viii MC92N0-G Integrator Guide
Creating Groups ....................................................................................................................... 6-4
Creating Remote Authentication .............................................................................................. 6-5
Save Data ................................................................................................................................ 6-5
Exporting File ........................................................................................................................... 6-5
Importing User List ................................................................................................................... 6-6
Importing Group List ................................................................................................................. 6-6
Importing Package List ............................................................................................................. 6-6
Editing a User ........................................................................................................................... 6-6
Deleting a User ........................................................................................................................ 6-6
Editing a Group ........................................................................................................................ 6-6
Deleting a Group ...................................................................................................................... 6-7
Editing a Package .................................................................................................................... 6-7
Deleting a Package .................................................................................................................. 6-7
MultiUser Administrator .................................................................................................................. 6-8
Importing a Password .............................................................................................................. 6-8
Disabling the Multi-user Feature .............................................................................................. 6-9
Enabling Remote Authentication .............................................................................................. 6-9
Disabling Remote Authentication ............................................................................................. 6-9
Enabling Data Separation ........................................................................................................ 6-9
Disabling Data Separation ..................................................................................................... 6-10
Delete User Data .................................................................................................................... 6-10
Capturing a Log File ............................................................................................................... 6-10
AppLock Administrator ................................................................................................................. 6-11
Enabling Application Lock ...................................................................................................... 6-11
Disabling Application Lock ..................................................................................................... 6-11
Manual File Configuration ............................................................................................................ 6-11
Groups File ............................................................................................................................. 6-11
White List File ......................................................................................................................... 6-12
Package List File .................................................................................................................... 6-13
Groups File ............................................................................................................................. 6-13
White List File ......................................................................................................................... 6-13
Determining Applications Installed on the Device .................................................................. 6-14
Package List File .................................................................................................................... 6-15
Secure Storage ...............................................................................................................
............. 6-16
Installing a Key ....................................................................................................................... 6-16
Viewing Key List ..................................................................................................................... 6-16
Deleting a Key ........................................................................................................................ 6-17
Volumes ................................................................................................................................. 6-17
Creating Volume Using EFS File ..................................................................................... 6-17
Creating a Volume Manually ............................................................................................ 6-17
Mounting a Volume ................................................................................................................ 6-18
Listing Volumes ...................................................................................................................... 6-18
Unmounting a Volume ............................................................................................................ 6-18
Deleting a Volume .................................................................................................................. 6-18
Creating an EFS File .............................................................................................................. 6-18
Off-line Extraction Tool ........................................................................................................... 6-19
Usage ..................................................................................................................................... 6-19
Creating an Image .................................................................................................................. 6-19
Mounting an Image ................................................................................................................ 6-20
Unmounting an Image ............................................................................................................ 6-20