conpal LAN Crypt for iOS / iPadOSPDF ⤓
- What is conpal LAN Crypt for iOS / iPadOS?
- Supported encryption algorithms for file encryption
- General preparations and setup
- Rolling out policy files and certificates using MDM
- Deleting policy file and user certificate
- Open, edit, encrypt, decrypt and share files
- Technical support
- Legal notice
What is conpal LAN Crypt for iOS / iPadOS?
conpal LAN Crypt for iOS / iPadOS enables users to work with their encrypted data remotely, by using their mobile devices, such as smartphones or tablets.
With transparent file encryption on Windows / macOS, conpal LAN Crypt enables the secure exchange of confidential data within authorization groups in small, medium and large organizations. Numerous companies, business organizations and the public administration in Germany and worldwide are already relying on conpal LAN Crypt.
A Security Officer (SO) determines centrally, which files and storage locations should be protected by conpal LAN Crypt and defines which users are allowed to have access to specific data by setting one, or several encryption rules. As an example, the Security Officer (SO) can ensure that all Word documents in a specific file storage path are encrypted, by creating an encryption rule on the defined path, e.g., “\Servername\Files*.docx”. As soon as this rule is transferred to the client computer via a policy file, created with the conpal LAN Crypt Administration console, all Word documents in this path will be encrypted from now on. Additionally, you can combine one or more encryption rules to one encryption profile.
This applies to all files, independently of where the files are stored. You can access all conpal LAN Crypt encrypted files that are either stored locally, on a network storage or on a remote storage (e.g., cloud storage). A user can easily access the same conpal LAN Crypt encrypted files, that are also available on his workstation computer.
conpal LAN Crypt for iOS / iPadOS enables users to use their mobile devices, such as iPhone or iPad, to work with their encrypted data.
This release of conpal LAN Crypt for iOS / iPadOS allows the user to open, edit and save encrypted files and access them per se and moreover extends the usual conpal LAN Crypt security infrastructure by using certificates (.p12 files) and policy files (.xml.bz2) on mobile devices.
conpal LAN Crypt 2Go
With the new built-in conpal LAN Crypt 2Go you can also encrypt and decrypt files based on passwords. This allows you to easily and securely exchange information with other people, such as your business partners or even external employees.
Sophos SafeGuard Enterprise encrypted files
With conpal LAN Crypt for iOS / iPadOS you can also decrypt files that are encrypted with Sophos SafeGuard Enterprise. All you need for this is the corresponding key. For this to work, such keys must be exported from Sophos SafeGuard Enterprise and imported into conpal LAN Crypt Administration for Windows. More information is available at sgn-en.conpal.de. A step-by-step guide to migration is available via the Red Book “SafeGuard Enterprise: Migration file encryption in 5 steps”.
Which iOS / iPadOS-Versions are supported?
conpal LAN Crypt for iOS / iPadOS supports iOS / iPadOS 14 and newer versions.
conpal LAN Crypt for iOS / iPadOS is available in German and English.
Supported encryption algorithms for file encryption
Supported encryption algorithms for file encryption
conpal LAN Crypt for iOS / iPadOS supports the following encryption algorithms:
AES-256 Bit (XTS-Mode)
AES-256 Bit (CBC-Mode)
AES-128 Bit (XTS-Mode)
AES-128 Bit (CBC-Mode)
Supported encryption algorithms for key wrapping
conpal LAN Crypt for iOS / iPadOS supports the following encryption algorithms for key wrapping:
Supported, but not recommended: 3DES, 3DES TWO KEY, DES, RC4
With key wrapping (default setting), the transport key of the Security Officer data and the user profile data will be encrypted with a randomly generated session key, using the selected algorithm (AES is used by default). This key, on the other hand, is then RSA-encrypted using the public key from the certificate.
Please note that in comparison to conpal LAN Crypt for Windows, the algorithm “RC2” is not supported by conpal LAN Crypt for iOS / iPadOS. If the key wrapping for your policy file is set to this algorithm, the policy file cannot be used with conpal LAN Crypt for iOS / iPadOS. In that case, you have to change the key wrapping encryption algorithm and choose an algorithm that is supported. (e.g., AES-128).
