SlideShare a Scribd company logo
1 of 7
Download to read offline
IBM Traveler and Verse: Device Security
and Administration Overview
Devin S. Olson - IBM Champion
Red Pill Now – 07 November 2016
Introduction
There currently seems to be a great deal of confusion about IBM Traveler and Verse with regard to
device security and administration. The necessary overview information is available from IBM, but is
rather dispersed and somewhat difficult to track down in a single concise location. This document will
attempt to answer some of the most common points of confusion and concern for those considering a
Traveler deployment in their Domino environment -without necessarily having IBM Connect or Cloud
solutions in place.
Terminology
IBM Traveler
This is the name of the Domino server add-in that provides non-browser mail services to mobile client
devices (cell phones, tablets, etc.) It is also the old name of the client app used on these client devices.
IBM Verse
This is the name of the IBM product solution which provides access to the suite of IBM Mail, Calendar,
Contacts, and Connections information. It is also the new name of the client app used to access both
the Verse suite stuff and IBM Traveler information. IBM Verse currently requires an IBM Cloud
implementation in order to provide access to the suite information.
IBM VOP (Verse On-Premises)
This is the current term (and likely product name) for the IBM product solution which will provide access
to the same suite if IBM Mail, Calendar, Contacts, and Connections information while allowing the
customer to keep all of their information on premises, within their own network or data center. IBM
has discovered that many of their current and future customers do not want to move their data to the
IBM Cloud; which has prompted the push for this product solution to become a reality as soon as
possible.
The important distinction here is that for the rest of this document if I mention IBM Verse I am referring
to the client app which interacts with the IBM Traveler server; not the Verse Cloud or VOP solution.
Security and Administration
Supported Devices
The following devices are supported by IBM Traveler
 Apple iOS devices
 Android devices
 BlackBerry 10
 Windows Phone
 Windows Surface RT and Pro
 Nokia Series 60 w/ Symbian
 Windows Mobile
Encryption
Data in Transit
Encryption of data while in transit (to or from the device via HTTPS) is supported for all supported
devices.
SHA-2 / TLS1.2 and Apple iOS devices
With the release of iOS 9, Apple has defaulted to using TLS 1.2 ciphers for secure connections.
This means that the Traveler server or any network component in front of Traveler that will receive such
incoming connections from iOS 9 (or later) devices must be able to support TLS 1.2 ciphers in order for
the device to make a successful connection.
In order to support Apple devices running iOS 9 or later, IBM Traveler version 9.0.1.7 (or later) must be
installed, along with Domino server 9.0.1 Fix Pack 3 Interim Fix 2 (or later). In addition, SHA-2
certificates must be installed on the server.
While other devices will be able to connect to Traveler versions which do not support TLS 1.2 and SHA-1
certificates, the security and encryption cannot be ensured and should be avoided.
It is strongly recommended that all Traveler and public facing Domino environments be upgraded to
support TLS 1.2 with SHA-2 certificates.
Data at Rest
Encryption of the data at rest (on the device itself) is supported with the following caveats:
 Apple iOS: Supported with Domino policies or IBM Traveler device preferences and security
settings. Whole devices can be encrypted, and enabled and enforced with the security policies
in IBM Traveler. iPhones that do not support hardware encryption can be blocked. iPhone 3GS,
iPhone 4 and above, and the iPad support hardware encryption. First-generation iPhone and
iPhone 3G do not.
 Android Devices: The mail body and all attachments are encrypted using AES 256-bit encryption.
This is the case if stored on an SD card or internal phone storage. The rest of the data is stored
unencrypted in phone storage. This is implemented based on the Android application security
model.
 Windows Phone: Supported with Windows Phone 8 or higher versions.
 BlackBerry 10, Windows Surface RT, Windows Surface Pro: Supported
 Nokia Series 60: Only supported on Symbian^3 devices. Enforceable using Domino policies or
IBM Traveler device preferences and security settings. Storage cards can be encrypted.
 Windows Mobile: Storage cards can be encrypted. Data in native PIM and mail applications is
not encrypted, except for Domino encrypted mail.
Domino Encrypted Mail
Domino Encrypted Mail, where the mail message is itself encrypted, is supported for all devices except
the Windows Surface RT and Windows Surface Pro, with the following caveats:
 Viewing mail and attachments, sending, forwarding, and replying to encrypted mail are all
supported. Encrypted calendar invitations are not supported. Copy / Paste options for
