{"product_id":11427,"v_id":11427,"product_name":"BlackBerry UEM Server and Android Client v12","certification_status":"Certified","certification_date":"2024-05-30T00:00:00Z","tech_type":"Mobility, Network Encryption","vendor_id":{"name":"BlackBerry Ltd.","website":"https://www.blackberry.com"},"vendor_poc":"Tim Segato","vendor_phone":"+1-519-888-7465","vendor_email":"sct@blackberry.com","assigned_lab":{"cctl_name":"Gossamer Security Solutions"},"product_description":"<p class=\"Body\">The Target of Evaluation (TOE) is the BlackBerry Unified Endpoint Management (UEM) Server and Android Client version 12.</p>\r\n<p class=\"MsoNormal\" style=\"margin-bottom: 6.0pt; text-align: justify;\">The UEM Server provides centralized management of mobile devices and the UEM Android Client Agent (installed on each Android device) enforces the policies of the Server on each Android device.</p>\r\n<p class=\"MsoNormal\" style=\"margin-bottom: 6.0pt; text-align: justify;\"><span class=\"MsoPageNumber\"><span style=\"font-family: 'Times',serif;\">The BlackBerry UEM server, including the Core and UI security enforcing components, is implemented with a combination of Java and native code running on Windows Server 2016 or Windows Server 2019 with Java JRE 8.0.<span style=\"mso-spacerun: yes;\">&nbsp; </span>Ideally, the scope of supported platforms for the evaluation would be Windows Server 2016 or Windows Server 2019 wherever they are deployable, however, it will be limited due to NIAP policy about CAVP algorithm certificates &ndash; the allowed environments would be expected to conform to the environments of the CAVP certificates (e.g., using the processors used for CAVP algorithm testing).<span style=\"mso-spacerun: yes;\">&nbsp; </span>In this case, the CAVP testing for Certicom was done on Windows Server 2016 and Windows Server 2019 running in a virtual environment (VMWare ESXi 7) on an Intel Xeon E5-2620<strong style=\"mso-bidi-font-weight: normal;\">.</strong></span></span></p>\r\n<p class=\"MsoNormal\" style=\"text-align: justify;\"><span class=\"MsoPageNumber\"><span style=\"font-family: 'Times',serif;\">The BlackBerry UEM Android Client has two main deployment methods&ndash; as a single Workspace client or alternatively as a dual client with one managing the Personal (whole) device and another managing the Workspace.<span style=\"mso-spacerun: yes;\">&nbsp; </span>There is one BlackBerry UEM client deployment per enrolled mobile device.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The scope of supported managed client devices for the evaluation is limited by the set of devices evaluated on the NIAP PCL</span></span><a style=\"mso-footnote-id: ftn1;\" title=\"\" href=\"file:///C:/Users/h.nye-p/AppData/Local/Temp/ebc725e5-05f0-4bd4-ba55-fdf62986b6be_VID11427_Final_Package.zip.6be/VID11427_Final_Package/Public/VID11427_PCL.docx#_ftn1\" name=\"_ftnref1\"><span class=\"MsoFootnoteReference\"><span style=\"mso-bidi-font-family: Times;\"><span style=\"mso-special-character: footnote;\"><!-- [if !supportFootnotes]--><span class=\"MsoFootnoteReference\"><span style=\"font-size: 10.0pt; mso-bidi-font-size: 12.0pt; font-family: 'Times',serif; mso-fareast-font-family: 'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;\">[1]</span></span><!