- What is BlackBerry Access?
- Getting started with BlackBerry Access
- Managing BlackBerry Access
- Making BlackBerry Access available to users
- Configuring BlackBerry Access app settings
- Configuring the BlackBerry Dynamics Launcher
- Whitelist the BlackBerry UEM App Catalog in the BlackBerry Dynamics Connectivity profile
- Configure single sign-on for BlackBerry Access in Good Control
- Configure single sign-on for BlackBerry Access in BlackBerry UEM
- Setting up a PAC file to manage a proxy infrastructure
- Configure RSA SecurID soft token authentication
- Kerberos authentication support
- Managing certificates
- Verify that BlackBerry Access can use certificates in BlackBerry UEM
- Verify that BlackBerry Access can use certificates in Good Control
- Upload certificates for users in BlackBerry UEM
- Upload certificates for users in Good Control
- Delete certificates for users in BlackBerry UEM
- Delete certificates for users in Good Control
- Security features
- Video support
- Configuring allowed Internet domains
- Changing communications protocols
- Configure access to WebRTC-based destinations
- Allow users to open custom URL schemes
- Allow users to securely edit files within an app in BlackBerry Access on Windows or macOS
- Identifying BlackBerry Access in user agent
- Good Control cloud deployments and intranet servers
- Using BlackBerry Analytics to collect app data
- Configure a compliance rule for Windows antivirus detection in Good Control
- Configure support for FQDN resolution in Good Control
- Troubleshooting
- Feature support
- Browser support for HTML5 and CSS3
SSL and TLS
SSL transmission protocol employs a cryptographic system that uses two keys to
encrypt data: a public key known to everyone and a private, or secret, key known only to the
recipient of the message. TLS is the successor to SSL.
Both protocols use X.509 certificates and asymmetric cryptography to identify
the counterparty with whom they are talking, and to exchange a symmetric key. This session key is
then used to encrypt data flowing between the parties, providing data and message
confidentiality, along with message authentication codes for message integrity and message
authentication. An important characteristic is PFS, so the short term session key cannot be
derived from the long-term asymmetric secret key.