Skip to content

Android Device Management

This section takes you through on how to manage your Android device fleet. Covered within this section are:

  • Available Features

    • Supported operations summary
    • Applicable policies summary
  • Android Device Operations

  • Add Operations to an Android Device

  • Android Device Policies

    • Add a Policy
    • View a Policy
    • Publish a Policy
    • Unpublish a Policy
    • Verify the Policy Enforced on a Device
    • Manage the Policy Priority Order
    • Updating a Policy
    • Description of Available Policies for Android Devices
  • Android Device Policy Restrictions

  • Android Device Remote Control
  • Android Device Information
  • Android Enterprise Guide

Features

Entgra IoTS 4.0.0 is a Google Enterprise Partner for Android.

Supported Operations Summary

Entgra IoT Server facilitates one time operations that can be performed remotely via the Device Management Console. These operations are useful for runtime maintenance of devices.

The type of operations available for Android devices and are applicable for each enrollment type is summed up as per the table below.

Applicable Policies Summary

The Policies that can be applied on an Android device depends on the way the device is enrolled with the server.

Accordingly, the table below indicates the policies applicable for each type of enrollment.

Restrictions Policies

Restriction Policies are those that can be applied on a device restricting or controlling the use of certain specific device features. There are a large number of restrictions that can be applied on an Android device.

The following table lists the available Restriction Policies for Android devices.

Android Device Operations

Add Operations to an Android Device

Prerequisites

Steps

  1. Click on the operation that you need to apply to the device. In this tutorial, let us apply the Ring device operation.

  2. A popup message will be displayed on the screen. And click Send to Device to confirm the operation.

Android Device Policies

Add New Policy

Prerequisites

Server has to be downloaded and started.

Must have been logged on to the server's Device Management Portal.

  1. Select Policies in the left navigation.

  2. Go to Create + and select Policy.

Add New Policy

  1. Select the platform by clicking ANDROID from the listed device types.

Add New Policy

  1. Create your policy.

In this tutorial, let us create a passcode policy. After defining the required settings, click CONTINUE.

Add New Policy

A profile in the context of Entgra IoT Server refers to a collection of policies. For example, in this use case you are only creating one policy that is the passcode policy. If you want to, you can add an restrictions policy too. All these policies will be bundled as a profile and then pushed to the devices.

  1. Select the policy type.

There are two types of policies.

General Policy: General policy is applied to the device by default.

Corrective Policy: Corrective policy is applied to the device when the general policy is violated. When the general policy is not violated the correctiv policy is disabled.

If you wish to apply a corrective policy with a general policy;

  • First apply a corrective policy by selecting the policy type as the corrective policy.

  • Then apply a general policy by selecting the policy type as the general policy.

  • Select the corrective policy to be applied when this general policy is violated.

Add New Policy

Add New Policy

  1. Click Continue.

  2. Define the user groups that the passcode policy needs to be assigned to:

Select Set User role(s) or Set user(s) option and then select the users/roles from the item list. For this example, let's select Set User role(s) and then select ANY here.

Add New Policy

  1. Click Continue.

  2. Set a name for your policy and add a description under Publish to devices.

  3. Click Save and publish to save and publish the configured profile as an active policy to the database.

Add New Policy

If you save the configured profile, it will be in the Inactive state and will not be applied to any devices. If you save and publish the configured profile of policies, it will be in Active state.

  1. You have now successfully created a new policy and applied it to devices. Click Go to Policies to view all applicable policies.

Add New Policy

Passcode Policy

Enforce a configured Passcode Policy on Android devices. Once this profile is applied, the device owners will not be be able to modify password settings on their devices.

Data Keys of Policy and its Descriptions

Allow simple value

Permits repeating, ascending and descending character sequences.

Allow alphanumeric value

The user must enter a password containing at least both numeric and alphabetic (or other symbol) characters.

Minimum passcode length

Set the required number of characters for the password. For example, you can require PIN or passwords to have at least six characters.

Minimum number of complex characters

Set the required number of letters, numericals digits, and special symbols that passwords must contain. Introduced in Android 3.0.

Maximum passcode age in days ( Should be in between 1-to-730 days or 0 for none )

Designates the full email address for the account. If not present in the payload, the device prompts for this string during profile installation.

Passcode history ( Should be in between 1-to-50 passcodes or 0 for none )

Number of consequent unique passcodes to be used before reuse

Maximum number of failed attempts before device lock

The maximum number of incorrect password entries allowed. If you fail to enter the correct password within the allowed number of attempts, the device will be locked.

Maximum number of failed attempts before device reset

Specifies how many times a user can enter the wrong password before the device wipes its data. The Device Administration API also allows administrators to remotely reset the device to factory defaults. This secures data in case the device is lost or stolen.

Time to auto lock seconds

Time it takes in seconds for the device to lock automatically when idle.

Passcode policy for work profile

Enabled Work profile passcode

Enable a passcode for work profile

Allow simple value

Permits repeating, ascending and descending character sequences.

Allow alphanumeric value

The user must enter a password containing at least both numeric and alphabetic (or other symbol) characters.

Minimum passcode length

Set the required number of characters for the password. For example, you can require PIN or passwords to have at least six characters.

Minimum number of complex characters

Set the required number of letters, numericals digits, and special symbols that passwords must contain. Introduced in Android 3.0.

Maximum passcode age in days ( Should be in between 1-to-730 days or 0 for none )

Designates the full email address for the account. If not present in the payload, the device prompts for this string during profile installation.

Passcode history ( Should be in between 1-to-50 passcodes or 0 for none )

Number of consequent unique passcodes to be used before reuse

Maximum number of failed attempts

Specifies how many times a user can enter the wrong password before the device wipes its data. The Device Administration API also allows administrators to remotely reset the device to factory defaults. This secures data in case the device is lost or stolen.

Time to auto lock seconds

Time it takes in seconds for the device to lock automatically when idle.

Android Policy Restrictions

The Restrictions Policy for Android devices enables restricting specific settings on the device. Once the profile with these configurations is installed on the device, the user is unable to modify those settings on his/her device.

Data Keys of Policy and its Descriptions

Allow use of camera

Selecting this feature enables the device to use camera.

Disable/Block Configuring Credentials

This configuration blocks the user from being able to configure credentials in the security certificates. In order to test this under Work Profile enrollment, enforce this policy on the device. Then go to device settings.

  1. Search for certificates, and click View Security Certificates.

Search for certificates
2. If you tap on certificates under personal, a pop-up will appear allowing you to turn off a certificate.

Search for certificates
3. Since the policy is applied under Work Profile enrollment, the turn-off button is disabled/not visible.

Disable/Block Configuring VPN

This restriction blocks configuring VPN settings. To test this under Work Profile enrollment, download a free VPN app, for example “turbo VPN” from play store and try to create a VPN connection. The application will show an error.

Disable/Block Configuring App Control

Specifies if a user is blocked from modifying applications in Settings or launchers. The following actions will not be allowed for the user when this restriction is enforced:

  • Uninstalling Apps

  • Disabling Apps

  • Clearing App caches

  • Clearing App Data

  • Force Stopping Apps

  • Clearing App Defaults

After applying the policy, try to remove an installed app, for example the VPN client from the device, and it will not work.

Search for certificates

In the first image, uninstall is disabled, and the second image is from Settings -> Apps -> Installed App. Click Uninstall or Force Stop, or under application’s storage, click Clear Data or Clear Cache. The policy will prevent you from doing so.

Disable/Block Cross Profile Copy-Paste

This feature disables text copy-pasting between Work Profile and the regular profile. To test how this works, you can go to an app where you can type text. For example, in the Google Playstore’s search box. Type some text and copy it. Next, try pasting the copied text into another app on the phone, that is not a part of the Work Profile container. The text will not be available. Remove the policy and retry.

Disable/Block Debugging

This feature blocks the ability to debug any application through the Android studio.

Disable Installing Apps

This will disable installing apps from the google play store.

Disable Installing from Unknown Sources

Install a browser such as chrome in the work profile and try to install an apk file from untrusted source such as

(https://github.com/selendroid/selendroid/raw/master/selendroid-standalone/src/test/resources/selendroid-test-app.apk)

This will be prevented by the OS.

Disable Modifying Accounts

Go to Settings -> “Cloud and accounts” -> “accounts” Under work, the add account will be disabled. Also if you go inside the existing Google account of the work profile and click on the 3 dot menu on the top right corner, the remove button is greyed out(Disabled).

Disable Outgoing Beams

This is related to NFC beams. Install an NFC app that sends some information to another. for example NFC contacts application into the work profile and try to send NFC beam to another NFC enabled device.

Disable Location Sharing

This restriction disables turning on location sharing. Under settings -> location -> the work profile and regular profiles location control is available.

Disable Uninstalling Apps

After enabling this restriction, install an app through the work profile and try to uninstall it and it is not allowed.

Disallow parent profile app linking

Allows apps in the parent profile to access or handle web links from the managed profile.

Disallow set wallpaper

By selecting this, it disables the abilty of the user to change the wallpaper.

Disallow set user icon

By selecting this, it disallows the user to change the user icon.

Disallow remove managed profile

If you try to remove the managed profile, it will not be enabled if this feature is selected.

Disable Autofill

This restriction will disable autofill services.To check, install a application that needs to enter user credintials to log in. when entering the credintials, device autofill service will ask to save credincials to autofill service (samsung devices uses samsung pass as default).After when this restiriction active,this auto fill service will be disabled.

Search for certificates

Disallow bluetooth

Bluetooth function will be disallowed on the device.

Disallow bluetooth sharing

Sharing data using bluetooth will be disabled by this feature.

Following set of restrictions require the device to be in device owner mode. Follow the documentation to get the device into device owner mode.

Ensure verifying apps

In settings, go to Google -> Work -> Security -> Verify apps -> Scan device for security threats is not configurable.

Enable auto timing

Search for automatic date and time in settings of the device and enabling/disabling this setting is controlled by this setting.

Disable screen capture

This will disable the ability to take screenshots by pressing the power key together with volume down.

Disable SMS

The user will not be allowed to send or receive SMS.

Disable Volume Adjust

This will disable the ability changing device volume. so the volume keys must not have an effect.

Disable Cell Broadcast

Disables cell broadcasting messages (message -> Settings -> Cell Broadcast).

Disable Configuring Bluetooth

This restriction will disable the Bluetooth settings in settings of the device.

Disable Configuring Mobile Networks

Under settings -> mobile networks -> mobile configurations menu disabling is achieved with this configuration.

Disable Configuring Tethering

This will disable the ability to configure mobile hotspots and tethering which is found in settings.

Disable Configuring WiFi

Disable the ability to configure wifi settings in device settings.

Disable Safe Boot

Disables the ability to safe boot a device to remove any apps installed. https://support.t-mobile.com/docs/DOC-34283

Disable Outgoing Calls

The user is not allowed to make outgoing phone calls. Emergency calls are still permitted.

Disable Mounting Physical Media

The user is disableed from mounting physical external media. Connect a Pendrive to the device via the OTG cable and the device will not allowed to mount Pendrive.

Disable Creating Window

Apps running are not allowed to create following types of windows.

LayoutParams#TYPE_TOAST LayoutParams#TYPE_PHONE LayoutParams#TYPE_PRIORITY_PHONE LayoutParams#TYPE_SYSTEM_ALERT LayoutParams#TYPE_SYSTEM_ERROR LayoutParams#TYPE_SYSTEM_OVERLAY LayoutParams#TYPE_APPLICATION_OVERLAY

To test, have an application that creates a toast and for example in the VPN app, when the VPN is created a toast may be shown and this must be Disableed with this setting.

Disable Factory Reset

Disabled the ability to factory set the device. Go to settings on the device, and the factory reset must be disabled.

Disable Remove User / Disable Add User

Multiple user profile control. The users are not allowed to remove or add. This may not be available in some Android devices.

Disable Network Reset

This restriction will disable network resetting and to check, type “reset network settings” in the settings search bar and the reset settings will be disabled.

Disable USB File Transfer

This restriction will disable the file transfer via USB.

Disable Factory Reset

Disabled the ability to factory set the device. Go to settings on the device, and the factory reset must be disabled.

Disable Unmute Microphone

This restriction will disable the microphone. Check the device microphone by using a recording app.

Below restrictions will be applied on devices with Android version 6.0 Marshmallow onwards only.

Disable status bar

This restriction will disable the device status bar.

Search for certificates

Disallow data roaming

By selecting this feature it disables the ability to use data while roaming

Enable device backup service

By selecting this you can enable the device backup service.

Disallow disable mobile data

By selecting this feature the user will not be able to disable mobile data on the device.

Below restrictions will be applicable when the agent is the device owner and Android version 9.0 (Pie) or higher.

Disallow airplane mode

When this restriction is enforced, it will be disabled the turning on airplane mode on the device. After adding this the device airplane mode will be disabled. When go to the settings->networks, in there the user can see how the restriction has been implemented.

Disallow config location

User is disallowed from enabling or disabling location. To test this restriction on the device, go to the location in the settings. In there the use location turn on button is disabled and the location accuracy part is also disabled.

Refer to Publish a Policy for instructions on how to publish a new policy in an Android device.

Encryption Settings

Refer to Add a Policy for instructions on how to add a new policy to an Android device.

This configuration can be used to encrypt data on an Android device, when the device is locked and make it readable when the passcode is entered. Once this configuration profile is installed on a device, corresponding users will not be able to modify these settings on their devices.

Data Keys of Policy and its Descriptions

Enable storage encryption

Encryption is the process of encoding all user data on an Android device using symmetric encryption keys. Having this checked would enable Storage-encryption in the device.

Search for certificates

Refer to Publish a Policy for instructions on how to publish a new policy in an Android device.

Access Point Name

Refer to Add a Policy for instructions on how to add a new policy to an Android device.

This configurations can be used to configure APN(Access Point Name) on an Android device. This policy will support with the Android 9.0 onwards. This will not work with the below versions. And also Agent must be the device owner to activate this policy.

Data Keys of Policy and its Descriptions

Name

String:The name to set for the APN This value may be null. Eg:Entgra

Entry Name

String:The entry name to set for the APN This value may be null. Eg:entgra

Proxy Address

String: the proxy address to set for the APN This value may be null. Eg: [192.168.8.1]

Proxy Port

int: the proxy port to set for the APN Eg:[ Target port 0-65535 ]

Username

String: the APN username to set for the APN This value may be null.

Password

String: the APN password to set for the APN This value may be null.

Server

String: the server set for the APN This value may be null.

MMSC

Uri: the MMSC Uri to set for the APN This value may be null. Eg:[ 192.168.8.1 ]

MMS Proxy Address

String: the MMS proxy address to set for the APN This value may be null. Eg:[ 192.168.8.1 ]

MMS Proxy Port

int: the MMS proxy port to set for the APN. Eg:[ Target port 0-65535 ]

MCC

int: the Mobile Country Code to set for the APN. Eg:413

MNC

int: the Mobile Network Code to set for the APN. Eg:02

Authentication Type

int: the authentication type to set for the APN Value

NONE

int: default Authentication Type for the APN. Constant Value: 0 (0x00000000)

PAP

int: Password Authentication Protocol for the APN. Constant Value: 1 (0x00000001)

CHAP

int: Challenge Handshake Authentication Protocol for the APN. Constant Value: 2 (0x00000002)

PAP_OR_CHAP

int: Authentication type for PAP or CHAP for the APN. Constant Value: 3 (0x00000003)

APN Type

int: Apn types are usage categories for an APN entry. One APN entry may support multiple APN types.

DEFAULT

int: APN type for default data traffic. Constant Value: 17 (0x00000011)

CBS

int: Carrier Branded Services for the APN. Constant Value: 128 (0x00000080)

DUN

int: Dial Up Networking bridge for the APN. Constant Value: 8 (0x00000008)

IMS

int: IP Multimedia Subsystem for the APN. Constant Value:64 (0x00000040)

MMS

int: Multimedia Messaging Service for the APN. Constant Value: 2 (0x00000002)

SUPL

int: APN type for SUPL assisted GPS. Constant Value: 4 (0x00000004)

IA

int: APN type for IA Initial Attach APN. Constant Value: 256 (0x00000100)

HIPRI

int: APN type for HiPri traffic. Constant Value: 16 (0x00000010)

FOTA

int: APN type for accessing the carrier's FOTA portal, used for over the air updates. Constant Value: 32 (0x00000020)

EMERGENCY

int: used for access to carrier services in an emergency call situation. Constant Value: 512 (0x00000200)

APN Protocol

int: Sets the protocol to use to connect to this APN

IPV4V6

int: Virtual PDP type introduced to handle dual IP stack UE capability. Constant Value: 2 (0x00000002)

IP

int: Internet protocol. Constant Value: 0 (0x00000000)

IPV6

int: Internet protocol, version 6. Constant Value: 1 (0x00000001)

PPP

int: Point to point protocol. Constant Value: 3 (0x00000003)

APN Roaming Protocol

int: Sets the protocol to use to connect to this APN when the device is roaming

IPV4V6

int: Virtual PDP type introduced to handle dual IP stack UE capability. Constant Value: 2 (0x00000002)

IP

int: Internet protocol. Constant Value: 0 (0x00000000)

IPV6

int: Internet protocol, version 6. Constant Value: 1 (0x00000001)

PPP

int: Point to point protocol. Constant Value: 3 (0x00000003)

APN Bearer

int: Sets Radio Technology (Network Type) info for this APN.

UNSPECIFIED

int: APN type for default data traffic.

LTE

int: Long Term Evolution is a standard in the communication of Mobile Phones used for data transfer

HSPAP

int: Dial Up Networking bridge for the APN. Constant Value: 8 (0x00000008)

HSPA

int:High Speed Packet Access

HSUPA

int: High Speed Uplink Packet Access

HSDPA

int: High Speed Download/Upload Packet Access

UMTS

int: Universal Mobile Telecommunications System

EDGE

int: Enhanced Data for GSM Evolution

GPRS

int: General Packet Radio Service. Constant Value: 32 (0x00000020)

eHRPD

int: Evolved High-Rate Packet Data

EVDO_0

int: Initial design of Evolution Data Optimized

EVDO_A

int: Several additions to the EVDO_0

EVDO_B

int: Multi-carrier evolution of the EVDO_A specification

1xRTT

int: Single carrier (1x) radio transmission technology

GSM

int: Global System for Mobile Communications

IWLAN

int: Industrial Wireless Local Area Network

APN Enable/Disable

boolean: the current status to set for this APN

Mobile Virtual Network Operator Type

int: Sets the Mobile Virtual Network Operator match type for this APN.

SPN

int: MVNO type for service provider name. Constant Value: 0 (0x00000000)

GID

int: MVNO type for group identifier level 1. Constant Value: 2 (0x00000002)

ICCID

int: MVNO type for Integrated Circuit Card ID. Constant Value: 3 (0x00000003)

IMSI

int:MVNO type for International Mobile Subscriber Identity Constant Value: 1 (0x00000001)

Wi-Fi Settings

Refer to Add a Policy for instructions on how to add a new policy to an Android device.

This configurations can be used to configure Wi-Fi access on an Android device. Once this configuration profile is installed on a device, corresponding users will not be able to modify these settings on their devices.

Data Keys of Policy and its Descriptions

Service Set Identifier (SSID)

The network's SSID. Can either be a UTF-8 string, which must be enclosed in double quotation marks (e.g., "MyNetwork"), or a string of hex digits, which are not enclosed in quotes (e.g., 01a243f405).

Security

Security type of the wireless network to be configured. 802.1x EAP works with Android 4.3 and above devices only.

WEP

WEP (Wired Equivalent Privacy) is a security algorithm for IEEE 802.11 wireless networks.

WPA/WPA 2 PSK

Wi-Fi Protected Access (WPA), Wi-Fi Protected Access II (WPA2) are the security protocols and security certification programs developed by the Wi-Fi Alliance to secure wireless computer networks.

802.1x EAP

EAP Method

EAP is an authentication framework for providing the transport and usage of material and parameters generated by EAP methods .

  • PEAP : PEAP (Protected Extensible Authentication Protocol) is a version of EAP, the authentication protocol used in wireless networks and Point-to-Point connections.

  • TLS : EAP uses TLS public key certificate authentication mechanism within EAP to provide mutual authentication of client to server and server to client

  • TTLS : The Tunneled TLS EAP method (EAP-TTLS) is very similar to EAP-PEAP in the way that it works and the features that it provides. The difference is t*hat instead of encapsulating EAP messages within TLS, the TLS payload of EAP-TTLS messages consists of a sequence of attributes.

  • PWD : EAP-PWD is highly secure (the password is never transmitted, even in encrypted form), and does not require PKI certificates, and also requires only 3 authentication round-trips.

  • SIM :

  • AKA : The AKA is defined in RFC 5448, and is used for non-3GPP access to a 3GPP core network. For example, via EVDO, WiFi, or WiMax.

Phase 2 Authentication

  • PAP : Password Authentication Protocol (PAP) is a password-based authentication protocol used by Point to Point Protocol (PPP) to validate users.
  • MCHAP :
  • MCHAPV2 :
  • GTC : Generic Token Card (GTC) carries a text challenge from the authentication server, and a reply generated by a security token.

Identity

Identity of the wireless network to be configured.

Anonymous Identity

Identity of the wireless network to be configured.

CA Certificate

CA Certificate for the wireless network.

Password

Password for the wireless network.

Enable force connect to WiFi

If this checkbox is ticked, the user will only be able to connect to the authorised WiFi networks with the SSIDs given above

Refer to Publish a Policy for instructions on how to publish a new policy in an Android device.

Global Proxy Settings

Refer to Add a Policy for instructions on how to add a new policy to an Android device.

This configurations can be used to set a network-independent global HTTP proxy on an Android device. Once this configuration profile is installed on a device, all the network traffic will be routed through the proxy server.

This profile requires the agent application to be the device owner. This proxy is only a recommendation and it is possible that some apps will ignore it.

Proxy Configuration Type

The type of configuration.

Data Keys of Policy and its Descriptions

Proxy Host

Host name/IP address of the proxy server. Eg:[ 192.168.8.1 ]

Proxy Port

Target port for the proxy server. Eg:[ Target port 0-65535 ]

Proxy Exclusion List

Add hostnames to this separated by commas to prevent them from routing through the proxy server. The hostname entries can be wildcards such as .example.com Eg:[ localhost, .example .com ]

Auto

Proxy PAC File URL

URL for the proxy auto config PAC script Eg: [ http://exampleproxy.com/proxy.pac ]

Refer to Publish a Policy for instructions on how to publish a new policy in an Android device.

Virtual Private Network

Refer to Add a Policy for instructions on how to add a new policy to an Android device.

VPN Settings

VPNs allow devices that aren’t physically on a network to securely access the network. Configure the OpenVPN settings on Android devices. In order to enable this, device needs to have “OpenVPN for Android” application installed.

Data Keys of Policy and its Descriptions

OpenVPN Server Config

Always On VPN Settings

Android can start a VPN service when the device boots and keep it running while the device is on. This feature is called always-on VPN and is available in Android 7.0 (API Level 24) or higher. Configure an always-on VPN connection through a specific VPN client application

Below configurations are valid only when the Agent is work-profile owner or device owner

Data Keys of Policy and its Descriptions

VPN Client Application Package Name

Package name of the VPN client application to be configured.

Refer to Publish a Policy for instructions on how to publish a new policy in an Android device.

Certificate Install Settings

Refer to Add a Policy for instructions on how to add a new policy to an Android device.

This configurations can be used to install certificate on an Android device.

Data Keys of Policy and its Descriptions

Certificate name

The file name of the enclosed certificate.

Certificate file

The base64 representation of the payload with a line length of 52.

Certificate type

Certificate should be a DER-encoded X.509 SSL certificate in format of .crt or .cer

Refer to Publish a Policy for instructions on how to publish a new policy in an Android device.

Device Profile Policy

Refer to Add a Policy for instructions on how to add a new policy to an Android device.

The configurations below can be applied to the devices where the agent is running in Android Work-Profile.

Data Keys of Policy and its Descriptions

Profile Name

Name of the Work-Profile created by IoT Server Agent

Enable System Apps

The system applications that needs to enabled in the work-profile.

Should be exact package names seperated by commas. Ex: com.google.android.apps .maps, com.google.android.calculator.

Hide System Apps

The system applications that needs to be hidden in the work-profile.

Should be exact package names seperated by commas. Ex: com.google.android.apps .maps, com.google.android.calculator.

Unhide System Apps

Should be exact package names seperated by commas. Ex: com.google.android.apps .maps, com.google.android.calculator.

Enable Google Play Store Apps

The applications that needs to be downloaded and installed from Google play store to the work-profile.

Should be exact package names seperated by commas. Ex: com .google.android.apps .maps, com.google.android.calculator.

Refer to Publish a Policy for instructions on how to publish a new policy in an Android device.

COSU Profile Configuration

Refer to Add a Policy for instructions on how to add a new policy to an Android device.

This policy can be used to configure the profile of COSU Devices

Data Keys of Policy and its Descriptions

Restrict Device Operation Time

Device will be operable only during the below time period.

Start Time

Start time for the device

End Time

Lock down time for the device

Device Global Configuration

Theme can be configured with the following options.

Launcher background image

This is the image that will be displayed in kiosk background. [ Should be a valid URL of jpg or jpeg or png ]

Company logo to display

Company logo to display in the kiosk app drower. [ Should be a valid URL ending with .jpg, .png, .jpeg ]

Company name

Name of the company that have to appear on the agent.

Is single application mode

This configuration allows user to enroll single application on Kiosk mode task.If user select more apps it will get the top most application.

Selected initial app in Enrollment Application Install policy config will be selected for single application mode. Atleast one application should be selected. If more than one application is beeing selected, then first selected application in the list will be installed as the single application mode.

Is application built for Kiosk

Is single mode app built for Kiosk. Enable if lock task method is called in the application.

Search for certificates

Is idle media enabled

This Configuration allows user to display idle timeout video on the device.

Data Keys of Policy and its Descriptions

Media to display while idle

Url of the media to display while the device is idle.[ Should be a valid URL ending with .jpg, .png, .jpeg, .mp4, .3gp, .wmv, .mkv ]

Idle graphic begin after(seconds)

Idle graphic begin after the defined seconds[ Idle timeout should be defined in seconds ]

Search for certificates Search for certificates

Keep display awake

Selecting this feature will keep the display on without a timeout.

Is multi-user device

If Is multi-user device enabled, multi-user configuration can be done for one device. Which enables to register already installed applications for registered users. After the policy is applied these applications can only be executed by logging in as the registered user. Other than this common applications which are common to all the users also can be specified by this policy.

Data Keys of Policy and its Descriptions

Is login needed for user switch

If this is enabled, the user should have valid user name and password to login to the device.

Primary User Apps

Primary User is the user to which the device is enrolled. The applications that are specified in here will be available by default. These applications can be used by any user. Provide comma separated package name or web clip details for applications. eg: com.google.android.apps.maps, {"identity":"http:entgra.io/","title":"entgra-webclip"}

Search for certificates

Search for certificates

Device display orientation

Data Keys of Policy and its Descriptions

Device display orientation

The display orientation of device can be set in a fixed mode.

  • Auto
  • Potrait
  • Landscape

Refer to Publish a Policy for instructions on how to publish a new policy in an Android device.

Application Restriction Settings

Refer to Add a Policy for instructions on how to add a new policy to an Android device.

This configuration can be used to create a black list or white list of applications.

Application blacklisting, is a network administration practice used to prevent the execution of undesirable programs. Such programs include not only those known to contain security threats or vulnerabilities but also those that are deemed inappropriate within a given organization.

Application whitelisting is the practice of specifying an index of approved software applications or executable files that are permitted to be present and active on a computer system. The goal of whitelisting is to protect computers and networks from potentially harmful applications.

Data Keys of Policy and its Descriptions

Select type

Select the type of restriction to proceed.

Restricted Application List

Application Name/Description

Eg: [ Gmail ]

Package Name

Eg: [ com.google.android.gm ]

Refer to Publish a Policy for instructions on how to publish a new policy in an Android device.

Runtime Permission Policy (COSU / Work Profile)

Refer to Add a Policy for instructions on how to add a new policy to an Android device.

This configuration can be used to set a runtime permission policy to an Android Device.

Already granted or denied permissions are not affected by this policy. Permissions can be granted or revoked only for applications built with a Target SDK Version of Android Marshmallow or later.

Data Keys of Policy and its Descriptions

Set default runtime permission

When an app requests a runtime permission, this enforces whether the user needs to prompted or the permission (PROMPT USER) either automatically granted (AUTO GRANT) or denied (AUTO DENY) .

Set app-specific runtime permissions

Application

Eg: [ Android Pay ]

Package Name

Eg: [ com.google.android.pay ]

Permission Name

Eg: [ android.permission.NFC ]

Permission Type

  • PROMPT USER
  • AUTO GRANT
  • AUTO DENY

Refer to Publish a Policy for instructions on how to publish a new policy in an Android device.

System Update Policy (COSU)

Refer to Add a Policy for instructions on how to add a new policy to an Android device.

This configuration can be used to set a passcode policy to an Android Device. Once this configuration profile is installed on a device, corresponding users will not be able to modify these settings on their devices.

Data Keys of Policy and its Descriptions

System Update

Type of the System Update to be set by the Device Owner

  • Automatic
  • Postpone
  • Window

Below configuration of start time and end time are valid only when window option is selected.

Start Time

Window start time for system update

End Time

Window end time for system update

Refer to Publish a Policy for instructions on how to publish a new policy in an Android device.

Enrollment Application Install

Refer to Add a Policy for instructions on how to add a new policy to an Android device.

Enforce applications to be installed during Android device enrollment.

This configuration will be applied only during Android device enrollment.

Data Keys of Policy and its Descriptions

Auto Install

When auto install is checked, then the applications that are selected will be installed autmatically.

Work profile global user configurations

App Auto Update Policy

  • When connected to wi-fi

  • Auto Update any time

  • Ask user to Update

  • Disable Auto Update

App Availability To A User

  • All Approved Apps for Enterprise

  • All Apps from Playstores

  • Only White-listed Apps

App Install Policy(Work profile only)

App Initial Install Mode

The auto install mode for the first time

  • Auto install once only when enrolling

  • Do not install automatically

  • Auto install even if uninstalled manually

Priority level when installing the app

Priority level when installing the app among many other apps

  • Lowest - Highest

Device charging state when installing apps

Device charging state when installing apps

  • Device must be charging

  • Device does not need to be charging

Device processor state when installing

  • Device does not need to be idling

  • Device does not need to be idling

Device network state when installing

Device processor state when installing

  • Device can be in any network

  • Device must be in an unmetered network

Refer to Publish a Policy for instructions on how to publish a new policy in an Android device.

Display Message Configuration

Refer to Add a Policy for instructions on how to add a new policy to an Android device.

This policy can be used to show the messages on the devices.To display the Lock screen message the device should have the device owner but the device owner does not need to display the long support message and the short support message.

Data Keys of Policy and its Descriptions

Lock Screen Message

Lock screen message works only for device owner. Once this message is applied to device it will show on the device lock screen and user can’t change it from the setting..

Setting App Support Message

Once this message is applied to devices the message will be displayed to the user in the device administrators settings screen.

Disabled Setting Support Message

Once this message is applied to devices the message will be displayed to the user in settings screens where functionality has been disabled by the admin.The message maximum length is 200 characters.

Refer to Publish a Policy for instructions on how to publish a new policy in an Android device.

App Usage Configuration

Refer to Add a Policy for instructions on how to add a new policy to an Android device.

This policy allow to define restrictions of the network usage and the data usage limits on individual apps. This policy is only applicable for COPE devices and Entgra Firewall must be installed for the restrictions to enforce

Data Keys of Policy and its Descriptions

Block application net usage

Using this policy, it is possible to completely block a set of applications from using internet or allow only a given set of applications to use internet and block eveything else.

Select the data restriction type.

Allow apps to use network

The list of apps mentioned here are the only applications allowed to use internet. The rest of the apps on the device cannot use internet.

Disallow apps to use network

The list of apps mentioned here are blocked from using internet. Rest of the apps on the device can use internet.

Add Applications

Application Name

A name to idetify the application. This can the name of the application on google playstore or any other name

Package Name

Package name of the application.

Network Usage Configuration

This policy allows to define the exact data usage limit for a given set of applications.

Package Name

Package name of the application.

Allowed Data

Amount of data alllow to be used by the app.

Unit

The unit of data mentioned in "Allowed data" field. Example if Allowed data is 1 and GB is selected, this means the package is allowed to use 1GB of data untill it is throtteled out.

Period

This is the period in which the allowed data is applied. After this period exceeds, the data usage counter for that app resets. Example: in the Allowed data is 1GB and the pediod is per day. This mean the application is allowed to use 1GB of data within a day.

Billing Date

If per billing date is selected in the above, this feild allows to define the billing date. This is a day of the month and alllows input of number 1-28. Example: if this field is set to 5, the billing cyce renews on every 5th day of every month.7

Refer to Publish a Policy for instructions on how to publish a new policy in an Android device.

Secure Browser Properties

This can be used to restrict properties of the web browser while using web views.

Data Keys of Policy and its Descriptions

Primary URL

Primary URL of the web view

Enable top control bar

Enables top control bar that displays all the controllers such as address bar, home button and forwards controllers

Enable Browser Address Bar

Enables address bar of the browser.

Is allow to go back on a page

Enables to go back in a page

Is allow to go forward on a page

Enables to go forward in a page

Is home button enabled

Enables browser's home button

Is page reload enabled

Enables page reload

Only allowed to visit the primary url

Enables visiting URLs other than the primary url

Is javascript enabled

Enables loading of javascript from the browser

Is copying text from browser enabled

Enables copying texts in the browser

Is downloading files enabled

Enable downloading files from the browser

Is Kiosk limited to one webapp

Sets whether device can access single or multiple web views

Is form auto-fill enabled

Enables autofill to forms in the browser

Is content access enabled

Enables content URL access within WebView. Content URL access allows WebView to load content from a content provider installed in the system.

Is file access enabled

Sets whether JavaScript running in the context of a file scheme URL should be allowed to access content from other file scheme URLs. .

Is allowed universal access from file URLs

Sets whether JavaScript running in the context of a file scheme URL should be allowed to access content from any origin.

Is application cache enabled.

