You will need to install the. Once you have done that, the easiest thing is to either use the Xcode IDE or use gcc, or nowadays better cc (the clang LLVM compiler), from the command line.According to Apple's site, the latest version of Xcode (3.2.1) only runs on Snow Leopard (10.6) so if you have an earlier version of OS X you will need to use an older version of Xcode. Your Mac should have come with a Developer Tools DVD which will contain a version that should run on your system. Also, the Apple Developer Tools site still has older versions available for download. Xcode 3.1.4 should run on Leopard (10.5). Just for the record in modern times, for 2017!1 - Just have updated Xcode on your machine as you normally do2 - Open terminal and $ xcode-select -installit will perform a short install of a minute or two.3 - Launch Xcode.
'New' 'Project'. You have to choose 'Command line tool'Note - confusingly this is under the 'macOS' tab.Select 'C' language on the next screen.4- You'll be asked to save the project somewhere on your desktop. The name you give the project here is just the name of the folder that will hold the project.
It does not have any importance in the actual software.5 - You're golden! You can now enjoy c with Mac and Xcode. Ondrasej is the 'most right' here, IMO.There are also gui-er ways to do it, without resorting to Xcode. I likeMac OS X includes Developer Tools, a developing environment for makingMacintosh applications.
However, if someone wants to study programmingusing C, Xcode is too big and too complicated for beginners, to writea small sample program. TryC is very suitable for beginners.You don't need to launch a huge Xcode application, or type unfamiliarcommands in Terminal. Using TryC, you can write, compile and run a C,C and Ruby program just like TextEdit. It's only available tocompile one source code file but it's enough for trying sampleprograms.
Hvordan Kan Jeg Lage En Cd For Mac Rating: 5,0/5 5152 reviewsVersions: Operations Area Working Group S. Winter Internet-Draft RESTENA Intended status: Standards Track February 10, 2014 Expires: August 14, 2014 A Configuration File Format for Extensible Authentication Protocol (EAP) Deployments Abstract This document specifies a file format for transfering configuration information of deployments of the Extensible Authentication Protocol (EAP).The latest Tweets from MAC Cosmetics (@MACcosmetics). The official MAC Cosmetics account. Tweeting for All Ages, All Races, All Genders. Support Communities / iLife / iMovie for Mac Looks like no one’s replied in a while.
To start the conversation again, simply ask a new question. User profile for user: PAF-NO PAF-NO. Question: Q: Hvordan kan jeg lage en DVD fra iMovie 10.0.1 More Less. Apple Footer.Such configuration files are meant to be discovered, consumed and used by EAP supplicant software to achieve secure and automatic EAP configuration on the consuming device. Status of This Memo This Internet-Draft is submitted in full conformance with the provisions of.
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as 'work in progress.' This Internet-Draft will expire on August 14, 2014.
Copyright Notice Copyright (c) 2014 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to and the IETF Trust's Legal Provisions Relating to IETF Documents in effect on the date of publication of this document.Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in.e of Winter Expires August 14, 2014 Page 1 Internet-Draft EAP Metadata File Format February 2014 the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License.
Table of Contents. Problem Statement. Other Approaches. Requirements Language. XML Schema for EAP Metadata File Format.Location of XML Schema and Sample XML file. Description of Schema Elements.
Overall structure.Internationalisation / Multi-language support. Issuer Authentication, Integrity Protection and Encryption of EAP Metadata configuration files. File Discovery. By MIME-Type: application/eap-config. By filename extension.eap-config. By network location: SCAD. Existing Implementations.Design Decisions.
Why XML and not $FOO?Deep definition of EAP method properties. EAP tunneling inside EAP tunnels. Placement of inside. Security Considerations. IANA Considerations. Normative References.
Informative References.: MIME Type Registration Template.Problem Statement The IETF has produced the Extensible Authentication Protocol (EAPand numerous EAP methods (for example EAP-TTLS, EAP-TLS and ); the methods have many properties which need to be setup on the EAP server and matched as configuration items on the EAP peer for a secure EAP deployment. Winter Expires August 14, 2014 Page 2 Internet-Draft EAP Metadata File Format February 2014 Setting up these configuration items is comparatively easy if the end-user devices which implement the EAP peer functionality are under central administrative control, e.g.
In closed enterprise environments. Group policies or device provisioning by the IT department can push the settings to user devices. In other environments, for example 'BYOD' scenarios where users bring their own devices which are not under enterprise control, or in EAP- based WISP environments (see e.g.and ) where it is not desired neither for the ISP nor for his user that the device control is in the ISPs hands, configuration of EAP is significantly harder as it has to be done by potentially very non-technical end users. Correct configuration of all EAP deployment parameters is required to make the resulting authentications o functional (i.e. The end user can authenticate to an EAP server at all) o secure (i.e. The end user device can unambiguously authenticate the EAP server prior to releasing any sensitive client-side credentials) o privacy-preserving (i.e. The end user is able to conceal his username from the EAP authenticator) It would be desirable to be able to convey the EAP configuration information of a deployment in a machine parseable way to the end- user device, so that all the gory details need not be known/ understood by the user.