--[endif]--></span></span></span></a><span class=\"MsoPageNumber\"><span style=\"font-family: 'Times',serif;\">:</span></span></p>\r\n<ul style=\"margin-top: 0in;\" type=\"disc\">\r\n<li class=\"MsoNormalCxSpMiddle\" style=\"text-align: justify; mso-list: l0 level1 lfo1;\"><span style=\"mso-fareast-font-family: 'MS Mincho'; mso-fareast-theme-font: minor-fareast; mso-bidi-font-family: Times;\">Android 13 - </span><a href=\"https://www.niap-ccevs.org/Product/Compliant.cfm?PID=11342\"><span style=\"mso-fareast-font-family: 'MS Mincho'; mso-fareast-theme-font: minor-fareast; mso-bidi-font-family: Times; color: blue;\">https://www.niap-ccevs.org/Product/Compliant.cfm?PID=11342</span></a><span style=\"mso-fareast-font-family: 'MS Mincho'; mso-fareast-theme-font: minor-fareast; mso-bidi-font-family: Times;\">,</span></li>\r\n<li class=\"MsoNormalCxSpMiddle\" style=\"text-align: justify; mso-list: l0 level1 lfo1;\"><span style=\"mso-fareast-font-family: 'MS Mincho'; mso-fareast-theme-font: minor-fareast; mso-bidi-font-family: Times;\">Android 12 - </span><a href=\"https://www.niap-ccevs.org/Product/Compliant.cfm?PID=11307\"><span style=\"mso-fareast-font-family: 'MS Mincho'; mso-fareast-theme-font: minor-fareast; color: blue;\">https://www.niap-ccevs.org/Product/Compliant.cfm?PID=11307</span></a><u><span style=\"mso-fareast-font-family: 'MS Mincho'; mso-fareast-theme-font: minor-fareast; color: blue;\"> and</span></u><span style=\"mso-fareast-font-family: 'MS Mincho'; mso-fareast-theme-font: minor-fareast; mso-bidi-font-family: Times;\">,</span></li>\r\n<li class=\"MsoNormalCxSpMiddle\" style=\"text-align: justify; mso-list: l0 level1 lfo1;\"><span style=\"mso-fareast-font-family: 'MS Mincho'; mso-fareast-theme-font: minor-fareast; mso-bidi-font-family: Times;\">Android 12 - </span><a href=\"https://www.niap-ccevs.org/Product/Compliant.cfm?PID=11228\"><span style=\"mso-fareast-font-family: 'MS Mincho'; mso-fareast-theme-font: minor-fareast; color: blue;\">https://www.niap-ccevs.org/Product/Compliant.cfm?PID=11228</span></a><span style=\"mso-fareast-font-family: 'MS Mincho'; mso-fareast-theme-font: minor-fareast; mso-bidi-font-family: Times;\">.</span></li>\r\n</ul>\r\n<p class=\"MsoNormal\" style=\"text-align: justify;\"><span class=\"MsoPageNumber\"><span style=\"font-family: 'Times',serif;\">Since the iOS agents are evaluated as part of the Apple iOS evaluations, the UEM server will be tested to ensure it can manage those devices, but the agent&rsquo;s behavior on those devices will not otherwise be tested.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The support is limited by the set of devices evaluated on the NIAP PCL:</span></span></p>\r\n<ul style=\"margin-top: 0in;\" type=\"disc\">\r\n<li class=\"MsoNormalCxSpMiddle\" style=\"text-align: justify; mso-list: l0 level1 lfo1;\">iOS 15 - <a style=\"text-indent: -24px;\" href=\"https://www.niap-ccevs.org/Product/Compliant.cfm?PID=11237\">https://www.niap-ccevs.org/Product/Compliant.cfm?PID=11237</a><span class=\"MsoHyperlink\" style=\"text-indent: -24px;\">, and</span></li>\r\n<li class=\"MsoNormalCxSpMiddle\" style=\"text-align: justify; mso-list: l0 level1 lfo1;\">iOS 16 -&nbsp;<span class=\"MsoPageNumber\" style=\"text-indent: -24px;\">&nbsp;</span><a style=\"text-indent: -24px;\" href=\"https://www.niap-ccevs.org/Product/Compliant.cfm?PID=11349\">https://www.niap-ccevs.org/Product/Compliant.cfm?PID=11349.</a></li>\r\n</ul>\r\n<div style=\"mso-element: footnote-list;\"><!-- [if !supportFootnotes]--><br clear=\"all\" /><hr align=\"left\" size=\"1\" width=\"33%\" /><!--[endif]-->\r\n<div id=\"ftn1\" style=\"mso-element: footnote;\">\r\n<p class=\"MsoFootnoteText\"><a style=\"mso-footnote-id: ftn1;\" title=\"\" href=\"file:///C:/Users/h.nye-p/AppData/Local/Temp/ebc725e5-05f0-4bd4-ba55-fdf62986b6be_VID11427_Final_Package.zip.6be/VID11427_Final_Package/Public/VID11427_PCL.docx#_ftnref1\" name=\"_ftn1\"><span class=\"MsoFootnoteReference\"><span style=\"mso-special-character: footnote;\"><!-- [if !supportFootnotes]--><span class=\"MsoFootnoteReference\"><span style=\"font-size: 10.0pt; font-family: 'Times',serif; mso-fareast-font-family: 'Times New Roman'; mso-bidi-font-family: 'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;\">[1]</span></span><!--[endif]--></span></span></a> Note that the oldest evaluation listed here was removed from the NIAP PCL late in the evaluation of this product, but the applicable devices remain supported and tested in the context of this evaluation.