0% found this document useful (0 votes)
109 views65 pages

Pro iOS Security and Forensics Eric Butow all chapter instant download

Security

Uploaded by

anuardemmezr
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
109 views65 pages

Pro iOS Security and Forensics Eric Butow all chapter instant download

Security

Uploaded by

anuardemmezr
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 65

Download the Full Version of textbook for Fast Typing at textbookfull.

com

Pro iOS Security and Forensics Eric Butow

https://textbookfull.com/product/pro-ios-security-and-
forensics-eric-butow/

OR CLICK BUTTON

DOWNLOAD NOW

Download More textbook Instantly Today - Get Yours Now at textbookfull.com


Recommended digital products (PDF, EPUB, MOBI) that
you can download immediately if you are interested.

Programming Interviews For Dummies 1st Edition John Sonmez


Eric Butow

https://textbookfull.com/product/programming-interviews-for-
dummies-1st-edition-john-sonmez-eric-butow/

textboxfull.com

Pro iOS Testing: XCTest Framework for UI and Unit Testing


Avi Tsadok

https://textbookfull.com/product/pro-ios-testing-xctest-framework-for-
ui-and-unit-testing-avi-tsadok/

textboxfull.com

Practical Mobile Forensics A hands on guide to mastering


mobile forensics for the iOS Android and the Windows Phone
platforms 3rd Edition Rohit Tamma
https://textbookfull.com/product/practical-mobile-forensics-a-hands-
on-guide-to-mastering-mobile-forensics-for-the-ios-android-and-the-
windows-phone-platforms-3rd-edition-rohit-tamma/
textboxfull.com

iOS Penetration Testing: A Definitive Guide to iOS


Security 1st Edition Kunal Relan

https://textbookfull.com/product/ios-penetration-testing-a-definitive-
guide-to-ios-security-1st-edition-kunal-relan/

textboxfull.com
Pro iOS Testing: XCTest Framework for UI and Unit Testing
1st Edition Avi Tsadok

https://textbookfull.com/product/pro-ios-testing-xctest-framework-for-
ui-and-unit-testing-1st-edition-avi-tsadok/

textboxfull.com

Pro Spring Security 3rd Edition Masimo Nardone

https://textbookfull.com/product/pro-spring-security-3rd-edition-
masimo-nardone/

textboxfull.com

Financial Security For Dummies® Eric Tyson

https://textbookfull.com/product/financial-security-for-dummies-eric-
tyson/

textboxfull.com

Security Privacy and Forensics Issues in Big Data Advances


in Information Security Privacy and Ethics 1st Edition
Ramesh C. Joshi
https://textbookfull.com/product/security-privacy-and-forensics-
issues-in-big-data-advances-in-information-security-privacy-and-
ethics-1st-edition-ramesh-c-joshi/
textboxfull.com

Mobile Phone Security and Forensics A Practical Approach


2nd Edition Iosif I. Androulidakis (Auth.)

https://textbookfull.com/product/mobile-phone-security-and-forensics-
a-practical-approach-2nd-edition-iosif-i-androulidakis-auth/

textboxfull.com
Pro iOS
Security and
Forensics
Enterprise iPhone and iPad Safety

Eric Butow
Pro iOS Security
and Forensics
Enterprise iPhone and
iPad Safety

Eric Butow
Pro iOS Security and Forensics
Eric Butow
Jackson, California, USA

ISBN-13 (pbk): 978-1-4842-3756-4 ISBN-13 (electronic): 978-1-4842-3757-1


https://doi.org/10.1007/978-1-4842-3757-1
Library of Congress Control Number: 2018952358
Copyright © 2018 by Eric Butow
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or
part of the material is concerned, specifically the rights of translation, reprinting, reuse of
illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way,
and transmission or information storage and retrieval, electronic adaptation, computer software,
or by similar or dissimilar methodology now known or hereafter developed.
Trademarked names, logos, and images may appear in this book. Rather than use a trademark
symbol with every occurrence of a trademarked name, logo, or image we use the names, logos,
and images only in an editorial fashion and to the benefit of the trademark owner, with no
intention of infringement of the trademark.
The use in this publication of trade names, trademarks, service marks, and similar terms, even if
they are not identified as such, is not to be taken as an expression of opinion as to whether or not
they are subject to proprietary rights.
While the advice and information in this book are believed to be true and accurate at the date of
publication, neither the authors nor the editors nor the publisher can accept any legal
responsibility for any errors or omissions that may be made. The publisher makes no warranty,
express or implied, with respect to the material contained herein.
Managing Director, Apress Media LLC: Welmoed Spahr
Acquisitions Editor: Aaron Black
Development Editor: James Markham
Coordinating Editor: Jessica Vakili
Cover designed by eStudioCalamar
Cover image designed by Freepik (www.freepik.com)
Distributed to the book trade worldwide by Springer Science+Business Media New York,
233 Spring Street, 6th Floor, New York, NY 10013. Phone 1-800-SPRINGER, fax (201) 348-4505,
e-mail [email protected], or visit www.springeronline.com. Apress Media, LLC is a
California LLC and the sole member (owner) is Springer Science + Business Media Finance Inc
(SSBM Finance Inc). SSBM Finance Inc is a Delaware corporation.
For information on translations, please e-mail [email protected], or visit http://www.apress.
com/rights-permissions.
Apress titles may be purchased in bulk for academic, corporate, or promotional use. eBook
versions and licenses are also available for most titles. For more information, reference our Print
and eBook Bulk Sales web page at http://www.apress.com/bulk-sales.
Any source code or other supplementary material referenced by the author in this book is available
to readers on GitHub via the book’s product page, located at www.apress.com/978-1-4842-3756-4.
For more detailed information, please visit http://www.apress.com/source-code.
Printed on acid-free paper
For my grandmother,
Clara Butow (1912-2008), whose lessons,
spoken and unspoken, continue to teach me
Table of Contents
About the Author���������������������������������������������������������������������������������ix
Acknowledgments�������������������������������������������������������������������������������xi

