|
Getting Started with SecurityTechnology OverviewSecurity is about restricting access, whether to a physical object, a location, information, an application, or a particular feature of an application. Depending on what you need to protect, you may want to:
If your software needs to protect information or if you need to control access to your software, then you need to be familiar with the security features and APIs of Mac OS X. In addition to the documentation pointed to in this overview, read the Security topic page. Start HereStart with Security Overview to get a high-level view of Mac OS X security features:
Choose a Learning PathIf you want to verify the identity of a user before granting access to your program or data, you need to learn about the authentication methods available. To control users’ access to programs and data, you need to know how to get and set access rights. To create a secure mail, web, or network application or server, you need to learn how to transport data securely over a network. To protect data and ensure data integrity, you can use digital signatures and encryption. Authenticating a UserBefore you determine whether to grant a user access to your software or data, you must verify their identity. Authorization Services can prompt the user for their password or other authentication information. You can also use certificates to authenticate a user or server.
You can also store and retrieve passwords from the Keychain, and validate a user’s digital certificate stored on the Keychain.
Controlling AccessYou can control who has access to your data, to your application, or to particular features of your application by using the Authorization Services APIs to set and get access rights for users and to verify a user’s identity. There are procedural-C and Objective-C interfaces to Authorization Services.
Transporting Data Securely Over a NetworkYou can download data from a secure URL using the HTTPS protocol, or you can send data securely over a network using a Secure Sockets Layer (SSL) or Transport Layer Security (TLS) data stream:
Protecting DataTo ensure the integrity of data in a file or email, you can use digital signatures. For functions to create and evaluate digital signatures and to encrypt and decrypt data, use Apple’s implementation of the Common Data Security Architecture (CDSA). For pointers to CDSA, see the Security topic page. The sample code CryptoSample contains source code and example programs for encryption and for message digest creation. Message digests are used in digital signatures. Next StepsThe Security Reference Library includes the following high-level resource pages, which can be bookmarked for easy access:
|
© 2003, 2006 Apple Computer, Inc. All Rights Reserved. (Last updated: 2006-05-23)
|