Important: |
---|
This is retired content. This content is outdated and is no longer being maintained. It is provided as a courtesy for individuals who are still using these technologies. This content may contain URLs that were valid when originally published, but now link to sites or pages that no longer exist. |
4/8/2010
This example shows how to add certificates to the Privileged and Unprivileged stores, and how to add a certificate with its corresponding role mask to the SPC store.
Code Example
Copy Code | |
---|---|
<Add> <CmdID>1</CmdID> <Item> <Target> <LocURI>./Vendor/MSFT/CertificateStore/Privileged%20Execution%20Trust%20Authorities/{sha1 hash of the certificate}/EncodedCertificate</LocURI> </Target> <Data>{b-64 encoded certificate}</Data> <Meta> <Format xmlns="syncml:metinf">b64</Format> </Meta> </Item> </Add> <Add> <CmdID>2</CmdID> <Item> <Target> <LocURI>./Vendor/MSFT/CertificateStore/Unprivileged%20Execution%20Trust%20Authorities/{sha1 hash of the certificate}/EncodedCertificate</LocURI> </Target> <Data>{b-64 encoded certificate}</Data> <Meta> <Format xmlns="syncml:metinf">b64</Format> </Meta> </Item> </Add> <Add> <CmdID>3</CmdID> <Item> <Target> <LocURI>./Vendor/MSFT/CertificateStore/SPC/{sha1 hash of the certificate}/EncodedCertificate</LocURI> </Target> <Data>{encoded certificate}</Data> <Meta> <Format xmlns="syncml:metinf">b64</Format> </Meta> </Item> <Item> <Target> <LocURI>./Vendor/MSFT/CertificateStore/SPC/{hash of the certificate}/Role</LocURI> </Target> <Data>16</Data> <Meta> <Format xmlns="syncml:metinf">int</Format> </Meta> </Item> </Add> |
Remarks
One provisioning XML file typically contains configuration information for multiple Configuration Service Providers. To use this example, you must replace the values as appropriate, and add the node as a child of the SyncBody node in an OMA DM provisioning file. For more information about the syntax of the provisioning file, see OMA DM Provisioning Files.