- Ресурс: Политика
- ApplicationPolicy
- InstallType
- Политика разрешений
- РазрешениеГрант
- Делегированная область действия
- Шаблон управляемой конфигурации
- ConnectedWorkAndPersonalApp
- AutoUpdateMode
- ExtensionConfig
- AlwaysOnVpnLockdownExemption
- WorkProfileWidgets
- CredentialProviderPolicy
- CustomAppConfig
- UserUninstallSettings
- InstallConstraint
- NetworkTypeConstraint
- ChargingConstraint
- DeviceIdleConstraint
- Настройки пользовательского контроля
- PreferentialNetworkId
- ApplicationSigningKeyCert
- Роль
- Тип роли
- KeyguardDisabledFeature
- Постоянная предпочтительная активность
- SystemUpdate
- SystemUpdateType
- Период заморозки
- Дата
- НастройкиОтчетностиСостояния
- Настройки отчетов приложений
- PackageNameList
- BatteryPluggedMode
- ProxyInfo
- ChoosePrivateKeyRule
- AlwaysOnVpnPackage
- LocationMode
- ComplianceRule
- НесоответствиеПодробностиСостояние
- ApiLevelCondition
- AppAutoUpdatePolicy
- AppTrack
- Политика шифрования
- PlayStoreMode
- НастройкаДействия
- LaunchAppAction
- Правило обеспечения соблюдения политики
- BlockAction
- БлокСкоп
- WipeAction
- Настройка киоска
- PowerButtonActions
- SystemErrorWarnings
- СистемнаяНавигация
- StatusBar
- Настройки устройства
- AdvancedSecurityOverrides
- Политика ненадежных приложений
- GooglePlayProtectVerifyApps
- Настройки разработчика
- CommonCriteriaMode
- MtePolicy
- Политика защиты контента
- Политики личного использования
- PlayStoreMode
- Политика использования персональных приложений
- InstallType
- PrivateSpacePolicy
- BluetoothSharing
- AutoDateAndTimeZone
- OncCertificateProvider
- ContentProviderEndpoint
- CrossProfilePolicies
- ПоказатьРаботуКонтактыВЛичномПрофиле
- CrossProfileCopyPaste
- CrossProfileDataSharing
- WorkProfileWidgetsDefault
- CrossProfileAppFunctions
- PreferentialNetworkService
- Журнал использования
- Тип журнала
- CameraAccess
- Доступ к микрофону
- Управление подключением устройств
- UsbDataAccess
- Настроить Wi-Fi
- Настройки WifiDirect
- Настройки модема
- WifiSsidPolicy
- WifiSsidPolicyType
- WifiSsid
- Политика роуминга Wi-Fi
- Настройка роуминга Wi-Fi
- WifiRoamingMode
- BluetoothSharing
- Предпочтительные настройки сетевой службы
- PreferentialNetworkServiceConfig
- FallbackToDefaultConnection
- NonMatchingNetworks
- APNPolicy
- OverrideApns
- APNSetting
- ApnType
- AlwaysOnSetting
- Тип аутентификации
- MvnoType
- Тип сети
- Протокол
- DeviceRadioState
- WifiState
- AirplaneModeState
- UltraWidebandState
- CellularTwoGState
- Минимальный уровень безопасности Wi-Fi
- CredentialProviderPolicyDefault
- Политика печати
- Настройки дисплея
- Настройки яркости экрана
- ScreenBrightnessMode
- Настройки времени ожидания экрана
- ScreenTimeoutMode
- AssistContentPolicy
- WorkAccountSetupConfig
- Тип аутентификации
- WipeDataFlag
- EnterpriseDisplayNameVisibility
- AppFunctions
- DefaultApplicationSetting
- DefaultApplication
- Методы
Ресурс: Политика
Ресурс политики представляет собой группу параметров, которые определяют поведение управляемого устройства и установленных на нем приложений.
JSON-представление |
---|
{ "name": string, "version": string, "applications": [ { object ( |
Поля | |
---|---|
name | Имя политики в формате |
version | Версия политики. Это поле доступно только для чтения. Номер версии увеличивается при каждом обновлении политики. |
applications[] | Политика применяется к приложениям. Максимальное количество элементов — 3000. |
maximumTimeToLock | Максимальное время активности пользователя до блокировки устройства (в миллисекундах). Значение 0 означает отсутствие ограничений. |
screenCaptureDisabled | Отключена ли функция захвата экрана. |
cameraDisabled | Если |
keyguardDisabledFeatures[] | Отключены настройки блокировки клавиатуры, такие как виджеты. |
defaultPermissionPolicy | Политика разрешений по умолчанию для запросов разрешений во время выполнения. |
persistentPreferredActivities[] | Действия обработчика намерений по умолчанию. |
openNetworkConfiguration | Настройка сети для устройства. Подробнее см. в разделе «Настройка сетей» . |
systemUpdate | Политика обновления системы, которая управляет применением обновлений ОС. Если тип обновления — Примечание: обновления системы из Google Play (также называемые обновлениями основной линии) загружаются автоматически и требуют перезагрузки устройства для установки. Подробнее см. в разделе «Обновления основной линии» в разделе «Управление обновлениями системы» . |
accountTypesWithManagementDisabled[] | Типы учетных записей, которыми пользователь не может управлять. |
addUserDisabled | Отключено ли добавление новых пользователей и профилей. Для устройств, где |
adjustVolumeDisabled | Отключена ли регулировка общей громкости. Также отключает звук устройства. Эта настройка действует только на полностью управляемых устройствах. |
factoryResetDisabled | Отключен ли сброс настроек к заводским настройкам. |
installAppsDisabled | Запрещена ли установка приложений пользователем. |
mountPhysicalMediaDisabled | Запрещено ли пользователю монтирование физических внешних носителей. |
modifyAccountsDisabled | Отключено ли добавление или удаление учетных записей. |
safeBootDisabled | Отключена ли перезагрузка устройства в безопасном режиме. |
uninstallAppsDisabled | Отключено ли удаление приложений пользователем. Это предотвращает удаление приложений, даже тех, которые удалены с помощью |
statusBarDisabled | Отключена ли строка состояния. Это отключает уведомления, быстрые настройки и другие элементы управления, позволяющие выйти из полноэкранного режима. УСТАРЕЛО. Чтобы отключить строку состояния на устройстве-киоске, используйте InstallType |
keyguardDisabled | Если установлено значение true, экран блокировки отключается для основного и/или дополнительного дисплеев. Эта политика поддерживается только в режиме управления выделенными устройствами. |
minimumApiLevel | Минимально допустимый уровень API Android. |
statusReportingSettings | Настройки отчетов о состоянии |
bluetoothContactSharingDisabled | Отключен ли общий доступ к контактам через Bluetooth. |
shortSupportMessage | Сообщение, отображаемое пользователю на экране настроек, если администратор отключил определённую функцию. Если сообщение длиннее 200 символов, оно может быть обрезано. |
longSupportMessage | Сообщение, отображаемое пользователю на экране настроек администратора устройства. |
passwordRequirements | Требования к паролю. Поле Примечание: Значения |
wifiConfigsLockdownEnabled | Это устарело. |
bluetoothConfigDisabled | Отключена ли настройка Bluetooth. |
cellBroadcastsConfigDisabled | Отключена ли настройка сотовой трансляции. |
credentialsConfigDisabled | Отключена ли настройка учетных данных пользователя. |
mobileNetworksConfigDisabled | Отключена ли настройка мобильных сетей. |
tetheringConfigDisabled | Отключена ли настройка режима модема и портативных точек доступа. Если для параметра |
vpnConfigDisabled | Отключена ли настройка VPN. |
wifiConfigDisabled | Отключена ли настройка сетей Wi-Fi. Поддерживается на полностью управляемых устройствах и рабочих профилях на корпоративных устройствах. Для полностью управляемых устройств установка значения true удаляет все настроенные сети и сохраняет только сети, настроенные с помощью |
createWindowsDisabled | Отключено ли создание окон помимо окон приложений. |
networkResetDisabled | Отключен ли сброс настроек сети. |
outgoingBeamDisabled | Отключено ли использование NFC для передачи данных из приложений. |
outgoingCallsDisabled | Запрещены ли исходящие вызовы. |
removeUserDisabled | Отключено ли удаление других пользователей. |
shareLocationDisabled | Отключен ли общий доступ к местоположению. |
smsDisabled | Отключена ли отправка и получение SMS-сообщений. |
unmuteMicrophoneDisabled | Если |
usbFileTransferDisabled | Отключена ли передача файлов по USB. Поддерживается только на корпоративных устройствах. |
ensureVerifyAppsEnabled | Включена ли принудительно проверка приложения. |
permittedInputMethods | Если поле присутствует, разрешены только методы ввода, предоставляемые пакетами из этого списка. Если это поле присутствует, но список пуст, разрешены только системные методы ввода. |
stayOnPluggedModes[] | Режимы работы от аккумулятора, при которых устройство остаётся включённым. При использовании этого параметра рекомендуется сбросить |
recommendedGlobalProxy | Сетевой глобальный HTTP-прокси. Обычно прокси-серверы настраиваются для каждой сети в |
setUserIconDisabled | Отключено ли изменение значка пользователя? Этот параметр действует только на полностью управляемых устройствах. |
setWallpaperDisabled | Отключена ли возможность смены обоев. |
choosePrivateKeyRules[] | Правила определения доступа приложений к закрытым ключам. Подробнее см. в правиле |
alwaysOnVpnPackage | Настройка постоянного VPN-подключения. Используйте с |
frpAdminEmails[] | Адреса электронной почты администраторов устройства для защиты от сброса к заводским настройкам. После сброса устройства к заводским настройкам одному из этих администраторов потребуется войти в систему, используя адрес электронной почты и пароль учётной записи Google, чтобы разблокировать устройство. Если администраторы не указаны, устройство не будет защищено от сброса к заводским настройкам. |
deviceOwnerLockScreenInfo | Информация о владельце устройства, которая будет отображаться на экране блокировки. |
dataRoamingDisabled | Отключены ли услуги роуминга данных. |
locationMode | Степень обнаружения местоположения включена. |
networkEscapeHatchEnabled | Включена ли функция аварийного отключения сети. Если сетевое подключение не может быть установлено во время загрузки, функция аварийного отключения предлагает пользователю временно подключиться к сети для обновления политики устройства. После применения политики временная сеть будет удалена, и устройство продолжит загрузку. Это предотвращает невозможность подключения к сети, если в последней политике нет подходящей сети, и устройство загружается в режиме блокировки приложения, или пользователь по какой-либо причине не может получить доступ к настройкам устройства. Примечание: Установка значения true для параметра |
bluetoothDisabled | Отключён ли Bluetooth. Предпочтительнее использовать этот параметр, чем |
complianceRules[] | Правила, определяющие, какие смягчающие действия следует предпринять, если устройство не соответствует политике. При выполнении условий нескольких правил применяются все смягчающие действия, предусмотренные этими правилами. Максимальное количество правил — 100. Вместо этого используйте правила применения политики. |
blockApplicationsEnabled | Блокируется ли установка приложений, отличных от настроенных в |
installUnknownSourcesAllowed | Это поле не имеет никакого эффекта. |
debuggingFeaturesAllowed | Разрешено ли пользователю включать функции отладки. |
funDisabled | Разрешено ли пользователю развлекаться. Отключает ли игра-пасхалку в настройках. |
autoTimeRequired | Требуется ли автоматическое время, что не позволяет пользователю вручную устанавливать дату и время. Если установлено |
permittedAccessibilityServices | Указывает разрешённые службы специальных возможностей. Если поле не заполнено, можно использовать любую службу специальных возможностей. Если поле заполнено, можно использовать только службы специальных возможностей из этого списка и встроенные в систему службы специальных возможностей. В частности, если поле пусто, можно использовать только встроенные в систему службы специальных возможностей. Это можно настроить на полностью управляемых устройствах и в рабочих профилях. При применении к рабочему профилю это влияет как на личный, так и на рабочий профили. |
