Safenet Mobilepass+ for Ios CUSTOMER RELEASE NOTES

Total Page:16

File Type:pdf, Size:1020Kb

Safenet Mobilepass+ for Ios CUSTOMER RELEASE NOTES SafeNet MobilePASS+ for iOS CUSTOMER RELEASE NOTES Version: 1.8.2 Build: 1.8.2 Issue Date: 28 February 2020 Document Number: 007-013373-001 Rev. N Contents Product Description 2 Release Description 2 Advisory Notes 2 Apple Watch to be Supported in an Upcoming Release 2 Working with SafeNet MobilePASS and SafeNet MobilePASS+ 2 Push OTP 2 Configuring STA for QR Code Enrollment 4 Biometric PIN 4 Resolved and Known Issues 5 Compatibility Information 5 Operating System 5 Supported Authentication Servers 5 Product Documentation 5 Support Contacts 6 SafeNet MobilePASS+ for iOS Customer Release Notes 007-013373-001 Rev. N 28 February 2020 Copyright 2020 Thales Group 1 Product Description SafeNet MobilePASS+ for iOS is a mobile client application enabling you to access corporate and web-based resources securely. It eliminates the need to remember complex passwords. SafeNet MobilePASS+ for iOS is a cost-effective way for businesses to leverage the security of One Time Passwords (OTP) using mobile phones. Associated with SafeNet Trusted Access, the SafeNet MobilePASS+ for iOS application is a perfect combination of security and convenience. It offers a simple user experience for token activation and authentication using the Push OTP mechanism. Release Description SafeNet MobilePASS+ for iOS v1.8.2 resolves the issues listed in "Resolved Issue" on page 5. NOTE If you use an MDM to deploy MobilePASS+, once a user upgrades to v1.8.2 they will not be able to downgrade to v1.7.1 or lower. Advisory Notes Apple Watch to be Supported in an Upcoming Release SafeNet MobilePASS+ for iOS 1.8.2 does not support Apple Watch. Users who have experimented with this functionality currently find that they can see the notification on their watch but cannot complete the approval flow. Thales Group is working to enable full functionality in an upcoming release. Working with SafeNet MobilePASS and SafeNet MobilePASS+ SafeNet SafeNet MobilePASS for iOS and SafeNet MobilePASS+ can be used on the same device and with the same virtual server. Token enrollments are for either SafeNet SafeNet MobilePASS for iOS or SafeNet MobilePASS+. This is controlled in SafeNet Trusted Access at the virtual server level. Push OTP Approving a Push OTP Login Request MobilePASS+ tokens that are not PIN protected or are configured to work with a server-side PIN can be configured to use the Enhanced Approval Workflow. The Enhanced Approval Workflow is not available for user-selected PIN protected tokens or for tokens that are not configured to support the workflow. When the Login request arrives on your mobile device, you can respond from the locked screen or from the MobilePASS+ application. Token Configuration Notification Action to Approve the Push OTP Login Request Location SafeNet MobilePASS+ for iOS Customer Release Notes 007-013373-001 Rev. N 28 February 2020 Copyright 2020 Thales Group 2 Approving a Push OTP Login iOS Locked Screen Do one of the following: Request with standard > Swipe the notification from right to left to expand it approval workflow and tap APPROVE. > Single tap on the notification to open the login request in SafeNet MobilePASS+, review the login request information, and tap APPROVE. iOS Unlocked 1. Tap the Pending Notification bar. Screen or within 2. Tap APPROVE. another Application Approving a Push OTP Login iOS Locked Screen 1. Tap the Login request notification. Request with Enhanced 2. Tap APPROVE. Approval Workflow 3. If your device is password protected, enter the passcode. iOS Unlocked 1. Tap on the notification to open the login request in Screen or within SafeNet MobilePASS+. another Application 2. Review the login request information. 3. Tap APPROVE. SafeNet In the Login Request Form window, tap Approve. MobilePASS+ Application Configuring STA for Enhanced Approval Workflow NOTE To maintain compatibility with MobilePASS+ Android and iOS versions earlier than 1.4, do not select Enhanced Approval Workflow. To enable Enhanced Approval Workflow: 1. In the STA Token Management console, select VIRTUAL SERVERS > POLICY > Token Policies > Software Token & Push OTP Settings. 2. Select Enhanced approval workflow and click Apply. Conditions that will trigger Enhanced Approval Workflow on a mobile device: > Enhanced Approval Workflow must be enabled on the server SafeNet MobilePASS+ for iOS Customer Release Notes 007-013373-001 Rev. N 28 February 2020 Copyright 2020 Thales Group 3 > The mobile device must be running iOS 10 or later > The mobile device must be provisioned with one token only on the server-side > The token must not have a user-PIN Push OTP Troubleshooting If an expected push OTP request does not arrive on your mobile device, check that a network connection is present. Heavy traffic and/or service outages from the public push service provider (Apple) may result in delivery delays or disruptions. In such circumstances, use manual OTP generation to complete the authentication. Configuring STA for QR Code Enrollment 1. In the STA Token Management console, select VIRTUAL SERVERS > POLICY > Automation Policies > Self-Enrollment Policy. 