Apple device security
There are special considerations to be aware of when securing an Apple device.
Authentication
IBM Traveler relies on the Domino® infrastructure (HTTP and Admin Client) to authenticate the user. The authentication credentials can be one of the user's allowed Domino® name formats, along with the user's HTTP password, or it can be something defined with the Directory Assistance database. All devices use HTTP Basic Authentication, so HTTPS is recommended for security reasons unless using a VPN or a secured network.
Account information and passwords
Mail, Calendar, and Contacts are controlled with the single Exchange ActiveSync account. These credentials are controlled by Apple.
IBM Traveler Companion and To Do's store all of their credentials in the Apple iOS provided keychain.
Data storage
Apple provides some devices that have hardware encryption (iPad, iPhone 3Gs or later, iPod Touch 3rd generation or later). This encryption is controlled by Apple and is reported to be AES 256-bit.
IBM Traveler Companion does not persist any PIM data.
IBM® Notes® To Do's data is stored in a local database and secured using the Apple iOS Data Protection capabilities.