Chapter 1: Preparing Security Features�����������������������������������������������1


What iPhones Are Eligible?�����������������������������������������������������������������������������������1
Enroll Your Devices�����������������������������������������������������������������������������������������������3
Create Your New Apple ID��������������������������������������������������������������������������������3
Add Your Business Details�������������������������������������������������������������������������������8
Wait Your Turn������������������������������������������������������������������������������������������������12
The Final Steps����������������������������������������������������������������������������������������������13
Now You Can Start����������������������������������������������������������������������������������������������14
Find Your MDM����������������������������������������������������������������������������������������������������15
Add Your MDM to DEP������������������������������������������������������������������������������������17
What’s Next?�������������������������������������������������������������������������������������������������19
Enroll a Device to Your MDM�������������������������������������������������������������������������������20
Sync with Apple DEP�������������������������������������������������������������������������������������������24
Setting Up Apps��������������������������������������������������������������������������������������������������24
Deploy Your App Catalog�������������������������������������������������������������������������������������26
Add an App����������������������������������������������������������������������������������������������������26
Add App Groups and Deploy��������������������������������������������������������������������������27
Push Assigned Apps��������������������������������������������������������������������������������������29
Manage Your Configurations�������������������������������������������������������������������������������30

v
Table of Contents

Chapter 2: Using Security Apps and Backup��������������������������������������33


Taking Specific Security Actions�������������������������������������������������������������������������34
Send a Message��������������������������������������������������������������������������������������������35
Lock the Screen���������������������������������������������������������������������������������������������36
Clear the Passcode����������������������������������������������������������������������������������������37
Wipe Data������������������������������������������������������������������������������������������������������38
Finding Security Apps in the App Store���������������������������������������������������������������39
Backing Up with iCloud and iTunes���������������������������������������������������������������������40
Backup to iCloud�������������������������������������������������������������������������������������������41
Backup to a Computer�����������������������������������������������������������������������������������42
Setting Up Supervision Mode������������������������������������������������������������������������������44
Add Devices to DEP���������������������������������������������������������������������������������������46
Add Devices in Apple Configurator����������������������������������������������������������������49
Create a New Group for Supervised iPhones������������������������������������������������56

Chapter 3: Connect to Your Network Securely������������������������������������63


Different Connection Types���������������������������������������������������������������������������������64
Virtual Private Networks (VPNs)��������������������������������������������������������������������65
Select and Install a VPN App�������������������������������������������������������������������������������66
Manage Your VPN from Your MDM�����������������������������������������������������������������69
Push Your Wi-Fi Connection��������������������������������������������������������������������������������73
Keep Your Employees Safe and Connected���������������������������������������������������������76
VPN over Wi-Fi�����������������������������������������������������������������������������������������������76
Using Wi-Fi in Public��������������������������������������������������������������������������������������77
How to Protect Your Employees���������������������������������������������������������������������78
Manage Your 4G Connections�����������������������������������������������������������������������������81

vi
Table of Contents

Chapter 4: Creating Policies���������������������������������������������������������������83


Company vs. Personal iPhones���������������������������������������������������������������������������84
Company iPhones������������������������������������������������������������������������������������������84
Personal iPhones�������������������������������������������������������������������������������������������86
Provisioning Policies for User Management�������������������������������������������������������87
Adding Roles in SimpleMDM�������������������������������������������������������������������������88
Adding a User in SimpleMDM������������������������������������������������������������������������90
Setting Advanced User Security Options�������������������������������������������������������91
Policies for Loss, Theft, and Damage������������������������������������������������������������������97
Before You Start Shopping�����������������������������������������������������������������������������97
AppleCare and Extended Plans����������������������������������������������������������������������99
Insurance�������������������������������������������������������������������������������������������������������99

Chapter 5: Communicating About Security��������������������������������������103


Communicate Your Policies�������������������������������������������������������������������������������104
Check Your Existing Policies������������������������������������������������������������������������104
Creating Policy Documents��������������������������������������������������������������������������105
Communicating Your Policy�������������������������������������������������������������������������111
Phishers are Fishing for You�����������������������������������������������������������������������������114
Look for the Hooks��������������������������������������������������������������������������������������114
Check and Communicate�����������������������������������������������������������������������������116
Staying Safe Browsing the Web������������������������������������������������������������������������117
Private Browsing in Safari���������������������������������������������������������������������������117
Block or Approve Websites in Supervised Mode�����������������������������������������122
Manage Passwords�������������������������������������������������������������������������������������126
Managing App Permissions�������������������������������������������������������������������������������127

vii
Table of Contents

Updating iOS and Apps Regularly���������������������������������������������������������������������128


