SlideShare a Scribd company logo
Device Management Requirements
Hamdamboy Urunov, a Ph.D. Researcher.
Special Communication Research Center.,
Kookmin University
Seoul, South Korea
Approved Version 2.0 – 09 Feb 2016
Open Mobile Alliance
OMA-RD-DM-V2_0-20160209-A
Device Management release description
2
 DM is intended to operate over a HTTP transport protocol and notification
protocols in a platform neutral format.
End-to-end Service Description
• The DM 2.0 Enabler is based on RESTful architecture.
• This protocol allows simpler implementations of both DM clients and DM servers by reusing widely deployed
standard base technologies, such as HTTP, and JSON data representation.
• The DM 2.0 Enabler can handle existing Management Objects (MO) which are designed for working with DM
1.x Enabler.
Requirements
3
High-Level Functional Requirements
Label Description Release
DM-HLF-001 The DM enabler SHALL specify a mechanism for the DM Client to expose supported
MO types.
2.0
DM-HLF-002 The DM enabler SHALL support web browser or web browser component for the UI
functionality.
2.0
DM-HLF-003 The DM enabler SHALL support a mechanism for delivering the management data and
management commands separately.
2.0
DM-HLF-004 The DM enabler SHALL support delivery of management commands and management
data in the same message.
2.0
DM-HLF-005 The DM enabler SHALL support HTTP GET, POST, and PUT operations for device
management.
2.0
DM-HLF-006 The DM enabler SHALL support a mechanism for delivering information required for
bootstrapping.
2.0
DM-HLF-007 The DM enabler SHALL support interface to manipulate DM Management Tree 2.0
DM-HLF-008 The DM enabler SHALL provide a mechanism for the discovery of optional DM features
supported by the client
2.0
4
Label Description Release
DM-SEC-001 The DM enabler SHALL support authentication, authorization, integrity and
confidentiality.
2.0
DM-SEC-002 DM Enabler SHALL provide secure communication channel between DM Server and
DM Client
2.0
DM-SEC-003 DM Enabler SHALL support secure communication channel between Data Repository
and DM Client
2.0
Requirements (cont…)
Security
5
Label Description Release
DM-AT-001 DM Enabler SHALL provide mutual authentication between DM Server and DM Client 2.0
DM-AT-002 DM Enabler SHALL support mutual authentication between Data Repository and DM
Client
2.0
Requirements (cont…)
Security - Authentication
Security - Authorization
Label Description Release
DM-AZ-001 The DM enabler SHALL support a mechanism to separate the right for managing the
access control from managing data.
Informational Note: DM 1.3 use ‘Replace’ right for both managing data and the access
control.
2.0
DM-AZ-002 DM Enabler SHALL not allow un-authorized access from DM Client to DM Server 2.0
DM-AZ-003 DM Enabler SHALL not allow un-authorized access from DM Server to DM Client
6
Label Description Release
DM-ADM-001 DM Enabler SHALL allow the DM Server to use the same DM account across multiple
devices.
2.0
Requirements (cont…)
Administration and Configuration
Label Description Release
DM-INT-001 The DM enabler SHALL support the usage of MIME types for identifying the format of
the management data.
2.0
DM-INT-002 The DM enabler SHALL specify a JSON format for delivering a MO. 2.0
DM-INT-003 The DM enabler SHALL allow the servers to manage devices without the knowledge of
a MO location.
2.0
DM-INT-004 The DM enabler SHALL allow supported MOs to be described in separate DDF files. 2.0
DM-INT-005 The DM enabler SHALL support existing Management Objects which have been
designed to work with OMA DM 1.x.
2.0
Interoperability
7
Label Description Release
DM-SYS-001 The DM enabler SHALL allow state-less implementation of servers. 2.0
Overall System Requirements
General requirements for DM Enabler are
describe below:
Thank you
hamdamboy.urunov@gmail.com
8

More Related Content

What's hot

3429 How to transform your messaging environment to a secure messaging envi...
3429   How to transform your messaging environment to a secure messaging envi...3429   How to transform your messaging environment to a secure messaging envi...
3429 How to transform your messaging environment to a secure messaging envi...
Robert Parker
 