appAutoUpdatePolicy | Рекомендуемая альтернатива: Если для Политика автоматического обновления приложений, которая контролирует, когда могут применяться автоматические обновления приложений. |
kioskCustomLauncherEnabled | Включен ли настраиваемый лаунчер киоска. Главный экран заменяется лаунчером, который блокирует на устройстве приложения, установленные через настройки |
androidDevicePolicyTracks[] | Этот параметр не поддерживается. Любое значение игнорируется. |
skipFirstUseHintsEnabled | Отметьте, чтобы пропустить подсказки при первом использовании. Администратор предприятия может включить системную рекомендацию для приложений пропускать руководство пользователя и другие вводные подсказки при первом запуске. |
privateKeySelectionEnabled | Позволяет отображать пользовательский интерфейс на устройстве, чтобы пользователь мог выбрать псевдоним закрытого ключа, если в ChoosePrivateKeyRules нет соответствующих правил. На устройствах с ОС Android ниже P установка этого параметра может сделать корпоративные ключи уязвимыми. Это значение не будет действовать, если какое-либо приложение имеет область делегирования |
encryptionPolicy | Включено ли шифрование |
usbMassStorageEnabled | Включено ли USB-хранилище. Устарело. |
permissionGrants[] | Явные разрешения или групповые разрешения или запреты для всех приложений. Эти значения переопределяют |
playStoreMode | Этот режим контролирует, какие приложения доступны пользователю в Play Store, а также поведение устройства при удалении приложений из политики. |
setupActions[] | Действие, которое необходимо выполнить в процессе настройки. Можно указать не более одного действия. |
passwordPolicies[] | Политики требований к паролям. Для рабочего профиля или полностью управляемых устройств можно настроить различные политики, настроив поле |
policyEnforcementRules[] | Правила, определяющие поведение, когда конкретная политика не может быть применена к устройству |
kioskCustomization | Настройки, управляющие поведением устройства в режиме киоска. Чтобы включить режим киоска, установите для параметра |
advancedSecurityOverrides | Расширенные настройки безопасности. В большинстве случаев их настройка не требуется. |
personalUsagePolicies | Политики управления личным использованием корпоративного устройства. |
autoDateAndTimeZone | Включены ли на корпоративном устройстве функции автоматической установки даты, времени и часового пояса. Если они включены, то |
oncCertificateProviders[] | Эта функция обычно недоступна. |
crossProfilePolicies | На устройстве применены политики кросс-профилей. |
preferentialNetworkService | Управляет включением приоритетной сетевой службы в рабочем профиле или на полностью управляемых устройствах. Например, организация может заключить соглашение с оператором связи о том, что все рабочие данные с устройств её сотрудников будут передаваться через сетевую службу, предназначенную для корпоративного использования. Примером поддерживаемой приоритетной сетевой службы является корпоративный сегмент в сетях 5G. Эта политика не действует, если на устройствах под управлением Android 13 и выше заданы |
usageLog | Настройка ведения журнала активности устройства. |
cameraAccess | Управляет использованием камеры и наличием у пользователя доступа к переключателю доступа к камере. |
microphoneAccess | Управляет использованием микрофона и наличием у пользователя доступа к переключателю доступа к микрофону. Это применимо только к полностью управляемым устройствам. |
deviceConnectivityManagement | Охватывает элементы управления подключением устройств, такими как Wi-Fi, доступ к данным через USB, подключение клавиатуры/мыши и многое другое. |
deviceRadioState | Охватывает элементы управления состоянием радио, такими как Wi-Fi, Bluetooth и т. д. |
credentialProviderPolicyDefault | Управляет тем, каким приложениям разрешено выступать в качестве поставщиков учётных данных на Android 14 и более поздних версиях. Эти приложения хранят учётные данные. Подробнее см. здесь и здесь . См. также |
printingPolicy | Необязательно. Управляет разрешением печати. Поддерживается на устройствах под управлением Android 9 и более поздних версий. |
displaySettings | Необязательно. Управление настройками дисплея. |
assistContentPolicy | Необязательно. Определяет, разрешено ли отправлять AssistContent привилегированному приложению, например приложению-помощнику. AssistContent включает снимки экрана и информацию о приложении, например, название пакета. Поддерживается на Android 15 и более поздних версиях. |
workAccountSetupConfig | Необязательно. Управляет конфигурацией настройки рабочей учётной записи, например, указывает, требуется ли аутентификация Google. |
wipeDataFlags[] | Необязательно. Флаги очистки, указывающие, какие данные удаляются при очистке устройства или профиля по любой причине (например, из-за несоответствия). Это не относится к методу |
enterpriseDisplayNameVisibility | Необязательно. Управляет отображением |
appFunctions | Необязательно. Определяет, разрешено ли приложениям на устройстве (для полностью управляемых устройств) или в рабочем профиле (для устройств с рабочими профилями) предоставлять функции приложения. |
defaultApplicationSettings[] | Необязательно. Настройка приложения по умолчанию для поддерживаемых типов. Если приложение по умолчанию успешно установлено хотя бы для одного типа приложения в профиле, пользователи не смогут изменять приложения по умолчанию в этом профиле. Для каждого Более подробную информацию см. в руководстве по настройкам приложения по умолчанию . |
ApplicationPolicy
Политика для отдельного приложения. Примечание: Доступность приложения на данном устройстве нельзя изменить с помощью этой политики, если включен параметр
. Максимальное количество приложений, которое можно указать для одной политики, — 3000. installAppsDisabled
JSON-представление |
---|
{ "packageName": string, "installType": enum ( |
Поля | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
packageName | Имя пакета приложения. Например, | ||||||||||||||||
installType | Тип выполняемой установки. | ||||||||||||||||
lockTaskAllowed | Разрешено ли приложению блокировать себя в полноэкранном режиме. УДАРЕНО. Используйте InstallType | ||||||||||||||||
defaultPermissionPolicy | Политика по умолчанию для всех разрешений, запрашиваемых приложением. Если указано, переопределяет политику | ||||||||||||||||
permissionGrants[] | Явные разрешения или запреты для приложения. Эти значения переопределяют значения | ||||||||||||||||
managedConfiguration | Управляемая конфигурация, применяемая к приложению. Формат конфигурации определяется значениями
| ||||||||||||||||
disabled | Отключено ли приложение. При отключении данные приложения сохраняются. | ||||||||||||||||
minimumVersionCode | Минимальная версия приложения, работающего на устройстве. Если эта версия установлена, устройство попытается обновить приложение как минимум до этого кода версии. Если приложение не обновлено, устройство будет содержать | ||||||||||||||||
delegatedScopes[] | Области действия, делегированные приложению из Android Device Policy. Они предоставляют дополнительные привилегии приложениям, к которым они применяются. | ||||||||||||||||
managedConfigurationTemplate | Шаблон управляемых конфигураций для приложения, сохранённый из iframe управляемых конфигураций . Это поле игнорируется, если задано значение manageConfiguration. | ||||||||||||||||
accessibleTrackIds[] | Список идентификаторов версий приложения, к которым может получить доступ устройство, принадлежащее предприятию. Если список содержит несколько идентификаторов версий, устройства получают последнюю версию из всех доступных версий. Если список не содержит идентификаторов версий, устройствам доступна только версия, находящаяся в процессе производства. Подробнее о каждой версии можно узнать в AppTrackInfo . | ||||||||||||||||
connectedWorkAndPersonalApp | Контролирует, может ли приложение взаимодействовать само с собой через рабочие и личные профили устройства при условии согласия пользователя. | ||||||||||||||||
autoUpdateMode | Управляет режимом автоматического обновления приложения. | ||||||||||||||||
extensionConfig | Конфигурация для включения этого приложения в качестве приложения-расширения с возможностью взаимодействия с Android Device Policy в автономном режиме. Это поле можно задать не более чем для одного приложения. Если есть приложение с ролью Для взаимодействия приложения с Android Device Policy отпечаток сертификата ключа подписи приложения на устройстве должен соответствовать одной из записей в | ||||||||||||||||
alwaysOnVpnLockdownExemption | Указывает, разрешено ли приложению использовать сеть, когда VPN не подключена и | ||||||||||||||||
workProfileWidgets | Указывает, разрешено ли приложению, установленному в рабочем профиле, добавлять виджеты на главный экран. | ||||||||||||||||
credentialProviderPolicy | Необязательно. Разрешено ли приложению выступать в качестве поставщика учётных данных на Android 14 и более поздних версиях. | ||||||||||||||||
customAppConfig | Необязательно. Конфигурация для этого пользовательского приложения. Для этого необходимо установить | ||||||||||||||||
installConstraint[] | Необязательно. Ограничения для установки приложения. Можно указать максимум одно значение | ||||||||||||||||
installPriority | Необязательно. Среди приложений, для которых Этот параметр определяет относительный приоритет установки. Значение 0 (по умолчанию) означает, что приложение не имеет приоритета перед другими приложениями. Для значений от 1 до 10 000 более низкое значение соответствует более высокому приоритету. Значения вне диапазона от 0 до 10 000 включительно отклоняются. | ||||||||||||||||
userControlSettings | Необязательно. Указывает, разрешён ли пользовательский контроль над приложением. Пользовательский контроль включает такие действия пользователя, как принудительная остановка и очистка данных приложения. Некоторые типы приложений имеют особую обработку. Подробнее см. в разделах | ||||||||||||||||
preferentialNetworkId | Необязательно. Идентификатор предпочитаемой сети, используемой приложением. Для указанного идентификатора сети должна быть конфигурация в | ||||||||||||||||
signingKeyCerts[] | Необязательно. Подписание сертификатов ключей приложения. Это поле обязательно для заполнения в следующих случаях:
Если это поле не задано для пользовательского приложения, политика отклоняется. Если оно не задано при необходимости для обычного приложения, выдаётся В остальных случаях это поле необязательно и используются сертификаты ключей подписи, полученные из Play Store. Чтобы узнать, как используется это поле, ознакомьтесь со следующими параметрами политики: | ||||||||||||||||
roles[] | Необязательно. Роли, которые есть у приложения. Приложения с определёнными ролями могут быть освобождены от ограничений по питанию и фоновому выполнению, а также от приостановки и гибернации на Android 14 и более поздних версиях. Пользовательский контроль также может быть запрещён для приложений с определёнными ролями на Android 11 и более поздних версиях. Подробнее см. в документации по каждому Приложение получает уведомления о назначенных ему ролях, если у него есть служба приёмника уведомлений с Для применения исключений и уведомления приложения о ролях отпечаток сертификата ключа подписи приложения на устройстве должен совпадать с одним из отпечатков сертификата ключа подписи, полученных из Play Маркета, или с одной из записей в Не должно быть дублирующихся ролей с одинаковым |
InstallType
Тип установки, которую необходимо выполнить для приложения. Если
ссылается на приложение, для setupAction
должно быть установлено значение installType
REQUIRED_FOR_SETUP
, иначе установка завершится ошибкой.