Instead, the EAP peer software on the device could consume the configuration information and set up all EAP authentication details automatically. However, there is currently no standard way of communicating configuration parameters about an EAP setup to the EAP peer.This specification defines such a file format for EAP configuration metadata. The specification allows for unique identification of an EAP identity provider by scoping it into a namespace and giving it a unique name inside that namespace.Using this unique identification, other configuration files (e.g. Which detail an Enterprise Wi-Fi setup) can then refer to this particular instance of EAP identity information as authentication source. Winter Expires August 14, 2014 Page 3 Internet-Draft EAP Metadata File Format February 2014. Other Approaches Device manufacturers sometimes have developed their own proprietary configuration formats, examples include Apple's 'mobileconfig' (MIME type application/x-apple-aspen-config), Microsoft's XML schemata for EAP methods for use with the command-line 'netsh' tool, or Intel's 'PRO/Set Wireless' binary configuration files.
The multitude of proprietary file formats and their different levels of richness in expression of EAP details create a very heterogenous and non- interoperable landscape. New devices which would like to benefit from machine-parseable EAP configuration currently either have to choose to follow a competitor's approach and use that competitor's file format or have to develop their own.This situation is very unsatisfactory. Requirements Language In this document, several words are used to signify the requirements of the specification. The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', 'SHALL NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', 'MAY', and 'OPTIONAL' in this document are to be interpreted as described in.
XML Schema for EAP Metadata File Format. Location of XML Schema and Sample XML file The schema files are currently hosted on this preliminary location: o Schema: o Sample.Description of Schema Elements. Overall structure The root element is the tag, which contains a sequence of elements; these carry the actual installer information. In most practical applications, the will contain only a single element; a longer list can be used for metadata transfers between systems or to allow users to select from a set of providers in one file.Winter Expires August 14, 2014 Page 4 Internet-Draft EAP Metadata File Format February 2014 Every has two attributes which make it globally unique: one attribute is the 'namespace' attribute which defines the namespace inside which this EAPIdentityProvider is unique; the other attribute is the 'ID' attribute which specifies the unique name inside the namespace.
The element contains the following sub- elements: o zero or one timestamp with an indication of possible expiry of the information in the configuration file. EAP peers importing the configuration file can use this information for example to re-assess whether the account is still valid (e.g.If the ValidUnil timestamp has passed, and authentication attempts consistently fail, the supplicant should consider the information stale and ask the user to verify his access authorisation with the EAP identity provider) o exactly one block contains a list of EAP methods which the EAPIdentityProvider supports. This element is described in more detail in section o zero or one blocks provide additional information about the EAPIdentityProvider, e.g. A logo to allow visual identification of the provider to the user in a user interface, or Acceptable Use Policies pertaining to the use of this EAP identity. This element is described in more detail in section o zero or more elements with undefined structure for cases where particular implementations of this specification need to convey additional data which is not covered by the other elements of this specification and does not require cross-vendor interoperability. The attribute 'vendor' of the element MUST contain the vendor's IANA Enterprise Number.Is a sequence of elements.
Each such element specifies the properties of one supported authentication method with various elements.These elements are enumerated in section The set of configuration parameters depends on the particular EAP method to be configured. For instance, EAP-PWD does not require any server certificate parameters; EAP-FAST and TEAP are the only ones making use of Protected Access Credential (PAC) provisioning. On the other hand, properties such as outer ('anonymous') identity or the need for a trusted root Certification Authority are common to several EAP Winter Expires August 14, 2014 Page 5 Internet-Draft EAP Metadata File Format February 2014 methods. The server- and client-side credential types of EAP methods are defined as a flat list of elements to choose from (see and below); see section for a rationale. Where the sequence of elements contains more than one element, the order of appearance in the file indicates the server operator's preference for the supported EAP types; occurences earlier in the file indicate a more preferred authentication method.When a consuming device receives multiple elements, it should attempt to install more preferred methods first. If the configuration information for that method is insufficient (e.g.The is EAP-TLS, but the configuration file does not contain the client certificate/private key and the device's credential store is not pre-loaded with the client's certificate), the device should query whether the more preferred method should be used (requiring the user to supplement the missing data) or whether a less-preferred method should be configured. In non-interactive provisioning scenarios, all methods should be tried in order until one method can be installed; if no method can be installed in a fully automated way, provisioning is aborted.