encrypted mail are disabled and not allowed. Encrypted attachments can only be opened in
(detached to) other client applications which have been pre-approved by the Traveler
administrator.
 Apple iOS devices require IBM Traveler Companion application (available on the iTunes store) to
manage the users Notes ID encryption keys.
 BlackBerry 10 devices require a BES (BlackBerry Enterprise Server) to send encrypted mail from
the device.
Remote Wipe
Should the device become lost or stolen, the ability for an administrator to remotely wipe the IBM
Traveler data store is supported for all devices. The ability for an administrator to remotely wipe the
entire device is also supported, with the following caveats:
 Android device wipe required Android 2.2 or higher
 BlackBerry 10 devices managed by a BES can have the entire device wiped or only the work
perimeter.
Administration Settings
IBM Traveler provides a set of default device preferences and security settings. These settings should be
reviewed by the Administrator prior to rolling out a Traveler instance for their environment.
Traveler Administration Database
The IBM Traveler administration database contains a default device setting document that is initialized
with the default settings. This document contains a variety of system-wide settings which can be
configured by the Administrator. Additionally, it contains several subsets of device-specific settings for
individual device types:
Once this is set up, when an
authorized user connects to the
Traveler server using an authorized
device, a device specific settings
document is created. It is from this
document that the Administrator can
take any necessary security actions
for the specific device, such as
Denying access, Wiping, or Changing
Approval.
Domino Policies
For IBM Domino / Traveler releases prior to 8.5.1, these settings were required to be implemented using
Traveler-specific Policy Settings document(s). This is still supported, though no longer required.
Domino policies provide additional flexibility and functionality but are more difficult to use than the
default device settings document in some environments. The advantage of using Domino policies is the
ability to assign different device preferences and security settings by user, group, or organization. The
default settings document does include a mechanism to include or exclude users, groups, and
organizations, but it is much more limited than Domino policies. Users to which the default settings
document does not apply receive the IBM Traveler built-in defaults if they do not have a Domino policy.
These hard-coded defaults are the same as the default settings document. With Domino policies, you
can define different settings for every user. The limited include/exclude support of the default settings
document allows you to have two sets of defaults: those defined in the default settings document, and
the built-in IBM Traveler defaults.
NOTE: If settings and security policies are defined for a user in both a Domino policy and in the IBM
Traveler default settings document, the Domino policy settings are used.
Summary
IBM Traveler is very well versed, is fairly easy to configure and deploy, and provides adequate features,
security, and administration capabilities for most environments. Advanced security settings are not
difficult to configure, although the IBM documentation can make it seem more daunting than it really is.
Links / Suggested Reading:
IBM
Using Verse Mobile:
http://www.ibm.com/support/knowledgecenter/SSYRPW_9.0.1/UsingVerseMobile.html
Server Synchronized Settings:
https://www.ibm.com/support/knowledgecenter/SSYRPW_9.0.1/Server_synchronized_settings.html
Verse Offline FAQ:
http://www-01.ibm.com/support/docview.wss?uid=swg21978542
IBM Verse Apple Devices:
http://www.ibm.com/support/knowledgecenter/SSYRPW_9.0.1/iOSVerseNeedtoKNow.html
Planning for Security:
http://www.ibm.com/support/knowledgecenter/SSYRPW_9.0.1/planningforsecurity.html
Assigning Preference and Security Settings:
http://www.ibm.com/support/knowledgecenter/SSYRPW_9.0.1/Pushing_configuration_to_a_device.ht
ml
Apple devices with iOS 9 connectivity Technote:
http://www-01.ibm.com/support/docview.wss?uid=swg21967350
Non-IBM Industry Experts
Darren Duke (Simplified Technology Solutions) - Using IBM Traveler with a proxy:
https://blog.darrenduke.net/Darren/DDBZ.nsf/dx/using-ibm-lotus-traveler-with-a-proxy....food-for-
thought-before-you-do-this.htm
Gabriella Davis (The Turtle Partnership) – Traveler Management, Security and Performance:
www.slideshare.net/gabturtle/ibm-traveler-management-security-and-performance
About Devin S. Olson
Who Am I?
 Christian
 Husband
 Father
 Biker, Brewer, Friend
What do I do?
 Senior Consultant at Red Pill Now
 IBM Champion
 Notes / Domino consultant since 1995
 MCP
 PCLP SA/AD R4.6, R5, R6, R7
 Beer Snob (Anheuser-Busch Certified Beer Master)
 www.redpillnow.com
 www.LearningXPages.com
Contact:
 devin@redpilldevelopment.com
 devin.olson@azlighthouse.com
 twitter, skype: @spanky762
 facebook: default.xsp

