Chapter 8 Application Deployment; Introduction; Security; Secure Certificates - Motorola ET1 Integrator Manual

Enterprise tablet
Hide thumbs Also See for ET1:
Table of Contents

Advertisement

CHAPTER 8

Introduction

This chapter describes features in Android including new security features, how to package applications, and
procedures for deploying applications onto the ET1.

Security

The ET1 implements a set of security policies that determine whether an application is allowed to run and, if
allowed, with what level of trust. To develop an application, you must know the security configuration of the
device, and how to sign an application with the appropriate certificate to allow the application to run (and to run
with the needed level of trust).

Secure Certificates

If the VPN or Wi-Fi networks rely on secure certificates, obtain the certificates and store them in the ET1's
secure credential storage, before configuring access to the VPN or Wi-Fi networks.
If downloading the certificates from a web site, set a password for the credential storage.
ET1 supports X.509 certificates saved in PKCS#12 key store files with a .p12 extension (if key store has a .pfx
or other extension, change to .p12).
The ET1 also installs any accompanying private key or certificate authority certificates contained in the key
store.
To install a secure certificate from the microSD card:
Copy the certificate from the host computer to the root of the microSD card. See
1.
Communication
Touch
>
2.
Touch Location & security.
3.
Touch Install from SD card.
4.
APPLICATION DEPLOYMENT
for information about connecting the ET1 to a host computer and copying files.
> Settings.
Chapter 3, USB

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents