viii MC92N0-G Integrator Guide
Fusion Applications .............................................................................................................................. 5-3
Signal Strength Icon ............................................................................................................................ 5-3
Turning Off the Radio .......................................................................................................................... 5-4
On Windows CE Device ................................................................................................................. 5-4
On Windows Embedded Handheld Devices .................................................................................. 5-4
Chapter 6: Administrator Utilities
Required Software ............................................................................................................................... 6-1
On-device Application Installation ........................................................................................................ 6-1
Multi-user/AppLock Configuration ........................................................................................................ 6-2
Enterprise Administrator Application .................................................................................................... 6-2
Creating Users ............................................................................................................................... 6-2
Adding Packages ........................................................................................................................... 6-3
Creating Groups ............................................................................................................................. 6-4
Creating Remote Authentication .................................................................................................... 6-5
Save Data ...................................................................................................................................... 6-5
Exporting File ................................................................................................................................. 6-5
Importing User List ......................................................................................................................... 6-6
Importing Group List ...................................................................................................................... 6-6
Importing Package List .................................................................................................................. 6-6
Editing a User ................................................................................................................................ 6-6
Deleting a User .............................................................................................................................. 6-7
Editing a Group .............................................................................................................................. 6-7
Deleting a Group ............................................................................................................................ 6-7
Editing a Package .......................................................................................................................... 6-7
Deleting a Package ........................................................................................................................ 6-7
MultiUser Administrator ....................................................................................................................... 6-8
Importing a Password .................................................................................................................... 6-8
Disabling the Multi-user Feature .................................................................................................... 6-9
Enabling Remote Authentication .................................................................................................... 6-9
Disabling Remote Authentication ................................................................................................... 6-9
Enabling Data Separation .............................................................................................................. 6-9
Disabling Data Separation ............................................................................................................. 6-10
Delete User Data ........................................................................................................................... 6-10
Capturing a Log File ....................................................................................................................... 6-10
AppLock Administrator ......................................................................................................................... 6-11
Enabling Application Lock .............................................................................................................. 6-11
Disabling Application Lock ............................................................................................................. 6-11
Manual File Configuration .................................................................................................................... 6-11
Groups File .................................................................................................................................... 6-11
White List File ................................................................................................................................ 6-12
Package List File ............................................................................................................................ 6-12
Groups File .................................................................................................................................... 6-13
White List File ................................................................................................................................ 6-13
Determining Applications Installed on the Device .......................................................................... 6-14
Package List File ............................................................................................................................ 6-14
Secure Storage .................................................................................................................................... 6-16
Installing a Key ............................................................................................................................... 6-16
Viewing Key List ............................................................................................................................. 6-16