Apple iPod and iPod Touch manual EAPClientConfiguration Dictionary, EncryptionType

Page 56

56

Key

Value

EncryptionType

String. The possible values for “EncryptionType” are “WEP”, “WPA”,

 

or “Any”.“WPA” corresponds to WPA and WPA2 and applies to

 

both encryption types. Make sure that these values exactly

 

match the capabilities of the network access point. If you’re

 

unsure about the encryption type, or would prefer that it applies

 

to all encryption types, use the value “Any”.

 

 

Password

String, optional. The absence of a password doesn’t prevent the

 

network from being added to the list of known networks. The

 

user is eventually prompted to provide the password when

 

connecting to that network.

 

 

For 802.1X enterprise networks, the EAP Client Configuration Dictionary must be provided.

EAPClientConfiguration Dictionary

In addition to the standard encryption types, it is also possible to specify an enterprise profile for a given network via the “EAPClientConfiguration” key. This key is declared as kEAPOLControlEAPClientConfiguration in <EAP8021X/EAPOLControlTypes.h>.

If present, its value is a dictionary with the following keys.

Key

Value

UserName

String, optional. Unless you know the exact user name, this

 

property won’t appear in an imported configuration. Users can

 

enter this information when they authenticate.

 

 

AcceptEAPTypes

Array of integer values. These EAP types are accepted.:

 

13 = TLS

 

17 = LEAP

 

21 = TTLS

 

25 = PEAP

 

43 = EAP-FAST

 

 

TLSTrustedCertificates

Array of data values, optional. This is the list of certificates to be

 

trusted for this authentication. Each data element contains the

 

.cer form of the corresponding certificate.

 

This key lets you craft the list of certificates that are expected for

 

the given network, and avoids asking the user to dynamically

 

set trust on a certificate.

 

Dynamic trust (the certificate dialogue) is disabled if this

 

property is specified, unless TLSAllowTrustExceptions is also

 

specified with the value true (see below).

 

 

Appendix B Configuration Profile Format

Image 56
Contents IPhone and iPod touch Enterprise Deployment Guide Page Contents Appendix a Appendix BSystem Requirements IPhone and iPod touchITunes Mac OS X computersIPhone Configuration Utility Microsoft Exchange ActiveSyncSupported Exchange ActiveSync Policies Windows computersRemote Wipe Microsoft Direct PushMicrosoft Exchange Autodiscovery Microsoft Exchange Global Address ListExchange ActiveSync Features Not Supported Network SecurityAdditional Resources CertificatesEmail accounts Deploying iPhone and iPod touch Activating DevicesPreparing Access to Network Services and Enterprise Data Microsoft ExchangeExchange Account Setup WPA/WPA2 Enterprise Wi-Fi NetworksNetwork Configuration Virtual Private Networks WPA/WPA2 Enterprise Network ConfigurationVPN Setup Guidelines Imap Network Setup Guidelines Determining Device Passcode PoliciesImap Email Enterprise ApplicationsConfiguring Devices Other ResourcesAbout iPhone Configuration Utility IPhone Configuration Utility for Mac OSCreating and Deploying Configuration Profiles IPhone Configuration Utility for the Web Installing on Mac OSInstalling on Windows XP and Windows Vista Accessing iPhone Configuration Utility for WebStarting or Restarting iPhone Configuration Utility Web Creating Configuration Profiles To restart the utility on WindowsGeneral Settings Passcode Settings Wi-Fi Settings Enterprise SettingsExchange Settings VPN SettingsEmail Settings Advanced Settings Editing Configuration ProfilesCredentials Settings Preparing Configuration Profiles for Deployment Distributing Configuration Profiles by EmailDistributing Configuration Profiles on the Web Mac OS X ServerInstalling Configuration Profiles IIS Web ServerRemoving and Updating Configuration Profiles Manually Configuring Devices VPN SettingsCisco IPSec Settings Field DescriptionPptp Settings L2TP Settings Wi-Fi Settings Exchange Settings Format domain\usernameManually Configuring Devices Installing Identities and Root Certificates Additional Mail Accounts Installing on Windows using iTunesSetup.exe Installing iTunesInstalling iTunes on Windows Computers Silently Installing on Windows Setting iTunes RestrictionsInstalling iTunes on Macintosh Computers Setting iTunes Restrictions for Mac OS Setting iTunes Restrictions for WindowsTo update iPhone software, follow these steps Updating iTunes and iPhone Software ManuallyDeploying iPhone Applications Register for Application DevelopmentWindows XP Installing Provisioning Profiles using iTunesMac OS Installing Applications using iTunes Windows VistaUsing Enterprise Applications ACisco VPN Server Configuration Authentication GroupsIPSec Settings Other Supported Features IPhone and iPod touch support the followingRoot Level AppendixPayload Content Passcode Policy Payload Number of allowed failed attempts to enter the passcode atEmail Payload APN Payload Exchange PayloadVPN Payload PPP Dictionary KeysWi-Fi Payload IPSec Dictionary KeysEAPClientConfiguration Dictionary EncryptionTypeEAP-Fast Support FastProxy settings Certificates

iPod and iPod Touch specifications

The Apple iPod, first released in 2001, revolutionized the way we listen to music. This portable media player, with its sleek design and user-friendly interface, quickly garnered a dedicated following. The original iPod featured a mechanical scroll wheel and a minimalist aesthetic, allowing users to carry their music libraries wherever they went. It was a game changer in the digital music landscape, encouraging both casual listeners and audiophiles to embrace the concept of portability.

As technology evolved, so did the iPod. The introduction of the iPod Mini in 2004 marked a transition to a smaller, more compact design. In 2005, Apple launched the iPod Nano, which showcased an even slimmer profile, vibrant color displays, and flash storage for improved resistance to shocks. The most significant evolution came with the introduction of the iPod Touch in 2007, which transformed the iPod into a more multifaceted device.

The iPod Touch brought a touchscreen interface, resembling the iPhone. It allowed users to access not only their music but also apps, games, and web browsing capabilities. The device was powered by Apple's iOS, featuring a robust App Store that offered thousands of applications, from productivity tools to entertainment options. With Wi-Fi connectivity, the iPod Touch enabled users to stream music and videos, browse the internet, and utilize apps without being tethered to a computer.

In terms of audio quality, iPods have consistently featured high-performance DACs and audio processors, capable of delivering excellent sound reproduction. With support for various audio formats, including AAC, MP3, and Apple Lossless, users could enjoy their music without compromise. The integration of iTunes provided a seamless ecosystem for purchasing, organizing, and syncing music.

Throughout its iterations, the design of the iPod Touch has also evolved. The latest generations sport a sleek aluminum casing, Retina displays, and advanced camera systems. Features such as FaceTime, iMessage, and Apple Music integration have positioned the iPod Touch as a versatile device, appealing not only to music lovers but to a broader audience seeking a portable multimedia experience.

Ultimately, while the rise of smartphones may have overshadowed the iPod, its impact on the music industry and digital media consumption remains undeniable. The legacy of the iPod and iPod Touch is characterized by innovation, portability, and a continuous quest to enhance how we experience music and entertainment in our daily lives.