2. Select Enable Multi-Device Instructions. 3. Select Display QR Code. 4. Click Apply. The enrollment email sent to the user will include a link to the page on the STA Self Service Module where the QR code is displayed. The QR code will display only if a supported device is selected in the device selection drop down menu. Biometric PIN Biometric PIN Prerequisites > iOS 7 or later > Token configured in STA for Biometric PIN Activating Biometric PIN in Existing Tokens Tokens previously enrolled without the Biometric PIN feature must be re-enrolled with the Biometric PIN feature enabled in the STA console. Configuring STA for Biometric PIN (Touch ID and Face ID) 1. In the STA Token Management console, select VIRTUAL SERVERS > POLICY > Token Policies > Token Templates. 2. Select the SafeNet MobilePASS for iOS token type and click Edit. 3. In the Edit Token Template window, under PIN Policy, select User-selected PIN and then select Allow Biometric PIN. The SafeNet MobilePASS+ token can now, following enrollment, be activated to use Touch ID. SafeNet MobilePASS+ for iOS Customer Release Notes 007-013373-001 Rev. N 28 February 2020 Copyright 2020 Thales Group 4 Resolved and Known Issues Resolved Issue Issue Synopsis N/A Uncommon enrollments proceed to completion correctly. SASMOB-2109 The MobilePASS+ application functions correctly when scanning a deep link from the iOS camera application. Known Issues Issue Synopsis SAS-21916 Summary: OCRA tokens prevent non-OCRA tokens from performing authentication. Workaround: None SASMOB-1949 Summary: Changes to the security requirements for iOS 13 prevent MobilePASS+ from enrolling a token when using iOS 13.1.2. Workaround: None SASMOB-954 Summary: On iOS 13, when Touch ID is triggered to unlock an OTP or to approve a push authentication request, the user interface for Touch ID remains hidden. This affects iPhone 5, 6, 7, and 8 devices. Workaround: Upgrade to the latest release: iOS 13.1.3 or later. Compatibility Information Operating System > iOS 10 and later NOTE BETA releases of the operating system are not supported. Supported Authentication Servers > SafeNet Authentication Service (Cloud Edition) > SafeNet Authentication Service PCE/SPE 3.5 or later The QR Code Enrollment and Biometric PIN (Touch ID) features require version 3.5.4 or later. Product Documentation The following product documentation is associated with this release: SafeNet MobilePASS+ for iOS Customer Release Notes 007-013373-001 Rev. N 28 February 2020 Copyright 2020 Thales Group 5 > SafeNet MobilePASS+ for iOS User Guide > SafeNet Authentication Service (SAS) Push OTP Solution Guide We have attempted to make these documents complete, accurate, and useful, but we cannot guarantee them to be perfect. When we discover errors or omissions, or they are brought to our attention, we endeavor to correct them in succeeding releases of the product. Support Contacts If you encounter a problem while installing, registering, or operating this product, please refer to the documentation before contacting support. If you cannot resolve the issue, contact your supplier or Thales Group Customer Support. Thales Group Customer Support operates 24 hours a day, 7 days a week. Your level of access to this service is governed by the support plan arrangements made between Thales Group and your organization. Please consult this support plan for further information about your entitlements, including the hours when telephone support is available to you. Customer Support Portal The Customer Support Portal, at https://supportportal.gemalto.com, is where you can find solutions for most common problems. The Customer Support Portal is a comprehensive, fully searchable database of support resources, including software and firmware downloads, release notes listing known problems and workarounds, a knowledge base, FAQs, product documentation, technical notes, and more. You can also use the portal to create and manage support cases. NOTE You require an account to access the Customer Support Portal. To create a new account, go to the portal and click on the REGISTER link. Telephone Support If you have an urgent problem, or cannot access the Customer Support Portal, you can contact Thales Group Customer Support by telephone at +1 410-931-7520. Additional local telephone support numbers are listed on the support portal. Email Support You can also contact technical support by email at [email protected]. SafeNet MobilePASS+ for iOS Customer Release Notes 007-013373-001 Rev. N 28 February 2020 Copyright 2020 Thales Group 6.