General preparations and setup
For security reasons, the conpal LAN Crypt app requires a passcode to be set for the device. When the app becomes active, it checks for the presence of a device passcode and if it finds that the device is not protected, it blocks usage until a device passcode has been set. Never use an easy-to-guess passcode, such as “1234” or “000000”. Only with a secure passcode you can prevent unauthorized access to your confidential data, in case your device is lost or stolen. In general, conpal recommends to erase the policy file and certificate on your Apple device, if the device is not in use for a longer period of time, or if you exchange your device for a new one (see Deleting policy file and user certificate).
- When the device passcode is turned off, the user certificate password is removed and must be re-entered after the device passcode is turned on again.
Providing the configuration data
After leaving the conpal LAN Crypt for iOS / iPadOS welcome screen, you will be prompted to provide the configuration data:
- If SMB shares are used to distribute configuration files, the settings view shows an additional Network section. This allows to clear or enter the SMB credentials. When deleting the SMB credentials, downloaded configuration files are deleted as well.
Managing encryption keys
Managed keys and password-based keys can be both found within the settings. Managed keys originate exclusively from the given policy file, whereas password-based keys can be freely created, renamed and deleted inside the related settings. Renaming a key does not change the generated key used for encryption.
Password-based keys can also be created within the action of encrypting a file. These keys are then automatically added to the saved list of password-based keys.
By successfully decrypting a file with a password-based key, the used key will also be automatically added to the saved list of password-based keys.
Passwords used for generating password-based keys can also still be inspected after they have been created.
What are conpal LAN Crypt policy files?
A Security Officer (SO) centrally defines via the Administration of conpal LAN Crypt which files and storage locations are to be protected by conpal LAN Crypt with encryption and also which users have access to which of these data. For this purpose, the Security Officer creates one or more encryption rules for the user. Each individual encryption rule consists of an encryption path, a key and an encryption algorithm. conpal LAN Crypt policy files contain all encryption rules, that the user requires, in order to be able to work with encrypted data. For the user to be able to use the policy file, he/she needs a certificate, which will be provided to him/her as a key file (.p12 file) by the conpal LAN Crypt Security Officer. The key file contains the certificate and the private key of the user. The access to the key file is secured by a password. The user will receive the password through his Security Officer. Before importing the policy file and the key file to the mobile device, the files have to be copied to a location that is accessible via the mobile device. This can be a private folder in OneDrive, iCloud or on a network share. Alternatively, you can copy the key file directly into the storage of the mobile device, by connecting it to the PC via USB or WLAN. For the direct connection between two Apple devices, you also have the option to share via AirDrop, which supports Wi-Fi as well as Bluetooth.
Import your policy file
Open the app conpal LAN Crypt for iOS / iPadOS on your mobile device. Then tap on the user icon in the LAN Crypt history (file browser) in the app in the upper right corner to open the settings view. There, tap on the selection Policy File and then choose the storage location in which the policy file is located. Then tap the policy file. The policy file will be imported into your mobile device.
Import your user certificate
Open the app conpal LAN Crypt for iOS / iPadOS on your mobile device. Then tap on the user icon in the LAN Crypt history (file browser) in the app in the upper right corner to open the settings view. There, tap on the selection User Certificate and choose the location that contains the key file (.p12). Tap the certificate file (.p12). The file will appear in your file browser. In the following dialog, enter the password that you received from the Security Officer for your certificate / key file and confirm your entry by tapping OK. If you entered the correct password, the certificate and the corresponding personal key will be imported into the conpal LAN Crypt for iOS / iPadOS app.
- conpal LAN Crypt for iOS / iPadOS also supports referencing multiple user certificates in the policy file. In order to be able to use the policy file, the user must have at least one of the certificates that have been issued to him and whose public key is used to encrypt the policy file, and of course he must also have imported it.