Перечисления | |
---|---|
INSTALL_TYPE_UNSPECIFIED | Не указано. По умолчанию — ДОСТУПНО. |
PREINSTALLED | Приложение устанавливается автоматически и может быть удалено пользователем. |
FORCE_INSTALLED | Приложение устанавливается автоматически независимо от установленного окна обслуживания и не может быть удалено пользователем. |
BLOCKED | Приложение заблокировано и не может быть установлено. Если приложение было установлено в соответствии с предыдущей политикой, оно будет удалено. Это также заблокирует его функцию мгновенного запуска. |
AVAILABLE | Приложение доступно для установки. |
REQUIRED_FOR_SETUP | Приложение устанавливается автоматически и не может быть удалено пользователем, а также не позволит завершить установку до ее завершения. |
KIOSK | Приложение автоматически устанавливается в режиме киоска: оно задано как предпочтительное намерение для домашнего экрана и добавлено в белый список для режима блокировки. Настройка устройства не будет завершена, пока приложение не будет установлено. После установки пользователи не смогут удалить приложение. Этот Если есть приложение с ролью |
CUSTOM | Приложение можно установить и обновить только с помощью команды AMAPI SDK . Примечание:
|
Политика разрешений
Политика предоставления запросов на разрешения приложениям.
Перечисления | |
---|---|
PERMISSION_POLICY_UNSPECIFIED | Политика не указана. Если для разрешения на каком-либо уровне политика не указана, по умолчанию используется поведение PROMPT . |
PROMPT | Запросить у пользователя разрешение. |
GRANT | Автоматически предоставить разрешение. На устройствах Android 12 и выше |
DENY | Автоматически отклонить разрешение. |
РазрешениеГрант
Конфигурация разрешения Android и состояние его предоставления.
JSON-представление |
---|
{
"permission": string,
"policy": enum ( |
Поля | |
---|---|
permission | Разрешение или группа Android, например |
policy | Политика предоставления разрешения. |
Делегированная область действия
Области делегирования, которые другой пакет может получить из Android Device Policy. Они предоставляют дополнительные привилегии приложениям, к которым они применяются.
Перечисления | |
---|---|
DELEGATED_SCOPE_UNSPECIFIED | Объем делегирования не указан. |
CERT_INSTALL | Предоставляет доступ к установке и управлению сертификатами. Эту область действия можно делегировать нескольким приложениям. |
MANAGED_CONFIGURATIONS | Предоставляет доступ к управлению управляемыми конфигурациями. Эту область действия можно делегировать нескольким приложениям. |
BLOCK_UNINSTALL | Предоставляет доступ к блокировке удаления. Эту возможность можно делегировать нескольким приложениям. |
PERMISSION_GRANT | Предоставляет доступ к политике разрешений и состоянию предоставленных разрешений. Эту область действия можно делегировать нескольким приложениям. |
PACKAGE_ACCESS | Предоставляет доступ к состоянию доступа к пакету. Эту область действия можно делегировать нескольким приложениям. |
ENABLE_SYSTEM_APP | Предоставляет доступ для включения системных приложений. Эту область действия можно делегировать нескольким приложениям. |
NETWORK_ACTIVITY_LOGS | Предоставляет доступ к журналам сетевой активности. Позволяет делегированному приложению вызывать методы setNetworkLoggingEnabled , isNetworkLoggingEnabled и retrieveNetworkLogs . Эта область может быть делегирована не более чем одному приложению. Поддерживается для полностью управляемых устройств на Android 10 и более поздних версиях. Поддерживается для рабочего профиля на Android 12 и более поздних версиях. Если делегирование поддерживается и настроено, игнорируется. |
SECURITY_LOGS | Предоставляет доступ к журналам безопасности. Позволяет делегированному приложению вызывать методы setSecurityLoggingEnabled , isSecurityLoggingEnabled , retrieveSecurityLogs и retrievePreRebootSecurityLogs . Эта область может быть делегирована не более чем одному приложению. Поддерживается для полностью управляемых устройств и корпоративных устройств с рабочим профилем на Android 12 и выше. Если делегирование поддерживается и настроено, игнорируется. |
CERT_SELECTION | Grants access to selection of KeyChain certificates on behalf of requesting apps. Once granted, the delegated application will start receiving DelegatedAdminReceiver#onChoosePrivateKeyAlias . Allows the delegated application to call grantKeyPairToApp and revokeKeyPairFromApp methods. This scope can be delegated to at most one application. must be empty and has no effect if certificate selection is delegated to an application. |
ManagedConfigurationTemplate
The managed configurations template for the app, saved from the managed configurations iframe .
JSON representation |
---|
{ "templateId": string, "configurationVariables": { string: string, ... } } |
Поля | |
---|---|
templateId | The ID of the managed configurations template. |
configurationVariables | Optional, a map containing <key, value> configuration variables defined for the configuration. An object containing a list of |
ConnectedWorkAndPersonalApp
Controls whether the app can communicate with itself cross-profile, subject to user consent.
Перечисления | |
---|---|
CONNECTED_WORK_AND_PERSONAL_APP_UNSPECIFIED | Unspecified. Defaults to CONNECTED_WORK_AND_PERSONAL_APPS_DISALLOWED. |
CONNECTED_WORK_AND_PERSONAL_APP_DISALLOWED | Default. Prevents the app from communicating cross-profile. |
CONNECTED_WORK_AND_PERSONAL_APP_ALLOWED | Allows the app to communicate across profiles after receiving user consent. |
AutoUpdateMode
Controls the auto-update mode for the app. If a device user makes changes to the device settings manually, these choices are ignored by AutoUpdateMode
as it takes precedence.
Перечисления | |
---|---|
AUTO_UPDATE_MODE_UNSPECIFIED | Unspecified. Defaults to . |
AUTO_UPDATE_DEFAULT | The default update mode. The app is automatically updated with low priority to minimize the impact on the user. The app is updated when all of the following constraints are met:
The device is notified about a new update within 24 hours after it is published by the developer, after which the app is updated the next time the constraints above are met. |
AUTO_UPDATE_POSTPONED | The app is not automatically updated for a maximum of 90 days after the app becomes out of date. 90 days after the app becomes out of date, the latest available version is installed automatically with low priority (see The user can still manually update the app from the Play Store at any time. |
AUTO_UPDATE_HIGH_PRIORITY | The app is updated as soon as possible. No constraints are applied. The device is notified as soon as possible about a new update after it becomes available. NOTE: Updates to apps with larger deployments across Android's ecosystem can take up to 24h. |
ExtensionConfig
Configuration to enable an app as an extension app, with the capability of interacting with Android Device Policy offline. For Android versions 11 and above, extension apps are exempt from battery restrictions so will not be placed into the restricted App Standby Bucket . Extensions apps are also protected against users clearing their data or force-closing the application, although admins can continue to use the clear app data command
on extension apps if needed for Android 11 and above.
JSON representation |
---|
{ "signingKeyFingerprintsSha256": [ string ], "notificationReceiver": string } |
Поля | |
---|---|
signingKeyFingerprintsSha256[] | Hex-encoded SHA-256 hashes of the signing key certificates of the extension app. Only hexadecimal string representations of 64 characters are valid. The signing key certificate fingerprints are always obtained from the Play Store and this field is used to provide additional signing key certificate fingerprints. However, if the application is not available on the Play Store, this field needs to be set. A The signing key certificate fingerprint of the extension app on the device must match one of the signing key certificate fingerprints obtained from the Play Store or the ones provided in this field for the app to be able to communicate with Android Device Policy. In production use cases, it is recommended to leave this empty. |
notificationReceiver | Fully qualified class name of the receiver service class for Android Device Policy to notify the extension app of any local command status updates. The service must be exported in the extension app's |
AlwaysOnVpnLockdownExemption
Controls whether an app is exempt from the
setting. alwaysOnVpnPackage.lockdownEnabled
Перечисления | |
---|---|
ALWAYS_ON_VPN_LOCKDOWN_EXEMPTION_UNSPECIFIED | Unspecified. Defaults to VPN_LOCKDOWN_ENFORCED . |
VPN_LOCKDOWN_ENFORCED | The app respects the always-on VPN lockdown setting. |
VPN_LOCKDOWN_EXEMPTION | The app is exempt from the always-on VPN lockdown setting. |
WorkProfileWidgets
Controls if a work profile application is allowed to add widgets to the home screen.
Перечисления | |
---|---|
WORK_PROFILE_WIDGETS_UNSPECIFIED | Unspecified. Defaults to
|
WORK_PROFILE_WIDGETS_ALLOWED | Work profile widgets are allowed. This means the application will be able to add widgets to the home screen. |
WORK_PROFILE_WIDGETS_DISALLOWED | Work profile widgets are disallowed. This means the application will not be able to add widgets to the home screen. |
CredentialProviderPolicy
Whether the app is allowed to act as a credential provider on Android 14 and above.
