The help for this version of the solution is no longer updated, so it may contain outdated information. For up-to-date information about the solution refer to the Kaspersky Secure Mobility Management 4.1 Help.
Device owner mode
This section contains information about how to manage the settings of Android mobile devices in device owner mode. For information about device owner mode deployment, see here.
Device owner mode offers the following features and control options for Android mobile devices:
Page top
[Topic 241818]
The help for this version of the solution is no longer updated, so it may contain outdated information. For up-to-date information about the solution refer to the Kaspersky Secure Mobility Management 4.1 Help.
Restricting Android features on devices
Expand all | Collapse all
You can restrict Android operating system features in device owner mode. For example, you can restrict factory reset, changing credentials, use of Google Play and Google Chrome, file transfer over USB, changing location settings, and manage system updates.
You can restrict Android features in the Feature restrictions section.
To open the Feature restrictions section:
- In the console tree, in the Managed devices folder, select the administration group to which the Android devices belong.
- In the workspace of the group, select the Policies tab.
- Open the policy properties window by double-clicking any column.
Complete the following steps within 15 minutes. Otherwise, you may face an error when saving changes to the policy.
- In the policy Properties window, select the Device owner mode > Feature restrictions section.
Restrict device features
On the Device Features tab of the Feature restrictions section, you can enable or disable the following features:
- Prohibit factory reset
Selecting or clearing this check box specifies whether the device user is allowed to perform a factory reset from device settings.
This check box is cleared by default.
- Prohibit screen sharing, recording, and screenshots
Selecting or clearing this check box specifies whether the device user is allowed to take screenshots, record and share the device screen. It also specifies whether the contents of the device screen are allowed to be captured for artificial intelligence purposes.
This check box is cleared by default.
- Prohibit changing language (Android 9 or later)
Selecting or clearing the check box specifies whether the device user is allowed to change the device language.
This restriction is supported on devices with Android 9 or later.
This check box is cleared by default.
On some devices (for example, Xiaomi, TECNO, and Realme) running Android 9 or later, when you select the Prohibit changing language check box in device owner mode, the user still can change the language, and no warning message appears.
- Prohibit changing date, time, and time zone (Android 9 or later)
Selecting or clearing the check box specifies whether the device user is allowed to change date, time, and time zone in Settings.
This restriction is supported on devices with Android 9 or later.
This check box is cleared by default.
- Prohibit adding and removing Google accounts
Selecting or clearing the check box specifies whether the device user is allowed to add and remove Google accounts.
This check box is cleared by default.
- Prohibit adjusting volume and mute device
Restricts volume adjustment and muting the device.
If the check box is selected, the device user can't adjust the volume and the device is muted.
If the check box is cleared, the device user can adjust the volume and the device is unmuted.
Anti-Theft can play a sound on the device disregarding of this restriction. The restriction is disabled to allow to play the sound, and then re-enabled.
This check box is cleared by default.
- Prohibit outgoing phone calls
Selecting or clearing this check box specifies whether the device user is allowed to make outgoing phone calls on this device.
This check box is cleared by default.
- Prohibit sending and receiving SMS messages
Selecting or clearing this check box specifies whether the device user is allowed to send and receive SMS messages on this device.
This check box is cleared by default.
- Prohibit changing credentials
Selecting or clearing this check box specifies whether the device user is allowed to change user credentials in the operating system.
This check box is cleared by default.
- Prohibit keyguard camera
Selecting or clearing the check box specifies whether the device user is prohibited to use camera when the device is locked.
This check box is cleared by default.
- Prohibit keyguard notifications
Selecting or clearing the check box specifies whether notifications are prohibited when the device screen is locked.
This check box is available only if the Prohibit keyguard features check box is selected. Otherwise, the Prohibit keyguard notifications check box is cleared and disabled.
This check box is cleared by default.
- Prohibit keyguard trust agents
Selecting or clearing this check box specifies whether trusted apps are prohibited when the device screen is locked. Trusted apps are apps that allow the device user to unlock the device without a password, PIN, or fingerprint.
This check box is available only if the Prohibit keyguard features check box is selected. Otherwise, the Prohibit keyguard trust agents check box is cleared and disabled.
This check box is cleared by default.
