Important:
This is retired content. This content is outdated and is no longer being maintained. It is provided as a courtesy for individuals who are still using these technologies. This content may contain URLs that were valid when originally published, but now link to sites or pages that no longer exist.
4/8/2010

This example shows how to add certificates to the Privileged and Unprivileged stores, and how to add a certificate with its corresponding role mask to the SPC store.

Code Example

Copy Code
<Add>
   <CmdID>1</CmdID> 
   <Item>
	<Target>
	
<LocURI>./Vendor/MSFT/CertificateStore/Privileged%20Execution%20Trust%20Authorities/{sha1
hash of the certificate}/EncodedCertificate</LocURI> 
	</Target>
	<Data>{b-64 encoded certificate}</Data> 
	<Meta>
		 <Format xmlns="syncml:metinf">b64</Format> 
	</Meta>
   </Item>
</Add>
<Add>
   <CmdID>2</CmdID> 
   <Item>
	<Target>
	
<LocURI>./Vendor/MSFT/CertificateStore/Unprivileged%20Execution%20Trust%20Authorities/{sha1
hash of the certificate}/EncodedCertificate</LocURI> 
	</Target>
	<Data>{b-64 encoded certificate}</Data> 
	<Meta>
		 <Format xmlns="syncml:metinf">b64</Format> 
	</Meta>
   </Item>
</Add>
<Add>
   <CmdID>3</CmdID> 
   <Item>
	<Target>
		 <LocURI>./Vendor/MSFT/CertificateStore/SPC/{sha1
hash of the certificate}/EncodedCertificate</LocURI> 
	</Target>
	<Data>{encoded certificate}</Data> 
	<Meta>
		 <Format xmlns="syncml:metinf">b64</Format> 
	</Meta>
   </Item>
<Item>
   <Target>
   <LocURI>./Vendor/MSFT/CertificateStore/SPC/{hash of the
certificate}/Role</LocURI> 
   </Target>
   <Data>16</Data> 
   <Meta>
   <Format xmlns="syncml:metinf">int</Format> 
   </Meta>
   </Item>
   </Add>

Remarks

One provisioning XML file typically contains configuration information for multiple Configuration Service Providers. To use this example, you must replace the values as appropriate, and add the node as a child of the SyncBody node in an OMA DM provisioning file. For more information about the syntax of the provisioning file, see OMA DM Provisioning Files.

See Also