Перечисления | |
---|---|
CREDENTIAL_PROVIDER_POLICY_UNSPECIFIED | Unspecified. The behaviour is governed by . |
CREDENTIAL_PROVIDER_ALLOWED | App is allowed to act as a credential provider. |
CustomAppConfig
Configuration for a custom app.
JSON representation |
---|
{
"userUninstallSettings": enum ( |
Поля | |
---|---|
userUninstallSettings | Optional. User uninstall settings of the custom app. |
UserUninstallSettings
Specifies if a user is allowed to uninstall the custom app.
Перечисления | |
---|---|
USER_UNINSTALL_SETTINGS_UNSPECIFIED | Unspecified. Defaults to . |
DISALLOW_UNINSTALL_BY_USER | User is not allowed to uninstall the custom app. |
ALLOW_UNINSTALL_BY_USER | User is allowed to uninstall the custom app. |
InstallConstraint
Amongst apps with
set to:InstallType
this defines a set of restrictions for the app installation. At least one of the fields must be set. When multiple fields are set, then all the constraints need to be satisfied for the app to be installed.
JSON representation |
---|
{ "networkTypeConstraint": enum ( |
Поля | |
---|---|
networkTypeConstraint | Optional. Network type constraint. |
chargingConstraint | Optional. Charging constraint. |
deviceIdleConstraint | Optional. Device idle constraint. |
NetworkTypeConstraint
Network type constraint.
Перечисления | |
---|---|
NETWORK_TYPE_CONSTRAINT_UNSPECIFIED | Unspecified. Default to INSTALL_ON_ANY_NETWORK . |
INSTALL_ON_ANY_NETWORK | Any active networks (Wi-Fi, cellular, etc.). |
INSTALL_ONLY_ON_UNMETERED_NETWORK | Any unmetered network (eg Wi-FI). |
ChargingConstraint
Charging constraint.
Перечисления | |
---|---|
CHARGING_CONSTRAINT_UNSPECIFIED | Unspecified. Default to CHARGING_NOT_REQUIRED . |
CHARGING_NOT_REQUIRED | Device doesn't have to be charging. |
INSTALL_ONLY_WHEN_CHARGING | Device has to be charging. |
DeviceIdleConstraint
Device idle state constraint.
Перечисления | |
---|---|
DEVICE_IDLE_CONSTRAINT_UNSPECIFIED | Unspecified. Default to DEVICE_IDLE_NOT_REQUIRED . |
DEVICE_IDLE_NOT_REQUIRED | Device doesn't have to be idle, app can be installed while the user is interacting with the device. |
INSTALL_ONLY_WHEN_DEVICE_IDLE | Device has to be idle. |
UserControlSettings
Specifies whether user control is permitted for a given app. User control includes user actions like force-stopping and clearing app data.
Перечисления | |
---|---|
USER_CONTROL_SETTINGS_UNSPECIFIED | Uses the default behaviour of the app to determine if user control is allowed or disallowed. User control is allowed by default for most apps but disallowed for following types of apps:
|
USER_CONTROL_ALLOWED | User control is allowed for the app. Kiosk apps can use this to allow user control. For extension apps (see For apps with For kiosk apps (see |
USER_CONTROL_DISALLOWED | User control is disallowed for the app. This is supported on Android 11 and above. A with is reported if the Android version is less than 11. |
PreferentialNetworkId
Preferential network identifier.
Перечисления | |
---|---|
PREFERENTIAL_NETWORK_ID_UNSPECIFIED | Whether this value is valid and what it means depends on where it is used, and this is documented on the relevant fields. |
NO_PREFERENTIAL_NETWORK | Application does not use any preferential network. |
PREFERENTIAL_NETWORK_ID_ONE | Preferential network identifier 1. |
PREFERENTIAL_NETWORK_ID_TWO | Preferential network identifier 2. |
PREFERENTIAL_NETWORK_ID_THREE | Preferential network identifier 3. |
PREFERENTIAL_NETWORK_ID_FOUR | Preferential network identifier 4. |
PREFERENTIAL_NETWORK_ID_FIVE | Preferential network identifier 5. |
ApplicationSigningKeyCert
The application signing key certificate.
JSON representation |
---|
{ "signingKeyCertFingerprintSha256": string } |
Поля | |
---|---|
signingKeyCertFingerprintSha256 | Required. The SHA-256 hash value of the signing key certificate of the app. This must be a valid SHA-256 hash value, ie 32 bytes. Otherwise, the policy is rejected. A base64-encoded string. |
Роль
Role an app can have.
JSON representation |
---|
{
"roleType": enum ( |
Поля | |
---|---|
roleType | Required. The type of the role an app can have. |
RoleType
The type of the role an app can hold.
Перечисления | |
---|---|
ROLE_TYPE_UNSPECIFIED | The role type is unspecified. This value must not be used. |
COMPANION_APP | The role type for companion apps. This role enables the app as a companion app with the capability of interacting with Android Device Policy offline. This is the recommended way to configure an app as a companion app. For legacy way, see On Android 14 and above, the app with this role is exempted from power and background execution restrictions, suspension and hibernation. On Android 11 and above, the user control is disallowed for the app with this role. Android Device Policy notifies the companion app of any local command status updates if the app has a service with |
KIOSK | The role type for kiosk apps. An app can have this role only if it has The app having this role type is set as the preferred home intent and allowlisted for lock task mode. When there is an app with this role type, status bar will be automatically disabled. This is preferable to setting On Android 11 and above, the user control is disallowed but |
MOBILE_THREAT_DEFENSE_ENDPOINT_DETECTION_RESPONSE | The role type for Mobile Threat Defense (MTD) / Endpoint Detection & Response (EDR) apps. On Android 14 and above, the app with this role is exempted from power and background execution restrictions, suspension and hibernation. On Android 11 and above, the user control is disallowed and |
SYSTEM_HEALTH_MONITORING | The role type for system health monitoring apps. On Android 14 and above, the app with this role is exempted from power and background execution restrictions, suspension and hibernation. On Android 11 and above, the user control is disallowed and |
KeyguardDisabledFeature
Keyguard (lock screen) features that can be disabled..
Перечисления | |
---|---|
KEYGUARD_DISABLED_FEATURE_UNSPECIFIED | This value is ignored. |
CAMERA | Disable the camera on secure keyguard screens (eg PIN). |
NOTIFICATIONS | Disable showing all notifications on secure keyguard screens. |
UNREDACTED_NOTIFICATIONS | Disable unredacted notifications on secure keyguard screens. |
TRUST_AGENTS | Ignore trust agent state on secure keyguard screens. |
DISABLE_FINGERPRINT | Disable fingerprint sensor on secure keyguard screens. |
DISABLE_REMOTE_INPUT | On devices running Android 6 and below, disables text entry into notifications on secure keyguard screens. Has no effect on Android 7 and above. |
FACE | Disable face authentication on secure keyguard screens. |
IRIS | Disable iris authentication on secure keyguard screens. |
BIOMETRICS | Disable all biometric authentication on secure keyguard screens. |
SHORTCUTS | Disable all shortcuts on secure keyguard screen on Android 14 and above. |
ALL_FEATURES | Disable all current and future keyguard customizations. |
PersistentPreferredActivity
A default activity for handling intents that match a particular intent filter. Note: To set up a kiosk, use InstallType to KIOSK
rather than use persistent preferred activities.
JSON representation |
---|
{ "receiverActivity": string, "actions": [ string ], "categories": [ string ] } |
Поля | |
---|---|
receiverActivity | The activity that should be the default intent handler. This should be an Android component name, eg |
actions[] | The intent actions to match in the filter. If any actions are included in the filter, then an intent's action must be one of those values for it to match. If no actions are included, the intent action is ignored. |
categories[] | The intent categories to match in the filter. An intent includes the categories that it requires, all of which must be included in the filter in order to match. In other words, adding a category to the filter has no impact on matching unless that category is specified in the intent. |
SystemUpdate
Configuration for managing system updates
Note: Google Play system updates (also called Mainline updates) are automatically downloaded but require a device reboot to be installed. Refer to the mainline section in Manage system updates for further details.
JSON representation |
---|
{ "type": enum ( |
Поля | |
---|---|
type | The type of system update to configure. |
startMinutes | If the type is |
endMinutes | If the type is |
freezePeriods[] | An annually repeating time period in which over-the-air (OTA) system updates are postponed to freeze the OS version running on a device. To prevent freezing the device indefinitely, each freeze period must be separated by at least 60 days. |
SystemUpdateType
The type of system update configuration.
Перечисления | |
---|---|
SYSTEM_UPDATE_TYPE_UNSPECIFIED | Follow the default update behavior for the device, which typically requires the user to accept system updates. |
AUTOMATIC | Install automatically as soon as an update is available. |
WINDOWED | Install automatically within a daily maintenance window. This also configures Play apps to be updated within the window. This is strongly recommended for kiosk devices because this is the only way apps persistently pinned to the foreground can be updated by Play. If |
POSTPONE | Postpone automatic install up to a maximum of 30 days. This policy does not affect security updates (eg monthly security patches). |
FreezePeriod
A system freeze period. When a device's clock is within the freeze period, all incoming system updates (including security patches) are blocked and won't be installed.
When the device is outside any set freeze periods, the normal policy behavior (automatic, windowed, or postponed) applies.
Leap years are ignored in freeze period calculations, in particular:
- If Feb. 29th is set as the start or end date of a freeze period, the freeze period will start or end on Feb. 28th instead.
- When a device's system clock reads Feb. 29th, it's treated as Feb. 28th.
- When calculating the number of days in a freeze period or the time between two freeze periods, Feb. 29th is ignored and not counted as a day.
Note: For Freeze Periods to take effect,
cannot be specified as SystemUpdateType
, because freeze periods require a defined policy to be specified. SYSTEM_UPDATE_TYPE_UNSPECIFIED
JSON representation |
---|
{ "startDate": { object ( |
Поля | |
---|---|
startDate | The start date (inclusive) of the freeze period. Note: |
endDate | The end date (inclusive) of the freeze period. Must be no later than 90 days from the start date. If the end date is earlier than the start date, the freeze period is considered wrapping year-end. Note: |
Дата
Represents a whole or partial calendar date, such as a birthday. The time of day and time zone are either specified elsewhere or are insignificant. The date is relative to the Gregorian Calendar. This can represent one of the following:
- A full date, with non-zero year, month, and day values.
- A month and day, with a zero year (for example, an anniversary).
- A year on its own, with a zero month and a zero day.
- A year and month, with a zero day (for example, a credit card expiration date).