Display certificate details
Open the app conpal LAN Crypt for iOS / iPadOS on your mobile device. Then tap on the user icon in the LAN Crypt history (file browser) in the app in the upper right corner to open the settings view. There, tap on the selection User Certificate. The next dialog will show you more details about this certificate, such as the Subject and the Serial Number. If the certificate is not trusted, this is also indicated at this point.
Rolling out policy files and certificates using MDM
In addition to the app, you can use a Mobile Device Management (MDM) solution to deploy the individual configuration (policy file and certificate) for the mobile devices in addition to the app itself. If you do not have a Mobile Device Management (MDM) solution at your disposal, the configuration data (policy file and certificate) must be imported by each user manually, as described above.
Configuration data is a list of key+string tuples. Files must be provided as Base64-encoded strings, via URL, hosted on a HTTPS or SMB server. The following configuration keys are offered by conpal LAN Crypt:
policy_blob: Policy XML or XML.bz2 file as Base64-encoded (STRING).
policy_url: URL to a policy XML or XML.bz2 file (STRING).
User Certificate / P12 file
usercert_blob: Certificate PKCS-12 file as Base64-encoded (STRING).
usercert_url: URL to a certificate PKCS-12 file (STRING).
Security Officer Certificate
admcert_blob: Security Officer Certificate (.cer) file (DER encoded) as Base64-encoded (STRING).
admcert_url: URL to a Security Officer Certificate (.cer) file (DER encoded) (STRING).
default_key_guid: GUID of the key that must be used for encryption of new files (STRING).
- If this key is set, the user is not allowed to change the encryption key (forced encryption key). However, he can always use a password-based key for encryption (which results in an encrypted copy of the original file).
smb_username: If one of the policy or user cert settings refers to a SMB location, the user name for the SMB connection can be configured with this key (STRING).
- If the value is not set, the user is asked to enter the user name. Due to security reasons, the password for the SMB connection has always to be entered by the user.
cert_validation: Enables the certificate validation. Validation is disabled if setting is missing (BOOLEAN).
- The validation is disabled if the setting is missing.
- Managed settings cannot be changed or overruled by the user.
- URLs must be hosted on HTTPS servers with a valid SSL certificate. You can verify this by entering the URL in a browser on the mobile device (e.g., Chrome, Safari). If the file can be shown, the URL will also work as configuration value.
- If both BLOB and URL are supported for a setting, the BLOB has priority.
- If the data BLOB or URL of a setting is invalid, an error is shown.
- When using URLs for SMB shares, username and passwords will be ignored (use smb_username instead) (smb://localfileserver/certificates/sepp.p12)
/ / /
- There are no documented maximum lengths for configuration strings but size of the strings should not be bigger than a few kilobytes.
WARNING - Intune and Base64-encoding of strings for iOS configuration data:
- When using Microsoft Intune and providing Base64-encoded strings: use XML configuration file format, as strings otherwise are cut by Intune without warning and incomplete data will be pushed to the device.
Deleting policy file and user certificate
Deleting the policy file
Open the conpal LAN Crypt for iOS / iPadOS app on your iPhone or iPad. Within the conpal LAN Crypt for iOS / iPadOS app, tap the user icon in the right top corner of the LAN Crypt Recents screen (file browser), to open the settings. On the right side, next to the policy file tap the Trash icon. Then tap Delete, if you really want to delete your policy file. Tap Cancel, if you do not want to continue deleting your policy file.
Deleting the user certificate
Open the conpal LAN Crypt for iOS / iPadOS app on your iPhone or iPad. Then tap the user icon in the upper right corner of the LAN Crypt history (file browser) to access the settings. From there, tap the Trash icon to the right of the user certificate. Then tap Delete, if you really want to delete your user certificate. Tap Cancel, if you do not want to continue deleting your user certificate.