WebSphere Message Broker Training | IBM WebSphere Message Broker Online Training
WebSphere Message Broker Training | IBM WebSphere Message Broker Online TrainingWebSphere Message Broker Training | IBM WebSphere Message Broker Online Training
WebSphere Message Broker Training | IBM WebSphere Message Broker Online Training
ecorptraining2
 
Websphere MQ admin guide
Websphere MQ admin guideWebsphere MQ admin guide
Websphere MQ admin guide
Ram Babu
 
What's new in IBM MQ Messaging
What's new in IBM MQ MessagingWhat's new in IBM MQ Messaging
What's new in IBM MQ Messaging
MarkTaylorIBM
 
HHM-3481: IBM MQ for z/OS: Enhancing Application and Messaging Connectivity ...
 HHM-3481: IBM MQ for z/OS: Enhancing Application and Messaging Connectivity ... HHM-3481: IBM MQ for z/OS: Enhancing Application and Messaging Connectivity ...
HHM-3481: IBM MQ for z/OS: Enhancing Application and Messaging Connectivity ...
Matt Leming
 
IBM MQ - better application performance
IBM MQ - better application performanceIBM MQ - better application performance
IBM MQ - better application performance
MarkTaylorIBM
 
IBM WebSphere MQ for z/OS - Security
IBM WebSphere MQ for z/OS - SecurityIBM WebSphere MQ for z/OS - Security
IBM WebSphere MQ for z/OS - Security
Damon Cross
 
MQ Infrastructure of Today and Tomorrow
MQ Infrastructure of Today and TomorrowMQ Infrastructure of Today and Tomorrow
MQ Infrastructure of Today and Tomorrow
Prolifics
 
Securing Lotus Domino for the Web - Email Relay
Securing Lotus Domino for the Web - Email RelaySecuring Lotus Domino for the Web - Email Relay
Securing Lotus Domino for the Web - Email Relay
John Lawren James
 
IBM MQ - Monitoring and Managing Hybrid Messaging Environments
IBM MQ - Monitoring and Managing Hybrid Messaging EnvironmentsIBM MQ - Monitoring and Managing Hybrid Messaging Environments
IBM MQ - Monitoring and Managing Hybrid Messaging Environments
MarkTaylorIBM
 
Ibm websphere mq
Ibm websphere mqIbm websphere mq
Ibm websphere mqRakeshtoodi
 
IBM MQ V8 Security
IBM MQ V8 SecurityIBM MQ V8 Security
IBM MQ V8 Security
Morag Hughson
 
IBM MQ v8 and JMS 2.0
IBM MQ v8 and JMS 2.0IBM MQ v8 and JMS 2.0
IBM MQ v8 and JMS 2.0
Matthew White
 
websphere MQ training Online
websphere MQ training Onlinewebsphere MQ training Online
websphere MQ training Online
Divya Angel
 
An Introduction to the Message Queuing Technology & IBM WebSphere MQ
An Introduction to the Message Queuing Technology & IBM WebSphere MQAn Introduction to the Message Queuing Technology & IBM WebSphere MQ
An Introduction to the Message Queuing Technology & IBM WebSphere MQ
Ravi Yogesh
 
IBM MQ Channel Authentication
IBM MQ Channel AuthenticationIBM MQ Channel Authentication
IBM MQ Channel AuthenticationIBM Systems UKI
 
Virtual migration cloud
Virtual migration cloudVirtual migration cloud
Virtual migration cloud
Shalini Toluchuri
 
IBM MQ Overview (IBM Message Queue)
IBM MQ Overview (IBM Message Queue)IBM MQ Overview (IBM Message Queue)
IBM MQ Overview (IBM Message Queue)
Juarez Junior
 

What's hot (20)

3429 How to transform your messaging environment to a secure messaging envi...
3429   How to transform your messaging environment to a secure messaging envi...3429   How to transform your messaging environment to a secure messaging envi...
3429 How to transform your messaging environment to a secure messaging envi...
 
