CHAPTER1 Overview
C455HD | Users & Administrator's Manual
■ AudioCodesDeviceManager(partofAudioCodes'OVOCsuite)overHTTPS.
■ DebugginginterfaceoverSSH.NotethatSSHmustbedisabledbydefaultandenabledonly
perspecificcasefordebuggingpurposesonly.
AudioCodes Device Manager Validation
TheAudioCodesNativeTeamsdevicesvalidatetheAudioCodesDeviceManageridentityusinga
knowntrustedcertificate:
■ Thedeviceisshippedwithknowntrustedcertificateinstalled.SeeAudioCodesRootCA
Certificateonthenextpage.
■ Fortheinitialconnection,theAudioCodesDeviceManageraccessesdevicesusingaknown
trustedcertificate.
■ Onceasuccessfulsecuredconnectionhasbeenestablishedbetweenthedeviceandthe
DeviceManager,theusercanreplacethetrustedcertificateontheDeviceManagerandon
thephone,andre-establishtheconnectionleveraginganyPrivateTrustedCertificate.
Sandboxing
AudioCodesdevicesuseAndroidApplicationSandboxsothateachapplicationcanaccessits
owndataandisisolatedfromotherapplications.Thispreventsamaliciousappfromaccessing
thecodeorthedataofotherapplicationsinthesystem.
Device File System
TheAudioCodesdevice'sfilesystemisencryptedon455HDdevices.Customersmayenforcea
policyofdeviceencryptionviaMicrosoft'scloud-basedIntuneservice.
Keystore
WithAudioCodesdevices,thecertificatekeysareencryptedonthedevicefilesystem.
Device Certificate
AudioCodesdevicesareshippedwithauniquecertificatewhichissignedbyAudioCodesRoot
CA.Networkadministratorscaninstallathird-partycertificateonthephoneinthecustomer’s
trusted environment. Network administrators should follow the following guidelines when
replacingtheexistingdevicecertificate:
■ ThedevicecertificateURLwillonlybevalidifnoSCEPserverURLispresent
■ Usethefollowingtwoparameterstosetthedevicecertificateinthephone'sconfiguration
file:
● security/device_certificate_url=http://<server-ip>/device.crt
● security/device_private_key_url=http://<server-ip>/device.key
- 8 -