</p>\r\n</div>\r\n</div>","evaluation_configuration":"","security_evaluation_summary":"<p class=\"MsoNormal\" style=\"text-align: justify; mso-outline-level: 1;\">The evaluation was carried out in accordance to the Common Criteria Evaluation and Validation Scheme (CCEVS) requirements and guidance.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The evaluation demonstrated that <span style=\"mso-bidi-font-style: italic;\">the TOE </span>meets the security requirements contained in the Security Target.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The criteria against which the TOE was judged are described in the Common Criteria for Information Technology Security Evaluation, Version 3.1, Revision 5, April 2017. The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Evaluation Methodology, Version 3.1, Revision 5, April 2017.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The product, when delivered and configured as identified in the <span style=\"mso-no-proof: yes;\">BlackBerry UEM Administrative Guidance Document</span>, Version <span style=\"mso-no-proof: yes;\">12.19</span>, <span style=\"mso-no-proof: yes;\">May 2024</span> document, satisfies all of the security functional requirements stated in the <span style=\"mso-no-proof: yes;\">BlackBerry UEM Server and Android Client v12 Security Target</span>, Version <span style=\"mso-no-proof: yes;\">0.93</span>, <span style=\"mso-no-proof: yes;\">May 29, 2024</span>.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The project underwent CCEVS Validator review.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The evaluation was completed in <span style=\"mso-no-proof: yes;\">May 2024</span>.<span style=\"mso-spacerun: yes;\">&nbsp; </span>Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report (report number CCEVS-VR-VID<span style=\"mso-no-proof: yes;\">11427-2024</span>) prepared by CCEVS.</p>","environmental_strengths":"<p class=\"MsoNormal\" style=\"text-align: justify; mso-outline-level: 1;\">The logical boundaries of the <span style=\"mso-no-proof: yes;\">UEM Server and Android Client v12</span> are realized in the security functions that it implements. Each of these security functions is summarized below.</p>\r\n<p class=\"MsoNormal\" style=\"text-align: justify; mso-outline-level: 1;\"><strong>Security audit:</strong></p>\r\n<p class=\"Body\"><span style=\"font-family: 'Times New Roman',serif;\">The BlackBerry UEM server is designed to generate and export audit events.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The audit events are stored in the SQL database and sent to the configured syslog servers as events occur. The BlackBerry UEM server can also generate alerts for specific events &ndash; these alerts are sent to administrators as e-mails. The BlackBerry UEM server supports TLS tunneling of syslog messages to protect exported audit records.</span></p>\r\n<p class=\"Body\"><span style=\"font-family: 'Times New Roman',serif;\">The BlackBerry UEM Android client is also designed to generate and export audit events. <span style=\"mso-spacerun: yes;\">&nbsp;</span>It stores audit events in the platform audit logs which it can retrieve and send to its enrolled BlackBerry UEM server.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The BlackBerry UEM server will forward the events to a configured syslog server as the events are received.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The BlackBerry UEM Android client can also send required alerts directly to the BlackBerry UEM server which are received, logged as audit events, and treated as administrator alerts.