WebSphere Message Broker Training | IBM WebSphere Message Broker Online Training
WebSphere Message Broker Training | IBM WebSphere Message Broker Online TrainingWebSphere Message Broker Training | IBM WebSphere Message Broker Online Training
WebSphere Message Broker Training | IBM WebSphere Message Broker Online Training
 
Websphere MQ admin guide
Websphere MQ admin guideWebsphere MQ admin guide
Websphere MQ admin guide
 
What's new in IBM MQ Messaging
What's new in IBM MQ MessagingWhat's new in IBM MQ Messaging
What's new in IBM MQ Messaging
 
HHM-3481: IBM MQ for z/OS: Enhancing Application and Messaging Connectivity ...
 HHM-3481: IBM MQ for z/OS: Enhancing Application and Messaging Connectivity ... HHM-3481: IBM MQ for z/OS: Enhancing Application and Messaging Connectivity ...
HHM-3481: IBM MQ for z/OS: Enhancing Application and Messaging Connectivity ...
 
IBM MQ - better application performance
IBM MQ - better application performanceIBM MQ - better application performance
IBM MQ - better application performance
 
WebSphere MQ introduction
WebSphere MQ introductionWebSphere MQ introduction
WebSphere MQ introduction
 
IBM WebSphere MQ for z/OS - Security
IBM WebSphere MQ for z/OS - SecurityIBM WebSphere MQ for z/OS - Security
IBM WebSphere MQ for z/OS - Security
 
MQ Infrastructure of Today and Tomorrow
MQ Infrastructure of Today and TomorrowMQ Infrastructure of Today and Tomorrow
MQ Infrastructure of Today and Tomorrow
 
IBM MQ V8 annd JMS 2.0
IBM MQ V8 annd JMS 2.0IBM MQ V8 annd JMS 2.0
IBM MQ V8 annd JMS 2.0
 
Securing Lotus Domino for the Web - Email Relay
Securing Lotus Domino for the Web - Email RelaySecuring Lotus Domino for the Web - Email Relay
Securing Lotus Domino for the Web - Email Relay
 
IBM MQ - Monitoring and Managing Hybrid Messaging Environments
IBM MQ - Monitoring and Managing Hybrid Messaging EnvironmentsIBM MQ - Monitoring and Managing Hybrid Messaging Environments
IBM MQ - Monitoring and Managing Hybrid Messaging Environments
 
Ibm websphere mq
Ibm websphere mqIbm websphere mq
Ibm websphere mq
 
IBM MQ V8 Security
IBM MQ V8 SecurityIBM MQ V8 Security
IBM MQ V8 Security
 
IBM MQ v8 and JMS 2.0
IBM MQ v8 and JMS 2.0IBM MQ v8 and JMS 2.0
IBM MQ v8 and JMS 2.0
 
websphere MQ training Online
websphere MQ training Onlinewebsphere MQ training Online
websphere MQ training Online
 
An Introduction to the Message Queuing Technology & IBM WebSphere MQ
An Introduction to the Message Queuing Technology & IBM WebSphere MQAn Introduction to the Message Queuing Technology & IBM WebSphere MQ
An Introduction to the Message Queuing Technology & IBM WebSphere MQ
 
IBM MQ Channel Authentication
IBM MQ Channel AuthenticationIBM MQ Channel Authentication
IBM MQ Channel Authentication
 
Virtual migration cloud
Virtual migration cloudVirtual migration cloud
Virtual migration cloud
 
IBM MQ Overview (IBM Message Queue)
IBM MQ Overview (IBM Message Queue)IBM MQ Overview (IBM Message Queue)
IBM MQ Overview (IBM Message Queue)
 

Similar to oma dm-requirment

Product description of net numen _m3_(cdma_omc)
Product description of net numen _m3_(cdma_omc)Product description of net numen _m3_(cdma_omc)
Product description of net numen _m3_(cdma_omc)
Adeep Asaad
 
Introduction to OMA LightweightM2M by OMA Device Management Chairman (IoT Wor...
Introduction to OMA LightweightM2M by OMA Device Management Chairman (IoT Wor...Introduction to OMA LightweightM2M by OMA Device Management Chairman (IoT Wor...
Introduction to OMA LightweightM2M by OMA Device Management Chairman (IoT Wor...
Open Mobile Alliance
 
One m2m 3- managment_capability
One m2m 3- managment_capabilityOne m2m 3- managment_capability
One m2m 3- managment_capability
Hamdamboy (함담보이)
 