More Related Content

What's hot

Radmin - efficient solution for business processes optimization
Radmin - efficient solution for business processes optimizationRadmin - efficient solution for business processes optimization
Radmin - efficient solution for business processes optimizationFamatech
 
Thin Client Smart Station Smart 2590
Thin Client Smart Station Smart 2590Thin Client Smart Station Smart 2590
Thin Client Smart Station Smart 2590Nirav Ambani
 
Nsa best practices for keeping your home network secure
Nsa   best practices for keeping your home network secureNsa   best practices for keeping your home network secure
Nsa best practices for keeping your home network secureFort Rucker FRSA
 
Windows 10 voor bedrijven
Windows 10 voor bedrijvenWindows 10 voor bedrijven
Windows 10 voor bedrijvenICT-Partners
 
Samsung Knox Configure: Understanding the Features
Samsung Knox Configure: Understanding the FeaturesSamsung Knox Configure: Understanding the Features
Samsung Knox Configure: Understanding the FeaturesSamsung Biz Mobile
 
IBM Sametime Unified Telephony Lite Client: Configuring SIP trunks to third-p...
IBM Sametime Unified Telephony Lite Client: Configuring SIP trunks to third-p...IBM Sametime Unified Telephony Lite Client: Configuring SIP trunks to third-p...
IBM Sametime Unified Telephony Lite Client: Configuring SIP trunks to third-p...jackdowning
 
Lotus Notes And Domino 8.5 Security Comparison 2
Lotus Notes And Domino 8.5 Security Comparison 2Lotus Notes And Domino 8.5 Security Comparison 2
Lotus Notes And Domino 8.5 Security Comparison 2Sarwar Javaid
 
Mobile frame getting started guide v5 0
Mobile frame getting started guide v5 0Mobile frame getting started guide v5 0
Mobile frame getting started guide v5 0MobileWorxs
 
JMP205 From Zero To Mobile Hero - IBM Sametime 8.5.2 Mobile Access Server Ins...
JMP205 From Zero To Mobile Hero - IBM Sametime 8.5.2 Mobile Access Server Ins...JMP205 From Zero To Mobile Hero - IBM Sametime 8.5.2 Mobile Access Server Ins...
JMP205 From Zero To Mobile Hero - IBM Sametime 8.5.2 Mobile Access Server Ins...Frank Altenburg
 
Forklift Impact Management in Real Time
Forklift Impact Management in Real TimeForklift Impact Management in Real Time
Forklift Impact Management in Real TimeTed Jurca
 
Forklift Fleet Management, SkidWeigh Technology
Forklift Fleet Management, SkidWeigh TechnologyForklift Fleet Management, SkidWeigh Technology
Forklift Fleet Management, SkidWeigh TechnologyTed Jurca
 
Lotusphere 2012 - What's next in Lotus Notes & Domino
Lotusphere 2012 - What's next in Lotus Notes & DominoLotusphere 2012 - What's next in Lotus Notes & Domino
Lotusphere 2012 - What's next in Lotus Notes & DominoIBM Danmark
 
OIB Brochure (Eng)
OIB Brochure (Eng)OIB Brochure (Eng)
OIB Brochure (Eng)dyanger
 

What's hot (16)

Radmin - efficient solution for business processes optimization
Radmin - efficient solution for business processes optimizationRadmin - efficient solution for business processes optimization
Radmin - efficient solution for business processes optimization
 
Thin Client Smart Station Smart 2590
Thin Client Smart Station Smart 2590Thin Client Smart Station Smart 2590
Thin Client Smart Station Smart 2590
 
Nsa best practices for keeping your home network secure
Nsa   best practices for keeping your home network secureNsa   best practices for keeping your home network secure
Nsa best practices for keeping your home network secure
 
Windows 10 voor bedrijven
Windows 10 voor bedrijvenWindows 10 voor bedrijven
Windows 10 voor bedrijven
 
Samsung Knox Configure: Understanding the Features
Samsung Knox Configure: Understanding the FeaturesSamsung Knox Configure: Understanding the Features
Samsung Knox Configure: Understanding the Features
 
Webinar: Opsummering af Connect 2013
Webinar: Opsummering af Connect 2013Webinar: Opsummering af Connect 2013
Webinar: Opsummering af Connect 2013
 
Mobile Operating System
Mobile Operating SystemMobile Operating System
Mobile Operating System
 
Emc lifeline
Emc lifelineEmc lifeline
Emc lifeline
 
IBM Sametime Unified Telephony Lite Client: Configuring SIP trunks to third-p...
IBM Sametime Unified Telephony Lite Client: Configuring SIP trunks to third-p...IBM Sametime Unified Telephony Lite Client: Configuring SIP trunks to third-p...
IBM Sametime Unified Telephony Lite Client: Configuring SIP trunks to third-p...
 
