes RPC protocol.
Security Technical Overview Protecting communications in your organization's environment
91