- Disable keyguard swipe
Selecting or clearing the check box specifies whether a user's device can be unlocked with a swipe.
This setting has no effect if a password, PIN-code, or pattern is currently set as an unlocking method on the device.
This check box is cleared by default.
- Prohibit adjusting brightness (Android 9 or later)
Selecting or clearing the check box specifies whether the device user is allowed to adjust brightness on the mobile device.
This restriction is supported on devices with Android 9 or later.
This check box is cleared by default.
- Prohibit ambient display (Android 9 or later)
If this option is enabled, the user cannot use the Ambient Display feature on the device.
By default, the option is disabled.
- Force screen on when plugged in to AC charger (Android 6 or later)
Selecting or clearing the check box specifies if the device screen will be on while the device is charging with an AC charger.
The restriction is supported on devices with Android 6 or later.
This check box is cleared by default.
- Force screen on when plugged in to USB charger (Android 6 or later)
Selecting or clearing of the check box specifies whether the device screen will be on while the device is charging via a USB charger.
The restriction is supported on devices with Android 6.0 or later.
This check box is cleared by default.
- Force screen on when plugged in to wireless charger (Android 6 or later)
Selecting or clearing this check box specifies whether the device screen will be on while the device is charging via a wireless charger.
The restriction is supported on devices with Android 6 or later.
This check box is cleared by default.
- Prohibit changing wallpaper (Android 7.0 or later)
Selecting or clearing the check box specifies whether the device user is allowed to change the wallpaper on the mobile device.
This restriction is supported on devices with Android 7.0 or later.
This check box is cleared by default.
- Prohibit status bar (Android 6 or later)
Preventing the status bar from being displayed.
If the check box is selected, the status bar is not displayed on the device. Notifications and quick settings accessible via the status bar are also blocked.
If the check box is cleared, the status bar can be displayed on the device.
The restriction is supported on devices with Android 6 or later.
This check box is cleared by default.
- Prohibit adding users
Selecting or clearing the check box specifies whether the device user is allowed to add new users.
This check box is selected by default. If device owner mode was enrolled via a QR code, the restriction is enabled and can't be disabled.
The restriction can be disabled only on devices that meet the following requirements:
- The device owner mode was enrolled via the
adb.exe
installation package. - The device must support multiple users.
- Prohibit switching user (Android 9 or later)
If this option is enabled, the user cannot switch the current user of the device.
By default, the option is disabled.
- Prohibit removing users
Selecting or clearing the check box specifies whether the device user is allowed to remove users.
This check box is selected by default. If device owner mode was enrolled via a QR code, the restriction can't be disabled.
The restriction can be disabled only on devices that meet the following requirements:
- The device owner mode was enrolled via the
adb.exe
installation package. - The device must support multiple users.
- Prohibit safe boot (Android 6 or later)
Selecting or clearing this check box specifies whether the device user is allowed to boot the device in safe mode.
The restriction is supported on devices with Android 6 or later.
This check box is cleared by default.
- Prohibit unmuting microphone
If this option is enabled, the device microphone is muted.
If this option is disabled, the user can unmute the microphone and adjust its volume.
By default, the option is disabled.
- Prohibit disabling microphone (Android 12 or later)
If this option is enabled, the user cannot disable access to the microphone via the system toggle on the device. If access to the microphone on the device is disabled when this option is enabled, it is automatically re-enabled.
By default, the option is disabled.
On some Xiaomi and HUAWEI devices running Android 12, this restriction does not work. This issue is caused by the specific features of MIUI firmware on Xiaomi devices and EMUI firmware on HUAWEI devices.
If this option is enabled, the device does not display content suggestions depending on the currently displayed contents. Examples of content suggestions are: suggested contacts, emoticons, next words.
By default, the option is disabled.
Restrict app features
On the Apps tab of the Feature restrictions section, you can enable or disable the following features:
- Prohibit use of camera
Selecting or clearing the check box specifies whether the device user is allowed to use all cameras on the device.
If the check box is selected, our solution usually blocks the camera. However, for Asus and OnePlus devices, the camera app icon is completely hidden when the check box is selected.
This check box is cleared by default.
- Prohibit camera toggle (Android 12 or later)
Preventing the device user from toggling the camera.