Lotus Notes And Domino 8.5 Security Comparison 2
Lotus Notes And Domino 8.5 Security Comparison 2Lotus Notes And Domino 8.5 Security Comparison 2
Lotus Notes And Domino 8.5 Security Comparison 2
 
Mobile frame getting started guide v5 0
Mobile frame getting started guide v5 0Mobile frame getting started guide v5 0
Mobile frame getting started guide v5 0
 
JMP205 From Zero To Mobile Hero - IBM Sametime 8.5.2 Mobile Access Server Ins...
JMP205 From Zero To Mobile Hero - IBM Sametime 8.5.2 Mobile Access Server Ins...JMP205 From Zero To Mobile Hero - IBM Sametime 8.5.2 Mobile Access Server Ins...
JMP205 From Zero To Mobile Hero - IBM Sametime 8.5.2 Mobile Access Server Ins...
 
Forklift Impact Management in Real Time
Forklift Impact Management in Real TimeForklift Impact Management in Real Time
Forklift Impact Management in Real Time
 
Forklift Fleet Management, SkidWeigh Technology
Forklift Fleet Management, SkidWeigh TechnologyForklift Fleet Management, SkidWeigh Technology
Forklift Fleet Management, SkidWeigh Technology
 
Lotusphere 2012 - What's next in Lotus Notes & Domino
Lotusphere 2012 - What's next in Lotus Notes & DominoLotusphere 2012 - What's next in Lotus Notes & Domino
Lotusphere 2012 - What's next in Lotus Notes & Domino
 
OIB Brochure (Eng)
OIB Brochure (Eng)OIB Brochure (Eng)
OIB Brochure (Eng)
 

Similar to IBM Traveler and Verse: Device Security and Administration Overview

Ask the expert session on ibm traveler and new security changes
Ask the expert session on ibm traveler and new security changes Ask the expert session on ibm traveler and new security changes
Ask the expert session on ibm traveler and new security changes jayeshpar2006
 
Empower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSEmpower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSKris Wagner
 
Beyond BYOD
Beyond BYODBeyond BYOD
Beyond BYODWorksPad
 
Connect2014 id600 ibm notes traveler 2013 & beyond
Connect2014 id600 ibm notes traveler 2013 & beyondConnect2014 id600 ibm notes traveler 2013 & beyond
Connect2014 id600 ibm notes traveler 2013 & beyonda8us
 
NSA Best Practices Datasheets
NSA Best Practices DatasheetsNSA Best Practices Datasheets
NSA Best Practices DatasheetsScientia Groups
 
120019_top5_security
120019_top5_security120019_top5_security
120019_top5_securityJessica Hirst
 
Best practices datasheets
Best practices datasheetsBest practices datasheets
Best practices datasheetsfrankold
 
So, You're Going to the Cloud? Start Preparing NOW!
So, You're Going to the Cloud? Start Preparing NOW!So, You're Going to the Cloud? Start Preparing NOW!
So, You're Going to the Cloud? Start Preparing NOW!Wes Morgan
 
Cortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - ENCortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - ENolivier lussac
 
Tip from IBM Connect 2014: Mobile security roundup
Tip from IBM Connect 2014: Mobile security roundupTip from IBM Connect 2014: Mobile security roundup
Tip from IBM Connect 2014: Mobile security roundupSocialBiz UserGroup
 
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...IBM Security
 
Security Best Practices for Mobile Development
Security Best Practices for Mobile DevelopmentSecurity Best Practices for Mobile Development
Security Best Practices for Mobile DevelopmentSalesforce Developers
 
Fasoo Secure Document (FSD) for SharePoint
Fasoo Secure Document (FSD) for SharePoint Fasoo Secure Document (FSD) for SharePoint
Fasoo Secure Document (FSD) for SharePoint Fasoo
 
Comodo one | Patch Management Software
Comodo one | Patch Management SoftwareComodo one | Patch Management Software
Comodo one | Patch Management SoftwareKristen theron
 
Win10 comparetable fy17
Win10 comparetable fy17Win10 comparetable fy17
Win10 comparetable fy17namprince187
 

Similar to IBM Traveler and Verse: Device Security and Administration Overview (20)

Ask the expert session on ibm traveler and new security changes
Ask the expert session on ibm traveler and new security changes Ask the expert session on ibm traveler and new security changes
Ask the expert session on ibm traveler and new security changes
 
DLP and MDM Datasheet
DLP and MDM DatasheetDLP and MDM Datasheet
DLP and MDM Datasheet
 
Empower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSEmpower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMS
 