Unsupervised Mode�������������������������������������������������������������������������������������129
Update from SimpleMDM����������������������������������������������������������������������������131

Chapter 6: Recovering from Loss or Attack�������������������������������������135


Using Find My iPhone���������������������������������������������������������������������������������������136
Adding iCloud����������������������������������������������������������������������������������������������136
Restricting iCloud Access����������������������������������������������������������������������������137
Activate Find My iPhone������������������������������������������������������������������������������137
Launch Find My iPhone�������������������������������������������������������������������������������140
Restrict Hackers from Turning Off Location Services����������������������������������142
Take Actions������������������������������������������������������������������������������������������������145
Using Recovery Mode���������������������������������������������������������������������������������������147
iPhone 8, iPhone 8 Plus, and iPhone X��������������������������������������������������������148
iPhone 7 and 7 Plus�������������������������������������������������������������������������������������150
iPhone 6s and 6s Plus���������������������������������������������������������������������������������151
Restoring the iPhone from DFU Mode���������������������������������������������������������������151
iPhone 8 and X Models��������������������������������������������������������������������������������152
iPhone 7 Models������������������������������������������������������������������������������������������153
iPhone 6 Models������������������������������������������������������������������������������������������153
If Nothing’s Working������������������������������������������������������������������������������������������155

Index�������������������������������������������������������������������������������������������������157

viii
About the Author
Eric Butow is the owner and CEO of Butow
Communications Group (BCG) in Jackson,
California, which offers online marketing
ROI improvement services for businesses.
He has used iPhones in his business since he
bought the 3G in 2008. Eric has authored
or co-authored 31 books, most recently
My Samsung Galaxy S7, Samsung Gear S2
for Dummies, and Instagram for Business
for Dummies. He has also developed and
taught networking, computing, and usability
courses for Ed2Go, Virtual Training Company,
California State University, Sacramento,
and Udemy.

ix
Acknowledgments
My thanks to the best literary agent on the planet, Carole Jelen. I also thank
and appreciate my editors, Jessica Vakili and Aaron Black, for all their help
and support. And I thank you for buying and reading this book.

xi
CHAPTER 1

Preparing Security
Features
With iOS security features as with most of Apple’s efforts, the company
strives to make it easy for its customers to use its products. In the case of
managing a large number of its devices in a corporate setting, Apple makes
the Device Enrollment Program (DEP) available on its website for network
administrators to set up iPhones (as well as iPads and Macs) without
having to configure each physical device.
After you sign up with DEP, you’ll talk with an Apple business
representative on the phone, as you’ll learn about later in this chapter.
During the call, you’ll learn whether you’re ready to go or if you need to
make some changes to qualify for DEP.

What iPhones Are Eligible?


Before you start enrolling in DEP, you need to take stock of the iPhones
you’re going to administer in your organization.
If your business purchased iPhones through its Apple business account
for business use only, and those devices were purchased after March 1,
2011, then you’re ready to enroll.

© Eric Butow 2018 1


E. Butow, Pro iOS Security and Forensics, https://doi.org/10.1007/978-1-4842-3757-1_1
Chapter 1 Preparing Security Features

Your business may have a Bring Your Own Device (BYOD) policy for
some or all its employees. If so, you can enroll each user’s personal iPhone
in DEP to manage. Apple determines if an iPhone is eligible for DEP by the
location where that iPhone was purchased. For example, if the iPhone was
purchased through a cellular carrier such as Verizon or AT&T, then Apple
may accept that iPhone into DEP.
An iPhone purchased directly from Apple using a consumer account is
not eligible. Your employee may be able to get their phone number moved
from a consumer to a business account so the phone can be added to
DEP. They will have to contact their cellular carrier to find out if they are
eligible and to go through the transfer process, which may take some time.

Note Check your employees’ phones to ensure they have the latest
version of iOS 11 installed so they have access to the latest security
and management features. If your company requires all the features
iOS 11 offers and one or more employees have older iPhones that
can’t run iOS 11, you will need to speak with those employees and/
or management to determine if those employees need to purchase a
new iPhone or be supplied with an iPhone assigned by your business.

2
Chapter 1 Preparing Security Features

Enroll Your Devices


Access the Device Enrollment Program website at https://www.apple.
com/business/dep/. Scroll down the page to view more information about
the program. Enrollment is a multi-part process, so get comfortable and
have your favorite beverage nearby before you start.

Create Your New Apple ID


The first step in the process is to create a new Apple ID. As part of the
application, you will have to enter a new email address for DEP that is
different from any other email address you use.

1. Click or tap Enroll Now shown in Figure 1-1.

Figure 1-1. The Enroll Now link appears near the top of the page

3
Chapter 1 Preparing Security Features

2. In the Welcome webpage, click or tap Enroll to the


right of the Device Enrollment Program description.
See Figure 1-2.

Figure 1-2. The Device Enrollment Program entry appears at the top
of the webpage

4
Chapter 1 Preparing Security Features

3. In the Your Details webpage, type your company


details into the appropriate boxes and then click
Next as shown in Figure 1-3.

Figure 1-3. The Your Details webpage is the first of four steps in the
application

4. When you receive an email message from Apple that


contains the next steps to enroll in DEP, click the
Sign In button within the email message.