Recommended publications
  • Protect Yourself and Your Personal Information*
    CYBER SAFETY Protect yourself and your personal information * Cybercrime is a growing and serious threat, making it essential that fraud prevention is part of our daily activities. Put these safeguards in place as soon as possible—if you haven’t already. Email Public Wi-Fi/hotspots Key Use separate email accounts: one each Minimize the use of unsecured, public networks CYBER SAFETY for work, personal use, user IDs, alerts Turn oF auto connect to non-preferred networks 10 notifications, other interests Tips Turn oF file sharing Choose a reputable email provider that oFers spam filtering and multi-factor authentication When public Wi-Fi cannot be avoided, use a 1 Create separate email accounts virtual private network (VPN) to help secure your for work, personal use, alert Use secure messaging tools when replying session to verified requests for financial or personal notifications and other interests information Disable ad hoc networking, which allows direct computer-to-computer transmissions Encrypt important files before emailing them 2 Be cautious of clicking on links or Never use public Wi-Fi to enter personal attachments sent to you in emails Do not open emails from unknown senders credentials on a website; hackers can capture Passwords your keystrokes 3 Use secure messaging tools when Create complex passwords that are at least 10 Home networks transmitting sensitive information characters; use a mix of numbers, upper- and Create one network for you, another for guests via email or text message lowercase letters and special characters and children
    [Show full text]
  • 5Tips for Securing Your Mobile Device for Telehealth
    Tips for Securing your Mobile Device 5for Telehealth The Health Insurance Portability and Accountability Act (HIPAA) requires that providers protect your information and not share it without your permission. Telehealth providers are required by law to secure medical information that can be shared electronically by encrypting messages and adding other safeguards into the software they use. However, patients’ devices on the receiving end of care often do not always have these safeguards while some medical devices have been shown to be vulnerable to hackers. It is therefore the responsibility of the patient to secure personal devices. 01 Use a PIN or Passcode to secure device Securing your mobile device is important for ensuring that others do not have access to your confidential information and applications. To protect your iPad, iPhone, Android phone you need to set a passcode. It is a 4- to 6-digit PIN used to grant access to the device, like the code you use for an ATM bank card or a debit card. Securing your Apple (iPhone and iPad) and Android devices In addition to allowing you to secure your phone with a passcode, Newer Apple and Android devices also use biometrics called Touch ID and Face ID on Apple, and Face recognition, Irises, and Fingerprints on some Android devices. These tools use your Face, eyes, and fingerprints as unique identifiers to help secure your devices. Face ID and Face recognition use your facial features in order to unlock your device. Touch ID, which is no longer being used on newer versions of iPhone and iPad, and Fingerprints on Android is a fingerprinting tool.
    [Show full text]
  • Legal-Process Guidelines for Law Enforcement
    Legal Process Guidelines Government & Law Enforcement within the United States These guidelines are provided for use by government and law enforcement agencies within the United States when seeking information from Apple Inc. (“Apple”) about customers of Apple’s devices, products and services. Apple will update these Guidelines as necessary. All other requests for information regarding Apple customers, including customer questions about information disclosure, should be directed to https://www.apple.com/privacy/contact/. These Guidelines do not apply to requests made by government and law enforcement agencies outside the United States to Apple’s relevant local entities. For government and law enforcement information requests, Apple complies with the laws pertaining to global entities that control our data and we provide details as legally required. For all requests from government and law enforcement agencies within the United States for content, with the exception of emergency circumstances (defined in the Electronic Communications Privacy Act 1986, as amended), Apple will only provide content in response to a search issued upon a showing of probable cause, or customer consent. All requests from government and law enforcement agencies outside of the United States for content, with the exception of emergency circumstances (defined below in Emergency Requests), must comply with applicable laws, including the United States Electronic Communications Privacy Act (ECPA). A request under a Mutual Legal Assistance Treaty or the Clarifying Lawful Overseas Use of Data Act (“CLOUD Act”) is in compliance with ECPA. Apple will provide customer content, as it exists in the customer’s account, only in response to such legally valid process.