Authentication Method Properties The element contains o exactly one element, which is an integer of the EAP method identifier as assigned by IANA o zero or one elements which are a complex type containing elements which define means to authenticate the EAP server to the EAP peer (for a list of these elements, see section ) o zero or one elements which are a complex type containing elements which define means to authenticate the EAP peer to the EAP server (for a list of these elements, see section ) o zero or more elements. Elements of this type indicate that a tunneled EAP method is in use, and that further server-side and/or client-side credentials are defined inside the tunnel.The presence of more than one InnerAuthenticationMethod indicates that EAP Method Chaining is in use, i.e. That several inner EAP methods are to be executed in sequence inside the tunnel.Winter Expires August 14, 2014 Page 6 Internet-Draft EAP Metadata File Format February 2014 The element itself contains the same, and as described in the preceding list, but differs in two points: o It can optionally contain the element (an enumerated integer of authentication methods not based on EAP) instead of because some tunneled EAP types do not necessarily contain EAP inside the tunnel (e.g. TTLS-PAP, TEAP). Note that the XML Schema formally allows to specify both. This situation MUST NOT occur in configuration files to ensure deterministic interpretability. O It can NOT contain further elements because establishing a secure tunnel inside an already established secure tunnel is considered a pathological case which needs not be considered.
Hvordan Kan Jeg Lage En Cd For Mac On Windows
See section for a rationale.Properties The server-side authentication of a mutually authenticating EAP method is typically based on X.509 certificates, which requires the EAP peer to be pre-provisioned with one or more trusted root Certification Authority prior to authenticating. A server is uniquely identified by presenting a certificate which is signed by these trusted CAs, and by the EAP peer verifying that the name of the server matches the expected one.
Consequently, a (set of) CAs and a (set of) server names make up the ServerSideCredentials block.Note that different EAP methods use different terminology when referring to trusted CA roots, server certificates, and server name identification. They also differ or have inherent ambiguity in their interpretation on where to extract the server name from (e.g. Is the server name the CN part of the DistinguishedName, or is the server name one of the subjectAltName:DNS entries; what to do if there is a mismatch?). This specification introduces one single element for CA trust roots and naming; these notions map into the naming of the particular EAP methods very naturally.This specification can not remove the CN vs. SAN:DNS ambiguity in many EAP methods.
O zero or more elements: a Certification Authority which is trusted to sign the expected server certificate. The set of elements SHOULD contain self-signed root certificates to establish trust, and MAY contain additional intermediate CA certificates which ultimately root in these self-signed root CAs. A configuration file can, but SHOULD NOT include only an intermediate CA certificate (i.e.Without also including the corresponding self-signed root) because trusting only an Winter Expires August 14, 2014 Page 7 Internet-Draft EAP Metadata File Format February 2014 intermediate CA without being able to verify to a self-signed root is an unsupported notion in many EAP peers. O zero or more elements: these elements contain the expected server names in incoming X.509 EAP server certificates. For EAP methods not using X.509 certificates for their mutual authentication, these elements contain other string-based handles which identify the server (Example: EAP-pwd).Properties There is a variety of means to identify the EAP peer to the EAP server.
EAP methods use a subset of these criteria. As with server- side credentials, the terminology for the credential type may differ slightly between EAP types.The naming convention in this specification maps nicely into the method-specific terminology. Not all the criteria make sense in all contexts; for EAP methods which do not support a criterion, configuration files SHOULD NOT contain the corresponding elements, and consumers of the file MUST ignore these elements. Specifying any one of these elements is optional and they can occur at most once.Consumers of configuration files MUST be able to fall back to user-interactive configuration for these parts if they are not specified (e.g. Ask for the username and password for an EAP method during import of the EAP configuration data). Configuration files which do contain sensitive elements such as MUST be handled with due care after the import on the device (e.g. Ensure minimal file permissions, or delete the source file after installing).The element has an attribute 'allowsave'; if it is set to false, sensitive parts of the client- side credentials MUST NOT be permanently saved on the device.
See also section for transport security considerations. Is typcially used on the outside of a tunneled EAP method and allows to specify which user identity should be used outside the tunnel. This string is not used for actual user authentication, but may contain routing hints to send the request to the right EAP server. Contains the actual username to be used for user authentication. For tunneled EAP methods, this element SHOULD only occur in the 's - if differing outer identities are not desired in the deployment, the element should be populated for the element; but may contain the actual username then.Winter Expires August 14, 2014 Page 8 Internet-Draft EAP Metadata File Format February 2014 contains a X.509 certificate and private key; if the key is protected, the element MAY be used to indicate the passphrase, see below contains the passphrase needed to unlock a cryptographic credential internally on the device (i.e. It is not used itself for the actual authentication during the EAP conversation) contains the user's password, or an otherwise secret string which the user needs to authenticate to the EAP server contains the Protected Access Credential, typically used in EAP-FAST and TEAP. Is a boolean which indicates whether a PAC should be provisioned on the first connection.
