mirror of
https://github.com/Start9Labs/documentation.git
synced 2026-04-02 05:23:18 +00:00
Feat/re arrange (#475)
* move things around a lot * move up a layer * some edits * rename some paths
This commit is contained in:
79
site/source/guides/device-guides/ios/ca-ios.rst
Normal file
79
site/source/guides/device-guides/ios/ca-ios.rst
Normal file
@@ -0,0 +1,79 @@
|
||||
.. _ca-ios:
|
||||
|
||||
=====================================
|
||||
Trusting Your Server's Root CA on iOS
|
||||
=====================================
|
||||
Complete this guide to trust your server's Root Certificate Authority (Root CA) on iOS.
|
||||
|
||||
.. note:: This guide only applies to iOS v15+. For v14, see the `v14 guide </0.3.1.x/user-manual/connecting/connecting-lan/lan-os/lan-ios>`_.
|
||||
|
||||
#. Ensure you have already `downloaded your server's Root CA </getting-started/trust-ca/#download-your-server-s-root-ca>`_
|
||||
|
||||
#. Open your iCloud Downloads folder and click on the certificate. It will display a dialog box that says "Profile Downloaded." Click `Close`.
|
||||
|
||||
.. figure:: /_static/images/ssl/ios/import_cert.png
|
||||
:width: 20%
|
||||
:alt: Profiles
|
||||
|
||||
#. Head to *Settings > General > VPN & Device Management*
|
||||
|
||||
.. figure:: /_static/images/ssl/ios/settings_general_vpn.png
|
||||
:width: 20%
|
||||
:alt: Profiles
|
||||
|
||||
#. Locate the profile under "DOWNLOADED PROFILE" and tap on it
|
||||
|
||||
.. figure:: /_static/images/ssl/ios/install_1.png
|
||||
:width: 20%
|
||||
:alt: Profiles
|
||||
|
||||
#. Tap *Install*
|
||||
|
||||
.. figure:: /_static/images/ssl/ios/install_2.png
|
||||
:width: 20%
|
||||
:alt: Profiles
|
||||
|
||||
#. Tap *Install* again
|
||||
|
||||
.. figure:: /_static/images/ssl/ios/install_3.png
|
||||
:width: 20%
|
||||
:alt: Profiles
|
||||
|
||||
#. Tap *Install* yet again
|
||||
|
||||
.. figure:: /_static/images/ssl/ios/install_4.png
|
||||
:width: 20%
|
||||
:alt: Profiles
|
||||
|
||||
#. You should see green text with a check-mark saying "Verified" under the Profile Installed dialog.
|
||||
|
||||
.. figure:: /_static/images/ssl/ios/install_5.png
|
||||
:width: 20%
|
||||
:alt: Profiles
|
||||
|
||||
#. Tap *Done* near the top right.
|
||||
|
||||
#. Next, navigate to *General > About > Certificate Trust Settings*.
|
||||
|
||||
.. figure:: /_static/images/ssl/ios/trust_1.png
|
||||
:width: 20%
|
||||
:alt: Certificate trust settings
|
||||
|
||||
#. Under "Enable full trust for root certificates", enable your "<custom-address> Local Root CA".
|
||||
|
||||
.. figure:: /_static/images/ssl/ios/trust_2.png
|
||||
:width: 20%
|
||||
:alt: Enable full trust
|
||||
|
||||
#. Tap *Continue*
|
||||
|
||||
.. figure:: /_static/images/ssl/ios/trust_3.png
|
||||
:width: 20%
|
||||
:alt: Profiles
|
||||
|
||||
#. Your certificate should now be installed and trusted:
|
||||
|
||||
.. figure:: /_static/images/ssl/ios/trust_4.png
|
||||
:width: 20%
|
||||
:alt: Profiles
|
||||
|
||||
37
site/source/guides/device-guides/ios/index.rst
Normal file
37
site/source/guides/device-guides/ios/index.rst
Normal file
@@ -0,0 +1,37 @@
|
||||
.. _ios:
|
||||
|
||||
===
|
||||
iOS
|
||||
===
|
||||
It is recommended you complete all of the guides below.
|
||||
|
||||
.. raw:: html
|
||||
|
||||
<div class="topics-grid grid-container full">
|
||||
|
||||
<div class="grid-x grid-margin-x">
|
||||
|
||||
.. topic-box::
|
||||
:title: Trust Root CA
|
||||
:link: ca-ios
|
||||
:icon: scylla-icon scylla-icon--partners
|
||||
:class: large-4
|
||||
:anchor: View
|
||||
|
||||
Trust your server's Root Certificate Authority for fast, secure connections
|
||||
|
||||
.. topic-box::
|
||||
:title: Connect to Tor Network
|
||||
:icon: scylla-icon scylla-icon--networking
|
||||
:link: tor-ios
|
||||
:class: large-4
|
||||
:anchor: View
|
||||
|
||||
Run Tor natively for remote connectivity
|
||||
|
||||
.. toctree::
|
||||
:maxdepth: 4
|
||||
:hidden:
|
||||
|
||||
ca-ios
|
||||
tor-ios
|
||||
29
site/source/guides/device-guides/ios/tor-ios.rst
Normal file
29
site/source/guides/device-guides/ios/tor-ios.rst
Normal file
@@ -0,0 +1,29 @@
|
||||
.. _tor-ios:
|
||||
|
||||
==================
|
||||
Running Tor on iOS
|
||||
==================
|
||||
|
||||
Running Orbot
|
||||
-------------
|
||||
Orbot is a system-wide proxy for your Android device that enables communications over Tor.
|
||||
|
||||
#. Download and install `Orbot from the Apple appstore <https://apps.apple.com/us/app/orbot/id1609461599>`_.
|
||||
#. Open Orbot and tap on "Settings".
|
||||
#. Activate the "Disable Orbot for non-onion traffic" setting:
|
||||
|
||||
.. figure:: /_static/images/tor/ios-orbot-settings-oniononlymode.png
|
||||
:width: 25%
|
||||
:alt: iOS Orbot -> Settings -> Onion-Only Mode
|
||||
|
||||
#. Go back to the main screen and click "Start" and you will see Tor connect:
|
||||
|
||||
.. figure:: /_static/images/tor/ios-orbot-connecting-full.png
|
||||
:width: 35%
|
||||
:alt: iOS Orbot Connecting to Tor
|
||||
|
||||
#. Apps will now work transparently when requesting onion urls!
|
||||
|
||||
Access Onionsites
|
||||
-----------------
|
||||
Once Orbot is setup on your system as you've just done, you don't need any browser configuration. All browsers in iOS are Safari under the hood, and this Orbot configuration enables access to ``.onion`` URLs. Regular clearnet requests will not use tor.
|
||||
Reference in New Issue
Block a user