    [Show full text]
  • Certified Device List for Mobiliti – Phone Channel
    Mobiliti™ Certified Device List December 2019 - ASP Version CONFIDENTIAL – LIMITED: Distribution restricted to Fiserv employees and clients © 2011-2019 Fiserv, Inc. or its affiliates. All rights reserved. This work is confidential and its use is strictly limited. Use is permitted only in accordance with the terms of the agreement under which it was furnished. Any other use, duplication, or dissemination without the prior written consent of Fiserv, Inc. or its affiliates is strictly prohibited. The information contained herein is subject to change without notice. Except as specified by the agreement under which the materials are furnished, Fiserv, Inc. and its affiliates do not accept any liabilities with respect to the information contained herein and is not responsible for any direct, indirect, special, consequential or exemplary damages resulting from the use of this information. No warranties, either express or implied, are granted or extended by this document. http://www.fiserv.com Fiserv is a registered trademark of Fiserv, Inc. Other brands and their products are trademarks or registered trademarks of their respective holders and should be noted as such. CONFIDENTIAL – LIMITED: Distribution restricted to Fiserv employees and clients Contents Revision and History .................................................................................................................. 4 Certified Device List for Mobiliti – Phone Channel .................................................................. 5 Scope .....................................................................................................................................................
    [Show full text]
  • Apple Submission NIST RFI Privacy Framework
    Apple Submission in Response to NIST Request for Information Developing a Privacy Framework, Docket No. 181101997-8997-01 January 14, 2018 Apple appreciates this opportunity to comment on NIST’s Request For Information (RFI) regarding its proposed Privacy Framework. Apple supports the development of the Privacy Framework and NIST’s engagement on this important topic. At Apple, we believe privacy is a fundamental human right. We have long embraced the principles of privacy-by-design and privacy-by-default, not because the law requires it, but because it is the right thing for our customers. We’ve proved time and again that great experiences don’t have to come at the expense of privacy and security. Instead, they support them. Every Apple product is designed from the ground up to protect our users’ personal information. We’ve shown that protecting privacy is possible at every level of the technical stack and shown how these protections must evolve over time. Users can protect their devices with Face ID or Touch ID, where their data is converted into a mathematical representation that is encrypted and used only by the Secure Enclave1 on their device, cannot be accessed by the operating system, and is never stored on Apple servers. In communication, we use end-to-end encryption to protect iMessage and FaceTime conversations so that no one but the participants can access them. On the web, Safari was the first browser to block third-party cookies by default, and we introduced Intelligent Tracking Protection to combat the growth of online tracking. When we use data to create better experiences for our users, we work hard to do it in a way that doesn’t compromise privacy.
    [Show full text]
  • Read Apple Pay Faqs
    Apple Pay FAQs What is Apple Pay? Apple pay is an easy, secure and private way to pay on iPhone, iPad, Apple Watch and Mac. You can make purchases in stores by holding your compatible device near a contactless reader at participating merchants or when shopping online at participating merchants. You can find more information about Apple Pay and how to set up your card at apple.com. What do I need to use Apple Pay? • Eligible device • Supported card from Texas DPS Credit Union • Latest version of iOS, watchOS or macOS • An Apple ID signed into iCloud What Apple devices are compatible? • iPhone models with Face ID • iPhone models with Touch ID, except for iPhone 5s • iPad Pro, iPad Air, iPad and iPad mini models with Touch ID or Face ID • Apple Watch Series 1 and 2 and later • Mac models with Touch ID How do I add my card to Apple Pay? • On your compatible device, access the Settings app, scroll down to Wallet & Apple Pay, then click Add Card, under Payment Cards and follow the prompts. The card information will be verified and confirm whether you can use your card with Apple Pay. If the Credit Union needs more information to verify your card, you will receive a prompt to contact us. After your card has been verified, you can start using Apple Pay. OR • Go to the Wallet and tap the plus sign. Follow the prompts to add a new card. Tap Next. The card information will be verified and confirm whether you can use your card with Apple Pay.