Enables web view's application cache

Application cache file path

Sets the path to the Application Caches files. In order for the Application Caches API to be enabled, this method must be called with a path to which the application can write

Application cache mode

Overrides the way the cache is used. The way the cache is used is based on the navigation type. For a normal page load, the cache is checked and content is re-validated as needed. When navigating back, content is not re-validated, instead the content is just retrieved from the cache. This method allows the client to override this behavior by specifying one of LOAD_DEFAULT, LOAD_CACHE_ELSE_NETWORK, LOAD_NO_CACHE or LOAD_CACHE_ONLY

Should load images

Sets whether the browser should load image resources(through network and cached). Note that this method controls loading of all images, including those embedded using the data URI scheme.

Block image loads via network

Sets whether the browser should not load image resources from the network (resources accessed via http and https URI schemes)

Block all resource loads from network

title="Sets whether the browser should not load any resources from the network."

Support zooming

Sets whether the browser should support zooming using its on-screen zoom controls and gestures.

Show on-screen zoom controllers

Sets whether the browser should display on-screen zoom controls. Gesture based controllers are still available

Text zoom percentage

Sets the text zoom of the page in percent(Should be a positive number)

Default font size

Sets the default font size of the browser(Should be a positive number between 1 and 72)

Default text encoding name

Sets the default text encoding name to use when decoding html pages(Should a valid text encoding)

Is database storage API enabled

Sets whether the database storage API is enabled.

Is DOM storage API enabled

Sets whether the DOM storage API is enabled

Is Geolocation enabled

Sets whether Geolocation API is enabled

Can JavaScript open windows

JavaScript can open windows automatically or not. This applies to the JavaScript function window.open()

Sets whether the browser requires a user gesture to play media. If false, the browser can play media without user consent

Is safe browsing enabled

Sets whether safe browsing is enabled. Safe browsing allows browser to protect against malware and phishing attacks by verifying the links

Use wide view port

Sets whether the browser should enable support for the viewport HTML meta tag or should use a wide viewport. When the value of the setting is false, the layout width is always set to the width of the browser control in device-independent (CSS) pixels. When the value is true and the page contains the viewport meta tag, the value of the width specified in the tag is used. If the page does not contain the tag or does not provide a width, then a wide viewport will be used

Browser user agent string

Sets the WebView's user-agent string(Should be a valid user agent string)

Mixed content mode

Configures the browser's behavior when a secure origin attempts to load a resource from an insecure origin.

Secure browser properties

Allow list URLs

Only the URLs listed here will be allowed to be accessed by the browser. Set comma seperated URLs and only http(s) URLs are allowed.

Match domains only in allow list

If this feature is enforced only the URLs that matches the above allow list will be allowed to be accessed. if not any domain in the list will be allowed to be accessed.

Refer to Publish a Policy for instructions on how to publish a new policy in an Android device.

Enterprise Factory Reset Protection

Refer to Add a Policy for instructions on how to add a new policy to an Android device.

Using Enterprise Factory Reset Protection, organizations can specify which Google Accounts can provision a device that has been factory reset. Consumer factory reset protection is designed to deter device theft.

Before allowing anyone to provision the device after unauthorized factory reset, the setup wizard requires the user to authenticate against any Google Accounts that were previously on the personal profile of the device.

This policy works only for Android 5.1 (Lolipop) or later versions and for devices provisioned as Device Owner.

Data Keys of Policy and its Descriptions

Add Emails and Account IDs (Steps to obtain the Account ID)

To apply this policy to the device, email addresses and its account IDs should be given. Once the policy is applied on the device and after a hard reset, the device can be accessed only after providing any of the email address which was given in the policy.

How to get the get account ID to be used in the Policy?

  • Sign in with the Gmail address
  • Go to the Google GET People API https://developers.google.com/people/api/rest/v1/people/get
  • Provide people/me for the resourceName
  • Provide metadata for the personFields
  • Click Execute
  • Allow authorization access for the API
  • Use the account ID returned in the response

User Peripherals

Refer to Add a Policy for instructions on how to add a new policy to an Android device.

Configure these settings to manage the applications in the show message.

Data Keys of Policy and its Descriptions

Bluetooth Peripherals

The lists of apps the user allows or disallows will be in the allow list and/or the block list. Only the apps set by the user will be allowed.

Refer to Publish a Policy for instructions on how to publish a new policy in an Android device.

Speed Limit Policy

Refer to Add a Policy for instructions on how to add a new policy to an Android device.

When activated, this policy ensures that related corrective policies are applied if and when the set speed limit is exceeded on moving devices.

Using this policy, an administrator can define a speed limit on the device, which if exceeded, will result in subsequent corrective policies, such as disabling certain specific apps on the device, being applied.

Data Keys of Policy and its Descriptions

Set speed limit

Using this speed limit enterprices can catch device moving speed and apply corrective policies to do various actions.

Refer to Publish a Policy for instructions on how to publish a new policy in an Android device.

Android Device Remote Control

The remote control feature allows administrators to troubleshoot devices that are enrolled with Entgra IoT Server using the endpoint management console. You can create a remote session, send adb shell commands, view the device logs, chat with the end user, transfer the files with FTP server, and remotely view and interact with the screen of an Android device.

Let's take a look at how you can start using it.

BEFORE YOU BEGIN!

  • Make sure to enroll an Android device. For more information, see Android Device.
  • Make sure that your Android device supports the Android Lollipop (API level 21) version or above to use the screen feature.
  • The enrolled device needs to be connected to the network at all times.

Create a Remote Session

Follow the steps given below to create a remote session between the device and Entgra IoT Server:

  1. Start Entgra IoT Server.

  2. Access the endpoint management console: https://<IOTS_HTTPS_HOST>:9443/endpoint-mgt For example: https://localhost:9443/endpoint-mgt

  3. Sign in as an administrator. By default, the username is admin and the password is admin.
  4. Under DEVICES, click All devices.

    Remote Control

A page appears that lists all the devices that are enrolled with Entgra IoT Server because you have administrator privileges. If you do not have administrator privileges, you only the see the devices that you enrolled.

  1. Click on the device you want to troubleshoot. You will be taken to a page with device details.
  2. Click on the Remote Session tab.
  3. Click Connect to Device to start a remote session with the device. 

    Remote Control

  4. When the server connects to the device, you will see the following screen with Start screen share and Close Session options:

    Remote Control

You can now continue to troubleshoot the device as described in the next sections. To stop the remote sharing session, click Close Session.

Send adb Shell Commands

Android Debug Bridge (adb) is a command line tool that lets you communicate with an emulator or connected Android device. Follow the steps given below to troubleshoot the device using adb shell commands:

  1. If you haven't already set up a remote session, set it up now.
  2. Click Remote Shell.
  3. Write the shell command (see adb shell commands for the available commands) and press Enter.
    For example, if you want to get the CPU and memory usage of the device, use the top adb command.
    Sample output:

    Remote Control

View Device Logs

Logcat is a tool that displays messages from the device log in real time and keeps a history so you can view the old messages. Follow the steps given below to view the device logs.

  1. If you haven't already set up a remote session, set it up now.
  2. Click Logcat.

You can now see the log for the device. 

Remote Control

Chat with the User

Chat is a tool that can be used to communicate/connect with the device owner. The device owner can also communicate through the Entgra Device Management Agent.

