Security Roles
Security roles are assigned to over-the-air (OTA) messages and determine which Windows Mobile device resources the message has access to. The security role is based on the message origin and how the message is signed. See Security Role Settings for the list of possible security roles.
Security Roles are also used with certificates to enforce security settings that were configured by using Security Policies. You can add or update the security roles for a specific certificate by using the CertificateStore Configuration Service Provider.
Security Roles for Smartphones
On Smartphones, security roles are checked and enforced. Configuration Manager ensures that the XML document has sufficient permission to change the specified registry key. For more information, see Effect of Device Management Policies on the OTA Process.
The following table lists common roles for Smartphones.
Role | Decimal value |
---|---|
SECROLE_MANAGER | 8 |
SECROLE_OEM | 2 |
SECROLE_OPERATOR | 4 |
SECROLE_OPERATOR_TPS | 128 |
SECROLE_PPG_TRUSTED | 2048 |
SECROLE_PPG_AUTH | 1024 |
SECROLE_TRUSTED_PPG | 512 |
SECROLE_KNOWN_PPG | 256 |
SECROLE_USER_AUTH | 16 |
SECROLE_USER_UNAUTH | 64 |
SECROLE_NONE | 0 |
Security Roles for Pocket PC
On Windows Mobile-based Pocket PC Phone Edition, the different levels of access to the resources of a device are enforced by the metabase, which is a repository of resources available for over-the-air (OTA) provisioning with associated access control rights. Pocket PC does no certificate checking for installation or execution of applications. Every application on Pocket PC has access to the entire system.
Every Pocket PC call into Configuration Manager has a role mask assigned, which determines its access to the system. All OTA configuration calls get role masks based on security policy settings and how the OTA message was signed.
In general, applications on Pocket PC have access to all system resources. On the device, all security roles are assigned to an application such that the application is automatically installed or automatically runs.
The following table lists common roles for Pocket PC Phone Edition.
Role | Decimal value |
---|---|
SECROLE_MANAGER | 8 |
SECROLE_OEM | 2 |
SECROLE_OPERATOR | 4 |
SECROLE_OPERATOR_TPS | 128 |
SECROLE_USER_AUTH | 16 |
SECROLE_USER_UNAUTH | 64 |
For more information about the decimal value for specific roles, see the access-role table in Metabase Configuration Service Provider.
See Also
Security Policies and Roles | Application Trust Levels | Metabase Provisioning | Modifying the Security Policy Provisioning Document
Send feedback on this topic to the authors.
© 2005 Microsoft Corporation. All rights reserved.