This is not the end-all-be-all but it's a good start. There are a lot of guides/videos out there - this is not an all-inclusive list, just a list of "trusted" or known sources.
Team Awareness/Tactical Assault Kit (TAK)
All things Team Awareness/Tactical Assault Kit (TAK)
Certificate error: peer not verified; error is presented when the public certificate being presented to the client does not match who signed the server you are connecting to.
If you're familiar with revoking certificates in TAK you will notice that you have to execute multiple tasks. With this script, you're able to execute this within your home directory using one step and a command.
If you want to implement additional security with TAK Certificates, this script generates a random password for each client certificate preventing the sharing of a common password.
Team Awareness/Tactical Awareness Kit (TAK) Microsoft Visio Stencils and Icons in PowerPoint Format.
So, you want to implement channels? The difference is groups are active 100% of the time they are applied. For example, if you're a member of multiple groups you participate in those groups no matter what. With channels, you can enable the groups you need at any time.
One of the first steps you should do after building your TAK environment is to secure your TAK Server and its clients. This is not a definitive guide on how to secure your environment but should serve as a reference and starting point if you're just getting started.
Creating a data package for TAK configuration/enrollment provides a turnkey solution for new clients. To summarize as a TAK administrator after provisioning the TAK credentials or certificate issuance process all that is required by the end user is a compressed file.
In this guide, we will cover creating and applying custom attributes to our users in AD/LDAP to apply to our ATAK Clients. Once we have created these custom attributes we will modify the TAK Server core configuration file to apply these attributes to newly enrolled ATAK clients.
Manage users and groups within a TAK Server using the local user and group manager or integrate your TAK Server into an AD/LDAP environment.