Binary Files
The application security configuration determines whether you must sign the binary files to run applications. Windows Mobile software for Smartphone supports the common application security configurations shown in the following table.
Application security configuration | PrivilegedApps policy setting | Unsigned Applications policy setting | Unsigned Prompt policy setting |
---|---|---|---|
Restricted | Two-tier security model | Unsigned applications cannot run | User is not prompted |
Standard | Two-tier security model | Unsigned applications can run | User is prompted |
Unrestricted | One-tier security model | Unsigned applications can run | User is prompted |
For information about specific policy settings, see Security Policy Settings.
If the application security configuration requires signed binary files, you must confirm the following to run applications:
- The revocation list does not include the certificate hashes.
- The revocation list does not include the binary file hashes.
- The certificate chain maps to a root certificate in the Privileged Execution Trust Authorities or the Unprivileged Execution Trust Authorities certificate store.
See Also
Application Security | Creating the Provisioning XML for Signed Binary Files
Last updated on Friday, April 22, 2005
© 2005 Microsoft Corporation. All rights reserved.
Send feedback on this topic to the authors.