Beyond BYOD
Beyond BYODBeyond BYOD
Beyond BYOD
 
Connect2014 id600 ibm notes traveler 2013 & beyond
Connect2014 id600 ibm notes traveler 2013 & beyondConnect2014 id600 ibm notes traveler 2013 & beyond
Connect2014 id600 ibm notes traveler 2013 & beyond
 
NSA Best Practices Datasheets
NSA Best Practices DatasheetsNSA Best Practices Datasheets
NSA Best Practices Datasheets
 
120019_top5_security
120019_top5_security120019_top5_security
120019_top5_security
 
Best practices datasheets
Best practices datasheetsBest practices datasheets
Best practices datasheets
 
Network_Administration_PPT
Network_Administration_PPTNetwork_Administration_PPT
Network_Administration_PPT
 
Laptop management
Laptop managementLaptop management
Laptop management
 
So, You're Going to the Cloud? Start Preparing NOW!
So, You're Going to the Cloud? Start Preparing NOW!So, You're Going to the Cloud? Start Preparing NOW!
So, You're Going to the Cloud? Start Preparing NOW!
 
Cortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - ENCortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - EN
 
Tip from IBM Connect 2014: Mobile security roundup
Tip from IBM Connect 2014: Mobile security roundupTip from IBM Connect 2014: Mobile security roundup
Tip from IBM Connect 2014: Mobile security roundup
 
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...
 
Security Best Practices for Mobile Development
Security Best Practices for Mobile DevelopmentSecurity Best Practices for Mobile Development
Security Best Practices for Mobile Development
 
Fasoo Secure Document (FSD) for SharePoint
Fasoo Secure Document (FSD) for SharePoint Fasoo Secure Document (FSD) for SharePoint
Fasoo Secure Document (FSD) for SharePoint
 
Windows 10: Security Focus (part II)
Windows 10: Security Focus (part II)Windows 10: Security Focus (part II)
Windows 10: Security Focus (part II)
 
Project Pt1
Project Pt1Project Pt1
Project Pt1
 
Comodo one | Patch Management Software
Comodo one | Patch Management SoftwareComodo one | Patch Management Software
Comodo one | Patch Management Software
 
Win10 comparetable fy17
Win10 comparetable fy17Win10 comparetable fy17
Win10 comparetable fy17
 

More from Devin Olson

Paired with an Idiot: Things that sabotage success
Paired with an Idiot: Things that sabotage successPaired with an Idiot: Things that sabotage success
Paired with an Idiot: Things that sabotage successDevin Olson
 
Resolving Cached Design Element Corruption Issues in the IBM Notes Client
Resolving Cached Design Element Corruption Issues in the IBM Notes ClientResolving Cached Design Element Corruption Issues in the IBM Notes Client
Resolving Cached Design Element Corruption Issues in the IBM Notes ClientDevin Olson
 
Do you have a website? Do you want to get sued?
Do you have a website?  Do you want to get sued?Do you have a website?  Do you want to get sued?
Do you have a website? Do you want to get sued?Devin Olson
 
Website Accessibility Workshop
Website Accessibility WorkshopWebsite Accessibility Workshop
Website Accessibility WorkshopDevin Olson
 
Raw Iron to Enterprise Server: Installing Domino on Linux
Raw Iron to Enterprise Server: Installing Domino on LinuxRaw Iron to Enterprise Server: Installing Domino on Linux
Raw Iron to Enterprise Server: Installing Domino on LinuxDevin Olson
 
Curing the Headaches: How to Deal with Bad Developers
Curing the Headaches: How to Deal with Bad DevelopersCuring the Headaches: How to Deal with Bad Developers
Curing the Headaches: How to Deal with Bad DevelopersDevin Olson
 
Accessibility for the Visually Impaired with IBM Lotus Domino
Accessibility for the Visually Impaired with IBM Lotus DominoAccessibility for the Visually Impaired with IBM Lotus Domino
Accessibility for the Visually Impaired with IBM Lotus DominoDevin Olson
 
Countdown to Domino 10
Countdown to Domino 10Countdown to Domino 10
Countdown to Domino 10Devin Olson
 
Pink Slip Time: Turning a Job Loss into a Career Win
Pink Slip Time: Turning a Job Loss into a Career WinPink Slip Time: Turning a Job Loss into a Career Win
Pink Slip Time: Turning a Job Loss into a Career WinDevin Olson
 
XPages Development 2
XPages Development 2XPages Development 2
XPages Development 2Devin Olson
 
XPages Development 1
XPages Development 1XPages Development 1
XPages Development 1Devin Olson
 
Countdown to Domino 2025
Countdown to Domino 2025Countdown to Domino 2025
Countdown to Domino 2025Devin Olson
 
