About Derived Credentials with MobileIron

Smart cards contain identity certificates that give your users access to various computing resources without using passwords. The identity certificates make up the user’s primary credential. A derived credential:

derives from the primary credential.

The derived credential contains identity certificates derived from the primary credential’s identity certificates. Therefore, if the primary credential becomes revoked or expired, the derived credential also becomes revoked or expired.

is an X.509 public key certificate
is stored on the user’s mobile device.

Apps on the user’s iOS or Android mobile device can use these derived identity certificates for these purposes:

Table 1. Purposes for using derived credentials

Purpose

Supported platforms

Authenticating to your backend servers, such as web servers, app servers, or content servers

iOS and Android

Authenticating to your backend email server

iOS and Android

Digital signing

iOS and Android

Encryption

iOS and Android

Decryption of older emails when the certificate that had been used for encryption has expired

iOS

Authenticating the user to Standalone Sentry when using AppTunnel with Kerberos authentication to the backend server

iOS

Typically, a different identity certificate is used for authentication, signing, encryption, and the expired certificates used for decryption. The identity certificates each have the same identity information, but the private and public key pair for each is different.