</span></p>\r\n<p class=\"MsoNormal\" style=\"text-align: justify; mso-outline-level: 1;\"><strong>Cryptographic support:</strong></p>\r\n<p class=\"Body\"><span style=\"font-family: 'Times New Roman',serif;\">The BlackBerry UEM server uses the Certicom </span>Security Builder FIPS Java Module <span style=\"font-family: 'Times New Roman',serif;\">for its cryptographic operations.<span style=\"mso-spacerun: yes;\">&nbsp; </span>It includes the following algorithm certificates which are applicable as the platform for this evaluation:</span></p>\r\n<p class=\"MsoListParagraphCxSpFirst\" style=\"text-align: justify; text-indent: -0.25in; padding-left: 40px;\"><!-- [if !supportLists]--><span class=\"MsoPageNumber\"><span style=\"font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol;\"><span style=\"mso-list: Ignore;\">&middot;<span style=\"font: 7.0pt 'Times New Roman';\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span></span></span><!--[endif]--><span class=\"MsoPageNumber\"><span style=\"mso-bidi-font-family: Times;\">AES<span style=\"mso-tab-count: 1;\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span>A5201</span></span></p>\r\n<p class=\"MsoListParagraphCxSpMiddle\" style=\"text-align: justify; text-indent: -0.25in; padding-left: 40px;\"><!-- [if !supportLists]--><span class=\"MsoPageNumber\"><span style=\"font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol;\"><span style=\"mso-list: Ignore;\">&middot;<span style=\"font: 7.0pt 'Times New Roman';\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span></span></span><!--[endif]--><span class=\"MsoPageNumber\"><span style=\"mso-bidi-font-family: Times;\">DRBG<span style=\"mso-tab-count: 1;\">&nbsp;&nbsp;&nbsp; </span>A5201</span></span></p>\r\n<p class=\"MsoListParagraphCxSpMiddle\" style=\"text-align: justify; text-indent: -0.25in; padding-left: 40px;\"><!-- [if !supportLists]--><span class=\"MsoPageNumber\"><span style=\"font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol;\"><span style=\"mso-list: Ignore;\">&middot;<span style=\"font: 7.0pt 'Times New Roman';\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span></span></span><!--[endif]--><span class=\"MsoPageNumber\"><span style=\"mso-bidi-font-family: Times;\">ECDSA<span style=\"mso-tab-count: 1;\">&nbsp; </span>A5201</span></span></p>\r\n<p class=\"MsoListParagraphCxSpMiddle\" style=\"text-align: justify; text-indent: -0.25in; padding-left: 40px;\"><!-- [if !supportLists]--><span class=\"MsoPageNumber\"><span style=\"font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol;\"><span style=\"mso-list: Ignore;\">&middot;<span style=\"font: 7.0pt 'Times New Roman';\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span></span></span><!--[endif]--><span class=\"MsoPageNumber\"><span style=\"mso-bidi-font-family: Times;\">HMAC<span style=\"mso-tab-count: 1;\">&nbsp;&nbsp; </span>A5201</span></span></p>\r\n<p class=\"MsoListParagraphCxSpMiddle\" style=\"text-align: justify; text-indent: -0.25in; padding-left: 40px;\"><!-- [if !supportLists]--><span class=\"MsoPageNumber\"><span style=\"font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol;\"><span style=\"mso-list: Ignore;\">&middot;<span style=\"font: 7.0pt 'Times New Roman';\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span></span></span><!--[endif]--><span class=\"MsoPageNumber\"><span style=\"mso-bidi-font-family: Times;\">KAS<span style=\"mso-tab-count: 1;\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span>A5201</span></span></p>\r\n<p class=\"MsoListParagraphCxSpMiddle\" style=\"text-align: justify; text-indent: -0.25in; padding-left: 40px;\"><!-- [if !supportLists]--><span class=\"MsoPageNumber\"><span style=\"font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol;\"><span style=\"mso-list: Ignore;\">&middot;<span style=\"font: 7.0pt 'Times New Roman';\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span></span></span><!