Related types:
-
google.type.TimeOfDay
-
google.type.DateTime
-
google.protobuf.Timestamp
JSON representation |
---|
{ "year": integer, "month": integer, "day": integer } |
Поля | |
---|---|
year | Year of the date. Must be from 1 to 9999, or 0 to specify a date without a year. |
month | Month of a year. Must be from 1 to 12, or 0 to specify a year without a month and day. |
day | Day of a month. Must be from 1 to 31 and valid for the year and month, or 0 to specify a year by itself or a year and month where the day isn't significant. |
StatusReportingSettings
Settings controlling the behavior of status reports.
JSON representation |
---|
{
"applicationReportsEnabled": boolean,
"deviceSettingsEnabled": boolean,
"softwareInfoEnabled": boolean,
"memoryInfoEnabled": boolean,
"networkInfoEnabled": boolean,
"displayInfoEnabled": boolean,
"powerManagementEventsEnabled": boolean,
"hardwareStatusEnabled": boolean,
"systemPropertiesEnabled": boolean,
"applicationReportingSettings": {
object ( |
Поля | |
---|---|
applicationReportsEnabled | Whether app reports are enabled. |
deviceSettingsEnabled | Whether device settings reporting is enabled. |
softwareInfoEnabled | Whether software info reporting is enabled. |
memoryInfoEnabled | Whether memory event reporting is enabled. |
networkInfoEnabled | Whether network info reporting is enabled. |
displayInfoEnabled | Whether displays reporting is enabled. Report data is not available for personally owned devices with work profiles. |
powerManagementEventsEnabled | Whether power management event reporting is enabled. Report data is not available for personally owned devices with work profiles. |
hardwareStatusEnabled | Whether hardware status reporting is enabled. Report data is not available for personally owned devices with work profiles. |
systemPropertiesEnabled | Whether system properties reporting is enabled. |
applicationReportingSettings | Application reporting settings. Only applicable if applicationReportsEnabled is true. |
commonCriteriaModeEnabled | Whether |
defaultApplicationInfoReportingEnabled | Optional. Whether |
ApplicationReportingSettings
Settings controlling the behavior of application reports.
JSON representation |
---|
{ "includeRemovedApps": boolean } |
Поля | |
---|---|
includeRemovedApps | Whether removed apps are included in application reports. |
PackageNameList
A list of package names.
JSON representation |
---|
{ "packageNames": [ string ] } |
Поля | |
---|---|
packageNames[] | A list of package names. |
BatteryPluggedMode
Modes for plugging in the battery.
Перечисления | |
---|---|
BATTERY_PLUGGED_MODE_UNSPECIFIED | This value is ignored. |
AC | Power source is an AC charger. |
USB | Power source is a USB port. |
WIRELESS | Power source is wireless. |
ProxyInfo
Configuration info for an HTTP proxy. For a direct proxy, set the host
, port
, and excludedHosts
fields. For a PAC script proxy, set the pacUri
field.
JSON representation |
---|
{ "host": string, "port": integer, "excludedHosts": [ string ], "pacUri": string } |
Поля | |
---|---|
host | The host of the direct proxy. |
port | The port of the direct proxy. |
excludedHosts[] | For a direct proxy, the hosts for which the proxy is bypassed. The host names may contain wildcards such as *.example.com. |
pacUri | The URI of the PAC script used to configure the proxy. |
ChoosePrivateKeyRule
Controls apps' access to private keys. The rule determines which private key, if any, Android Device Policy grants to the specified app. Access is granted either when the app calls KeyChain.choosePrivateKeyAlias
(or any overloads) to request a private key alias for a given URL, or for rules that are not URL-specific (that is, if urlPattern
is not set, or set to the empty string or .*
) on Android 11 and above, directly so that the app can call KeyChain.getPrivateKey
, without first having to call KeyChain.choosePrivateKeyAlias
.
When an app calls KeyChain.choosePrivateKeyAlias
if more than one
matches, the last matching rule defines which key alias to return. choosePrivateKeyRules
JSON representation |
---|
{ "urlPattern": string, "packageNames": [ string ], "privateKeyAlias": string } |
Поля | |
---|---|
urlPattern | The URL pattern to match against the URL of the request. If not set or empty, it matches all URLs. This uses the regular expression syntax of |
packageNames[] | The package names to which this rule applies. The signing key certificate fingerprint of the app is verified against the signing key certificate fingerprints provided by Play Store and |
privateKeyAlias | The alias of the private key to be used. |
AlwaysOnVpnPackage
Configuration for an always-on VPN connection.
JSON representation |
---|
{ "packageName": string, "lockdownEnabled": boolean } |
Поля | |
---|---|
packageName | The package name of the VPN app. |
lockdownEnabled | Disallows networking when the VPN is not connected. |
LocationMode
The degree of location detection enabled on work profile and fully managed devices.
Перечисления | |
---|---|
LOCATION_MODE_UNSPECIFIED | Defaults to LOCATION_USER_CHOICE . |
HIGH_ACCURACY | On Android 8 and below, all location detection methods are enabled, including GPS, networks, and other sensors. On Android 9 and above, this is equivalent to |
SENSORS_ONLY | On Android 8 and below, only GPS and other sensors are enabled. On Android 9 and above, this is equivalent to |
BATTERY_SAVING | On Android 8 and below, only the network location provider is enabled. On Android 9 and above, this is equivalent to |
OFF | On Android 8 and below, location setting and accuracy are disabled. On Android 9 and above, this is equivalent to |
LOCATION_USER_CHOICE | Location setting is not restricted on the device. No specific behavior is set or enforced. |
LOCATION_ENFORCED | Enable location setting on the device. |
LOCATION_DISABLED | Disable location setting on the device. |
ComplianceRule
A rule declaring which mitigating actions to take when a device is not compliant with its policy. For every rule, there is always an implicit mitigating action to set policyCompliant
to false for the Device
resource, and display a message on the device indicating that the device is not compliant with its policy. Other mitigating actions may optionally be taken as well, depending on the field values in the rule.
JSON representation |
---|
{ "disableApps": boolean, "packageNamesToDisable": [ string ], // Union field |
Поля | |
---|---|
disableApps | If set to true, the rule includes a mitigating action to disable apps so that the device is effectively disabled, but app data is preserved. If the device is running an app in locked task mode, the app will be closed and a UI showing the reason for non-compliance will be displayed. |
packageNamesToDisable[] | If set, the rule includes a mitigating action to disable apps specified in the list, but app data is preserved. |
Union field condition . The condition, which when satisfied, triggers the mitigating actions defined in the rule. Exactly one of the conditions must be set. condition can be only one of the following: | |
nonComplianceDetailCondition | A condition which is satisfied if there exists any matching |
apiLevelCondition | A condition which is satisfied if the Android Framework API level on the device doesn't meet a minimum requirement. |
NonComplianceDetailCondition
A compliance rule condition which is satisfied if there exists any matching NonComplianceDetail
for the device. A NonComplianceDetail
matches a NonComplianceDetailCondition
if all the fields which are set within the NonComplianceDetailCondition
match the corresponding NonComplianceDetail
fields.
JSON representation |
---|
{
"settingName": string,
"nonComplianceReason": enum ( |
Поля | |
---|---|
settingName | The name of the policy setting. This is the JSON field name of a top-level |
nonComplianceReason | The reason the device is not in compliance with the setting. If not set, then this condition matches any reason. |
packageName | The package name of the app that's out of compliance. If not set, then this condition matches any package name. |
ApiLevelCondition
A compliance rule condition which is satisfied if the Android Framework API level on the device doesn't meet a minimum requirement. There can only be one rule with this type of condition per policy.
JSON representation |
---|
{ "minApiLevel": integer } |
Поля | |
---|---|
minApiLevel | The minimum desired Android Framework API level. If the device doesn't meet the minimum requirement, this condition is satisfied. Must be greater than zero. |
AppAutoUpdatePolicy
Recommended alternative:
which is set per app, provides greater flexibility around update frequency.autoUpdateMode
When
is set to autoUpdateMode
or AUTO_UPDATE_POSTPONED
, this field has no effect.AUTO_UPDATE_HIGH_PRIORITY
The app auto-update policy, which controls when automatic app updates can be applied.
Перечисления | |
---|---|
APP_AUTO_UPDATE_POLICY_UNSPECIFIED | The auto-update policy is not set. Equivalent to CHOICE_TO_THE_USER . |
CHOICE_TO_THE_USER | The user can control auto-updates. |
NEVER | Apps are never auto-updated. |
WIFI_ONLY | Apps are auto-updated over Wi-Fi only. |
ALWAYS | Apps are auto-updated at any time. Data charges may apply. |
AppTrack
A Google Play app release track.
Перечисления | |
---|---|
APP_TRACK_UNSPECIFIED | This value is ignored. |
PRODUCTION | The production track, which provides the latest stable release. |
BETA | The beta track, which provides the latest beta release. |
EncryptionPolicy
Type of encryption
Перечисления | |
---|---|
ENCRYPTION_POLICY_UNSPECIFIED | This value is ignored, ie no encryption required |
ENABLED_WITHOUT_PASSWORD | Encryption required but no password required to boot |
ENABLED_WITH_PASSWORD | Encryption required with password required to boot |
PlayStoreMode
Possible values for Play Store mode policy.
Перечисления | |
---|---|
PLAY_STORE_MODE_UNSPECIFIED | Unspecified. Defaults to WHITELIST. |
WHITELIST | Only apps that are in the policy are available and any app not in the policy will be automatically uninstalled from the device. |
BLACKLIST | All apps are available and any app that should not be on the device should be explicitly marked as 'BLOCKED' in the applications policy. |
SetupAction
An action executed during setup.
JSON representation |
---|
{ "title": { object ( |
Поля | |
---|---|
title | Title of this action. |
description | Description of this action. |
Union field action . The action to execute during setup. action can be only one of the following: | |
launchApp | An action to launch an app. The app will be launched with an intent containing an extra with key |
LaunchAppAction
An action to launch an app.
JSON representation |
---|
{ // Union field |
Поля | |
---|---|
Union field launch . Description of launch action to be executed launch can be only one of the following: | |
packageName | Package name of app to be launched |
PolicyEnforcementRule
A rule that defines the actions to take if a device or work profile is not compliant with the policy specified in settingName
. In the case of multiple matching or multiple triggered enforcement rules, a merge will occur with the most severe action being taken. However, all triggered rules are still kept track of: this includes initial trigger time and all associated non-compliance details. In the situation where the most severe enforcement rule is satisfied, the next most appropriate action is applied.
