The VMware Tunnel uses unique certificates for authentication and encryption between end-user applications and the VMware Tunnel.

IApp Certificate Authentication and Encryption

When an application for corporate access through the VMware Tunnel, AirWatch automatically deploys a unique X.509 certificate to enrolled devices. This certificate can then be used for mutual authentication and encryption between the application and the VMware Tunnel. Unlike other certificates used for Wi-Fi, VPN, and email authentication, this certificate resides within the application sandbox and can only be used within the specific app itself. By using this certificate, the VMware Tunnel can identify and allow only approved, recognized apps to communicate with corporate systems over HTTP(S), or, for Per-App Tunneling, TCP and HTTP(S).

Per-App Tunnel

See Per-App Tunneling Overview.

Secure Internal Browsing

By using the VMware Tunnel with VMware Browser, you can provide secure internal browsing to any intranet site and Web application that resides within your network. Because VMware Browser has been architected with application tunneling capabilities, all it takes to enable mobile access to your internal Web sites is to enable a setting from the AirWatch Console. By doing so, VMware Browser establishes a trust with VMware Tunnel using an AirWatch-issued certificate and accesses internal Web sites by proxying traffic through the VMware Tunnel over SSL encrypted HTTPS. IT can not only provide greater levels of access to their mobile users, but also remain confident that security is not compromised by encrypting traffic, remembering history, disabling copy/paste, defining cookie acceptance, and more.