Child pages
  • Secure provisioning of Snom phones


Implementing a secure provisioning environment is fundamental when you are deploying phones in a untrusted environment.

During the provisioning the phone retrieves the device settings from the provisioning server, the transferred settings can contains also different types of credentials (SIP accounts, LDAP bind credentials, HTTP client credentials for XML applications, etc..).

Is fundamental that such credentials are not accessible from unwanted or malicious users, in order to protect those informations you must:

  • authenticate and authorize the requests to the data, so only valid users / devices can access the information
  • encrypt the transport of the data in order to avoid access to the informations via network sniffing

Snom phones uses TLS to provide all the needed security features for the provisioning.


Please visit our TLS feature page for more details.