If the check box is selected, the device user cannot block the camera access via the system toggle.
If the check box is cleared, the device user is allowed to use the camera toggle.
The restriction is supported on devices with Android 12 or later.
This check box is cleared by default.
On some Xiaomi and HUAWEI devices running Android 12, this restriction does not work. This issue is caused by the specific features of MIUI firmware on Xiaomi devices and EMUI firmware on HUAWEI devices.
- Prohibit use of Google Play
Selecting or clearing the check box specifies whether the device user is allowed to use Google Play.
This check box is cleared by default.
- Prohibit use of Google Chrome
Preventing use of Google Chrome.
If the check box is selected, the device user cannot start Google Chrome or configure it in system settings.
If the check box is cleared, the device user is allowed to use Google Chrome on the device.
The check box is cleared by default.
- Prohibit use of Google Assistant
Selecting or clearing the check box specifies whether the device user is allowed to use Google Assistant on the device.
This check box is cleared by default.
- Prohibit installation of apps from unknown sources
Selecting or clearing the check box specifies whether the device user is allowed to install apps from unknown sources.
This check box is cleared by default.
- Prohibit modification of apps in Settings
Preventing modifying apps in Settings.
If the check box is selected, the device user is disallowed to perform the following actions:
- Uninstalling apps
- Disabling apps
- Clearing app caches
- Clearing app data
- Force stopping apps
- Clearing app defaults
If the check box is cleared, the device user is allowed to modify apps in Settings.
This check box is cleared by default.
- Prohibit installation of apps
Selecting or clearing the check box specifies whether the device user is allowed to install apps on the device.
This check box is cleared by default.
- Prohibit uninstallation of apps
Selecting or clearing the check box specifies whether a device user is allowed to uninstall apps from this device.
This check box is cleared by default.
- Prohibit disabling app verification
Selecting or clearing the check box specifies whether the device user is allowed to disable app verification.
This check box is cleared by default.
- Granting runtime permissions for apps
The Granting runtime permissions for apps setting allows you to select an action to be performed when apps installed on devices in device owner mode are running and request additional permissions. This does not apply to permissions granted in device Settings (e.g. Access All Files).
- Prompt the user for permissions
When a permission is requested, the user decides whether to grant the specified permission to the app.
This option is selected by default.
- Grant permissions automatically
All apps installed on devices in device owner mode are granted permissions without user interaction.
- Deny permissions automatically
All apps installed on devices in device owner mode are denied permissions without user interaction.
Users can adjust app permissions in device settings before these permissions are denied automatically.
On Android 12 or later, the following permissions can't be granted automatically but can be denied automatically. If you select Grant permissions automatically, the app will prompt the user for these permissions:
- Location permissions
- Permissions for camera
- Permissions to record audio
- Permission for activity recognition
- Permissions to access body sensors data
Restrict storage features
On the Storage tab of the Feature restrictions section, you can enable or disable the following features:
- Prohibit debugging features
Preventing use of debugging features.
If the check box is selected, the device user cannot use USB debugging features and developer mode.
If the check box is cleared, the device user is allowed to enable and access debugging features and developer mode.
This check box is cleared by default.
- Prohibit mounting physical external media
Selecting or clearing the check box specifies whether the device user is allowed to mount physical external media, such as SD cards and OTG adapters.
This check box is cleared by default.
- Prohibit file transfer over USB
Selecting or clearing this check box specifies whether the device user is allowed to transfer files over USB.
This check box is cleared by default.
- Prohibit backup service (Android 8.0 or later)
Selecting or clearing the check box specifies whether the device user is allowed to enable or disable the backup service.
The restriction is supported on devices with Android 8.0 or later.
This check box is cleared by default.
Restrict network features
On the Network tab of the Feature restrictions section, you can enable or disable the following features:
- Prohibit use of Wi-Fi
Selecting or clearing the check box specifies whether the device user is allowed to use Wi-Fi and configure it in Settings.
This check box is cleared by default.
- Prohibit enabling/disabling Wi-Fi (Android 13 or later)
If this option is enabled, the user cannot enable or disable Wi-Fi on the device. Also, Wi-Fi cannot be disabled via airplane mode.