  1. If you haven not already set up a remote session, set it up now.
  2. Click Chat.
  3. Type the message that you want to send and press Send.

    Remote Control

Transfer Files with FTP Server

File System is a file transferring tool to transfer the files from the local device to the FTP server and vice-versa. under the FTP server section in General Platform settings, you can add a new FTP server. In addition, the user has the ability to rename and delete files.

How to Transfer Files

  1. Click Platform Configurations under Configurations.
  2. Go to the General Configuration and select FTP server.
  3. Add a new FTP server in there and click Add.

    Remote Control

  4. Set up a remote session.

  5. Click File System.
  6. In the Local Files section, you can see all the files of your device. Select the added FTP server in the Server Files section. There, youwill see the files that are available on the server.

    Remote Control

  7. You can then transfer the files between the FTP server and your device. If you want to transfer files from your device to the server, select the file that you want to transfer and copy it. Paste that file in the desired location on the server. Follow the same steps if you want to transfer files from the server to the device.

Renaming Files

  1. Select a file that you want to rename and click Edit.

    Remote Control

  2. Rename the file and click OK.

    Remote Control

Deleting Files

  1. Click Delete on the record you want to delete and then click OK.

    Remote Control

View Device Screen Remotely

To troubleshoot a device, it can be helpful to view the device’s screen so you can monitor how the device owner is using it and then take actions yourself, such as opening applications and configuring settings.

To view the screen, take the following steps:

  1. If you haven not already set up a remote session, set it up now.
  2. Click Screen Share > Start.

    Remote Control

  3. A message is sent to the device asking the device owner to share the screen with Entgra IoT Server. After the device owner accepts this message, you can view the device’s screen.

  4. Click Stop Screen Share to stop viewing the screen of the device.

    Remote Control

View and Interact with the Device Remotely

Viewing the screen of the device alone does not help you to solve the issue. You need to be able to carry out actions on the shared screen to successfully troubleshoot the device. Follow the steps given below to try it out:

Remote Touch Inputs

Method 1 : Using Accessibility Service (For non rooted devices)

PREREQUISITES

  • Android OS version should be higher than Android 7.0 Nougat (API 24) or

  • Agent needs to run as a privileged system app. (has to have signed with system signing key and app needs to be a system app)

  • To start giving touch inputs using the mouse, device owner have to enable Entgra IoT Remote Touch accessibility service from automatically popped up settings page on the device. (If it's already enabled "Entgra IoT Remote Touch" accessibility service at enrollment, this step is not necessary)

Remote Control

Method 2 : Using System APIs

Remote Keyboard Inputs

  1. Click Start Remote Keyboard to enable the Entgra Remote Keyboard. Then it will pop up the setting screen which can enable the custom IME.

    Remote Control

  2. Once you enable that you have to choose the keyboard from the notification bar.

    Remote Control

    Remote Control

  3. After that you can give the inputs from your hardware keyboard.

Android Device Information

This section explains about the Device Infomation which can be seen in an Android Device.

Android Data Usage

This feature enables the measure of data usage of the devices over the last 30 days. It distinctly measures the usage of Mobile data and WiFi separately. The users can view this under the Device Information of the Agent.

Entgra Device Management Agent - Data Usage.

Android Enterprise Guide

What is Android Enterprise?

Android enterprise allows EMMs to integrate with Google Play and make the enrollment and management of your mobile devices and apps much easier. Android enterprise offers some unique enrollment flows which allows enterprises to gain full control over devices using Fully Managed and Dedicated Device enrollments.

Configure Android Enterprise

Before you start using the capabilities of Android enterprise, there is a configuration step that enables Entgra to connect to Google Enterprise. This step will allow Entgra to manage your device uniquely to your enterprise. In more technical terms, Entgra requires a special token to talk to Google APIs (known as ESA) and a unique enterprise ID to identify your organisation and its devices and apps uniquely.

The steps below will enable you to get these tokens:

Before we begin

  1. Get an access token from Entgra. This token provided by Entgra is only valid for a period of 1 hour. Therefore, please make sure to mention the time that you are planning to perform these steps. This is a token that gives you access to start the onboarding process which will allow you to register a new enterprise ID and a token from Google known as ESA.

    a. If you are using Entgra EMM cloud, create a new ticket in the support system with the following title Requesting a token for Android Enterprise Onboarding. In the description, please mention the time window you are planning to perform the onboarding steps. Example: We are planning to configure at 9AM EST on 24/02/2021.

    b. If you are using the on-premises version, please send an email to biz-dev@entgra.io with the following subject Requesting a token for Android enterprise onboarding. In the body, please mention the time window you are planning to perform the onboarding steps. Example: We are planning to configure at 9AM EST on 24/02/2021.

  2. You will need a Google account which is dedicated to EMM related work. We recommend creating a new Google account (a free account). Please keep this account details securely as this will be having administrative rights over your enterprise account.

  3. If you have any other Google accounts you have signed in using your browser, please open a private browser window and sign in to your new Google account.

  4. Before you begin, please note that during the onboarding process, you will be prompted to provide your organization name and fill the following form. Filling this form is optional based on your countries regulations such as GDPR. Also note that agreeing to the managed Google Play agreement at the bottom of this form is mandatory. Please review this prior to starting the onboarding process.

Google Play Agreement

Configuration Steps

  1. On the endpoint-mgt portal, Go to Android for work configuration section as shown in the bellow image.

    Google Play Agreement

  2. Under EMM initiating section, click here.

  3. A popup will be displayed as below. Enter the token you received from Entgra and click OK.

    Google Play Agreement

  4. You will be redirected to Google’s Enterprise onboarding page where you are required to provide your organisation name.

    Google Play Agreement

  5. Fill the form and click Confirm. On the next screen that appears, click Complete registration.

    Google Play Agreement

  6. You will be redirected to the platform configuration page. Stay on this page until you see the following notification on the top right corner that shows the end of successful completion of configurations.

    Google Play Agreement

Now the link between Entgra EMM and your new enterprise is established successfully! We have everything we need to start importing applications from Google Play store to the EMM server.

Importing Apps from Google Play Store

Although EMM server can now communicate with Google Play store, we need to define the exact apps that are to be imported to the EMM server. Importing the apps you need to EMM will bring all the icons, screenshots from Google Play Store to the EMM publisher portal, which will enable installing the same on devices. This import process allows you to import public apps on Play Store such as Gmail or facebook to the EMM publisher portal.

Steps

  1. Go to the publisher portal and hover over the Manage menu and click Android Enterprise.

    Google Play Agreement

  2. Next, click Approve applications.

    Google Play Agreement

  3. Now you will get a popup with the Google Play store where you can search for any application that you wish to import to the EMM server. Example: Gmail.

    Google Play Agreement

  4. Click Approve and you may need to approve the permissions for this application.

    Google Play Agreement

  5. Click Done and close the popup windows.

    Google Play Agreement

  6. Finally, click Sync to fetch all the approved applications to the EMM portal and automatically move them to the published state.