--[endif]--><span class=\"MsoPageNumber\"><span style=\"mso-bidi-font-family: Times;\">RSA<span style=\"mso-tab-count: 1;\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span>A5201</span></span></p>\r\n<p class=\"MsoListParagraph\" style=\"margin-bottom: 6pt; text-align: justify; text-indent: -0.25in; padding-left: 40px;\"><!-- [if !supportLists]--><span class=\"MsoPageNumber\"><span style=\"font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol;\"><span style=\"mso-list: Ignore;\">&middot;<span style=\"font: 7.0pt 'Times New Roman';\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span></span></span><!--[endif]--><span class=\"MsoPageNumber\"><span style=\"mso-bidi-font-family: Times;\">SHS<span style=\"mso-tab-count: 1;\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span>A5201</span></span></p>\r\n<p class=\"Body\"><span style=\"font-family: 'Times New Roman',serif;\">The BlackBerry UEM Android client uses the cryptographic functions provided by the evaluated mobile devices.<span style=\"mso-spacerun: yes;\">&nbsp; </span>As such, the Android client can reference the applicable certificates in the preceding evaluations of those devices.</span></p>\r\n<p class=\"Body\"><span style=\"font-family: 'Times New Roman',serif;\">The BlackBerry UEM server implements a X.509 key hierarchy summarized as follows:</span></p>\r\n<p class=\"BodyCxSpMiddle\" style=\"margin-left: .5in; mso-add-space: auto; text-indent: -.25in; mso-list: l1 level1 lfo2;\"><!-- [if !supportLists]--><span style=\"font-family: 'Times New Roman',serif;\"><span style=\"mso-list: Ignore;\">1.<span style=\"font: 7.0pt 'Times New Roman';\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span></span><!--[endif]--><span style=\"font-family: 'Times New Roman',serif;\">The PKI is rooted in a self-signed certificate (RSA 4096 SHA512) created when the first server is installed. </span></p>\r\n<p class=\"BodyCxSpMiddle\" style=\"margin-left: .5in; mso-add-space: auto; text-indent: -.25in; mso-list: l1 level1 lfo2;\"><!-- [if !supportLists]--><span style=\"font-family: 'Times New Roman',serif;\"><span style=\"mso-list: Ignore;\">2.<span style=\"font: 7.0pt 'Times New Roman';\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span></span><!--[endif]--><span style=\"font-family: 'Times New Roman',serif;\">The root is used to issue an intermediate CA certificate (RSA 3072 SHA512) also created when the first server is installed.</span></p>\r\n<p class=\"BodyCxSpMiddle\" style=\"margin-left: .5in; mso-add-space: auto; text-indent: -.25in; mso-list: l1 level1 lfo2;\"><!-- [if !supportLists]--><span style=\"font-family: 'Times New Roman',serif;\"><span style=\"mso-list: Ignore;\">3.<span style=\"font: 7.0pt 'Times New Roman';\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span></span><!--[endif]--><span style=\"font-family: 'Times New Roman',serif;\">Additional certificates are issued using the intermediate CA certificate as follows:</span></p>\r\n<p class=\"BodyCxSpMiddle\" style=\"margin-left: 1.0in; mso-add-space: auto; text-indent: -.25in; mso-list: l1 level2 lfo2;\"><!-- [if !supportLists]--><span style=\"mso-fareast-font-family: Times; mso-bidi-font-family: Times;\"><span style=\"mso-list: Ignore;\">a.<span style=\"font: 7.0pt 'Times New Roman';\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span></span><!--[endif]--><span style=\"font-family: 'Times New Roman',serif;\">Console web server certificate (RSA 2048 SHA512)</span></p>\r\n<p class=\"BodyCxSpMiddle\" style=\"margin-left: 1.0in; mso-add-space: auto; text-indent: -.25in; mso-list: l1 level2 lfo2;\"><!-- [if !supportLists]--><span style=\"mso-fareast-font-family: Times; mso-bidi-font-family: Times;\"><span style=\"mso-list: Ignore;\">b.<span style=\"font: 7.0pt 'Times New Roman';\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span></span><!