Security Policies and Roles
Security policies are used for configuring security settings that are enforced by security roles and certificates.
Security policies are configured on the mobile devices by using a security policy provisioning document (XML file) that is applied by the SecurityPolicy Configuration Service Provider. Windows Mobile-based devices contain a default security policy provisioning document that you can modify.
Security roles define a logical representation of physical users based on their roles in relation to the devices. These roles are used by device management and during application installation to allow different levels of access to the resources of a device (for example, registry keys, files, settings, and APIs).
In This Section
- Security Roles
Security roles identify levels of access. Describes the Security Roles and provides their decimal values. also provides Security Role information that is specific to Smartphone and Pocket PC. - Security Policies
Security policies enable you to configure security settings. Describes Security Policy Settings, and explains how to change the policies.
Related Sections
- Application Security
Application security provides levels of protection against application installation, application execution. - Metabase Provisioning
How to create or modify a provisioning XML document to change metabase settings. - Modifying the Security Policy Provisioning Document
How to modify the default security policy document. - Troubleshooting Application Installation (SP Only)
Provides insight as to why application installation may fail. - Troubleshooting Application Execution (SP Only)
Provides insight as to why application execution may fail.
Last updated on Friday, April 22, 2005
© 2005 Microsoft Corporation. All rights reserved.
Send feedback on this topic to the authors.