Important: |
---|
This is retired content. This content is outdated and is no longer being maintained. It is provided as a courtesy for individuals who are still using these technologies. This content may contain URLs that were valid when originally published, but now link to sites or pages that no longer exist. |
Mobile Operators can change Security Policies after manufacture.
By following these steps, you will know how to:
- Choose a method of delivery.
- Query device policies before changing them.
- Determining the settings that you want to make
- Create a provisioning XML file that queries the device
settings.
- Optionally package the XML file for delivery and sign the
package file.
- Deliver the provisioning XML file to the device.
The following list shows the tasks that you must perform to provision a device.
Step | Topic |
---|---|
If you have not already done so, decide on a method of delivery. |
|
If you have not already done so, query the device to determine the current policies and roles that are configured. You should always query a device before changing the settings. |
|
Determine the settings or changes that you want to make. There is a trade-off between application compatibility and device security. Although there are many policies, the following four policy options show the balance of compatibility and security.
For details about each policy, see Security Policy Settings. |
|
Create a provisioning XML file that uses the SecurityPolicy Configuration Service Provider to change device settings. |
SecurityPolicy Configuration Service Provider The following list shows some examples:
|
Test that the provisioning XML changes a Windows Mobile device similar to the ones that you want to update. Thoroughly test the security settings on the device. |
N/A |
If you chose to deliver the XML file by using either a cabinet (.cab) or cabinet provisioning format (.cpf) file, you must do the following:
|
|
Deliver the provisioning XML file to the device. Typically, the file is installed upon delivery. |
|
|
|
See Also
Tasks
SecurityPolicy Configuration Service Provider Examples for OMA Client ProvisioningReference
SecurityPolicy Configuration Service ProviderConcepts
Provisioning Security SettingsSetting the Grant Manager Policy
Other Resources
Security Policy SettingsSecurityPolicy Configuration Service Provider Examples for OMA DM