F5_and_Azure_v3.pptx
F5_and_Azure_v3.pptxF5_and_Azure_v3.pptx
F5_and_Azure_v3.pptx
RifqiMultazamOfficia
 
Cambium ptp 300 series 05 02 release note
Cambium ptp 300 series 05 02 release noteCambium ptp 300 series 05 02 release note
Cambium ptp 300 series 05 02 release noteAdvantec Distribution
 
Cambium ptp 300 series 05 02 release note
Cambium ptp 300 series 05 02 release noteCambium ptp 300 series 05 02 release note
Cambium ptp 300 series 05 02 release noteAdvantec Distribution
 
Comtrend Products Catalogue 2011.pdf
Comtrend Products Catalogue 2011.pdfComtrend Products Catalogue 2011.pdf
Comtrend Products Catalogue 2011.pdfComtrend Corporation
 
Securing your IBM MQ environment.
Securing your IBM MQ environment.Securing your IBM MQ environment.
Securing your IBM MQ environment.
Robert Parker
 
Device Management with OMA Lightweight M2M
Device Management with OMA Lightweight M2MDevice Management with OMA Lightweight M2M
Device Management with OMA Lightweight M2M
Hannes Tschofenig
 
OMA LWM2M Tutorial by ARM to IETF ACE
OMA LWM2M Tutorial by ARM to IETF ACEOMA LWM2M Tutorial by ARM to IETF ACE
OMA LWM2M Tutorial by ARM to IETF ACE
Open Mobile Alliance
 
Movimento Management Protocols
Movimento Management ProtocolsMovimento Management Protocols
Movimento Management Protocols
Leo Dumov
 
One m2m 2. requirements
One m2m 2. requirements One m2m 2. requirements
One m2m 2. requirements
Hamdamboy (함담보이)
 
OMA LWM2M overview
OMA LWM2M overviewOMA LWM2M overview
OMA LWM2M overview
Alexandre Moreno
 
Mule anypoint b2 b
Mule  anypoint b2 bMule  anypoint b2 b
Mule anypoint b2 b
D.Rajesh Kumar
 
Mule B2B
Mule B2BMule B2B
Mule B2B
charan teja R
 
Anypoint b2 b
Anypoint b2 bAnypoint b2 b
Anypoint b2 b
himajareddys
 
Mule b2 b
Mule  b2 bMule  b2 b
Mule b2 b
himajareddys
 
M11 - Securing your MQ environment. Integration technical conference 2019
M11 - Securing your MQ environment. Integration technical conference 2019M11 - Securing your MQ environment. Integration technical conference 2019
M11 - Securing your MQ environment. Integration technical conference 2019
Robert Parker
 
M14: MQ security deep dive ITC 2019
M14: MQ security deep dive ITC 2019M14: MQ security deep dive ITC 2019
M14: MQ security deep dive ITC 2019
Robert Parker
 
Concurrent And Independent Access To Encrypted Cloud Databases
Concurrent And Independent Access To Encrypted Cloud DatabasesConcurrent And Independent Access To Encrypted Cloud Databases
Concurrent And Independent Access To Encrypted Cloud Databases
Editor IJMTER
 

Similar to oma dm-requirment (20)

Product description of net numen _m3_(cdma_omc)
Product description of net numen _m3_(cdma_omc)Product description of net numen _m3_(cdma_omc)
Product description of net numen _m3_(cdma_omc)
 
Introduction to OMA LightweightM2M by OMA Device Management Chairman (IoT Wor...
Introduction to OMA LightweightM2M by OMA Device Management Chairman (IoT Wor...Introduction to OMA LightweightM2M by OMA Device Management Chairman (IoT Wor...
Introduction to OMA LightweightM2M by OMA Device Management Chairman (IoT Wor...
 