5. In the new browser tab, type the user name and


temporary password that appears in the email
message and then press Enter (or tap Return) on
your keyboard.

5
Chapter 1 Preparing Security Features

6. Update your Apple ID with your new password and


then click or tap Change Password.

7. Click or tap Continue to verify your email address.


In a short while, a message from Apple appears in
your email inbox. This message contains a six-digit
code.

8. Return to your browser, type the code into the


browser, and then click or tap Continue.

9. Now enter your complete birthdate and the three


security questions (and answers) you want to use in
case you can’t remember your password.

10. When you’re done, click or tap Update.

11. Once Apple updates your ID, click or tap Continue.

12. Now type your name and password and then press
Enter (or tap Return).

13. Answer two of the three security questions you


added earlier and then click or tap Continue.

14. Within the Security section in the Apple ID


webpage, click Get Started under Two-Step
Verification. See Figure 1-4.

Figure 1-4. The Get Started link appears in the lower-right of the
Security section

6
Chapter 1 Preparing Security Features

15. When you finish reading about two-step verification


in the window, click Continue.

16. Type the phone number you want to use to receive


verification codes when you sign in with your Apple
ID, and then click or tap Continue.

17. Type the four-digit code you received in the text


message on your phone and then click or tap
Continue.

18. If you have another Apple mobile device that has


Find My iPhone, iPad, or iPod touch enabled, you
will have to verify your devices in the same way you
did in the previous step. When you finish verifying
those devices, or you don’t see any devices to verify,
click or tap Continue.

19. Print or write down your recovery key in case you


can’t remember your password or you lose the
iPhone you’re using to set up your DEP account.

20. When you’re done, click or tap Continue.

21. Type your Recovery Key and then click or tap


Confirm.

22. Review the Two-Step Verification conditions and


then click or tap the I Understand the Conditions
Above check box.

23. Click or tap Enable Two-Step Verification.

24. Click or tap Done.

7
Chapter 1 Preparing Security Features

In a few minutes, you’ll receive a verification message from Apple in


your email app.

Add Your Business Details


Once you’ve created your new Apple ID, click or switch to the Apple
Deployment Programs tab in your browser. Click or tap Deploy.apple.com
as you see in Figure 1-5.

Figure 1-5. The link to deploy and continue appears below step 3 on
the webpage

8
Chapter 1 Preparing Security Features

Now you need to add your business details to your DEP application as
follows:

1. In the Deployment Programs webpage, type your


Apple ID and password, and then click or tap Sign
In.

2. Verify your identity using two-step verification by


clicking or tapping the phone number you want to
use (if necessary), and then click or tap Continue.

3. Type the four-digit verification code you received in


the text message on your iPhone and then click or
tap Continue.

4. In the Add Verification Contact Details webpage,


enter the contact information for the person who
can verify that you have the legal authority to sign
up for DEP.

Note If you signed up for DEP and can also supply legal authority,
you need to type a different email address in Step 4 than the one you
used to sign up for DEP.

9
Chapter 1 Preparing Security Features

5. When you’re done, click or tap Next.

6. In the Add Institution Details webpage shown in


Figure 1-6, type your institution information and the
DUNS number.
7. When you’re finished, tap Next.

Figure 1-6. Begin adding your institutional details by typing your


company name in the Company Name box

10
Chapter 1 Preparing Security Features

Tip You can find your DUNS number by clicking the blue help
icon to the right of Company D-U-N-S and then clicking or tapping
“Locate your company’s D-U-N-S Number” in the window. The Dun
& Bradstreet website opens in a new browser tab opens so you can
read all the information the website requires to obtain your DUNS
number.

8. When you receive your DUNS number, copy


the number from the Dun & Bradstreet website
page, return to the Deployment Programs tab in
your browser, and then paste the number in the
Company D-U-N-S box.

9. Return to the Dun & Bradstreet tab, log out, and


then return to the Deployment Programs tab.

10. After you enter the reseller ID number, click or tap


Verify under the number to verify that the number is
correct.

11. Type your address, city, ZIP code, and website


address in the appropriate boxes.

12. Select your state and country from the State and
Country drop-down boxes, respectively.

13. Click the Devices Purchased From check box and


then select whether you purchased your phones
from a reseller (such as Verizon or AT&T) or from
Apple Direct.
14. Enter your Apple customer ID or DEP Reseller ID
number.

11
Chapter 1 Preparing Security Features

Note If you don’t have your DEP Reseller ID number, you can search
for this information on your reseller website.

15. When you’re finished, click or tap Next.

16. After you finish reviewing your enrollment details,


click or tap Submit.

17. Now you need to verify your identity with two-step


notification, so select the phone number you want
to use to verify your identity (if necessary) and then
click or tap Continue.

18. Type the verification code you received in the


messaging app of the device you used, and then
click or tap Continue.

Wait Your Turn


Now the Deployment Programs webpage shows you that your Device
Enrollment Program application is in review. It may take Apple up to five
business days to review your application. When the review is complete,
you’ll receive a phone call from Apple at the number you entered in the
Your Details webpage.
A helpful Apple representative will ask you a few follow-up questions
to ensure that you are who you say you are and that you can meet all
of Apple’s requirements. Once you answer the questions to Apple’s
satisfaction, the representative will tell you that you’re approved, and a
day or two later you’ll receive an email message (see Figure 1-7) telling you
what to do now that you’re approved.