    [Show full text]
  • Your Action Is Needed
    FOR iPHONE/iPAD OWNERS: YOUR ACTION IS NEEDED YOU MUST FOLLOW the steps below to disconnect your original device from iCloud and unlock it. STEP 1: DISCONNECT FROM iCLOUD If your device is damaged but still working: Go to Settings > Tap on your name/ID > iCloud > Find My iPhone > Turn off the Find My iPhone button > Enter your Apple ID and Password > Tap Turn Off If your device is damaged and won’t turn on: Go to iCloud.com and enter your Apple ID and Password > At the Two-Factor Authentication page, click Find My iPhone > Click the down arrow next to All Devices > Click on the device you are removing > Click Erase iPhone > Click Erase > Enter your Apple ID Password > Answer any Security Questions > Click Continue > At Enter Phone Number prompt, select Next > At Enter Message prompt, select Done > iPhone Erase Pending will be displayed > Click the down arrow next to iPhone > Click the x to the right of your device > Click Remove If your device is lost or stolen: Go to iCloud.com and enter your Apple ID and Password > At the Two-Factor Authentication page, click Find My iPhone > Click the down arrow next to All Devices > Click on the lost/stolen device > Click Lost Mode (iOS 6 or later), or Lock (iOS 5 or earlier) > Follow the onscreen instructions STEP 2: UNLOCK YOUR DEVICE Go to Settings > Tap Touch ID/Face ID & Passcode (Passcode for devices without a Touch or Face ID Sensor) > Enter Passcode > Turn Passcode Off > Turn Off > If prompted, enter Passcode For further assistance, please visit support.apple.com.
    [Show full text]
  • Singpass App How-To Guide (Ios Users)
    Singpass app How-to guide (iOS users) March 2021 3 Simple Steps to start using Singpass app! All you need is a smartphone, an internet connection and a registered Singpass account. STEP STEP STEP 01 02 03 Download Launch the app You’re all set! You can Singpass app from and complete a now access the App Store. one-time setup. government and private sector services using your fingerprint (for selected smartphones), face (for selected smartphones) or 6-digit passcode. For more information, visit https://app.singpass.gov.sg. 2 Find step-by-step instructions on the following: 1 Download Singpass app 2 Set up Singpass app • If you have set up SMS 2FA • If you have not set up SMS 2FA 3 Singpass app login • I am logging in on mobile • I am logging in on desktop 3 Download Singpass app 1 Download Singpass app Visit the App Store and download 2 Set up Singpass app 1 ‘Singpass’ app. 3 Singpass app login Check that the developer is ‘Government Technology Agency’ before downloading the app. 4 Setting up Singpass app. Choose your profile: I have set up I have not set up SMS 2FA SMS 2FA 5 You have set up SMS 2FA and would like to set up Singpass app Click to find out more! 6 Set up Singpass app (2FA users) 1 Download Singpass app Launch the app and read the 2 Set up Singpass app 2 Terms & Privacy statement. 3 Singpass app login Tap ‘Okay’ to proceed to set up your Singpass app. 7 Set up Singpass app (2FA users) 1 Download Singpass app Swipe left or tap ‘Next’ for a quick 2 Set up Singpass app 2 overview of Singpass app.
    [Show full text]
  • Ipad Starter Guide for Students Welcome to Ipad
    iPad Starter Guide for Students Welcome to iPad. iPad is a powerful, versatile device that can transform into anything you want it to be—a book, a camera, a sketch pad, an assistant, and so much more. And iPad also has accessories like Apple Pencil, keyboards, and trackpad options to help you do whatever you need. Use this guide as an introduction to iPad, and discover new ways to explore, learn, and create. iPad is packed with features that can help you stay organized, manage time, and collaborate with professors and friends—both on and off campus. Contents Before You Begin Capture, Organize, and Create Navigate this Book 5 Scan and Save Documents 17 Set Up iCloud and Other Account Services 6 Capture What's on Your Screen 18 Check for Updates 7 Take Notes 19 Create Documents, Spreadsheets, and Presentations 20 Use Multiple Apps at the Same Time 21 Personalize iPad Collaborate with Classmates Customize Your Home Screen 9 Stay Connected with Mail and Messages 23 Enable Accessibility Features 10 Share Files and Folders 24 Keep Your Data Secure 11 Collaborate with Pages, Numbers, and Keynote 25 Connect with FaceTime 26 Manage Your Day Go Further Ask Siri 13 Explore the App Store 28 Set Reminders 14 Get Creative 29 Use Calendar 15 Learn to Code 30 Learn More 31 1 Before You Begin 4 Navigate this Book Most pages in this guide have instructions on the left and a gallery of images or a video on the right. After you’ve finished exploring an app or a feature described on a page, you can easily return to this guide using the Dock or the App Switcher.