--[endif]--><span style=\"font-family: 'Times New Roman',serif;\">Server client certificate (RSA 2048 SHA512) &ndash; used for SYSLOG, LDAP, etc.</span></p>\r\n<p class=\"BodyCxSpMiddle\" style=\"margin-left: 1.0in; mso-add-space: auto; text-indent: -.25in; mso-list: l1 level2 lfo2;\"><!-- [if !supportLists]--><span style=\"mso-fareast-font-family: Times; mso-bidi-font-family: Times;\"><span style=\"mso-list: Ignore;\">c.<span style=\"font: 7.0pt 'Times New Roman';\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span></span><!--[endif]--><span style=\"font-family: 'Times New Roman',serif;\">Profile signing certificate (RSA 2048 SHA512) &ndash; used for Apple MDM</span></p>\r\n<p class=\"BodyCxSpMiddle\" style=\"margin-left: 1.0in; mso-add-space: auto; text-indent: -.25in; mso-list: l1 level2 lfo2;\"><!-- [if !supportLists]--><span style=\"mso-fareast-font-family: Times; mso-bidi-font-family: Times;\"><span style=\"mso-list: Ignore;\">d.<span style=\"font: 7.0pt 'Times New Roman';\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span></span><!--[endif]--><span style=\"font-family: 'Times New Roman',serif;\">Per-device BDMI payload signing key (RSA 3072 SHA512)</span></p>\r\n<p class=\"BodyCxSpMiddle\" style=\"margin-left: 1.0in; mso-add-space: auto; text-indent: -.25in; mso-list: l1 level2 lfo2;\"><!-- [if !supportLists]--><span style=\"mso-fareast-font-family: Times; mso-bidi-font-family: Times;\"><span style=\"mso-list: Ignore;\">e.<span style=\"font: 7.0pt 'Times New Roman';\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span></span><!--[endif]--><span style=\"font-family: 'Times New Roman',serif;\">Per-device enrolled device certificates - issued during enrollment (RSA 2048 SHA512)</span></p>\r\n<p class=\"BodyCxSpMiddle\" style=\"margin-left: .5in; mso-add-space: auto; text-indent: -.25in; mso-list: l1 level1 lfo2;\"><!-- [if !supportLists]--><span style=\"font-family: 'Times New Roman',serif;\"><span style=\"mso-list: Ignore;\">4.<span style=\"font: 7.0pt 'Times New Roman';\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span></span><!--[endif]-->All of the certificates above, except the per-device certificates, are stored in the SQL database and the key store is encrypted with a DEK (AES-CBC 256) also created during installation. The per-device BDMI keys are encrypted using the DEK separately from the rest of the key store. The DEK is encrypted using an EC secp512r1 key (stored in the Windows key store), that is unique to each unit of scale (created during installation), and stored on the local file system of each unit of scale.</p>\r\n<p class=\"BodyCxSpMiddle\" style=\"margin-left: .5in; mso-add-space: auto; text-indent: -.25in; mso-list: l1 level1 lfo2;\"><!-- [if !supportLists]--><span style=\"font-family: 'Times New Roman',serif;\"><span style=\"mso-list: Ignore;\">5.<span style=\"font: 7.0pt 'Times New Roman';\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span></span><!--[endif]-->Each individual certificate in the key store is also encrypted individually using a DEK created during installation using PBEWithHmacSHA256AndAES256 (AES-CBC mode).</p>\r\n<p class=\"BodyCxSpMiddle\" style=\"margin-left: .5in; mso-add-space: auto; text-indent: -.25in; mso-list: l1 level1 lfo2;\"><!-- [if !supportLists]--><span style=\"font-family: 'Times New Roman',serif;\"><span style=\"mso-list: Ignore;\">6.<span style=\"font: 7.0pt 'Times New Roman';\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span></span><!--[endif]-->The enrolled device certificate private keys are generated on the mobile device and signed by the intermediate CA on the applicable UEM server.</p>\r\n<p class=\"BodyCxSpLast\" style=\"margin-left: .5in; mso-add-space: auto; text-indent: -.25in; mso-list: l1 level1 lfo2;\"><!-- [if !supportLists]--><span style=\"font-family: 'Times New Roman',serif;\"><span style=\"mso-list: Ignore;\">7.