JSON representation |
---|
{ "blockAction": { object ( |
Поля | |
---|---|
blockAction | An action to block access to apps and data on a company owned device or in a work profile. This action also triggers a user-facing notification with information (where possible) on how to correct the compliance issue. Note: |
wipeAction | An action to reset a company owned device or delete a work profile. Note: |
Union field trigger . Condition which will trigger this rule. trigger can be only one of the following: | |
settingName | The top-level policy to enforce. For example, |
BlockAction
An action to block access to apps and data on a fully managed device or in a work profile. This action also triggers a device or work profile to displays a user-facing notification with information (where possible) on how to correct the compliance issue. Note: wipeAction
must also be specified.
JSON representation |
---|
{
"blockAfterDays": integer,
"blockScope": enum ( |
Поля | |
---|---|
blockAfterDays | Number of days the policy is non-compliant before the device or work profile is blocked. To block access immediately, set to 0. |
blockScope | Specifies the scope of this |
BlockScope
Specifies the scope of BlockAction
. Only applicable to devices that are company-owned.
Перечисления | |
---|---|
BLOCK_SCOPE_UNSPECIFIED | Unspecified. Defaults to BLOCK_SCOPE_WORK_PROFILE . |
BLOCK_SCOPE_WORK_PROFILE | Block action is only applied to apps in the work profile. Apps in the personal profile are unaffected. |
BLOCK_SCOPE_DEVICE | Block action is applied to the entire device, including apps in the personal profile. |
WipeAction
An action to reset a company owned device or delete a work profile. Note: blockAction
must also be specified.
JSON representation |
---|
{ "wipeAfterDays": integer, "preserveFrp": boolean } |
Поля | |
---|---|
wipeAfterDays | Number of days the policy is non-compliant before the device or work profile is wiped. |
preserveFrp | Whether the factory-reset protection data is preserved on the device. This setting doesn't apply to work profiles. |
KioskCustomization
Settings controlling the behavior of a device in kiosk mode. To enable kiosk mode, set kioskCustomLauncherEnabled
to true
or specify an app in the policy with installType
KIOSK
.
JSON representation |
---|
{ "powerButtonActions": enum ( |
Поля | |
---|---|
powerButtonActions | Sets the behavior of a device in kiosk mode when a user presses and holds (long-presses) the Power button. |
systemErrorWarnings | Specifies whether system error dialogs for crashed or unresponsive apps are blocked in kiosk mode. When blocked, the system will force-stop the app as if the user chooses the "close app" option on the UI. |
systemNavigation | Specifies which navigation features are enabled (eg Home, Overview buttons) in kiosk mode. |
statusBar | Specifies whether system info and notifications are disabled in kiosk mode. |
deviceSettings | Specifies whether the Settings app is allowed in kiosk mode. |
PowerButtonActions
Sets the behavior of a device in kiosk mode when a user presses and holds (long-presses) the Power button.
Перечисления | |
---|---|
POWER_BUTTON_ACTIONS_UNSPECIFIED | Unspecified, defaults to POWER_BUTTON_AVAILABLE . |
POWER_BUTTON_AVAILABLE | The power menu (eg Power off, Restart) is shown when a user long-presses the Power button of a device in kiosk mode. |
POWER_BUTTON_BLOCKED | The power menu (eg Power off, Restart) is not shown when a user long-presses the Power button of a device in kiosk mode. Note: this may prevent users from turning off the device. |
SystemErrorWarnings
Specifies whether system error dialogs for crashed or unresponsive apps are blocked in kiosk mode.
Перечисления | |
---|---|
SYSTEM_ERROR_WARNINGS_UNSPECIFIED | Unspecified, defaults to ERROR_AND_WARNINGS_MUTED . |
ERROR_AND_WARNINGS_ENABLED | All system error dialogs such as crash and app not responding (ANR) are displayed. |
ERROR_AND_WARNINGS_MUTED | All system error dialogs, such as crash and app not responding (ANR) are blocked. When blocked, the system force-stops the app as if the user closes the app from the UI. |
StatusBar
Specifies whether system info and notifications are disabled in kiosk mode.
Перечисления | |
---|---|
STATUS_BAR_UNSPECIFIED | Unspecified, defaults to INFO_AND_NOTIFICATIONS_DISABLED . |
NOTIFICATIONS_AND_SYSTEM_INFO_ENABLED | System info and notifications are shown on the status bar in kiosk mode. Note: For this policy to take effect, the device's home button must be enabled using |
NOTIFICATIONS_AND_SYSTEM_INFO_DISABLED | System info and notifications are disabled in kiosk mode. |
SYSTEM_INFO_ONLY | Only system info is shown on the status bar. |
DeviceSettings
Specifies whether a user can access the device's Settings app while in kiosk mode.
Перечисления | |
---|---|
DEVICE_SETTINGS_UNSPECIFIED | Unspecified, defaults to SETTINGS_ACCESS_ALLOWED . |
SETTINGS_ACCESS_ALLOWED | Access to the Settings app is allowed in kiosk mode. |
SETTINGS_ACCESS_BLOCKED | Access to the Settings app is not allowed in kiosk mode. |
AdvancedSecurityOverrides
Advanced security settings. In most cases, setting these is not needed.
JSON representation |
---|
{ "untrustedAppsPolicy": enum ( |
Поля | |
---|---|
untrustedAppsPolicy | The policy for untrusted apps (apps from unknown sources) enforced on the device. Replaces |
googlePlayProtectVerifyApps | Whether Google Play Protect verification is enforced. Replaces |
developerSettings | Controls access to developer settings: developer options and safe boot. Replaces |
commonCriteriaMode | Controls Common Criteria Mode—security standards defined in the Common Criteria for Information Technology Security Evaluation (CC). Enabling Common Criteria Mode increases certain security components on a device, see Warning: Common Criteria Mode enforces a strict security model typically only required for IT products used in national security systems and other highly sensitive organizations. Standard device use may be affected. Only enabled if required. If Common Criteria Mode is turned off after being enabled previously, all user-configured Wi-Fi networks may be lost and any enterprise-configured Wi-Fi networks that require user input may need to be reconfigured. |
personalAppsThatCanReadWorkNotifications[] | Personal apps that can read work profile notifications using a NotificationListenerService . By default, no personal apps (aside from system apps) can read work notifications. Each value in the list must be a package name. |
mtePolicy | Optional. Controls Memory Tagging Extension (MTE) on the device. The device needs to be rebooted to apply changes to the MTE policy. |
contentProtectionPolicy | Optional. Controls whether content protection, which scans for deceptive apps, is enabled. This is supported on Android 15 and above. |
UntrustedAppsPolicy
The policy for untrusted apps (apps from unknown sources) enforced on the device. Replaces installUnknownSourcesAllowed (deprecated).
Перечисления | |
---|---|
UNTRUSTED_APPS_POLICY_UNSPECIFIED | Unspecified. Defaults to DISALLOW_INSTALL. |
DISALLOW_INSTALL | Default. Disallow untrusted app installs on entire device. |
ALLOW_INSTALL_IN_PERSONAL_PROFILE_ONLY | For devices with work profiles, allow untrusted app installs in the device's personal profile only. |
ALLOW_INSTALL_DEVICE_WIDE | Allow untrusted app installs on entire device. |
GooglePlayProtectVerifyApps
Whether Google Play Protect verification is enforced. Replaces
(deprecated). ensureVerifyAppsEnabled
Перечисления | |
---|---|
GOOGLE_PLAY_PROTECT_VERIFY_APPS_UNSPECIFIED | Unspecified. Defaults to VERIFY_APPS_ENFORCED. |
VERIFY_APPS_ENFORCED | Default. Force-enables app verification. |
VERIFY_APPS_USER_CHOICE | Allows the user to choose whether to enable app verification. |
DeveloperSettings
Controls access to developer settings: developer options and safe boot. Replaces
(deprecated) and safeBootDisabled
(deprecated). debuggingFeaturesAllowed
Перечисления | |
---|---|
DEVELOPER_SETTINGS_UNSPECIFIED | Unspecified. Defaults to DEVELOPER_SETTINGS_DISABLED. |
DEVELOPER_SETTINGS_DISABLED | Default. Disables all developer settings and prevents the user from accessing them. |
DEVELOPER_SETTINGS_ALLOWED | Allows all developer settings. The user can access and optionally configure the settings. |
CommonCriteriaMode
Controls Common Criteria Mode—security standards defined in the Common Criteria for Information Technology Security Evaluation (CC). Enabling Common Criteria Mode increases certain security components on a device, including:
- AES-GCM encryption of Bluetooth Long Term Keys
- Wi-Fi configuration stores
- Additional network certificates validation requiring the use of TLSv1.2 to connect to AM API destination hosts
- Cryptographic policy integrity check. It is recommended to set
to true to obtain the status of policy integrity check. If the policy signature verification fails, then the policy is not applied on the device andstatusReportingSettings.commonCriteriaModeEnabled
is set tocommonCriteriaModeInfo.policy_signature_verification_status
.POLICY_SIGNATURE_VERIFICATION_FAILED
Common Criteria Mode is only supported on company-owned devices running Android 11 or above.
Warning: Common Criteria Mode enforces a strict security model typically only required for IT products used in national security systems and other highly sensitive organizations. Standard device use may be affected. Only enabled if required. If Common Criteria Mode is turned off after being enabled previously, all user-configured Wi-Fi networks may be lost and any enterprise-configured Wi-Fi networks that require user input may need to be reconfigured.
Перечисления | |
---|---|
COMMON_CRITERIA_MODE_UNSPECIFIED | Unspecified. Defaults to COMMON_CRITERIA_MODE_DISABLED. |
COMMON_CRITERIA_MODE_DISABLED | Default. Disables Common Criteria Mode. |
COMMON_CRITERIA_MODE_ENABLED | Enables Common Criteria Mode. |
MtePolicy
Controls Memory Tagging Extension (MTE) on the device.
Перечисления | |
---|---|
MTE_POLICY_UNSPECIFIED | Unspecified. Defaults to . |
MTE_USER_CHOICE | The user can choose to enable or disable MTE on the device if the device supports this. |
MTE_ENFORCED | MTE is enabled on the device and the user is not allowed to change this setting. This can be set on fully managed devices and work profiles on company-owned devices. A Supported on Android 14 and above. A |
MTE_DISABLED | MTE is disabled on the device and the user is not allowed to change this setting. This applies only on fully managed devices. In other cases, a Supported on Android 14 and above. A |
ContentProtectionPolicy
Controls whether content protection, which scans for deceptive apps, is enabled. This is supported on Android 15 and above.
Перечисления | |
---|---|
CONTENT_PROTECTION_POLICY_UNSPECIFIED | Unspecified. Defaults to . |
CONTENT_PROTECTION_DISABLED | Content protection is disabled and the user cannot change this. |
CONTENT_PROTECTION_ENFORCED | Content protection is enabled and the user cannot change this. Supported on Android 15 and above. A |
CONTENT_PROTECTION_USER_CHOICE | Content protection is not controlled by the policy. The user is allowed to choose the behavior of content protection. Supported on Android 15 and above. A |
PersonalUsagePolicies
Policies controlling personal usage on a company-owned device with a work profile.