    [Show full text]
  • Session 6: Making Things Easier with Apple Features
    Apple Mobile Device Training Session 6: Making Things Easier with Apple Features Breakdown of Sessions Mondays (10:00am – 12:00pm) Thursdays (3:30pm – 5:30pm) • Session 1: Welcome to your iPhone or iPad • Session 2: Apple ID & Backups • Session 3: Apps & Settings • Session 4: Settings (Continued) • Session 5: Settings (Continued) • Session 6: Making Things Easier with Apple Features • Session 7: Communicating on your Device • Session 8: The Camera & Photos App • Session 9: Mail App & your Email Address • Session 10: Searching the Internet with the Safari App • Session 11: Productivity Apps • Session 12: Productivity Apps (Continued) • Session 13: How to Troubleshoot & Reset your Device if needed • Session 14: Other Useful Apps & Websites 2 Download Class Materials Go to https://sfcommunityliving.org/learn- skills/computer-training/, look through our Tech Help Desk class schedules for all online classes hosted by Community Living Campaign. • Here you can also download printable copies of the class materials used for today’s lesson & all other planned lessons on CLC’s Tech schedule. 3 Today’s Goals • What is Siri? • Adjusting Siri Settings • What is Dictation? • Using Dictation • What are Passcode, Touch ID & Face ID? • Adjusting Passcode & ID Settings 4 What is Siri? • Siri is the voice assistant built by Apple. • Siri helps you simplify navigating through your Apple device by simply listening to your voice and then performing the task you ask it to do. (For instance, you can ask Siri to set an alarm or a reminder for you at a specific time of a specific day.) • All devices have a button for the user to press & hold in order to activate Siri and then give the verbal command.
    [Show full text]
  • Hey Siri” on Your Iphone Or Ipad
    EBOOK EXTRAS: v2.0 Downloads, Updates, Feedback TAKE CONTROL OF SIRI COVERS SIRI ON iPhone • iPad • iPod touch Mac • Apple Watch Apple TV • HomePod by SCHOLLE McFARLAND $14.99 2nd Click here to buy the full 141-page “Take Control of Siri” for only $14.99! EDITION Table of Contents Read Me First ............................................................... 6 Updates and More ............................................................. 6 Basics .............................................................................. 7 What’s New in the Second Edition ....................................... 7 Introduction ................................................................ 9 Siri Quick Start .......................................................... 10 Brush Up on Siri Basics .............................................. 12 What You Need to Get Started ........................................... 12 Change Siri’s Language and Voice ...................................... 15 Control How Siri Talks Back to You ..................................... 17 Activate Siri By Touch ................................................ 24 Trigger Siri Manually on an iPad or iOS Device ..................... 24 Trigger Siri by Touch on Your Watch ................................... 26 Trigger Siri by Touch on HomePod ...................................... 27 Trigger Siri by Touch on Your Apple TV ............................... 27 Trigger Siri Manually on a Mac ........................................... 28 Don’t Forget Your Headphones .........................................
    [Show full text]
  • Ios Security Ios 12.3
    iOS Security iOS 12.3 May 2019 Contents Page 5 Introduction Page 6 System Security Secure boot chain System Software Authorization Secure Enclave OS Integrity Protection Touch ID Face ID Page 15 Encryption and Data Protection Hardware security features File Data Protection Passcodes Data Protection classes Keychain data protection Keybags Page 25 App Security App code signing Runtime process security Extensions App Groups Data Protection in apps Accessories HomeKit SiriKit HealthKit ReplayKit Secure notes Shared notes Apple Watch Page 39 Network Security TLS VPN Wi-Fi Bluetooth Single sign-on Continuity AirDrop security Wi-Fi password sharing iOS Security | May 2019 2 Page 47 Apple Pay Apple Pay components How Apple Pay uses the Secure Element How Apple Pay uses the NFC controller Credit, debit, and prepaid card provisioning Payment authorization Transaction-specific dynamic security code Paying with credit and debit cards in stores Paying with credit and debit cards within apps Paying with credit and debit cards on the web Contactless passes Apple Pay Cash Transit cards Student ID cards Suspending, removing, and erasing cards Page 58 Internet Services Apple ID iMessage Business Chat FaceTime iCloud iCloud Keychain Siri Safari Suggestions, Siri Suggestions in Search, Lookup, #images, News app, and News widget in non-News countries Safari Intelligent Tracking Prevention Page 73 User Password Management App access to saved passwords Automatic strong passwords Sending passwords to other people or devices Credential provider extensions Page
    [Show full text]