Motorola MC3090G Integration Guide - Page 112

Locking Down a Mobile Computer, Trust Certificate Store.

Page 112 highlights

5 - 2 MC3000 Integrator Guide certificate, they are assured that the package is authentic and that it was created by Motorola. By enforcing the use of digital signatures, users can also prevent malicious applications from executing on the MC3000. For example, users can provision the MC3000 to only execute "trusted" applications (digitally signed). Motorola ships all Windows Mobile 6.1 based products in an "open" state, which means all signed and unsigned applications should work. However, customers can still reconfigure their MC3000s to operate in the "trusted" mode. This means that only applications signed with a certificate from the Privileged Execution Trust Certificate Store can run. To support the broadest number of deployments, third-party software developers should perform the following when releasing software for a Windows Mobile 6.1 devices: • Sign all their EXEs & DLLs with their private key • Provide the corresponding public certificate to end-users so that it can be installed into Privileged Execution Trust Certificate Store. If the software is installed via a .CAB file, developer should also: • Sign the .CAB file with their private key • Provide the corresponding public certificate to end-users so that it can be installed into SPC Certificate Store. Locking Down a Mobile Computer Like most configuration options in Windows Mobile 6.1, security settings are set via XML provisioning. For example, to enforce the "trusted" model and only allow applications signed with a privileged certificate to run, use the following provisioning document: For more information on various security options, refer to the Security Policy Settings topic in the latest Windows Mobile documentation.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236

5 - 2
MC3000 Integrator Guide
certificate, they are assured that the package is authentic and that it was created by Motorola. By enforcing the use
of digital signatures, users can also prevent malicious applications from executing on the MC3000. For example,
users can provision the MC3000 to only execute “trusted” applications (digitally signed).
Motorola ships all Windows Mobile 6.1 based products in an “open” state, which means all signed and unsigned
applications should work. However, customers can still reconfigure their MC3000s to operate in the “trusted” mode.
This means that only applications signed with a certificate from the Privileged Execution Trust Certificate Store can
run.
To support the broadest number of deployments, third-party software developers should perform the following
when releasing software for a Windows Mobile 6.1 devices:
Sign all their EXEs & DLLs with their private key
Provide the corresponding public certificate to end-users so that it can be installed into Privileged Execution
Trust Certificate Store.
If the software is installed via a .CAB file, developer should also:
Sign the .CAB file with their private key
Provide the corresponding public certificate to end-users so that it can be installed into SPC Certificate Store.
Locking Down a Mobile Computer
Like most configuration options in Windows Mobile 6.1, security settings are set via XML provisioning. For
example, to enforce the “trusted” model and only allow applications signed with a privileged certificate to run, use
the following provisioning document:
<wap-provisioningdoc>
<characteristic type=”SecurityPolicy”>
<!-- Disallow unsigned apps -->
<parm name= “4102” value= “0”/>
<!-- No Prompt -->
<parm name= “4122” value= “1”/>
</characteristic>
</wap-provisioningdoc>
For more information on various security options, refer to the Security Policy Settings topic in the latest Windows
Mobile documentation.