Chapter 6 Security 55
VPN
Many enterprise environments have some form of virtual private network (VPN). These secure
network services typically require minimal setup and conguration to work with Apple devices,
which integrate with a broad range of commonly used VPN technologies.
For details, see the Virtual Private Networks (VPN) Overview.
IPSec
iOS and OS X support IPSec protocols and authentication methods. For details, see Supported
protocols and authentication methods.
SSL/TLS
iOS supports SSL v3 and Transport Layer Security (TLS v1.0, 1.1, and 1.2). Safari, Calendar, Mail,
and other Internet apps automatically use these to enable an encrypted communication channel
between iOS and OS X and corporate services.
WPA/WPA2
iOS and OS X support WPA2 Enterprise to provide authenticated access to your enterprise
wireless network. WPA2 Enterprise uses 128-bit AES encryption, so user data is protected when
communicating over a Wi-Fi network connection. And with support for 802.1X, the Apple devices
can be integrated into a broad range of RADIUS authentication environments.
iOS and OS X support these 802.1X authentication protocols:
•
EAP-TLS
•
EAP-TTLS
•
EAP-FAST
•
EAP-SIM
•
EAP-AKA
•
PEAP v0, v1
•
LEAP
For more information, see the Wi-Fi Overview.
FaceTime and iMessage encryption
Each FaceTime session and iMessage conversation is encrypted. iOS and OS X create a unique ID
for each user, ensuring communications are encrypted, routed, and connected properly.
App security
To ensure apps can’t be tampered with, iOS and OS X include a sandboxed approach to app
runtime protection and app signing. iOS and OS X also have the Keychain, a framework which
facilitates secure storage of app and network service credentials in an encrypted storage
location. For iOS and OS X developers, it oers a Common Crypto architecture that can be used
to encrypt data that apps store.
Runtime protection
All apps from the App Store are sandboxed to restrict access to data stored by other apps. Also,
system les, resources, and the kernel are shielded from the user’s app space. If an app needs to
access data from another app, it can do so only by using the APIs and services provided by iOS
and OS X. Code generation is also prevented.
100% resize factor