Open, edit, encrypt, decrypt and share files
conpal LAN Crypt for iOS / iPadOS provides access to files that are stored locally on the mobile device, or on remote storage systems. The access to remote storage systems (e.g., on OneDrive or Google Drive), via the file browser, is protected by iOS sandbox security. The iOS sandbox security provides protected remote access, over file browsers, that are provided by apps installed on the device. Thus, a user can, for example, use the conpal LAN Crypt for iOS / iPadOS app to access data stored on OneDrive, provided that the OneDrive app is installed on your device. The access to Google Drive happens in a similar manner, if the associated app is installed on the mobile device.
How to access encrypted data?
There are various ways how you can access files using your iPhone or iPad. This can be done within the conpal LAN Crypt for iOS / iPadOS app via the file browser or from there via a proprietary app for cloud storage (such as OneDrive). With conpal LAN Crypt for iOS / iPadOS you can open encrypted and unencrypted files, edit them and save them encrypted. If the file was already encrypted, it will be encrypted even after editing. You can use your preferred apps to modify files, e.g., Microsoft Office can be used to edit documents, presentations, and spreadsheets. The document preview has an Edit button. This can also be used to forward a file to a third-party apps.
Open encrypted file
To open an encrypted file, use the conpal LAN Crypt app, browse to the location that contains the encrypted file and tap the file to open it. This file is then opened and decrypted directly via the integrated viewer of the conpal LAN Crypt app on your iPhone or iPad. For this purpose, conpal LAN Crypt for iOS / iPadOS QuickLook framework. All files always remain in the secure sandbox of the conpal LAN Crypt app when displayed and are therefore always optimally protected. On the storage location itself, however, this file remains encrypted. All encryption and decryption processes only occur on the mobile Apple device itself.
The QuickLook framework for iOS has limited editing support for certain file types:
PDF and image files: Mark-up support. Tap the pen-tip icon in the navigation bar when viewing the file.
Video files: Rotation and Trimming support. Tap the rotate or trim button in the navigation bar when viewing the file. Tapping the Done button saves the changes back to the original file.
Edit files with third-party apps
- Tap the Edit button in the document preview.
- Document preview is closed and the iOS share screen comes up. Select your application of choice.
- The third-party app comes up and presents the document. Work with the app as usual.
- When the third-party app writes the changes, conpal LAN Crypt for iOS / iPadOS makes sure that the changes are written to the original location, e.g., being uploaded to a cloud storage provider.
Display file encryption information
A badge icon in the right top corner of the thumbnail indicates if a file can be opened:
- green key: The file is encrypted and can be accessed.
- gray key: The file is plain and can be accessed.
red key: The file is encrypted and can not be accessed (the key is not available or the used encryption algorithm is not supported on mobile).
- For more information long-press a file to open the context menu. There you can select the option Encryption Info.
The Encryption Info dialog now shows you the following information about the file:
- Encryption State: Indicating if the file is encrypted or not.
- Key name: The name of the key used for encryption (only shown for encrypted files).
- Key Id: The GUID of the key used for encryption (only shown for encrypted files).
- Key availability: Indicating if the key is available in the policy (only shown for encrypted files).
- Supported on Mobile: Indicating if the used encryption algorithm is supported on the device (only shown for encrypted files where the algorithm is not supported).
Encrypt a file with a key from the policy file
To encrypt a file, first navigate to the location where the file is stored using the integrated file browser in the conpal LAN Crypt for iOS / iPadOS app. Long-press the file you want to encrypt. The context menu appears. Then tap the Encrypt option there. In the next dialog you can decide with which method you want to encrypt the file. In the middle part of the dialog your available keys are displayed. If a default encryption key was set up for you, it is marked there. Select the key you want to use to encrypt the file. Then tap Done in the upper right corner. The file is encrypted with the previously selected key.
If no default encryption key was set up for you, you can change the encryption key from the list by tapping on another available key. In that case, the file will be encrypted using that key instead of the previous selected key.
Unlike the encryption using a password-based key, the encryption with a key from the police file will encrypt the file in-place which makes the file inaccessible to read without the used key.
