Editing Enterprise Provisioning
Warning: You are not logged in.
Your IP address will be recorded in this page's edit history.
The edit can be undone.
Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 13: | Line 13: | ||
=== The wireless challenge === | === The wireless challenge === | ||
- | Accessing a company network usually requires some keys that are available only inside the network to be accessed. | + | Accessing a company network usually requires some keys that are available only inside the network to be accessed. This is roughly equal with the starting point of provisioning a wireless device. |
- | For illustration, picture a man standing at the courtyard of a house. Inside the house, all room doors are locked. In a hallway there is a strongbox with a combination lock. Inside strongbox are keys to all room doors. The man knows the strongbox lock combination. The only problem is that the front the door of the house is locked as well and the man does not have the key. The front door key is in the strongbox | + | For illustration, picture a man standing at the courtyard of a house. Inside the house, all room doors are locked. In a hallway there is a strongbox with a combination lock. Inside strongbox are keys to all room doors. The man knows the strongbox lock combination. The only problem is that the front the door of the house is locked as well and the man does not have the key. The front door key is in the strongbox. |
=== Additional challenges === | === Additional challenges === |
Learn more about Contributing to the wiki.