<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic When https inspection is on: Unable to connect to Apple ID server in Cloud Security</title>
    <link>https://community.cisco.com/t5/cloud-security/when-https-inspection-is-on-unable-to-connect-to-apple-id-server/m-p/3308547#M532</link>
    <description>&lt;P&gt;In our testing when HTTP inspection is turned on, iTunes will not allow us to log into an iTunes account in order to perform a backup of an IOS device (iPad / iPhone).&amp;nbsp; The error message is Unable to connect to Apple ID server.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Does anyone know the category used for Apple products where in Decryption policies I can change it from Monitor to Pass Through?&amp;nbsp; Quite possibly it doesn't like the MITM certificate, even though its trusted from our domain CA.&lt;/P&gt;
&lt;P&gt;We had to do this for Finance, Government and Law, Online Meetings (for webex), and a custom category for Microsoft and Adobe updates.&lt;/P&gt;</description>
    <pubDate>Sat, 09 Mar 2019 01:42:00 GMT</pubDate>
    <dc:creator>keithsauer507</dc:creator>
    <dc:date>2019-03-09T01:42:00Z</dc:date>
    <item>
      <title>When https inspection is on: Unable to connect to Apple ID server</title>
      <link>https://community.cisco.com/t5/cloud-security/when-https-inspection-is-on-unable-to-connect-to-apple-id-server/m-p/3308547#M532</link>
      <description>&lt;P&gt;In our testing when HTTP inspection is turned on, iTunes will not allow us to log into an iTunes account in order to perform a backup of an IOS device (iPad / iPhone).&amp;nbsp; The error message is Unable to connect to Apple ID server.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Does anyone know the category used for Apple products where in Decryption policies I can change it from Monitor to Pass Through?&amp;nbsp; Quite possibly it doesn't like the MITM certificate, even though its trusted from our domain CA.&lt;/P&gt;
&lt;P&gt;We had to do this for Finance, Government and Law, Online Meetings (for webex), and a custom category for Microsoft and Adobe updates.&lt;/P&gt;</description>
      <pubDate>Sat, 09 Mar 2019 01:42:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-security/when-https-inspection-is-on-unable-to-connect-to-apple-id-server/m-p/3308547#M532</guid>
      <dc:creator>keithsauer507</dc:creator>
      <dc:date>2019-03-09T01:42:00Z</dc:date>
    </item>
    <item>
      <title>Re: When https inspection is on: Unable to connect to Apple ID server</title>
      <link>https://community.cisco.com/t5/cloud-security/when-https-inspection-is-on-unable-to-connect-to-apple-id-server/m-p/3309162#M533</link>
      <description>&lt;P&gt;iTunes uses certificate pinning and is thus (as you surmised) resistant to MiTM decryption, even from authorized appliances.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You need to create a custom rule for iTunes to exempt its traffic from decryption.&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jan 2018 17:51:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-security/when-https-inspection-is-on-unable-to-connect-to-apple-id-server/m-p/3309162#M533</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-01-10T17:51:03Z</dc:date>
    </item>
    <item>
      <title>Re: When https inspection is on: Unable to connect to Apple ID server</title>
      <link>https://community.cisco.com/t5/cloud-security/when-https-inspection-is-on-unable-to-connect-to-apple-id-server/m-p/3311711#M534</link>
      <description>&lt;P&gt;Would you suggest to do an ARIN lookup on apple and just throw their owned IP's into a particular group, then apply that group to HTTPS Decryption and change it to pass-through?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Not sure if anyone out there already has one of these rules in place, and what is the most efficient way to detect its apple itunes.&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jan 2018 21:14:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-security/when-https-inspection-is-on-unable-to-connect-to-apple-id-server/m-p/3311711#M534</guid>
      <dc:creator>keithsauer507</dc:creator>
      <dc:date>2018-01-15T21:14:31Z</dc:date>
    </item>
    <item>
      <title>Re: When https inspection is on: Unable to connect to Apple ID server</title>
      <link>https://community.cisco.com/t5/cloud-security/when-https-inspection-is-on-unable-to-connect-to-apple-id-server/m-p/3312678#M535</link>
      <description>&lt;P&gt;The ARIN lookup scheme is something I have seen used successfully in a similar case. That was for ISE with BYOD where the end user needs a pre-auth ACL to allow access to the Google Play store to download the provisioning client.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jan 2018 09:46:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-security/when-https-inspection-is-on-unable-to-connect-to-apple-id-server/m-p/3312678#M535</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-01-17T09:46:26Z</dc:date>
    </item>
  </channel>
</rss>

