Table of Contents ix
Creating Groups ....................................................................................................................... 5-4
Creating Remote Authentication .............................................................................................. 5-5
Save Data ................................................................................................................................ 5-5
Exporting File ........................................................................................................................... 5-5
Importing User List ................................................................................................................... 5-6
Importing Group List ................................................................................................................. 5-6
Importing Package List ............................................................................................................. 5-6
Editing a User ........................................................................................................................... 5-6
Deleting a User ........................................................................................................................ 5-6
Editing a Group ........................................................................................................................ 5-6
Deleting a Group ...................................................................................................................... 5-7
Editing a Package .................................................................................................................... 5-7
Deleting a Package .................................................................................................................. 5-7
MultiUser Administrator .................................................................................................................. 5-8
Importing a Password .............................................................................................................. 5-8
Disabling the Multi-user Feature .............................................................................................. 5-9
Enabling Remote Authentication .............................................................................................. 5-9
Disabling Remote Authentication ........................................................................................... 5-10
Enabling Data Separation ...................................................................................................... 5-10
Disabling Data Separation ..................................................................................................... 5-10
Delete User Data .................................................................................................................... 5-10
Capturing a Log File ............................................................................................................... 5-11
AppLock Administrator ................................................................................................................. 5-12
Enabling Application Lock ...................................................................................................... 5-12
Disabling Application Lock ..................................................................................................... 5-12
Manual File Configuration ............................................................................................................ 5-12
Groups File ............................................................................................................................. 5-12
White List File ......................................................................................................................... 5-13
Package List File .................................................................................................................... 5-14
Groups File ............................................................................................................................. 5-14
White List File ......................................................................................................................... 5-14
Determining Applications Installed on the Device .................................................................. 5-15
Package List File .................................................................................................................... 5-15
Secure Storage ............................................................................................................................ 5-16
Installing a Key ....................................................................................................................... 5-16
Viewing Key List ..................................................................................................................... 5-16
Deleting a Key ........................................................................................................................ 5-17
Volumes ................................................................................................................................. 5-17
Creating Volume Using EFS File ..................................................................................... 5-17
Creating a Volume Manually ............................................................................................ 5-17
Mounting a Volume ................................................................................................................ 5-18
Listing Volumes ...................................................................................................................... 5-18
Unmounting a Volume ............................................................................................................ 5-18
Deleting a Volume .................................................................................................................. 5-18
Encrypting an SD Card .......................................................................................................... 5-19
Creating an EFS File .............................................................................................................. 5-19
Off-line Extraction Tool ........................................................................................................... 5-19
Usage ..................................................................................................................................... 5-19
Creating an Image .................................................................................................................. 5-20
Mounting an Image ................................................................................................................ 5-20