JSON representation |
---|
{ "cameraDisabled": boolean, "screenCaptureDisabled": boolean, "accountTypesWithManagementDisabled": [ string ], "maxDaysWithWorkOff": integer, "personalPlayStoreMode": enum ( |
Поля | |
---|---|
cameraDisabled | If true, the camera is disabled on the personal profile. |
screenCaptureDisabled | If true, screen capture is disabled for all users. |
accountTypesWithManagementDisabled[] | Account types that can't be managed by the user. |
maxDaysWithWorkOff | Controls how long the work profile can stay off. The minimum duration must be at least 3 days. Other details are as follows:
|
personalPlayStoreMode | Used together with |
personalApplications[] | Policy applied to applications in the personal profile. |
privateSpacePolicy | Optional. Controls whether a private space is allowed on the device. |
bluetoothSharing | Optional. Whether bluetooth sharing is allowed. |
PlayStoreMode
Used together with personalApplications
to control how apps in the personal profile are allowed or blocked.
Перечисления | |
---|---|
PLAY_STORE_MODE_UNSPECIFIED | Unspecified. Defaults to BLOCKLIST . |
BLACKLIST | All Play Store apps are available for installation in the personal profile, except those whose |
BLOCKLIST | All Play Store apps are available for installation in the personal profile, except those whose installType is BLOCKED in personalApplications . |
ALLOWLIST | Only apps explicitly specified in personalApplications with installType set to AVAILABLE are allowed to be installed in the personal profile. |
PersonalApplicationPolicy
Policies for apps in the personal profile of a company-owned device with a work profile.
JSON representation |
---|
{
"packageName": string,
"installType": enum ( |
Поля | |
---|---|
packageName | The package name of the application. |
installType | The type of installation to perform. |
InstallType
Types of installation behaviors a personal profile application can have.
Перечисления | |
---|---|
INSTALL_TYPE_UNSPECIFIED | Unspecified. Defaults to AVAILABLE . |
BLOCKED | The app is blocked and can't be installed in the personal profile. If the app was previously installed in the device, it will be uninstalled. |
AVAILABLE | The app is available to install in the personal profile. |
PrivateSpacePolicy
Controls whether a private space is allowed on the device.
Перечисления | |
---|---|
PRIVATE_SPACE_POLICY_UNSPECIFIED | Unspecified. Defaults to . |
PRIVATE_SPACE_ALLOWED | Users can create a private space profile. |
PRIVATE_SPACE_DISALLOWED | Users cannot create a private space profile. Supported only for company-owned devices with a work profile. Caution: Any existing private space will be removed. |
BluetoothSharing
Whether bluetooth sharing is allowed in the personal profile of a company-owned device with a work profile.
Перечисления | |
---|---|
BLUETOOTH_SHARING_UNSPECIFIED | Unspecified. Defaults to BLUETOOTH_SHARING_ALLOWED . |
BLUETOOTH_SHARING_ALLOWED | Bluetooth sharing is allowed on personal profile. Supported on Android 8 and above. A |
BLUETOOTH_SHARING_DISALLOWED | Bluetooth sharing is disallowed on personal profile. Supported on Android 8 and above. A |
AutoDateAndTimeZone
Whether auto date, time, and time zone is enabled on a company-owned device.
Перечисления | |
---|---|
AUTO_DATE_AND_TIME_ZONE_UNSPECIFIED | Unspecified. Defaults to AUTO_DATE_AND_TIME_ZONE_USER_CHOICE . |
AUTO_DATE_AND_TIME_ZONE_USER_CHOICE | Auto date, time, and time zone are left to user's choice. |
AUTO_DATE_AND_TIME_ZONE_ENFORCED | Enforce auto date, time, and time zone on the device. |
OncCertificateProvider
This feature is not generally available.
JSON representation |
---|
{ "certificateReferences": [ string ], // Union field |
Поля | |
---|---|
certificateReferences[] | This feature is not generally available. |
Union field This feature is not generally available. | |
contentProviderEndpoint | This feature is not generally available. |
ContentProviderEndpoint
This feature is not generally available.
JSON representation |
---|
{ "uri": string, "packageName": string, "signingCertsSha256": [ string ] } |
Поля | |
---|---|
uri | This feature is not generally available. |
packageName | This feature is not generally available. |
signingCertsSha256[] | Required. This feature is not generally available. |
CrossProfilePolicies
Controls the data from the work profile that can be accessed from the personal profile and vice versa. A
with NonComplianceDetail
is reported if the device does not have a work profile. MANAGEMENT_MODE
JSON representation |
---|
{ "showWorkContactsInPersonalProfile": enum ( |
Поля | |
---|---|
showWorkContactsInPersonalProfile | Whether personal apps can access contacts stored in the work profile. |
crossProfileCopyPaste | Whether text copied from one profile (personal or work) can be pasted in the other profile. |
crossProfileDataSharing | Whether data from one profile (personal or work) can be shared with apps in the other profile. Specifically controls simple data sharing via intents. Management of other cross-profile communication channels, such as contact search, copy/paste, or connected work & personal apps, are configured separately. |
workProfileWidgetsDefault | Specifies the default behaviour for work profile widgets. If the policy does not specify |
crossProfileAppFunctions | Optional. Controls whether personal profile apps can invoke app functions exposed by apps in the work profile. |
exemptionsToShowWorkContactsInPersonalProfile | List of apps which are excluded from the
Supported on Android 14 and above. A |
ShowWorkContactsInPersonalProfile
Whether personal apps can access work profile contacts including contact searches and incoming calls
Note : Once a work contact is accessed by any personal app, it cannot be guaranteed to stay with the same app, as the contact could be shared or transferred to any other app, depending on the allowed app's behaviour.
Перечисления | |
---|---|
SHOW_WORK_CONTACTS_IN_PERSONAL_PROFILE_UNSPECIFIED | Unspecified. Defaults to When this is set, |
SHOW_WORK_CONTACTS_IN_PERSONAL_PROFILE_DISALLOWED | Prevents personal apps from accessing work profile contacts and looking up work contacts. When this is set, personal apps specified in Supported on Android 7.0 and above. A |
SHOW_WORK_CONTACTS_IN_PERSONAL_PROFILE_ALLOWED | Default. Allows apps in the personal profile to access work profile contacts including contact searches and incoming calls. When this is set, personal apps specified in Supported on Android 7.0 and above. A |
SHOW_WORK_CONTACTS_IN_PERSONAL_PROFILE_DISALLOWED_EXCEPT_SYSTEM | Prevents most personal apps from accessing work profile contacts including contact searches and incoming calls, except for the OEM default Dialer, Messages, and Contacts apps. Neither user-configured Dialer, Messages, and Contacts apps, nor any other system or play installed apps, will be able to query work contacts directly. When this is set, personal apps specified in Supported on Android 14 and above. If this is set on a device with Android version less than 14, the behaviour falls back to |
CrossProfileCopyPaste
Whether text copied from one profile (personal or work) can be pasted in the other profile.
Перечисления | |
---|---|
CROSS_PROFILE_COPY_PASTE_UNSPECIFIED | Unspecified. Defaults to COPY_FROM_WORK_TO_PERSONAL_DISALLOWED |
COPY_FROM_WORK_TO_PERSONAL_DISALLOWED | Default. Prevents users from pasting into the personal profile text copied from the work profile. Text copied from the personal profile can be pasted into the work profile, and text copied from the work profile can be pasted into the work profile. |
CROSS_PROFILE_COPY_PASTE_ALLOWED | Text copied in either profile can be pasted in the other profile. |
CrossProfileDataSharing
Whether data from one profile (personal or work) can be shared with apps in the other profile. Specifically controls simple data sharing via intents. This includes actions like opening a web browser, opening a map, sharing content, opening a document, etc. Management of other cross-profile communication channels, such as contact search, copy/paste, or connected work & personal apps, are configured separately.
Перечисления | |
---|---|
CROSS_PROFILE_DATA_SHARING_UNSPECIFIED | Unspecified. Defaults to DATA_SHARING_FROM_WORK_TO_PERSONAL_DISALLOWED. |
CROSS_PROFILE_DATA_SHARING_DISALLOWED | Prevents data from being shared from both the personal profile to the work profile and the work profile to the personal profile. |
DATA_SHARING_FROM_WORK_TO_PERSONAL_DISALLOWED | Default. Prevents users from sharing data from the work profile to apps in the personal profile. Personal data can be shared with work apps. |
CROSS_PROFILE_DATA_SHARING_ALLOWED | Data from either profile can be shared with the other profile. |
WorkProfileWidgetsDefault
Controls if work profile applications are allowed to add widgets to the home screen, where no app-specific policy is defined. Otherwise, the app-specific policy will have priority over this.
Перечисления | |
---|---|
WORK_PROFILE_WIDGETS_DEFAULT_UNSPECIFIED | Unspecified. Defaults to WORK_PROFILE_WIDGETS_DEFAULT_DISALLOWED. |
WORK_PROFILE_WIDGETS_DEFAULT_ALLOWED | Work profile widgets are allowed by default. This means that if the policy does not specify as for the application, it will be able to add widgets to the home screen. |
WORK_PROFILE_WIDGETS_DEFAULT_DISALLOWED | Work profile widgets are disallowed by default. This means that if the policy does not specify as for the application, it will be unable to add widgets to the home screen. |
CrossProfileAppFunctions
Controls whether personal profile apps are allowed to invoke app functions exposed by apps in the work profile.
Перечисления | |
---|---|
CROSS_PROFILE_APP_FUNCTIONS_UNSPECIFIED | Unspecified. If is set to , defaults to . If is set to , defaults to . |
CROSS_PROFILE_APP_FUNCTIONS_DISALLOWED | Personal profile apps are not allowed to invoke app functions exposed by apps in the work profile. |
CROSS_PROFILE_APP_FUNCTIONS_ALLOWED | Personal profile apps can invoke app functions exposed by apps in the work profile. If this is set, must not be set to , otherwise the policy will be rejected. |
PreferentialNetworkService
Controls whether preferential network service is enabled on the work profile or on fully managed devices. See
for details. preferentialNetworkService
Перечисления | |
---|---|
PREFERENTIAL_NETWORK_SERVICE_UNSPECIFIED | Unspecified. Defaults to PREFERENTIAL_NETWORK_SERVICES_DISABLED . |
PREFERENTIAL_NETWORK_SERVICE_DISABLED | Preferential network service is disabled on the work profile. |
PREFERENTIAL_NETWORK_SERVICE_ENABLED | Preferential network service is enabled on the work profile. This setting is only supported on work profiles on devices running Android 12 or above. Starting with Android 13, fully managed devices are also supported. |
UsageLog
Controls types of device activity logs collected from the device and reported via Pub/Sub notification .
