Actions with trusted devices

This section contains information about actions with trusted devices.

In this section:

Adding a device to the Trusted list from the application interface

Adding devices to the Trusted list based on the device model or ID

Adding devices to the Trusted list based on the mask of the device ID

Configuring user access to a trusted device

Removing a device from the list of trusted devices

Importing the list of trusted devices

Exporting the list of trusted devices

Page top