12
Chapter 1 Preparing Security Features

Figure 1-7. A sample DEP approval e-mail from Apple

The Final Steps


Once you’re approved, begin the setup process by clicking or tapping
Sign In within the email message. In the Deployment Programs webpage
in your browser, type your username and password into the appropriate
boxes and then click or tap Sign In.
In the Verify Your Identity webpage, select the phone number where
you want to receive your access code and then click or tap Continue.
(If you only have one phone number, it’s selected automatically.)
After you type the new code in the Enter Verification Code window,
click or tap Continue. Now go through the last four setup steps: The fun
tasks of agreeing to the terms and conditions for the DEP, macOS, iOS, and
tvOS Software License Agreements. It’s up to you if you want to read any of
the Terms and Conditions on each page.
In every page, you need to click or tap the check box to the left of the
“I have read and agree to…” sentence below the terms and conditions, and
then click or tap Agree.

13
Chapter 1 Preparing Security Features

Now You Can Start


Once you’ve agreed to all the terms and conditions, the Welcome webpage
appears (see Figure 1-8). On the left side of the webpage, you can click
links to show a list of company administrators, view more information
about DEP, and refresh your memory about the terms and conditions.
Return to the Welcome webpage by clicking or tapping Deployment
Programs in the upper-left corner of the page.

Figure 1-8. The Get Started link appears to the right of the Device
Enrollment Program logo

In the upper-right corner of the webpage shown in Figure 1-9, click


your name to view a drop-down menu to get your organizational details,
send feedback to Apple, or sign out. You can also click or tap the Help icon
to open the help documentation window.

Figure 1-9. The Help icon is a question mark inside a circle


14
Chapter 1 Preparing Security Features

When you’re ready to start, click or tap Get Started.

Note If the webpage is idle for about 10 minutes, you’re logged out
automatically; if you want to get back in, you’ll need to re-enter your
username, password, and verification code.

Find Your MDM


One of the issues that the Apple representative will remind you about in
your phone conversation is the need to acquire and set up a Mobile Device
Management (MDM) server on your Windows PC or Mac, or from an
MDM provider’s server if you decide to use a cloud-based solution.
An MDM server is an app you need to perform a wide variety of tasks
to manage your company iPhones, including, but not limited to these:

• Securing email messages

• Securing corporate documents

• Remote device locking

• Creating predefined Wi-Fi settings for your office

• Enforcing any other computing policies such as


Internet use

It’s easy to find a list of MDM providers online. Each solution provides
a list of features so you can ensure that it meets your company’s needs.
After you select an MDM provider, you need to add the MDM server to the
DEP so you can configure your iPhone management settings.

15
Chapter 1 Preparing Security Features

For this book, I’ll use SimpleMDM, which is a cloud-based MDM app
you can use from any computer or tablet, and it has a good combination
of features at a low price. It even has a 30-day free trial (see Figure 1-10)
after you sign up. You can access the website and view more information at
https://simplemdm.com/.

Figure 1-10. Scroll up and down the SimpleMDM home page to


learn more about the app

Download, install, and set up your MDM server before you proceed to
the next section.

Note If you decide SimpleMDM is not the right solution for your
business, just type mobile device management into your favorite
search engine to see other MDM app websites and reviews.

16
Chapter 1 Preparing Security Features

Add Your MDM to DEP


Switch or open a new browser tab and open the DEP webpage and
then click or tap Get Started in the Welcome page. The Manage Servers
webpage appears (see Figure 1-11) so you can add your MDM server.

Figure 1-11. There are no MDM servers listed when you open the
Manage Servers screen for the first time

In the upper-left area of the webpage, you see an expanded menu that
includes options to manage your servers and devices, and to view your
assignment history, such as when you assigned an iPhone to your list of
devices to manage.

Note Once you have set up your MDM server, the server may allow
you to add the MDM from its website. Since every MDM is different,
this example uses the Apple DEP website to add your MDM.

Click or tap Add MDM Server to open the Add MDM Server window
and begin the three-step addition process.

17
Chapter 1 Preparing Security Features

Step 1: Enter Your MDM Server Name


Type your MDM server name as shown in Figure 1-12, and then click or
tap Next.

Figure 1-12. Step one of the three-step MDM server addition process

Now you need to download your DEP Public Key from your MDM app.
To do this, click Settings in the menu on the left side of the webpage (see
Figure 1-13) and then click or tap DEP.

Figure 1-13. You only need to pay attention to step 5 in the Add DEP
Account instructions

18
Chapter 1 Preparing Security Features

In the Add DEP Account webpage, click DEP Public Key, which you see
in step 5 within the list of instructions. SimpleMDM downloads the key file
to your browser’s default downloads folder.

Step 2: Add the Key


Return to the DEP webpage tab and add the public key within the Add
window as follows:

1. Click or tap Choose File.

2. Navigate to the downloads folder if necessary and


open the file.

3. Click or tap Next.

Step 3: Get Your Token


After you add the key, click or tap Your Server Token to download from
Apple the server token that you can install on your MDM server. The token
file downloads to your browser’s default downloads folder. When you’re
finished, click or tap Done.

