11.07.2015 Views

Mac OS X Security Configuration - Office of Information Technology

Mac OS X Security Configuration - Office of Information Technology

Mac OS X Security Configuration - Office of Information Technology

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

4 Select “View and evaluate certificates” then click Continue.5 Select a trust policy.For an explanation about the trust policy, click Learn More. To evaluate a email certificate, select “S/MIME (Secure Multipurpose Internet MailExchange)” and enter the mail address <strong>of</strong> the sender. To evaluate a web server, select “SSL (Secure Socket Layer)” and enter the hostserver’s URL. If you want to ask the host for the certificates, select “Ask Host ForCertificates.” For any other type <strong>of</strong> certificate, select “Generic Apple X509.”6 Click Continue.7 Click the Add (+) button and select the certificate you want to evaluate.You can add and evaluate multiple certificates.To include other certificates from your keychain when evaluating the certificate chain,select “Include certificates from my keychain.” For example, if the root and intermediatecertificates for your selected certificate are in your keychain, selecting this buttonincludes them in the evaluation.The default certificate evaluated is always the user certificate, or leaf. If the certificateyou want to evaluate is an intermediate or root certificate click Make Leaf.Client-Side AuthenticationSome applications or services require that you use a digital certificate to authenticate.Digital certificates can be stored in a Smart Card and can also include a photograph <strong>of</strong>the authorized user to further protect a certificate from being used by an unauthorizeduser.By using a certificate as an authentication and identification method, the service orapplication can ensure that the person who provided the certificate is not only thesame person who provided the data, but is also who they say they are. The certificate isalso signed—in this case by the certificate authority (CA) who issued the certificate.Managing Data Communication and ExecutionDownloaded files are tagged with the com.apple.quarantine extended attribute untilyou permit the file to be opened or executed.Opening Safe FilesWhen you enable “Open ‘safe’ files after downloading” in Safari preferences, files thatare considered safe are opened after downloading. These include pictures, movies,sounds, text files, PDFs, disk images, and ZIP archives.152 Chapter 11 <strong>Information</strong> Assurance with Applications

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!