<span style=\"font: 7.0pt 'Times New Roman';\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span></span><!--[endif]-->Additional trusted root CAs can be loaded to support accepting certificates from other devices (syslog, LDAP, etc.).</p>\r\n<p class=\"MsoNormal\" style=\"text-align: justify; mso-outline-level: 1;\"><strong>Identification and authentication:</strong></p>\r\n<p class=\"Body\"><span style=\"font-family: 'Times New Roman',serif;\">The BlackBerry UEM server requires administrators to login prior to performing any security functions or accessing any services, such as creating an activation password.<span style=\"mso-spacerun: yes;\">&nbsp; </span>Similarly, mobile devices must authenticate with the server using an activation password prior to enrolling.</span></p>\r\n<p class=\"MsoNormal\" style=\"margin-bottom: 6.0pt; text-align: justify;\"><span style=\"font-family: 'Times New Roman',serif;\">Both the BlackBerry UEM server and Android client use X.509 certificates in conjunction with TLS to both authenticate and secure remote connections.</span></p>\r\n<p class=\"MsoNormal\" style=\"text-align: justify; mso-outline-level: 1;\"><strong>Security management:</strong></p>\r\n<p class=\"Body\"><span style=\"font-family: 'Times New Roman',serif;\">The BlackBerry UEM server facilitates granular administrative access to functions</span> based on roles: server primary administrators, security configuration administrators, device user administrators, auditor, and mobile device users. <span style=\"font-family: 'Times New Roman',serif;\"><span style=\"mso-spacerun: yes;\">&nbsp;</span>Administrators access the BlackBerry UEM server via a web-based interface.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The BlackBerry UEM server also supports the definition of mobile device users, and upon enrollment each mobile device generates an X.509 certificate used to identify that enrolled device.</span></p>\r\n<p class=\"Body\"><span style=\"font-family: 'Times New Roman',serif;\">The BlackBerry UEM server provides all the features necessary to manage its own security functions as well as to manage mobile device policies sent to enrolled mobile devices (via their clients).</span></p>\r\n<p class=\"MsoNormal\" style=\"margin-bottom: 6.0pt; text-align: justify;\"><span style=\"font-family: 'Times New Roman',serif;\">The BlackBerry UEM Android client provides the features necessary to securely communicate and enroll with the BlackBerry UEM server, apply policies received from the BlackBerry UEM server, and report the results of applying policies.</span></p>\r\n<p class=\"MsoNormal\" style=\"text-align: justify; mso-outline-level: 1;\"><strong>Protection of the TSF:</strong></p>\r\n<p class=\"Body\"><span style=\"font-family: 'Times New Roman',serif;\">The BlackBerry UEM server and Android client work together to ensure that all security related communication between those components is protected from disclosure and modification.</span></p>\r\n<p class=\"MsoNormal\" style=\"margin-bottom: 6.0pt; text-align: justify;\"><span style=\"font-family: 'Times New Roman',serif;\">The BlackBerry UEM server includes self-testing capabilities to ensure that they are functioning properly as well as to cryptographically verify that their executable images are not corrupted.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The UEM server also includes secure update capabilities to ensure the integrity of any updates so that updates will not introduce malicious or other unexpected changes in the TOE.</span></p>\r\n<p class=\"MsoNormal\" style=\"text-align: justify; mso-outline-level: 1;\"><strong>TOE access:</strong></p>\r\n<p class=\"MsoNormal\" style=\"margin-bottom: 6.0pt; text-align: justify;\"><span style=\"font-family: 'Times New Roman',serif;\">The BlackBerry UEM server has the capability to display an advisory banner when users attempt to login in order to manage the TOE.