Big Data with Graph, IBM Domino, and the OpenNTF API
Big Data with Graph, IBM Domino, and the OpenNTF APIBig Data with Graph, IBM Domino, and the OpenNTF API
Big Data with Graph, IBM Domino, and the OpenNTF APIDevin Olson
 
Customer Story: Next Level Coding
Customer Story: Next Level CodingCustomer Story: Next Level Coding
Customer Story: Next Level CodingDevin Olson
 
Countdown to Domino 2025 - Preparing for the NOW
Countdown to Domino 2025 - Preparing for the NOWCountdown to Domino 2025 - Preparing for the NOW
Countdown to Domino 2025 - Preparing for the NOWDevin Olson
 
Installing and Configuring Domino 10 on CentOS 7
Installing and Configuring Domino 10 on CentOS 7Installing and Configuring Domino 10 on CentOS 7
Installing and Configuring Domino 10 on CentOS 7Devin Olson
 
Extreme Development: Pair Programming
Extreme Development: Pair ProgrammingExtreme Development: Pair Programming
Extreme Development: Pair ProgrammingDevin Olson
 
Installing & Configuring IBM Domino 9 on CentOS
Installing & Configuring IBM Domino 9 on CentOSInstalling & Configuring IBM Domino 9 on CentOS
Installing & Configuring IBM Domino 9 on CentOSDevin Olson
 
Ad104 build a bean workshop
Ad104 build a bean workshopAd104 build a bean workshop
Ad104 build a bean workshopDevin Olson
 

More from Devin Olson (19)

Paired with an Idiot: Things that sabotage success
Paired with an Idiot: Things that sabotage successPaired with an Idiot: Things that sabotage success
Paired with an Idiot: Things that sabotage success
 
Resolving Cached Design Element Corruption Issues in the IBM Notes Client
Resolving Cached Design Element Corruption Issues in the IBM Notes ClientResolving Cached Design Element Corruption Issues in the IBM Notes Client
Resolving Cached Design Element Corruption Issues in the IBM Notes Client
 
Do you have a website? Do you want to get sued?
Do you have a website?  Do you want to get sued?Do you have a website?  Do you want to get sued?
Do you have a website? Do you want to get sued?
 
Website Accessibility Workshop
Website Accessibility WorkshopWebsite Accessibility Workshop
Website Accessibility Workshop
 
Raw Iron to Enterprise Server: Installing Domino on Linux
Raw Iron to Enterprise Server: Installing Domino on LinuxRaw Iron to Enterprise Server: Installing Domino on Linux
Raw Iron to Enterprise Server: Installing Domino on Linux
 
Curing the Headaches: How to Deal with Bad Developers
Curing the Headaches: How to Deal with Bad DevelopersCuring the Headaches: How to Deal with Bad Developers
Curing the Headaches: How to Deal with Bad Developers
 
Accessibility for the Visually Impaired with IBM Lotus Domino
Accessibility for the Visually Impaired with IBM Lotus DominoAccessibility for the Visually Impaired with IBM Lotus Domino
Accessibility for the Visually Impaired with IBM Lotus Domino
 
Countdown to Domino 10
Countdown to Domino 10Countdown to Domino 10
Countdown to Domino 10
 
Pink Slip Time: Turning a Job Loss into a Career Win
Pink Slip Time: Turning a Job Loss into a Career WinPink Slip Time: Turning a Job Loss into a Career Win
Pink Slip Time: Turning a Job Loss into a Career Win
 
XPages Development 2
XPages Development 2XPages Development 2
XPages Development 2
 
XPages Development 1
XPages Development 1XPages Development 1
XPages Development 1
 
Countdown to Domino 2025
Countdown to Domino 2025Countdown to Domino 2025
Countdown to Domino 2025
 
Big Data with Graph, IBM Domino, and the OpenNTF API
Big Data with Graph, IBM Domino, and the OpenNTF APIBig Data with Graph, IBM Domino, and the OpenNTF API
Big Data with Graph, IBM Domino, and the OpenNTF API
 
Customer Story: Next Level Coding
Customer Story: Next Level CodingCustomer Story: Next Level Coding
Customer Story: Next Level Coding
 
Countdown to Domino 2025 - Preparing for the NOW
Countdown to Domino 2025 - Preparing for the NOWCountdown to Domino 2025 - Preparing for the NOW
Countdown to Domino 2025 - Preparing for the NOW
 
Installing and Configuring Domino 10 on CentOS 7
Installing and Configuring Domino 10 on CentOS 7Installing and Configuring Domino 10 on CentOS 7
Installing and Configuring Domino 10 on CentOS 7
 