What’s Next?
The Manage Servers webpage list now shows your server name, the
number of devices connected (0), and when the devices were last
connected (Never). Now you need to add the server token to your MDM.
In the Add DEP Account webpage within SimpleMDM, click or tap
Choose File, open the server token file, and then click or tap Upload. Now
you see your DEP account information, which you can update. When
you’re done, click or tap Save. Now you see your DEP account within the
list in the DEP Accounts webpage.

19
Exploring the Variety of Random
Documents with Different Content
The Project Gutenberg eBook of The
Christmas city
This ebook is for the use of anyone anywhere in the United
States and most other parts of the world at no cost and with
almost no restrictions whatsoever. You may copy it, give it away
or re-use it under the terms of the Project Gutenberg License
included with this ebook or online at www.gutenberg.org. If you
are not located in the United States, you will have to check the
laws of the country where you are located before using this
eBook.

Title: The Christmas city


Bethlehem across the ages

Author: Lewis Gaston Leary

Release date: January 12, 2024 [eBook #72694]

Language: English

Original publication: New York: Sturgis & Walton Company, 1911

Credits: Bob Taylor, Charlene Taylor and the Online Distributed


Proofreading Team at https://www.pgdp.net (This file
was produced from images generously made available
by The Internet Archive)

*** START OF THE PROJECT GUTENBERG EBOOK THE CHRISTMAS


CITY ***
THE CHRISTMAS CITY
BETHLEHEM ACROSS THE AGES
HOLY NIGHT
From the painting by Zenisek
THE

CHRISTMAS CITY
BETHLEHEM ACROSS THE AGES

BY
LEWIS GASTON LEARY, Ph.D.
AUTHOR OF “THE REAL PALESTINE OF TO-DAY”

New York
STURGIS & WALTON
COMPANY
1911
Copyright 1911
By STURGIS & WALTON COMPANY

Set up and electrotyped. Published October, 1911


THIS LITTLE BOOK ABOUT THE
CITY OF DIVINE MOTHERHOOD
IS AFFECTIONATELY DEDICATED
TO MY OWN MOTHER
CONTENTS
CONTENTS
PAGE
The Charter of Pre-eminence 17
I The Welcome to Bethlehem 21
II The Grave by the Roadside 25
III The Girl From Beyond Jordan 35
IV The Boy Who Was to be King 43
V The Adventure of the Well 51
VI The Night of Nights 59
VII The Blossoms of Martyrdom 67
VIII The Story of the Stable 73
IX The Epitaph of the Lady Paula 83
X The Scholar in the Cave 93
XI The Christmas Coronation 105
XII Some Bethlehem Legends 117
XIII The Long White Road 129
XIV The House of Bread 145
XV The Church Which is a Fort 155
XVI The Sacred Caves 165
XVII The Guard of the Silver Star 175
XVIII The Song of the Kneeling Women 181
XIX Across the Ages 187
ILLUSTRATIONS
ILLUSTRATIONS

Holy Night, from the painting by Zenisek Frontispiece


PAGE
The Tomb of Rachel 31
The Church of the Nativity 79
The South Transept of the Church of the Nativity
and one of the Stairways leading down to the 97
Sacred Caves
St. Jerome and the Lion 123
The Bethlehem Road 133
Bethlehem Girls 137
Bethlehem 149
Interior of the Church of the Nativity 161
The Altar of the Nativity 169
THE CHARTER OF PRE-EMINENCE
THE CHARTER OF PRE-EMINENCE
Micah 5: 2-5

“B UT thou, Bethlehem Ephrathah, which art little to be among


the thousands of Judah, out of thee shall one come forth unto
me that is to be ruler in Israel; whose goings forth are from old,
from everlasting.... And he shall stand, and shall feed his flock in the
strength of Jehovah, in the majesty of the name of Jehovah his God:
and they shall abide; for now shall he be great unto the ends of the
earth.
“And this man shall be our peace.”
THE WELCOME TO BETHLEHEM
THE CHRISTMAS CITY
I
THE WELCOME TO BETHLEHEM
St. Paula, A. D. 386

“W ITH what expressions and what language shall we set before


you the cave of the Saviour? The stall where He cried as a
babe can best be honored by silence; words are inadequate to speak
its praise. Where are the spacious porticoes? Where are the gilded
ceilings? Where are the mansions furnished by the miserable toil of
doomed wretches? Where are the costly halls raised by untitled
opulence for man’s vile body to walk in? Where are the roofs that
intercept the sky, as if anything could be finer than the expanse of
heaven? Behold, in this poor crevice of the earth the Creator of the
heavens was born; here He was wrapped in swaddling clothes; here
He was seen by the shepherds; here He was pointed out by the star;
here He was adored by the wise men....
“In our excitement we are already hurrying to meet you.... Will the
day never come when we shall together enter the Saviour’s cave?
“Hail, Bethlehem, house of bread, wherein was born that Bread
that came down from heaven! Hail, Ephrathah, land of fruitfulness
and fertility, whose Fruit is the Lord himself.”
THE GRAVE BY THE ROADSIDE
II
THE GRAVE BY THE ROADSIDE