Note that the specification allows to use without a CA nor ServerID in. While this allows the operation mode of 'Anonymous PAC Provisioning' as used in EAP- FAST, due to the known security vulnerabilities of anonymous PAC provisioning, this combination SHOULD NOT be used. This specification needs to consider that user interaction during the installation time may be required; the user at the very least must be empowered to decide whether the configuration file was issued by a provider he has an account with; the provider may have hints for the user (e.g. Hvordan Kan Jeg Lage En Cd For MacWhich password to use for the login), or may want to display links to helpdesk pages in case the user has problems with the setup or use of his identity. The element allows to specify a range of potentially useful information for display to the user (some of which is relevant only during installation time, other pieces of information could be retained by the EAP peer implementation and displayed e.g. In case of failed authentication): o specifies a user-friendly name for the EAP Identity Provider.
Hvordan Kan Jeg Lage En Cd For Macbook Pro
Consumers of this specification should be aware that this is simple text, and self-asserted by the producer of the configuration file.If more authoritative information about the issuer is available (e.g. If the file is signed with S/MIME and carries an Organisation name (O attribute) in the signing certificate) then the more authoritative information should be displayed with more prominence than the self-asserted one. Winter Expires August 14, 2014 Page 9 Internet-Draft EAP Metadata File Format February 2014 o specifies a generic descriptive text which should be displayed to the user prior to the installation of the configuration data. O specifies the approximate geograhic location(s) of the EAP Identity Provider and/or his Points of Presence.This can be useful if the configuration file contains multiple elements; the user device can then make an informed guess which of the Identity Providers could be a good match to suggest to the user o specifies the logo of the EAP Identity Provider. The same self-assertion considerations as for above apply. O contains terms of use to be displayed to and acknowledged by the user prior to the installation of the configuration on the user's system o is a complex element with three possible sub-elements:, and, all of which can be displayed to the user.Internationalisation / Multi-language support Some elements in this specification contain text to be displayed in User Interfaces; depending on the user's language preferences, it would be desirable to present the information in a local language. Other elements contain contact information, and those contact points may only be able to handle requests in a number of languages; it may be desirable to present only contact points to the user which are compatible with his language capabilities.
All elements which either contain localisable text, or which point to external resources in localised languages, have an optional 'lang' attribute. The elements can occur more than once in the specification, which enables an iteration of the element in all applicable languages. If the 'lang' attribute is omitted or 'lang' is set to 'C', the instance of the element is considered a default choice which is to be displayed if no other instance is a better match.
If the entire file content consistently uses only one language set, e.g. All the elements are to be treated as 'default' choices, the language can also be set for the entire element in its own 'lang' attribute.Winter Expires August 14, 2014 Page 10 Internet-Draft EAP Metadata File Format February 2014.
Issuer Authentication, Integrity Protection and Encryption of EAP Metadata configuration files S/MIME or underlying transport security. Nuff said:-).File Discovery. By MIME-Type: application/eap-config For transports where the categorisation of file types via MIME types is possible (e.g. HTTP, E-Mail), this document assigns the MIME type application/eap-config Edge devices can associate this MIME type to incoming files on such transports, and register the application which can consume the EAP Metadata as the default handler for this file type.
By doing so, for example a single click or tap on a link to the file in the device's browser will invoke the configuration process. This method of discovery is analogous to the Apple 'mobileconfig' discovery on recent versions of Mac OS and iOS. By filename extension.eap-config In situations where file types can not be determined by MIME type meta-information (e.g.
When the file gets stored on a local filesystem), this document RECOMMENDs that EAP Metadata configuration files be stored with the extension.eap-config to identify the file as containing EAP Metadata configuration information.Edge devices can register the application which can consume the EAP Metadata with this file extension. By doing so, for example a single click or tap on the filename in the device's User Interface will invoke the configuration process.
By network location: SCAD. Existing Implementations Producers of the configuration files o eduroam Configuration Assistant Tool: this existing tool already produces EAP configuration files in various proprietary formats for hundreds of EAP Identity Providers. The authors of this Winter Expires August 14, 2014 Page 11 Internet-Draft EAP Metadata File Format February 2014 specification will add a module which will produce configuration files in the file format as specified in this document. Consumers of the configuration files o Android: the authors of this specification are currently developing an App for the Android operating system (compatible with API level 18 of Android, i.e.
Hvordan Kan Jeg Lage En Cd For Mac
Version 4.3 and above) which can consume the file format as defined in this draft specification and configure EAP via the WifiEnterpriseConfig API.O Linux: the authors of this specification are currently developing an application for UNIX-like operating systems which configure enterprise networks via the NetworkManager daemon; the application can consume the file format as defined in this draft specification and configure the settings via Networkmanager's D-BUS interface. Design Decisions. Why XML and not $FOO?