By default, the option is disabled.
- Prohibit changing Wi-Fi settings
Selecting or clearing the check box specifies whether the device user is allowed to configure Wi-Fi access points via Settings. The restriction does not affect Wi-Fi tethering settings.
This check box is cleared by default.
- Prohibit Wi-Fi Direct (Android 13 or later)
If this option is enabled, the user cannot use the Wi-Fi Direct feature on the device.
By default, the option is disabled.
- Prohibit sharing pre-configured Wi-Fi networks (Android 13 or later)
If this option is enabled, the user cannot share Wi-Fi networks that are configured in the policy settings. Other Wi-Fi networks on the device are not affected.
By default, the option is disabled.
- Prohibit adding Wi-Fi networks (Android 13 or later)
If this option is enabled, the user cannot manually add new Wi-Fi networks on the device.
By default, the option is disabled.
- Prohibit changing pre-configured Wi-Fi networks
Selecting or clearing the check box specifies whether the device user is allowed to change Wi-Fi configurations added by the administrator in the Wi-Fi section.
This check box is cleared by default.
- Prohibit airplane mode (Android 9 or later)
Selecting or clearing the check box specifies whether the device user is allowed to enable airplane mode on the device.
This restriction is supported on devices with Android 9 or later.
This check box is cleared by default.
- Prohibit use of Bluetooth (Android 8.0 or later)
Preventing use of Bluetooth.
If the check box is selected, the device user cannot turn on and configure Bluetooth via Settings.
If the check box is cleared, the device user is allowed to use Bluetooth.
The restriction is supported on devices with Android 8.0 and later. For earlier versions of Android, select the Prohibit use of Bluetooth check box in the Device Management section.
This check box is cleared by default.
- Prohibit changing Bluetooth settings
Selecting or clearing the check box specifies whether the device user is allowed to configure Bluetooth via Settings.
This check box is cleared by default.
- Prohibit outgoing data sharing over Bluetooth (Android 8.0 or later)
Selecting or clearing the check box specifies whether outgoing Bluetooth data sharing is allowed on the device.
The restriction is supported on devices with Android 8.0 or later.
This check box is cleared by default.
- Prohibit changing VPN settings
Preventing changing VPN settings.
If the check box is selected, the device user cannot configure a VPN in Settings and VPNs are prohibited from starting.
If the check box is cleared, the device user is allowed to modify a VPN in Settings.
This check box is cleared by default.
- Prohibit resetting network settings (Android 6 or later)
Selecting or clearing the check box specifies whether the device user is allowed to reset network settings in Settings.
This restriction is supported on devices with Android 6 or later.
This check box is cleared by default.
- Prohibit changing mobile network settings
Selecting or clearing the check box specifies whether the device user is allowed to change mobile network settings.
This check box is cleared by default.
- Prohibit use of cellular data while roaming (Android 7.0 or later)
Selecting or clearing the check box specifies whether the device user is allowed to use cellular data while roaming.
If the check box is selected, the device can't update anti-malware databases and synchronize with the Administration Server while in roaming.
To allow anti-malware database update while roaming, this check box should be cleared and the Allow database update while roaming check box in the Database update section should be selected.
To allow device synchronization with the Administration Server while roaming, this check box should be cleared and the Do not synchronize while roaming check box in the Synchronization section should be also cleared.
This restriction is supported on devices with Android 7.0 or later.
This check box is cleared by default.
- Prohibit use of Android Beam via NFC
Selecting or clearing the check box specifies whether beaming out data from apps via NFC is allowed on the device. However, the device user can enable or disable NFC.
This check box is cleared by default.
- Prohibit use of tethering
Selecting or clearing the check box specifies whether the device user is allowed to configure tethering and hotspots.
This check box is cleared by default.
Restrict location services
On the Location Services tab of the Feature restrictions section, you can configure the following settings:
- Prohibit use of location
Preventing turning location on and off.
If the check box is selected, the device user cannot turn location on or off. Search in Anti-Theft mode becomes unavailable.
If the check box is cleared, the device user can turn location on or off.
This check box is cleared by default.
Various combinations of the Prohibit use of location and the Prohibit changing location settings (Android 9 or later) restriction values produce different results for location feature and configuration.
