A computer system attempts to authenticate with a server to gain
authorization to access a first network. It is determined by the server
that the computer system is not authorized to access the first network.
The computer system is given authorization to access a second network for
at least the purpose of downloading files (e.g., signup and configuration
files) needed to access the first network. A user-interface for receiving
user-entered signup information is automatically presented at the
computer system. A first schema-based document including user-entered
information is transferred to the server. If the server determines that
the user-entered information is appropriate, a second-schema document,
which includes an indication of authorization to access the first network
(e.g., a user-identifier and password), is received. A third schema-based
document is executed at the computer system to compatibly configure the
computer system for accessing the first network.