One m2m 3- managment_capability
One m2m 3- managment_capabilityOne m2m 3- managment_capability
One m2m 3- managment_capability
 
F5_and_Azure_v3.pptx
F5_and_Azure_v3.pptxF5_and_Azure_v3.pptx
F5_and_Azure_v3.pptx
 
Cambium ptp 300 series 05 02 release note
Cambium ptp 300 series 05 02 release noteCambium ptp 300 series 05 02 release note
Cambium ptp 300 series 05 02 release note
 
Cambium ptp 300 series 05 02 release note
Cambium ptp 300 series 05 02 release noteCambium ptp 300 series 05 02 release note
Cambium ptp 300 series 05 02 release note
 
Comtrend Products Catalogue 2011.pdf
Comtrend Products Catalogue 2011.pdfComtrend Products Catalogue 2011.pdf
Comtrend Products Catalogue 2011.pdf
 
Securing your IBM MQ environment.
Securing your IBM MQ environment.Securing your IBM MQ environment.
Securing your IBM MQ environment.
 
Device Management with OMA Lightweight M2M
Device Management with OMA Lightweight M2MDevice Management with OMA Lightweight M2M
Device Management with OMA Lightweight M2M
 
OMA LWM2M Tutorial by ARM to IETF ACE
OMA LWM2M Tutorial by ARM to IETF ACEOMA LWM2M Tutorial by ARM to IETF ACE
OMA LWM2M Tutorial by ARM to IETF ACE
 
Movimento Management Protocols
Movimento Management ProtocolsMovimento Management Protocols
Movimento Management Protocols
 
One m2m 2. requirements
One m2m 2. requirements One m2m 2. requirements
One m2m 2. requirements
 
OMA LWM2M overview
OMA LWM2M overviewOMA LWM2M overview
OMA LWM2M overview
 
Mule anypoint b2 b
Mule  anypoint b2 bMule  anypoint b2 b
Mule anypoint b2 b
 
Mule B2B
Mule B2BMule B2B
Mule B2B
 
Anypoint b2 b
Anypoint b2 bAnypoint b2 b
Anypoint b2 b
 
Mule b2 b
Mule  b2 bMule  b2 b
Mule b2 b
 
M11 - Securing your MQ environment. Integration technical conference 2019
M11 - Securing your MQ environment. Integration technical conference 2019M11 - Securing your MQ environment. Integration technical conference 2019
M11 - Securing your MQ environment. Integration technical conference 2019
 
M14: MQ security deep dive ITC 2019
M14: MQ security deep dive ITC 2019M14: MQ security deep dive ITC 2019
M14: MQ security deep dive ITC 2019
 
Concurrent And Independent Access To Encrypted Cloud Databases
Concurrent And Independent Access To Encrypted Cloud DatabasesConcurrent And Independent Access To Encrypted Cloud Databases
Concurrent And Independent Access To Encrypted Cloud Databases
 

More from Hamdamboy (함담보이)

Network Management System and Protocol
Network Management System and Protocol Network Management System and Protocol
Network Management System and Protocol
Hamdamboy (함담보이)
 
The constrained application protocol (co ap) implementation-part5
The constrained application protocol (co ap) implementation-part5The constrained application protocol (co ap) implementation-part5
The constrained application protocol (co ap) implementation-part5
Hamdamboy (함담보이)
 
The constrained application protocol (co ap) implementation-part4-1
The constrained application protocol (co ap) implementation-part4-1The constrained application protocol (co ap) implementation-part4-1
The constrained application protocol (co ap) implementation-part4-1
Hamdamboy (함담보이)
 
The constrained application protocol (co ap) part 3
The constrained application protocol (co ap)  part 3The constrained application protocol (co ap)  part 3
The constrained application protocol (co ap) part 3
Hamdamboy (함담보이)
 
The constrained application protocol (co ap) part 2
The constrained application protocol (co ap)  part 2The constrained application protocol (co ap)  part 2
The constrained application protocol (co ap) part 2
Hamdamboy (함담보이)
 
Message queuing telemetry transport (mqtt)and part 3 and summarizing
Message queuing telemetry transport (mqtt)and  part 3 and summarizingMessage queuing telemetry transport (mqtt)and  part 3 and summarizing
Message queuing telemetry transport (mqtt)and part 3 and summarizing
Hamdamboy (함담보이)
 
Message queuing telemetry transport (mqtt) message format
Message queuing telemetry transport (mqtt) message formatMessage queuing telemetry transport (mqtt) message format
Message queuing telemetry transport (mqtt) message format
Hamdamboy (함담보이)
 
