How To Topics for Managing Devices
4/8/2010
Many settings can be customized for branding, security, or convenience. The topics in this section will help you understand what can be configured and how to modify the configuration.
In This Section
- Bootstrapping a Device
Provides information about how to configure a device so that it can be continuously provisioned by a privileged agent.
- How To Configure a Device After Manufacture
Lists the steps you must take to configure a device after the manufacturing process is complete. This includes instructions about deciding on a method of delivery, creating a provisioning XML file, packaging and delivering the file to the device.
- How to Query Security Policies
Walks you through the process of querying Security Policies, including choosing a method of delivery, creating an XML file, packaging the file if needed, and delivering the file to the device. You should query device policies before changing them.
- How to Change Security Policies
Walks your through the process of changing Security Policies, including choosing a method of delivery, querying device policies before you change them, determining the settings that you want to make, creating an XML file, packaging the file if needed, and delivering the file to the device.
- Installing a Root Certificate
Describes how to install a root certificate.
- ** Security and Managing Devices **
Describes the best practices for OMA Device Management Security and OMA Client Provisioning Security.