Important:
This is retired content. This content is outdated and is no longer being maintained. It is provided as a courtesy for individuals who are still using these technologies. This content may contain URLs that were valid when originally published, but now link to sites or pages that no longer exist.
4/8/2010

Configuration service providers execute configuration requests by changing or querying the values of settings. The Configuration Manager sends configuration requests to the configuration service providers in XML format.

The settings that you can access are determined by roles. You get a role when you try to access Configuration Manager. The following table shows the roles for each device type.

Device type Role

Windows Mobile Professional and Windows Mobile Classic 

  • All calls to DMProcessConfigXMLreceive the Manager role.

Windows Mobile Standard

  • Privileged applications are assigned the Manager role. This role allows unrestricted access to system resources.

  • Standard applications are assigned the UserAuth role by default. This role allows access to system resources with some restrictions.

  • Applications assigned the UserUnAuth role have more restricted access to system resources. This role allows access to fewer resources, for example, home screen settings.

A provisioning document is flat-format XML file that provides processing instructions to the different configuration service providers. It can be in OMA Device Management format or OMA Client Provisioning format, depending on the delivery option. For information about the available delivery option for each configuration service provider, see Configuration Service Provider Reference for Windows Mobile Devices.

For more information about the syntax of provisioning XML, see one of the following topics:

For a general example of a provisioning document, see OMA Client Provisioning XML File Examplesor OMA DM Provisioning XML File Examples.

Security Note:
Configuration data is not encrypted when sent over the air (OTA) through a WAP push. Be aware of this potential security risk when sending sensitive configuration data such as passwords.

See Also