Prohibit use of location
|
Prohibit changing location settings (Android 9 and later)
|
Feature restriction result
|
Enabled
|
Enabled
|
Location is disabled and cannot be enabled by the device user.
|
Enabled
|
Disabled
|
Location is disabled and can be enabled by the device user.
Disabling the Prohibit changing location settings (Android 9) restriction makes it possible for the user to disable location on the device, which may make some features unavailable.
|
Disabled
|
Enabled
|
Location is enabled and cannot be disabled by the device user.
|
Disabled
|
Disabled
|
Location is enabled and can be disabled by the device user.
Disabling the Prohibit changing location settings (Android 9) restriction makes it possible for the user to disable location on the device, which may make some features unavailable.
|
- Prohibit sharing location
If this option is enabled, the user cannot share the device location via apps that provide such a feature (for example, Google Maps).
By default, the option is disabled.
- Prohibit changing location settings (Android 9 or later)
Preventing changing location settings.
If the check box is selected, the device user cannot change location settings or disable location.
If the check box is cleared, the device user can change location settings.
The restriction is supported on devices with Android 9 or later.
This check box is cleared by default.
Various combinations of the Prohibit use of location and the Prohibit changing location settings (Android 9 or later) restriction values produce different results for location feature and configuration.
Prohibit use of location
|
Prohibit changing location settings (Android 9 and later)
|
Feature restriction result
|
Enabled
|
Enabled
|
Location is disabled and cannot be enabled by the device user.
|
Enabled
|
Disabled
|
Location is disabled and can be enabled by the device user.
Disabling the Prohibit changing location settings (Android 9) restriction makes it possible for the user to disable location on the device, which may make some features unavailable.
|
Disabled
|
Enabled
|
Location is enabled and cannot be disabled by the device user.
|
Disabled
|
Disabled
|
Location is enabled and can be disabled by the device user.
Disabling the Prohibit changing location settings (Android 9) restriction makes it possible for the user to disable location on the device, which may make some features unavailable.
|
Restrict system updates
Managing update settings on mobile devices is vendor-specific. On some Android devices, the restriction on manual installation of operating system updates may work incorrectly.
On the Updates tab of the Feature restrictions section, you can configure the following settings:
- Set system update policy
Type of system update policy.
If the check box is selected, one of the following system update policies is set:
- Install updates automatically. Installs system updates immediately without user interaction. This option is selected by default.
- Install updates during daily window. Installs system updates during a daily maintenance window without user interaction.
The administrator also needs to set the start and end of the daily maintenance window in the Start time and End time fields respectively.
- Postpone updates for 30 days. Postpones the installation of system updates for 30 days.
After the specified period, the operating system prompts the device user to install the updates. The period is reset and starts again if a new system update is available.
If the check box is cleared, a system update policy is not set.
This check box is selected by default.
Managing update settings on mobile devices is vendor-specific. On some Android devices, the restriction on manual installation of operating system updates may work incorrectly.
- System update freeze periods (Android 9 and later)
The System update freeze periods (Android 9 or later) block lets you set one or more freeze periods of up to 90 days during which system updates will not be installed on the device. When the device is in a freeze period, it behaves as follows:
Note: Each freeze period can be at most 90 days long, and the interval between adjacent freeze periods must be at least 60 days.
The restriction is supported on devices with Android 9 or later.
Managing update settings on mobile devices is vendor-specific. On some Android devices, the restriction on manual installation of operating system updates may work incorrectly.
Page top
[Topic 241819]
The help for this version of the solution is no longer updated, so it may contain outdated information. For up-to-date information about the solution refer to the Kaspersky Secure Mobility Management 4.1 Help.
Configuring kiosk mode for Android devices
Expand all | Collapse all
Kiosk mode is a Kaspersky Endpoint Security for Android feature that lets you limit the set of apps available to a device user, whether a single app or multiple apps. You can also efficiently manage some device settings.
The kiosk mode settings apply to devices managed via Kaspersky Endpoint Security for Android in device owner mode.
Kiosk mode does not affect the work of the Kaspersky Endpoint Security for Android app. It runs in the background, shows notifications, and can be updated.
