Limiting User Control Of Third-Party Applications On Blackberry Devices; Preventing Rim Value-Added Applications From Running On Blackberry Devices - Blackberry Infinity B1367WD User Manual

Table of Contents

Advertisement

Policy Reference Guide

Limiting user control of third-party applications on BlackBerry devices

Scenario
Prevent third-party applications from accessing
serial ports or USB ports on BlackBerry® devices.
Prevent third-party applications from accessing the
persistent store API on BlackBerry devices.
Prevent users from configuring and running add-in
applications in the BlackBerry® Desktop Manager.
Prevent users from downloading third-party
applications or themes to their BlackBerry devices.
Prevent users from removing a third-party Java®
application installed on their BlackBerry devices.
Prevent users from installing a third-party Java
application on their BlackBerry devices.
Remove a third-party Java application from
BlackBerry devices over the wireless network.
Prevent users from turning on a custom theme that
was created using the BlackBerry® Theme Studio.
Prevent users from unlocking their BlackBerry
devices using a BlackBerry® Smart Card Reader and
an authentication password.
Prevent users that are authenticating through a VPN
connection from using third-party applications on
their BlackBerry devices.
Preventing RIM value-added applications from running on BlackBerry
devices
You can use application control policy rules and IT policy rules to control whether Research In Motion® value-added applications
are available on BlackBerry® devices. RIM value-added applications include the BlackBerry® Wallet and the ecommerce content
optimization engine for the BlackBerry® Browser.
332

Preventing RIM value-added applications from running on BlackBerry devices

Example policy rule
Allow Third Party Apps to Use
Serial Port (IT policy rule)
Allow Third Party Apps to Use
Persistent Store (IT policy rule)
Desktop Allow Desktop Add-Ins
(IT policy rule)
Disallow Third Party Application
Downloads (IT policy rule)
Disposition (application control
policy rule)
Disposition (application control
policy rule)
Disposition (application control
policy rule)
Is Theme Data Allowed
(application control policy rule)
Is Access to the User
Authenticator API allowed
(application control policy rule)
Is Access to the User
Authenticator API allowed
(application control policy rule)
Value
No
No
No
Yes
Required
Required
Required
Required
Required
Required

Advertisement

Table of Contents
loading

This manual is also suitable for:

Enterprise server 5.0 sp2

Table of Contents