Message queuing telemetry transport (mqtt) launch
Message queuing telemetry transport (mqtt) launchMessage queuing telemetry transport (mqtt) launch
Message queuing telemetry transport (mqtt) launch
Hamdamboy (함담보이)
 
Message queuing telemetry transport (mqtt) id and other type parameters
Message queuing telemetry transport (mqtt) id and other type parametersMessage queuing telemetry transport (mqtt) id and other type parameters
Message queuing telemetry transport (mqtt) id and other type parameters
Hamdamboy (함담보이)
 
007 nms smi, oid, snmp method
007 nms smi, oid, snmp method007 nms smi, oid, snmp method
007 nms smi, oid, snmp method
Hamdamboy (함담보이)
 
001 implementation nms_software
001 implementation nms_software001 implementation nms_software
001 implementation nms_software
Hamdamboy (함담보이)
 
One m2m 4- identifier_resoruce structure
One m2m 4- identifier_resoruce structureOne m2m 4- identifier_resoruce structure
One m2m 4- identifier_resoruce structure
Hamdamboy (함담보이)
 
The constrained application protocol (coap) part 3
The constrained application protocol (coap)  part 3The constrained application protocol (coap)  part 3
The constrained application protocol (coap) part 3
Hamdamboy (함담보이)
 
The constrained application protocol (coap) part 2
The constrained application protocol (coap)  part 2The constrained application protocol (coap)  part 2
The constrained application protocol (coap) part 2
Hamdamboy (함담보이)
 
The constrained application protocol (CoAP)
The constrained application protocol (CoAP)The constrained application protocol (CoAP)
The constrained application protocol (CoAP)
Hamdamboy (함담보이)
 
Internet of things
Internet of thingsInternet of things
Internet of things
Hamdamboy (함담보이)
 

More from Hamdamboy (함담보이) (16)

Network Management System and Protocol
Network Management System and Protocol Network Management System and Protocol
Network Management System and Protocol
 
The constrained application protocol (co ap) implementation-part5
The constrained application protocol (co ap) implementation-part5The constrained application protocol (co ap) implementation-part5
The constrained application protocol (co ap) implementation-part5
 
The constrained application protocol (co ap) implementation-part4-1
The constrained application protocol (co ap) implementation-part4-1The constrained application protocol (co ap) implementation-part4-1
The constrained application protocol (co ap) implementation-part4-1
 
The constrained application protocol (co ap) part 3
The constrained application protocol (co ap)  part 3The constrained application protocol (co ap)  part 3
The constrained application protocol (co ap) part 3
 
The constrained application protocol (co ap) part 2
The constrained application protocol (co ap)  part 2The constrained application protocol (co ap)  part 2
The constrained application protocol (co ap) part 2
 
Message queuing telemetry transport (mqtt)and part 3 and summarizing
Message queuing telemetry transport (mqtt)and  part 3 and summarizingMessage queuing telemetry transport (mqtt)and  part 3 and summarizing
Message queuing telemetry transport (mqtt)and part 3 and summarizing
 
Message queuing telemetry transport (mqtt) message format
Message queuing telemetry transport (mqtt) message formatMessage queuing telemetry transport (mqtt) message format
Message queuing telemetry transport (mqtt) message format
 
Message queuing telemetry transport (mqtt) launch
Message queuing telemetry transport (mqtt) launchMessage queuing telemetry transport (mqtt) launch
Message queuing telemetry transport (mqtt) launch
 
Message queuing telemetry transport (mqtt) id and other type parameters
Message queuing telemetry transport (mqtt) id and other type parametersMessage queuing telemetry transport (mqtt) id and other type parameters
Message queuing telemetry transport (mqtt) id and other type parameters
 
007 nms smi, oid, snmp method
007 nms smi, oid, snmp method007 nms smi, oid, snmp method
007 nms smi, oid, snmp method
 
001 implementation nms_software
001 implementation nms_software001 implementation nms_software
001 implementation nms_software
 
One m2m 4- identifier_resoruce structure
One m2m 4- identifier_resoruce structureOne m2m 4- identifier_resoruce structure
One m2m 4- identifier_resoruce structure
 
The constrained application protocol (coap) part 3
The constrained application protocol (coap)  part 3The constrained application protocol (coap)  part 3
The constrained application protocol (coap) part 3
 