Kiosk mode types
The following kiosk mode types are available in Kaspersky Endpoint Security:
- Single-app mode
Kiosk mode with only a single app. In this mode, a device user can open only one app that is allowed on the device and specified in the kiosk mode settings. If the app that you want to add to kiosk mode is not installed on the device, kiosk mode activates after the app is installed.
On devices with Android 9 or later, the app launches directly in kiosk mode.
On devices with Android 8.0 or earlier, the specified app must support kiosk mode functionality and call the startLockTask()
method itself to launch the app.
- Multi-app mode
Kiosk mode with multiple apps. In this mode, a device user can open only the set of apps that are allowed on the device and specified in the kiosk mode settings.
Presettings
Pre-configuration for kiosk mode includes the following:
- Before specifying apps that are allowed to be run on the device in kiosk mode, you need first to add these apps in App Control > List of categories and apps and mark them as required. Then, they will appear in the App package list of the kiosk mode.
- Before activating kiosk mode, we recommend that you prohibit launching of Google Assistant by enabling the corresponding restriction in Policy > Device owner mode > Feature restrictions > Apps > Prohibit use of Google Assistant. Otherwise, Google Assistant launches in kiosk mode and allows non-trusted apps to be opened.
Open the kiosk mode settings
To open the kiosk mode settings:
- In the console tree, in the Managed devices folder, select the administration group to which the Android devices belong.
- In the workspace of the group, select the Policies tab.
- Open the policy properties window by double-clicking any column.
Complete the following steps within 15 minutes. Otherwise, you may face an error when saving changes to the policy.
- In the policy Properties window, select the Device owner mode → Kiosk mode section.
Configure single-app mode
To configure single-app mode:
- In the Kiosk mode drop-down list, select Single-app mode.
- In the App package drop-down list, select an app package with the app that is allowed to be run on the device.
- Specify any required restrictions. For available restrictions, see the "Kiosk mode restrictions" section below.
- Select the Allow navigation to additional apps check box if you want to add other apps that a device user can navigate to. For more details, see the Add additional apps section below.
- Click the Apply button to save the changes you have made.
Configure multi-app mode
To configure multi-app mode:
- In the Kiosk mode drop-down list, select Multi-app mode.
- Click Add, select apps that are allowed to be run on the device, and then click OK.
- Specify any required restrictions. For available restrictions, see the "Kiosk mode restrictions" section below.
- Select the Allow navigation to additional apps check box if you want to add other apps that a device user can navigate to. For more details, see the Add additional apps section below.
- Click the Apply button to save the changes you have made.
Kiosk mode restrictions
You can set the following restrictions in kiosk mode:
- Prohibit status bar (Android 9 or later)
Selecting or clearing this check box specifies whether the status bar is blank with notifications and indicators such as connectivity, battery, and sound and vibrate options. This restriction is supported on devices with Android 9 or later.
The check box is selected by default.
- Prohibit Overview button (Android 9 or later)
Selecting or clearing this check box specifies whether the Overview button is hidden. This restriction is supported on devices with Android 9 or later.
The check box is selected by default.
- Prohibit Home button (Android 9 or later)
Selecting or clearing this check box specifies whether the Home button is hidden. This restriction is supported on devices with Android 9 or later.
The check box is selected by default.
- Prohibit displaying system notifications (Android 9 or later)
Selecting or clearing this check box specifies whether system notifications are hidden. This restriction is supported on devices with Android 9 or later.
The check box is selected by default.
Add additional apps
Besides locking the device to a single app or set of apps, you can also specify additional apps, that the main app can use. These additional apps provide full functionality of the apps added to kiosk mode. A device user cannot launch additional apps manually.
To add additional apps in the Kiosk mode section:
- Select the Allow navigation to additional apps check box.
- Click Add, specify the desired app package name, and then click OK. How to get the package name of an app
To get the package name of an app:
- Open Google Play.
- Find the required app and open its page.
The app's URL ends with its package name (for example, https://play.google.com/store/apps/details?id=com.android.chrome).
To get the package name of an app that has been added to Kaspersky Security Center:
- In the console tree of Kaspersky Security Center go to Advanced > Remote installation > Installation packages.
- Click the Additional actions button and select Manage mobile apps packages in the drop-down list.