</span></p>\r\n<p class=\"MsoNormal\" style=\"text-align: justify; mso-outline-level: 1;\"><strong>Trusted path/channels:</strong></p>\r\n<p class=\"Body\"><span style=\"font-family: 'Times New Roman',serif;\">The BlackBerry UEM server uses TLS/HTTPS to secure communication channels between itself and remote administrators and mobile device users accessing the server via a web-based user interface. It also uses TLS to secure communication channels between itself, enrolled devices, its configured SQL database server, syslog servers, and optionally configured LDAP servers.</span></p>\r\n<p class=\"Body\"><span style=\"font-family: 'Times New Roman',serif;\">The following is a summary of applicable secure channels:</span></p>\r\n<p class=\"BodyCxSpMiddle\" style=\"margin-left: .5in; mso-add-space: auto; text-indent: -.25in; mso-list: l0 level1 lfo3;\"><!-- [if !supportLists]--><span style=\"font-family: 'Times New Roman',serif;\"><span style=\"mso-list: Ignore;\">1.<span style=\"font: 7.0pt 'Times New Roman';\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span></span><!--[endif]--><span style=\"font-family: 'Times New Roman',serif;\">UEM server console used by administrators &ndash; TLS not subject to mutual X.509 authentication. Certicom implementation of TLS on server.</span></p>\r\n<p class=\"BodyCxSpMiddle\" style=\"margin-left: .5in; mso-add-space: auto; text-indent: -.25in; mso-list: l0 level1 lfo3;\"><!-- [if !supportLists]--><span style=\"font-family: 'Times New Roman',serif;\"><span style=\"mso-list: Ignore;\">2.<span style=\"font: 7.0pt 'Times New Roman';\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span></span><!--[endif]--><span style=\"font-family: 'Times New Roman',serif;\">Mobile device UEM client to UEM server &ndash; TLS not subject to mutual X.509 authentication for initial enrollment, but always uses mutual X.509 authentication once enrolled. Certicom implementation of TLS on server &ndash; Mobile device implementation of TLS on the client end.</span></p>\r\n<p class=\"Body\" style=\"margin-left: .5in; text-indent: -.25in; mso-list: l0 level1 lfo3;\"><!-- [if !supportLists]--><span style=\"font-family: 'Times New Roman',serif;\"><span style=\"mso-list: Ignore;\">3.<span style=\"font: 7.0pt 'Times New Roman';\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span></span><!--[endif]--><span style=\"font-family: 'Times New Roman',serif;\">UEM server to SQL database, SYSLOG and LDAP &ndash; TLS optionally configured for mutual X.509 authentication. Certicom implementation of TLS on server.<span style=\"mso-spacerun: yes;\">&nbsp; </span>Communication with the SQL database is either local within the Windows platform on which the UEM server executes, or protected by IPsec provided by the Windows platform.</span></p>","features":[{"id":207,"feature_name":"Asymmetric Key Generation"},{"id":198,"feature_name":"Auditing"},{"id":206,"feature_name":"Certificate Authentication"},{"id":205,"feature_name":"Certificate Validation"},{"id":209,"feature_name":"Cryptographic Hashing"},{"id":208,"feature_name":"Cryptographic Key Establishment"},{"id":211,"feature_name":"Cryptographic Signature Generation"},{"id":210,"feature_name":"Cryptographic Signature Verification"},{"id":204,"feature_name":"DRBG"},{"id":199,"feature_name":"Key Destruction"},{"id":212,"feature_name":"Keyed-hash message authentication"},{"id":213,"feature_name":"MDM-Agent"},{"id":1913,"feature_name":"Mobile Application Management"},{"id":1915,"feature_name":"Mobile Content Management"},{"id":203,"feature_name":"Mobile Device Management"},{"id":201,"feature_name":"TLS 1.2"},{"id":202,"feature_name":"TLS Client"},{"id":200,"feature_name":"TLS Server with Mutual Authentication"}]}