T HE history of Bethlehem is the romance of Bethlehem; a story of


love and daring, of brave men and beautiful women. We do not
know that story in great detail; but here and there across the
centuries, the light breaks on the little Judean town and we catch a
fleeting glimpse of some scene of tender affection or chivalrous
adventure. And it is striking to notice how many of these incidents
involve womanly devotion and self-sacrifice, both before and after
the Most Blessed of Women suffered and rejoiced in Bethlehem.
Long, long centuries before that first Christmas was dreamed of,
the story of Bethlehem begins. And lo, the earliest episode has to do
with a birth day.
In the yellow evening light a little band of nomadic shepherds is
straggling along the dusty road past the high, gray walls of the outer
fortifications of Jerusalem—not Jerusalem the Holy City, but
Jerusalem the Jebusite stronghold, which is to remain heathen and
hateful for a thousand years until, in that far-distant future, the
arrogant fortress shall fall before the onslaughts of the mighty men
of David.
At the head of the long line of herds and pack-animals and armed
retainers walks the chief, Jacob ben-Isaac. A generation before, he
had passed along this same ancient caravan route going northward;
but no one would recognize that frightened, homesick fugitive in the
grave, self-confident leader who travels southward to-day. For now
he is Sheikh Jacob, full of years and riches and wisdom; Jacob the
strong man, the successful man and, in his own rude way, the good
man.
An hour’s journey beyond Jerusalem there appear shining on a
hilltop to the left the white stone houses of Bethlehem, at the sight
of which the tired herdsmen grow more cheerful and the slow-
moving caravan quickens somewhat its pace; for close under those
protecting walls the tribe of B’nai Jacob will shelter its flocks for the
night, safe alike from wolves and from marauding Arab bands.
But just as they reach the spot where the road to Bethlehem
branches off to the left from the main caravan route, there is a
sudden change of plan. The hope of camping at the town is
abandoned, and one of the low, black, goat-hair tents is hastily set
up right by the roadside. Then there is an excited bustling among
the household servants, and a time of anxious waiting for Sheikh
Jacob, until Bilhah, the handmaid, puts into the old man’s arms his
son Benjamin, his youngest boy, who is long to be the comfort of the
father’s declining years.

THE TOMB OF RACHEL


In the background the town of Beit Jala

Soon, however, the cries of rejoicing are hushed. From the


women’s quarters comes a loud, shrill wail of grief. And before the
B’nai Jacob break camp again the leader raises a heap of stones
over the grave of Rachel—his Rachel—a gray-haired woman now and
bent with toil, but still to him the beautiful girl whom he loved and
for whom he labored and sinned those twice seven long years in the
strength of his young manhood.
Many years afterward, when Benjamin was a grown man and
Jacob lay dying in the distant land of Egypt, the thoughts of the
homesick old sheikh dwelt on the lonely grave by the roadside.
“I buried her there on the way to Bethlehem,” he said.
Her tombstone remains “unto this day,” the Hebrew narrator adds.
Indeed, even to our own day, a spot by the Bethlehem road, about a
mile from the town, is pointed out as the burial place of Rachel.
Probably no site in Palestine is attested by the witness of so
continuous a line of historians and travelers. For many centuries the
grave was marked by a pyramid of stones. The present structure,
with its white dome, is only about four hundred years old. But there
it stands “unto this day,” revered by Christians, Jews and Moslems,
and the wandering Arabs bring their dead to be buried in its holy
shadow.
Such is the first Biblical reference to Bethlehem. A son was born
there! More significant still, there was a vicarious sacrifice—a laying
down of one life for another.
THE GIRL FROM BEYOND JORDAN
III
THE GIRL FROM BEYOND JORDAN

I N the Book of Judges are recounted the adventures which befell


certain Bethlehemites in those lawless days when “there was no
king in Israel and every man did that which was right in his own
eyes.” But the people mentioned in this history were no longer
dwelling in the city of their birth; and we are glad of an excuse to
pass by the tale of reckless crime and merciless vengeance. Yet
here, too, if the story were not too cruel to repeat, we should find a
woman dying for one whom she loved.
Even in that rough frontier period, however, there were interludes
of peace and kindliness; and like the cooling breeze which blows
from snow-capped Lebanon upon the burning brow of the Syrian
reaper, is the sense of grateful refreshment when we turn from the
heartrending monotony of scenes of cruelty and lust and treachery
to the sweet, clean air of the whitening harvest fields of Boaz of
Bethlehem.

