- What is BlackBerry Access?
- Getting started with BlackBerry Access
- Managing BlackBerry Access
- Making BlackBerry Access available to users
- Configuring BlackBerry Access app settings
- Configuring the BlackBerry Dynamics Launcher
- Whitelist the BlackBerry UEM App Catalog in the BlackBerry Dynamics Connectivity profile
- Configure single sign-on for BlackBerry Access in Good Control
- Configure single sign-on for BlackBerry Access in BlackBerry UEM
- Setting up a PAC file to manage a proxy infrastructure
- Configure RSA SecurID soft token authentication
- Kerberos authentication support
- Managing certificates
- Verify that BlackBerry Access can use certificates in BlackBerry UEM
- Verify that BlackBerry Access can use certificates in Good Control
- Upload certificates for users in BlackBerry UEM
- Upload certificates for users in Good Control
- Delete certificates for users in BlackBerry UEM
- Delete certificates for users in Good Control
- Security features
- Video support
- Configuring allowed Internet domains
- Changing communications protocols
- Configure access to WebRTC-based destinations
- Allow users to open custom URL schemes
- Allow users to securely edit files within an app in BlackBerry Access on Windows or macOS
- Identifying BlackBerry Access in user agent
- Good Control cloud deployments and intranet servers
- Using BlackBerry Analytics to collect app data
- Configure a compliance rule for Windows antivirus detection in Good Control
- Configure support for FQDN resolution in Good Control
- Troubleshooting
- Feature support
- Browser support for HTML5 and CSS3
Diagnostics
If a user is reporting an issue, you can ask them to perform app
diagnostics.
You can use diagnostic tools to check the connection between
BlackBerry Access
and BlackBerry Proxy
and other target servers.BlackBerry Access for iOS
also has a
“Collect network summary” option that you can use to collect and display a summary of
your internet usage. The summary, which can be used for diagnostics, displays
information such as delays in connections, authentication handshakes, and proxy
resolution.