Encrypt and share as password-protected file (conpal LAN Crypt 2Go)
If you want to share a password-protected file, navigate to the location where the file is stored using the integrated file browser in the conpal LAN Crypt for iOS / iPadOS app. Long-press the file you want to encrypt. The context menu appears. Tap the Encrypt option there. Then tap the Share as password-protected file slider so that it is highlighted in green. Now you can either select a previously used password or create a new password for encryption. By creating a new password in this way, the password will automatically be saved on device and can be used to further encrypt and decrypt files. Password-based keys can also be found and edited in the settings menu. In the next dialog, select the app you want to use to share the file in encrypted form, or alternatively tap Save to Files, if you want to save the file in encrypted form to a folder in the iCloud for example. Using AirDrop, you can also share the encrypted file with a nearby device via Wi-Fi or Bluetooth.
The encryption requires a secure password! This must be at least 8 characters long and contain upper- and lower-case letters, numbers and special characters. The password used for the key can still be inspected later on in the settings.
The name given to the encryption password does not have any impact on the key used for encryption. The actual key value for encryption is generated separately.
Unlike the in-place encryption using a key from the police file, the encryption with a password-based key will not manipulate the original file and will instead create an encrypted copy of the file to then share.
Decrypt and share a file
To decrypt a file, first navigate to the location where the encrypted file is stored using the integrated file browser in the conpal LAN Crypt for iOS / iPadOS app. Long-press the file you want to decrypt. The context menu appears. Then tap the Decrypt option there. If the file is a password-protected file, an additional dialog may be displayed at this point. In this case, enter the required password in the Enter password field. In the next dialog, select the app you want to use to share the file decrypted or, alternatively, tap Save to Files, if you want to save the file decrypted to a different location. After that, tap Save in the top right corner. The file is shared decrypted or saved decrypted in the previously selected location.
If you choose the same location, another dialog will ask you if you want to replace the existing file.
By successfully decrypting a file with a password-based key, the used key will automatically be added to the saved list of password-based keys. The list of password-based keys can be found and edited in the settings. The password used for the password-based key can also be accessed there.
conpal LAN Crypt for iOS / iPadOS has a Verbose Logging feature. The usage of this feature is only intended for error analysis and should only be enabled if you encounter any errors or issues with the conpal LAN Crypt for iOS / iPadOS app.
Open the conpal LAN Crypt for iOS / iPadOS app on your iPhone or iPad. Within the conpal LAN Crypt for iOS / iPadOS app, tap the user icon in the right top corner of the LAN Crypt history (file browser), to open the settings. Move the slider to the right to enable the Verbose Logging feature. The Verbose Logging feature is enabled once the area around the slider button is colored green. Take the necessary steps to reproduce the error, to create the log files.
- In no case will the log files reveal sensitive information!
By using the Send Logs feature, you can send the log files, for analysis purposes, to the conpal support team by e-mail. To send the log files, tap the share icon, that appears to the right of Send Logs. Then select the app you use for your email communication. The log file will be attached as a compressed file (.zip) and sent to the team at firstname.lastname@example.org. To disable the Verbose Logging feature, move the slide button back to the left.
To access technical support for conpal products do the following:
All maintenance contract customers can access further information and/or knowledge base items at the following link support.conpal.de. As a maintenance contract customer, send an email to technical support using the email@example.com email address and let us know the exact version number, operating system and patch level of your conpal software and, if applicable, a detailed description of any error messages you receive or applicable knowledge base items.
Copyright © 2018 - 2023 conpal GmbH, 1996 - 2018 Sophos Limited and Sophos Group. All rights reserved. conpal®, AccessOn® and AuthomaticOn® are registered trademarks of conpal GmbH.
All other product and company names mentioned are trademarks or registered trademarks of their respective owners.
No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise unless you are either a valid license where the documentation can be reproduced in accordance with the license terms or you otherwise have the prior permission in writing of the copyright owner.
You find copyright information on third party suppliers in the 3rd Party Software document in your product directory.
Last updated 16.01.2023