This section contains information about actions with trusted devices.
In this section:
Adding a device to the Trusted list from the application interface
Adding devices to the Trusted list based on the device model or ID
Adding devices to the Trusted list based on the mask of the device ID
Configuring user access to a trusted device
Removing a device from the list of trusted devices
Importing the list of trusted devices
Exporting the list of trusted devices