    Google Play Agreement

Authorize Devices to Install Apps

With Android enterprise, the EMM server plays a facilitator role or simply a UI where commands can be sent to Google. The actual app installation is done by the Google Play store. Therefore instructions must be given to Google Play store and allow the devices in EMM to be granted permission to install on devices.

There are 2 steps to achieve this:

  1. Define the Play Store layout
  2. Define which apps are allowed on which devices

Define the Play Store Layout

As shown in the enrollment using Android enterprise, a device that gets onboarded will get a Google account added to them. This means that there will be a Google Play store access to the specified user via the Play Store app on the device. As part of the authorization process, it is required to define how the apps were allowed to be available on the device and become visible to the user. In other words, we need to define the layout of the Google Play store app that becomes visible to the end user.

There are few parts in the Play Store app layout:

Google Play Agreement

  • Page - A Page consists of a set of app clusters. The page is vertically scrollable
  • Cluster - A cluster is a group of alls that are categories according to some logical need. Example: Business apps cluster, entertainment apps cluster, etc. A cluster resides in a page and a cluster is horizontally scrollable.
  • Quick Links - These appear at the top of every page and these are links to other pages

Create a Page

  1. Go to the publisher portal and hover over Manage menu and click Android Enterprise.
  2. Click Add new page.

    Google Play Agreement

  3. Enter a name for the page and click Create Page.

    Google Play Agreement

  4. In the pages list, click set as homepage to mark this new page as the first page in the Play Store.

    Google Play Agreement

Create a Cluster

  1. Selet a page from the list of pages, at the page list created earlier.
  2. Click Add new cluster.

    Google Play Agreement

  3. To name the cluster, click on the edit icon next to text New cluster.

    Google Play Agreement

  4. To add an app to the cluster, click Add app and select the app you wish to add from the popup and click OK.

    Google Play Agreement

  5. Click Save to save the cluster.

    Google Play Agreement

You can link multiple pages together by adding links to a page. Alternatively, follow the same procedure to remove already existing links from pages.

  1. Click on a page from the page list, that was created in the Create a Page step.
  2. Click Add/remove links.

    Google Play Agreement

  3. From the pop-up, add or remove pages to create/remove links and click Update.

    Google Play Agreement

Defining Permissible Apps Devices

When installing an app, it can be installed to the device groups, roles or users in the EMM server. At the same time, there are different properties such as whether to install the application while the device is plugged in to charging, whether to auto install app if the user tries to remove, etc. These properties need to be defined per user/group/role for better management. To achieve this, the process of defining the properties has been added to a policy.

  1. Create new policy or edit an existing policy and go to Enrollment Application Install Policy.

    Google Play Agreement

  2. Select the checkbox next to any app that you wish to make available to the assignees of this policy (devices in group/role/user).

    Google Play Agreement

  3. Select the Add configurations checkbox and fill the form.

    Google Play Agreement

    Per App Configuration Form Explanation

    Per App Configuration Form Explanation

    Input Field Dropdown Option Details
    App Initial Install Mode Auto install once only when enrolling
    Do not install automatically
    Auto install even if uninstalled manually
    Priority level when installing the app Highest to Lowest When there are multiple apps defined in the policy to be installed, the priority defined here will be used by playstore to determine which app to install first. Highest priority means the first to install.
    Device charging state when installing apps Device must be charging The app will not be installed until the device is connected to a charger
    Device does not need to be charging App will be installed regardless of the charging conditions of the device. However, please note on low power conditions, the device may behave based on the vendors preferences.
    Device processor state when installing Device does not need to be idling Install the application without considering the status of the device’s active state. i.e device does not need to be in the idle mode to start installation.
    Device must be idling
    Device network state when installing Device can be in any network App will be installed even if the device is on mobile data or even the network is marked metered.
    Device must be in an unmetered network Only install apps if the device is connected to WiFi

    Global Configurations for All Apps

    Global Configurations for All Apps

    There are 2 fields at the bottom of the Enrollment App Install policy which applies to all Android Enterprise enrolled devices that are configured via this policy. Given below is a description of those fields:

    Input Field Dropdown Option Details
    App Auto Update Policy When connected to WiFi Any updates to applications in the device can begin only on WiFi
    Auto Update Anytime Any updates to applications in the device can begin at anytime
    Ask User To Update Any updates to applications in the device will only begin when the user agrees to update
    Disable Auto Update Disable updates to applications. Users need to go to the playstore and manually update applications.
    App Availability to a User All Approved Apps For Enterprise Any app that has been imported to the EMM server via the Import apps from Google playstore step is available for the user of the device to install manually.
    All Apps From Play store Users are free to instal any application from the playstore.
    Only Allow listed Apps User can only install apps that are specifically allowed by filling the Per app configuration form above and applied via a policy.
  4. Click OK save and apply the policy to required devices.

Onboarding Devices

There are 2 ways to onboard a new device / a factory resetted device:

  1. Device enrollment with AFW identifier
  2. Enroll a device with QR code

If you have enrolled a device already using COPE mode, it is possible to still add a Google account and migrate the device to Fully Managed enrollment format. (Refer - Onboard already enrolled COPE devices)

Device Enrollment with AFW Identifier

Technical explanation on the enrollment method

You may skip this section if you wish to proceed straight with enrolling using the AFW method.

AFW based enrollment works by the device connecting to the Google Play store and downloading the Entgra agent application.

Given below is a rough explanation on the steps that happen.

Prerequisites

Factory reset a device and type in the Wifi credentials to join a network and be at the screen where you are prompted to enter Google account username.

Google Play Agreement

Steps

  1. User enters the special value afw#entgra and try to add a Google account. Device connects to Google backend and checks the EMM provider identifid by the ID afw#entgra.
  2. Google play will push the EMM agent of Entgra to the device.
  3. Agent gets installed and opened automatically.
  4. User needs to go to the QR scanning step as shown in the video and scan a QR code of type Fully managed.
  5. Entgra agent begins the enrollment.
  6. As part of the enrollment process, Entgra connects to Google play and creates a Google account on behalf of the device.
  7. Agent will add the new Google account with the help of Google play services.
  8. Agent will connect to EMM to check for policies. If there is a specified Enrollment app install policy for this user, the allowed apps will be picked and the EMM agent will provoke play store to install any required application based on the policy.
  9. Google will push apps to the device based on the policy given by the EMM agent.

Enroll a Device with AFW

AFW (Android for work) identifier is a special identifier used by Google to identify the EMM providers uniquely. Entgra’s identifier is afw#entgra.

Enroll a Device with QR Code

Instead of using the AFW base enrollment, it is possible to use the standard COPE enrollment. However, note that when generating a QR code, it is required to select Fully Managed instead of COPE. The rest of the steps are identical to the standard QR based COPE enrollment.

Enrollment Video

Enterprise Enrollment

Onboard Already Enrolled COPE Devices

If you have a device that is already onboarded as a COPE device, this device can be converted to a Fully managed device that works with Android enterprise.

  1. Go to the device that you need onboard as a fully managed device.
  2. Click Create Account and click OK.

    Google Play Agreement

Account creation will take a few minutes.