Extreme Development: Pair Programming
Extreme Development: Pair ProgrammingExtreme Development: Pair Programming
Extreme Development: Pair Programming
 
Installing & Configuring IBM Domino 9 on CentOS
Installing & Configuring IBM Domino 9 on CentOSInstalling & Configuring IBM Domino 9 on CentOS
Installing & Configuring IBM Domino 9 on CentOS
 
Ad104 build a bean workshop
Ad104 build a bean workshopAd104 build a bean workshop
Ad104 build a bean workshop
 

Recently uploaded

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 

Recently uploaded (20)

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 

IBM Traveler and Verse: Device Security and Administration Overview

  • 1. IBM Traveler and Verse: Device Security and Administration Overview Devin S. Olson - IBM Champion Red Pill Now – 07 November 2016 Introduction There currently seems to be a great deal of confusion about IBM Traveler and Verse with regard to device security and administration. The necessary overview information is available from IBM, but is rather dispersed and somewhat difficult to track down in a single concise location. This document will attempt to answer some of the most common points of confusion and concern for those considering a Traveler deployment in their Domino environment -without necessarily having IBM Connect or Cloud solutions in place. Terminology IBM Traveler This is the name of the Domino server add-in that provides non-browser mail services to mobile client devices (cell phones, tablets, etc.) It is also the old name of the client app used on these client devices. IBM Verse This is the name of the IBM product solution which provides access to the suite of IBM Mail, Calendar, Contacts, and Connections information. It is also the new name of the client app used to access both the Verse suite stuff and IBM Traveler information. IBM Verse currently requires an IBM Cloud implementation in order to provide access to the suite information. IBM VOP (Verse On-Premises) This is the current term (and likely product name) for the IBM product solution which will provide access to the same suite if IBM Mail, Calendar, Contacts, and Connections information while allowing the customer to keep all of their information on premises, within their own network or data center. IBM has discovered that many of their current and future customers do not want to move their data to the IBM Cloud; which has prompted the push for this product solution to become a reality as soon as possible.
  • 2. The important distinction here is that for the rest of this document if I mention IBM Verse I am referring to the client app which interacts with the IBM Traveler server; not the Verse Cloud or VOP solution. Security and Administration Supported Devices The following devices are supported by IBM Traveler  Apple iOS devices  Android devices  BlackBerry 10  Windows Phone  Windows Surface RT and Pro  Nokia Series 60 w/ Symbian  Windows Mobile Encryption Data in Transit Encryption of data while in transit (to or from the device via HTTPS) is supported for all supported devices. SHA-2 / TLS1.2 and Apple iOS devices With the release of iOS 9, Apple has defaulted to using TLS 1.2 ciphers for secure connections. This means that the Traveler server or any network component in front of Traveler that will receive such incoming connections from iOS 9 (or later) devices must be able to support TLS 1.2 ciphers in order for the device to make a successful connection. In order to support Apple devices running iOS 9 or later, IBM Traveler version 9.0.1.7 (or later) must be installed, along with Domino server 9.0.1 Fix Pack 3 Interim Fix 2 (or later). In addition, SHA-2 certificates must be installed on the server. While other devices will be able to connect to Traveler versions which do not support TLS 1.2 and SHA-1 certificates, the security and encryption cannot be ensured and should be avoided. It is strongly recommended that all Traveler and public facing Domino environments be upgraded to support TLS 1.2 with SHA-2 certificates. Data at Rest Encryption of the data at rest (on the device itself) is supported with the following caveats:  Apple iOS: Supported with Domino policies or IBM Traveler device preferences and security settings. Whole devices can be encrypted, and enabled and enforced with the security policies
  • 3. in IBM Traveler. iPhones that do not support hardware encryption can be blocked. iPhone 3GS, iPhone 4 and above, and the iPad support hardware encryption. First-generation iPhone and iPhone 3G do not.  Android Devices: The mail body and all attachments are encrypted using AES 256-bit encryption. This is the case if stored on an SD card or internal phone storage. The rest of the data is stored unencrypted in phone storage. This is implemented based on the Android application security model.  Windows Phone: Supported with Windows Phone 8 or higher versions.  BlackBerry 10, Windows Surface RT, Windows Surface Pro: Supported  Nokia Series 60: Only supported on Symbian^3 devices. Enforceable using Domino policies or IBM Traveler device preferences and security settings. Storage cards can be encrypted.  