When the two strange women entered the square there was great
excitement among the chattering busy-bodies who were waiting
their turn to fill their earthen jars at the public well; for one of the
travelers was seen to be no other than old Naomi, who long years
before had gone away across Jordan with her husband Elimelech to
better their fortunes among the famous farm-lands of Moab. Now
the wanderer has returned to the old home, poor and widowed and
childless—no doubt to the secret gratification of the more cautious
stay-at-homes, who had never dared tempt fortune by such an
emigration to distant Moab, and who were still no richer and no
poorer than their fathers’ fathers had been.
The other woman was younger, a foreigner, a widow, so the gossip
ran, who had married Naomi’s dead son. The women at the well
smiled at her quaint accent, for the dialect of Moab is quite different
from that of the Bethlehem district. But many a stalwart young
farmer dreamed that night of the lonely, appealing eyes of the
stranger from beyond Jordan.
Even middle-aged Boaz is stirred when the next morning he finds
the slender Moabitess among the women who are gleaning in his
barley field; for romance is not always dead in the soul of a mature
and wealthy landowner. Boaz, for all his grizzling hair, is a hero who
makes us feel very warm and comfortable about the heart. He is so
generous, so thoughtful, so humble in his final happiness. He has
already been touched by the story of the faithfulness of the young
widow who said to her mother-in-law,
“Entreat me not to leave thee, and to return from following after
thee; for whither thou goest, I will go; and where thou lodgest, I will
lodge; thy people shall be my people, and thy God my God.”
So the rich man drops a hint to his servants to let fall carelessly
little heaps of grain where the new gleaner can easily gather them.
He remembers the rough, dissolute character of the itinerant
harvesters, and warns them to treat the young woman with respect
and courtesy. At noontime he invites her to share the simple
luncheon provided for the farm-hands. A few weeks later the lonely
rich man discovers her affection for him, and our hearts beat in
sympathy with his as, with characteristic modesty, he exclaims,
“Blessed be thou of Jehovah, my daughter: thou hast shown more
kindness in the latter end than at the beginning, inasmuch as thou
followedest not young men, whether poor or rich.”
But as well might one attempt to retouch the soft colorings of the
Judean sunrise as to re-tell the beautiful idyll of Ruth. Old Josephus
quite misses the delicate beauty of the story; for he concludes his
smug paraphrase by saying, “I was therefore obliged to recount this
history of Ruth, because I had a mind to demonstrate the power of
God, who, without difficulty, can raise those that are of ordinary
parents to dignity and splendor.”
They lived together happily ever afterward. Even sad Naomi found
a new interest in life when she took into her lonely old arms the
form of little Obed. For this bit of Bethlehem history, like the first,
and like the greatest later on, ends with the coming of a baby boy.
And doubtless, if the whole of the tale were told us, we should some
day see grandmother Ruth crooning over Obed’s son Jesse, who was
to be the father of a king.
THE BOY WHO WAS TO BE KING
IV
THE BOY WHO WAS TO BE KING

A N ancient Hebrew commentary on First Samuel says that Jesse


became “a weaver of veils for the sanctuary.” This may be why
the story of David and Goliath compares the giant’s staff to “a
weaver’s beam.” Whatever his occupation, the grandson of rich Boaz
must have been a man of some means, and influential in Bethlehem
society. Also he had seven fine, stalwart sons. Indeed, he had eight
sons; but, as we all know, the youngest was out tending the sheep
when Samuel came.
The rough and ready era of the Judges, when every man did that
which was right in his own eyes, was now gone forever. Israel had a
king; and a tall, handsome figure of a man King Saul was. And for a
while he was a king who defeated foreign invaders on every side.
But Saul’s character could not stand the test of the sudden elevation
to a position of power and responsibility. His strength lay in brilliant,
spectacular efforts, rather than in a patient, well-organized rule.
Quarrels arose between the jealous tribes of Israel. Conquered foes
prepared new and better equipped forays against the poorly
protected frontier of the new kingdom. Worst of all, Saul broke with
his tried advisers and became prey to an irrational, suspicious
melancholy, which prevented him from coping with dangers which a
few years earlier would only have aroused his ambitious energy.
Saul had failed; so Samuel, the veteran prophet, judge and king-
maker, went quietly to Bethlehem to select a new leader who should
direct the troublous destinies of Israel.
It was doubtless the same farm where the young stranger from
beyond Jordan had gleaned the sheaves of barley almost a century
before. How proud Naomi would have been if she could have lived to
see those tall great-grandchildren of Ruth and Boaz! How excited we
boys used to get as we saw the seven sons of Jesse standing there
in a row, and waited for old Samuel to tell us which one was to be
the king! Surely it must be the eldest, Eliab, who is so tall and
handsome, the very image of what Saul was in his youth. No, it is
not Eliab, perhaps just because he is too much like King Saul.
Abinadab is rejected and Shammah, too; and the prophet’s eye
passes even more rapidly over Nethaneel and Raddai and Ozem.
Then Samuel turns to the father with a perplexed frown.
“Are these all your sons?”
“Yes—that is, all that are grown up. David is only a boy. He is
taking care of the sheep this morning.”
“Call him, too,” commands Samuel. “Let Abinadab mind the sheep
for a while.”
So in a few minutes David is brought in. He is fair in complexion,
like so many Judean Jews to-day, but his skin is burnt to a deep tan
by the sun of the sheep pasture. His eye has a captivating twinkle,
and he can hardly keep from humming a tune even in the presence
of the prophet.
We guessed it all the while! This is indeed a royal fellow; and the
old prophet touches the thick brown hair of the shepherd lad with a
strange, loving reverence as he tells him that some day he must be
his people’s king.
This time I think that Josephus is probably right. For he tells us
that while they were all sitting at dinner afterward, Samuel
whispered in the boy’s ear “that God chose him to be their king: and
exhorted him to be righteous, and obedient to His commands, for
that by this means his kingdom would continue for a long time, and
that his house should be of great splendor and celebrated in the
world.”
Surely wise old Samuel must have given the boy some such advice
as that.
Welcome to our website – the ideal destination for book lovers and
knowledge seekers. With a mission to inspire endlessly, we offer a
vast collection of books, ranging from classic literary works to
specialized publications, self-development books, and children's
literature. Each book is a new journey of discovery, expanding
knowledge and enriching the soul of the reade

Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.

Let us accompany you on the journey of exploring knowledge and


personal growth!

textbookfull.com

You might also like