The constrained application protocol (coap) part 2
The constrained application protocol (coap)  part 2The constrained application protocol (coap)  part 2
The constrained application protocol (coap) part 2
 
The constrained application protocol (CoAP)
The constrained application protocol (CoAP)The constrained application protocol (CoAP)
The constrained application protocol (CoAP)
 
Internet of things
Internet of thingsInternet of things
Internet of things
 

Recently uploaded

How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 

Recently uploaded (20)

How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 

oma dm-requirment

  • 1. Device Management Requirements Hamdamboy Urunov, a Ph.D. Researcher. Special Communication Research Center., Kookmin University Seoul, South Korea Approved Version 2.0 – 09 Feb 2016 Open Mobile Alliance OMA-RD-DM-V2_0-20160209-A
  • 2. Device Management release description 2  DM is intended to operate over a HTTP transport protocol and notification protocols in a platform neutral format. End-to-end Service Description • The DM 2.0 Enabler is based on RESTful architecture. • This protocol allows simpler implementations of both DM clients and DM servers by reusing widely deployed standard base technologies, such as HTTP, and JSON data representation. • The DM 2.0 Enabler can handle existing Management Objects (MO) which are designed for working with DM 1.x Enabler.
  • 3. Requirements 3 High-Level Functional Requirements Label Description Release DM-HLF-001 The DM enabler SHALL specify a mechanism for the DM Client to expose supported MO types. 2.0 DM-HLF-002 The DM enabler SHALL support web browser or web browser component for the UI functionality. 2.0 DM-HLF-003 The DM enabler SHALL support a mechanism for delivering the management data and management commands separately. 2.0 DM-HLF-004 The DM enabler SHALL support delivery of management commands and management data in the same message. 2.0 DM-HLF-005 The DM enabler SHALL support HTTP GET, POST, and PUT operations for device management. 2.0 DM-HLF-006 The DM enabler SHALL support a mechanism for delivering information required for bootstrapping. 2.0 DM-HLF-007 The DM enabler SHALL support interface to manipulate DM Management Tree 2.0 DM-HLF-008 The DM enabler SHALL provide a mechanism for the discovery of optional DM features supported by the client 2.0
  • 4. 4 Label Description Release DM-SEC-001 The DM enabler SHALL support authentication, authorization, integrity and confidentiality. 2.0 DM-SEC-002 DM Enabler SHALL provide secure communication channel between DM Server and DM Client 2.0 DM-SEC-003 DM Enabler SHALL support secure communication channel between Data Repository and DM Client 2.0 Requirements (cont…) Security
  • 5. 5 Label Description Release DM-AT-001 DM Enabler SHALL provide mutual authentication between DM Server and DM Client 2.0 DM-AT-002 DM Enabler SHALL support mutual authentication between Data Repository and DM Client 2.0 Requirements (cont…) Security - Authentication Security - Authorization Label Description Release DM-AZ-001 The DM enabler SHALL support a mechanism to separate the right for managing the access control from managing data. Informational Note: DM 1.3 use ‘Replace’ right for both managing data and the access control. 2.0 DM-AZ-002 DM Enabler SHALL not allow un-authorized access from DM Client to DM Server 2.0 DM-AZ-003 DM Enabler SHALL not allow un-authorized access from DM Server to DM Client
  • 6. 6 Label Description Release DM-ADM-001 DM Enabler SHALL allow the DM Server to use the same DM account across multiple devices. 2.0 Requirements (cont…) Administration and Configuration Label Description Release DM-INT-001 The DM enabler SHALL support the usage of MIME types for identifying the format of the management data. 2.0 DM-INT-002 The DM enabler SHALL specify a JSON format for delivering a MO. 2.0 DM-INT-003 The DM enabler SHALL allow the servers to manage devices without the knowledge of a MO location. 2.0 DM-INT-004 The DM enabler SHALL allow supported MOs to be described in separate DDF files. 2.0 DM-INT-005 The DM enabler SHALL support existing Management Objects which have been designed to work with OMA DM 1.x. 2.0 Interoperability
  • 7. 7 Label Description Release DM-SYS-001 The DM enabler SHALL allow state-less implementation of servers. 2.0 Overall System Requirements General requirements for DM Enabler are describe below: