×
Namespaces

Variants
Actions
(Difference between revisions)

Archived:Establishing trust between OMA DM server and a Symbian device

From Nokia Developer Wiki
Jump to: navigation, search
Forum Nokia KB (Talk | contribs)
Forum Nokia KB (Talk | contribs)
Line 48: Line 48:
 
[http://www.forum.nokia.com/info/sw.nokia.com/id/2ff7409a-cbb3-4151-bbae-247aac7cda33/OMA_Device_Management_DDF_for_Policy_Management_v1_1_en.zip.html OMA Device Management DDF for Policy Management]
 
[http://www.forum.nokia.com/info/sw.nokia.com/id/2ff7409a-cbb3-4151-bbae-247aac7cda33/OMA_Device_Management_DDF_for_Policy_Management_v1_1_en.zip.html OMA Device Management DDF for Policy Management]
  
[[Category:Symbian C++]][[Category:S60 3rd Edition FP1]][[Category:Technical Solution]][[Category:For publishing]][[Category:Device Management]]
+
[[Category:Symbian C++]][[Category:S60 3rd Edition FP1]][[Category:Technical Solution]][[Category:Device Management]]

Revision as of 09:37, 12 May 2009


Template:KBTS

Article Metadata
Tested with
Devices(s): Eseries devices
Compatibility
Platform(s): S60 3rd Edition FP1, S60 3rd Edition, FP2
S60 3rd Edition FP1
Article
Created: (12 May 2009)
Last edited: Forum Nokia KB (12 May 2009)

Description

Establishing trust between a device and the DM server is described in OMA Device Management DDF for Policy Management available at Forum Nokia. This article explains the possible ways of establishing trust and the different policies that can be used.

Solution

There are two ways to create corporate trust.

Separate mapping for certificate and roles

First, the certificate mapping policy is sent.

File:Certificate mapping.zip

The above policy creates a mapping between the certificate and the alias_id. The policy does not create the trust but simply describes that COMCOM is the "short name"/alias for the given certificate.

After this, the roles mapping policy is sent.

File:Roles mapping.zip

The above policy maps the COMCOM role to be the trustedadmin which is the role_id of the COMCOM. This policy will display the device security indicator § in the status pane.


Alternative approach

In this approach, both the certificate and role mappings are done at the same time with a single policy:

File:Certificate roles mapping.txt

The command: use_bearer_certificate = "true" will cause the certificate to be searched directly from the HTTPS session. In Approach 1, the certificate is taken from the policy file itself.

The second approach is an easy way to establish trust as both certificate mapping and roles mapping are handled automatically.

See also

OMA Device Management DDF for Policy Management

83 page views in the last 30 days.

Was this page helpful?

Your feedback about this content is important. Let us know what you think.

 

Thank you!

We appreciate your feedback.

×