Few topics trip up BlackBerry developers more than the RIM security model. It can be extremely frustrating to take an app that works perfectly in the simulator and find that it won’t even start on a handset; or, worse, one that passes all your internal testing, but exhibits strange behavior in the field. Such problems are often the result of occasionally arcane security rules. Some of them you can bend, some you can break, and others you must live with: in all cases, though, just understanding them will allow you to make better decisions. This chapter examines the most important features of BlackBerry device security and how they affect your applications.
KeywordsSecurity Policy Company Network User Permission Application Permission Corporate Network
Unable to display preview. Download preview PDF.