• iPhone,  Mac OS X,  Mac OS X Server,  Mac Security,  Mass Deployment

    Managing iOS Devices with Apple Configurator

    My traditional interpretation of Apple’s vision on how iOS devices are used is that everyone has an AppleID. That AppleID enables them to access their apps from any iOS device they own or Mac that they own. That AppleID enables them to access mail, contacts, calendars and even files through iCloud. That AppleID also allows users to remotely wipe their device through Find iPhone and track their friends iOS devices (as in social networking via breadcrumb tracking) through Find Friends. All of this “Just Works” in a consumer sense. And it even allows for a little sharing of content across devices you own. However, larger organizations need more. They need…

  • Windows XP

    Windows 7 HomeGroup

    HomeGroup is a new home security feature of WIndows 7. HomeGroup resemble how you protect your home (an analogy I use in the Mac OS X Security book as well): Keep the outside doors locked and keep the interior doors unlocked (unless you’re on the crapper). HomeGroup can be initiated by any Windows 7 version other than Home Basic and Starter editions. Any Windows 7 machine can join a HomeGroup though and it is not a backwards compatible feature, meaning that if you’re still running Windows 95, 98 or Millineum don’t bother to upgrade (you probably can’t read this site anyway). But 2K to Vista, you gots’ta upgrade to play…

  • Mac OS X,  Mac OS X Server,  Mac Security,  Mass Deployment

    Basic pkcs12 Management with security

    Recently, I did an article for afp548.com where I explained that you can import a pkcs12 file into an 802.1x profile using networksetup. In that type of environment you would be leveraging TLS or TTLS with the Mac OS X client acting as the supplicant and the certificate required to establish authentication with the authenticator. So you need the certificate to get started, but how do you get the pkcs12 and dish it out to clients programatically? We’re going to start out with a new keychain where we’ve imported the certificate into that keychain (or skip this step if you already have a p12 file). First, find the certificate and…