Windows Mobile: Storage cards can be encrypted. Data in native PIM and mail applications is not encrypted, except for Domino encrypted mail. Domino Encrypted Mail Domino Encrypted Mail, where the mail message is itself encrypted, is supported for all devices except the Windows Surface RT and Windows Surface Pro, with the following caveats:  Viewing mail and attachments, sending, forwarding, and replying to encrypted mail are all supported. Encrypted calendar invitations are not supported. Copy / Paste options for encrypted mail are disabled and not allowed. Encrypted attachments can only be opened in (detached to) other client applications which have been pre-approved by the Traveler administrator.  Apple iOS devices require IBM Traveler Companion application (available on the iTunes store) to manage the users Notes ID encryption keys.  BlackBerry 10 devices require a BES (BlackBerry Enterprise Server) to send encrypted mail from the device. Remote Wipe Should the device become lost or stolen, the ability for an administrator to remotely wipe the IBM Traveler data store is supported for all devices. The ability for an administrator to remotely wipe the entire device is also supported, with the following caveats:  Android device wipe required Android 2.2 or higher  BlackBerry 10 devices managed by a BES can have the entire device wiped or only the work perimeter. Administration Settings IBM Traveler provides a set of default device preferences and security settings. These settings should be reviewed by the Administrator prior to rolling out a Traveler instance for their environment.
  • 4. Traveler Administration Database The IBM Traveler administration database contains a default device setting document that is initialized with the default settings. This document contains a variety of system-wide settings which can be configured by the Administrator. Additionally, it contains several subsets of device-specific settings for individual device types: Once this is set up, when an authorized user connects to the Traveler server using an authorized device, a device specific settings document is created. It is from this document that the Administrator can take any necessary security actions for the specific device, such as Denying access, Wiping, or Changing Approval.
  • 5. Domino Policies For IBM Domino / Traveler releases prior to 8.5.1, these settings were required to be implemented using Traveler-specific Policy Settings document(s). This is still supported, though no longer required. Domino policies provide additional flexibility and functionality but are more difficult to use than the default device settings document in some environments. The advantage of using Domino policies is the ability to assign different device preferences and security settings by user, group, or organization. The default settings document does include a mechanism to include or exclude users, groups, and organizations, but it is much more limited than Domino policies. Users to which the default settings document does not apply receive the IBM Traveler built-in defaults if they do not have a Domino policy. These hard-coded defaults are the same as the default settings document. With Domino policies, you can define different settings for every user. The limited include/exclude support of the default settings document allows you to have two sets of defaults: those defined in the default settings document, and the built-in IBM Traveler defaults. NOTE: If settings and security policies are defined for a user in both a Domino policy and in the IBM Traveler default settings document, the Domino policy settings are used.
  • 6. Summary IBM Traveler is very well versed, is fairly easy to configure and deploy, and provides adequate features, security, and administration capabilities for most environments. Advanced security settings are not difficult to configure, although the IBM documentation can make it seem more daunting than it really is. Links / Suggested Reading: IBM Using Verse Mobile: http://www.ibm.com/support/knowledgecenter/SSYRPW_9.0.1/UsingVerseMobile.html Server Synchronized Settings: https://www.ibm.com/support/knowledgecenter/SSYRPW_9.0.1/Server_synchronized_settings.html Verse Offline FAQ: http://www-01.ibm.com/support/docview.wss?uid=swg21978542 IBM Verse Apple Devices: http://www.ibm.com/support/knowledgecenter/SSYRPW_9.0.1/iOSVerseNeedtoKNow.html Planning for Security: http://www.ibm.com/support/knowledgecenter/SSYRPW_9.0.1/planningforsecurity.html Assigning Preference and Security Settings: http://www.ibm.com/support/knowledgecenter/SSYRPW_9.0.1/Pushing_configuration_to_a_device.ht ml Apple devices with iOS 9 connectivity Technote: http://www-01.ibm.com/support/docview.wss?uid=swg21967350 Non-IBM Industry Experts Darren Duke (Simplified Technology Solutions) - Using IBM Traveler with a proxy: https://blog.darrenduke.net/Darren/DDBZ.nsf/dx/using-ibm-lotus-traveler-with-a-proxy....food-for- thought-before-you-do-this.htm Gabriella Davis (The Turtle Partnership) – Traveler Management, Security and Performance: www.slideshare.net/gabturtle/ibm-traveler-management-security-and-performance
  • 7. About Devin S. Olson Who Am I?  Christian  Husband  Father  Biker, Brewer, Friend What do I do?  Senior Consultant at Red Pill Now  IBM Champion  Notes / Domino consultant since 1995  MCP  PCLP SA/AD R4.6, R5, R6, R7  Beer Snob (Anheuser-Busch Certified Beer Master)  www.redpillnow.com  www.LearningXPages.com Contact:  devin@redpilldevelopment.com  devin.olson@azlighthouse.com  twitter, skype: @spanky762  facebook: default.xsp