In the Mobile apps package management window that opens, identifiers of managed apps are displayed in the Application name column.
If you have an app package as an .apk or .ipa file and want to know the app identifier, you can add the app package to the Mobile apps package management window by clicking the New button and following the on-screen instructions.
- Click the Apply button to save the changes you have made.
Page top
[Topic 241821]
The help for this version of the solution is no longer updated, so it may contain outdated information. For up-to-date information about the solution refer to the Kaspersky Secure Mobility Management 4.1 Help.
Connecting to an NDES/SCEP server
Expand all | Collapse all
You can configure a connection to an NDES/SCEP server to obtain a certificate from a certificate authority (CA) using Simple Certificate Enrollment Protocol (SCEP). To do this, you need to set up a connection to the CA using SCEP and specify a certificate profile.
To add a connection to a certificate authority and specify a certificate profile:
- In the console tree, in the Managed devices folder, select the administration group to which the Android devices belong.
- In the workspace of the group, select the Policies tab.
- Open the policy properties window by double-clicking any column.
Complete the following steps within 15 minutes. Otherwise, you may face an error when saving changes to the policy.
- In the policy Properties window, select the Device owner mode > NDES and SCEP section.
- In the Connection to certificate authority (CA) section, click Add.
The Connection to certificate authority dialog appears.
- Specify the following settings, and then click OK:
- Connection name
A unique connection name.
- Protocol type
A protocol version. Possible values:
- SCEP server URL
The URL of the SCEP server.
For NDES, the URL has the http://<ServerName>/certsrv/mscep/mscep.dll
format.
- Challenge phrase type
A type of challenge phrase required for authentication. Possible values:
- None - Does not require authentication data.
- Static - Requires entering an authentication phrase in the Static challenge phrase field. This is the default value.
- Static challenge phrase
Specifies the authentication phrase that is used to authenticate the device with the certificate with the SCEP server URL.
- In the Certificate profiles section, click Add.
The Certificate profile dialog appears.
- Specify the following certificate profile settings and click OK:
- Profile name
A unique certificate profile name.
- Certificate authority (CA)
A certificate authority that you created in the Connection to certificate authority (CA) section.
- Subject name
A unique identifier that is the subject of the certificate. It includes information about what is being certified, including common name, organization, organizational unit, country code, and so on. You can either enter the value or select it from the Available macros drop-down list.
- Private key length
A length of the certificate private key. Possible values:
- Private key type
A type of the certificate private key. Possible values:
- Signature (default)
- Encryption
- Signature and encryption
- Renew certificate automatically
If the check box is selected, the certificate will be automatically reissued to the device before this certificate expires. The Renew certificate before it expires (in days) field also becomes available. In this field, you need to specify the number of days before the expiration date when the certificate will be reissued.
If the check box is cleared, the certificate will not be renewed automatically.
The check box is cleared by default.
- Renew certificate before it expires (in days)
The number of days remaining until the certificate's expiration date during which a renewed certificate will be issued to the device. For example, you can specify 90 days in this field. A renewed certificate will be issued 90 days before the current certificate expires.
This option is available and is required to be specified if the Renew certificate automatically check box is selected.
The default value is not set.
- Subject Alternative Names (SAN)
An alternative name that represents the certificate subject name. You can specify multiple subject alternative names. To do this, click Add, and then specify the SAN type and SAN value options.
- Click Apply to save the changes you have made.
Manage connections and certificate profiles
You can later edit or remove the added connections and certificate profile.
To edit a connection or certificate profile:
- Select the needed connection or certificate profile in the corresponding section.
- Click Edit, make the required changes, and click OK.
- Click Apply to save the changes you have made.
After you edit the certificate profile in policy settings, the corresponding certificate on the device is deleted automatically during the next synchronization with Administration server and a new certificate is installed.
To remove a connection or certificate profile:
- Select the needed connection or certificate profile in the corresponding section.
- Click Delete, and then click OK.
If you remove a certificate authority connection, all certificate profiles that use this connection are also removed.
- Click Apply to save the changes you have made.
After you delete the certificate profile in policy settings, the corresponding certificate on the device will be deleted automatically during the next synchronization with Administration server.
Page top
[Topic 241827]