JSON representation |
---|
{ "enabledLogTypes": [ enum ( |
Поля | |
---|---|
enabledLogTypes[] | Specifies which log types are enabled. Note that users will receive on-device messaging when usage logging is enabled. |
uploadOnCellularAllowed[] | Specifies which of the enabled log types can be uploaded over mobile data. By default logs are queued for upload when the device connects to WiFi. |
LogType
The types of device activity logs that are reported from the device.
Перечисления | |
---|---|
LOG_TYPE_UNSPECIFIED | This value is not used. |
SECURITY_LOGS | Enable logging of on-device security events, like when the device password is incorrectly entered or removable storage is mounted. See for a complete description of the logged security events. Supported for fully managed devices on Android 7 and above. Supported for company-owned devices with a work profile on Android 12 and above, on which only security events from the work profile are logged. Can be overridden by the application delegated scope
|
NETWORK_ACTIVITY_LOGS | Enable logging of on-device network events, like DNS lookups and TCP connections. See for a complete description of the logged network events. Supported for fully managed devices on Android 8 and above. Supported for company-owned devices with a work profile on Android 12 and above, on which only network events from the work profile are logged. Can be overridden by the application delegated scope |
CameraAccess
Controls the use of the camera and whether the user has access to the camera access toggle. The camera access toggle exists on Android 12 and above. As a general principle, the possibility of disabling the camera applies device-wide on fully managed devices and only within the work profile on devices with a work profile. The possibility of disabling the camera access toggle applies only on fully managed devices, in which case it applies device-wide. For specifics, see the enum values.
Перечисления | |
---|---|
CAMERA_ACCESS_UNSPECIFIED | If is true, this is equivalent to . Otherwise, this is equivalent to . |
CAMERA_ACCESS_USER_CHOICE | The field is ignored. This is the default device behaviour: all cameras on the device are available. On Android 12 and above, the user can use the camera access toggle. |
CAMERA_ACCESS_DISABLED | The field There are no explicit restrictions placed on the camera access toggle on Android 12 and above: on fully managed devices, the camera access toggle has no effect as all cameras are disabled. On devices with a work profile, this toggle has no effect on apps in the work profile, but it affects apps outside the work profile. |
CAMERA_ACCESS_ENFORCED | The field is ignored. All cameras on the device are available. On fully managed devices running Android 12 and above, the user is unable to use the camera access toggle. On devices which are not fully managed or which run Android 11 or below, this is equivalent to . |
MicrophoneAccess
On fully managed devices, controls the use of the microphone and whether the user has access to the microphone access toggle. This setting has no effect on devices which are not fully managed. The microphone access toggle exists on Android 12 and above.
Перечисления | |
---|---|
MICROPHONE_ACCESS_UNSPECIFIED | If is true, this is equivalent to . Otherwise, this is equivalent to . |
MICROPHONE_ACCESS_USER_CHOICE | The field is ignored. This is the default device behaviour: the microphone on the device is available. On Android 12 and above, the user can use the microphone access toggle. |
MICROPHONE_ACCESS_DISABLED | The field The microphone access toggle has no effect as the microphone is disabled. |
MICROPHONE_ACCESS_ENFORCED | The field is ignored. The microphone on the device is available. On devices running Android 12 and above, the user is unable to use the microphone access toggle. On devices which run Android 11 or below, this is equivalent to . |
DeviceConnectivityManagement
Covers controls for device connectivity such as Wi-Fi, USB data access, keyboard/mouse connections, and more.
JSON representation |
---|
{ "usbDataAccess": enum ( |
Поля | |
---|---|
usbDataAccess | Controls what files and/or data can be transferred via USB. Supported only on company-owned devices. |
configureWifi | Controls Wi-Fi configuring privileges. Based on the option set, user will have either full or limited or no control in configuring Wi-Fi networks. |
wifiDirectSettings | Controls configuring and using Wi-Fi direct settings. Supported on company-owned devices running Android 13 and above. |
tetheringSettings | Controls tethering settings. Based on the value set, the user is partially or fully disallowed from using different forms of tethering. |
wifiSsidPolicy | Restrictions on which Wi-Fi SSIDs the device can connect to. Note that this does not affect which networks can be configured on the device. Supported on company-owned devices running Android 13 and above. |
wifiRoamingPolicy | Optional. Wi-Fi roaming policy. |
bluetoothSharing | Optional. Controls whether Bluetooth sharing is allowed. |
preferentialNetworkServiceSettings | Optional. Preferential network service configuration. Setting this field will override |
apnPolicy | Optional. Access Point Name (APN) policy. Configuration for Access Point Names (APNs) which may override any other APNs on the device. See |
UsbDataAccess
Controls what files and/or data can be transferred via USB. Does not impact charging functions. Supported only on company-owned devices.
Перечисления | |
---|---|
USB_DATA_ACCESS_UNSPECIFIED | Unspecified. Defaults to . |
ALLOW_USB_DATA_TRANSFER | All types of USB data transfers are allowed. is ignored. |
DISALLOW_USB_FILE_TRANSFER | Transferring files over USB is disallowed. Other types of USB data connections, such as mouse and keyboard connection, are allowed. is ignored. |
DISALLOW_USB_DATA_TRANSFER | When set, all types of USB data transfers are prohibited. Supported for devices running Android 12 or above with USB HAL 1.3 or above. If the setting is not supported, will be set. A with is reported if the Android version is less than 12. A with is reported if the device does not have USB HAL 1.3 or above. is ignored. |
ConfigureWifi
Controls Wi-Fi configuring privileges. Based on the option set, the user will have either full or limited or no control in configuring Wi-Fi networks.
Перечисления | |
---|---|
CONFIGURE_WIFI_UNSPECIFIED | Unspecified. Defaults to unless is set to true. If is set to true, this is equivalent to . |
ALLOW_CONFIGURING_WIFI | The user is allowed to configure Wi-Fi. is ignored. |
DISALLOW_ADD_WIFI_CONFIG | Adding new Wi-Fi configurations is disallowed. The user is only able to switch between already configured networks. Supported on Android 13 and above, on fully managed devices and work profiles on company-owned devices. If the setting is not supported, is set. A with is reported if the Android version is less than 13. is ignored. |
DISALLOW_CONFIGURING_WIFI | Disallows configuring Wi-Fi networks. The setting is ignored when this value is set. Supported on fully managed devices and work profile on company-owned devices, on all supported API levels. For fully managed devices, setting this removes all configured networks and retains only the networks configured using policy. For work profiles on company-owned devices, existing configured networks are not affected and the user is not allowed to add, remove, or modify Wi-Fi networks. Note: If a network connection can't be made at boot time and configuring Wi-Fi is disabled then network escape hatch will be shown in order to refresh the device policy (see ). |
WifiDirectSettings
Controls Wi-Fi direct settings. Supported on company-owned devices running Android 13 and above.
Перечисления | |
---|---|
WIFI_DIRECT_SETTINGS_UNSPECIFIED | Unspecified. Defaults to
|
ALLOW_WIFI_DIRECT | The user is allowed to use Wi-Fi direct. |
DISALLOW_WIFI_DIRECT | The user is not allowed to use Wi-Fi direct. A with is reported if the Android version is less than 13. |
TetheringSettings
Controls the extent to which the user is allowed to use different forms of tethering like Wi-Fi tethering, bluetooth tethering, etc.
Перечисления | |
---|---|
TETHERING_SETTINGS_UNSPECIFIED | Unspecified. Defaults to unless is set to true. If is set to true, this is equivalent to . |
ALLOW_ALL_TETHERING | Allows configuration and use of all forms of tethering. is ignored. |
DISALLOW_WIFI_TETHERING | Disallows the user from using Wi-Fi tethering. Supported on company owned devices running Android 13 and above. If the setting is not supported, will be set. A with is reported if the Android version is less than 13. is ignored. |
DISALLOW_ALL_TETHERING | Disallows all forms of tethering. Supported on fully managed devices and work profile on company-owned devices, on all supported android versions. The setting is ignored. |
WifiSsidPolicy
Restrictions on which Wi-Fi SSIDs the device can connect to. Note that this does not affect which networks can be configured on the device. Supported on company-owned devices running Android 13 and above.
JSON representation |
---|
{ "wifiSsidPolicyType": enum ( |
Поля | |
---|---|
wifiSsidPolicyType | Type of the Wi-Fi SSID policy to be applied. |
wifiSsids[] | Optional. List of Wi-Fi SSIDs that should be applied in the policy. This field must be non-empty when WifiSsidPolicyType is set to |
WifiSsidPolicyType
The types of Wi-Fi SSID policy that can be applied on the device.
Перечисления | |
---|---|
WIFI_SSID_POLICY_TYPE_UNSPECIFIED | Defaults to . must not be set. There are no restrictions on which SSID the device can connect to. |
WIFI_SSID_DENYLIST | The device cannot connect to any Wi-Fi network whose SSID is in , but can connect to other networks. |
WIFI_SSID_ALLOWLIST | The device can make Wi-Fi connections only to the SSIDs in . must not be empty. The device will not be able to connect to any other Wi-Fi network. |
WifiSsid
Represents a Wi-Fi SSID.
JSON representation |
---|
{ "wifiSsid": string } |
Поля | |
---|---|
wifiSsid | Required. Wi-Fi SSID represented as a string. |
WifiRoamingPolicy
Wi-Fi roaming policy.
JSON representation |
---|
{
"wifiRoamingSettings": [
{
object ( |
Поля | |
---|---|
wifiRoamingSettings[] | Optional. Wi-Fi roaming settings. SSIDs provided in this list must be unique, the policy will be rejected otherwise. |
WifiRoamingSetting
Wi-Fi roaming setting.
JSON representation |
---|
{
"wifiSsid": string,
"wifiRoamingMode": enum ( |
Поля | |
---|---|
wifiSsid | Required. SSID of the Wi-Fi network. |
wifiRoamingMode | Required. Wi-Fi roaming mode for the specified SSID. |
WifiRoamingMode
Wi-Fi roaming mode.
Перечисления | |
---|---|
WIFI_ROAMING_MODE_UNSPECIFIED | Unspecified. Defaults to . |
WIFI_ROAMING_DISABLED | Wi-Fi roaming is disabled. Supported on Android 15 and above on fully managed devices and work profiles on company-owned devices. A with is reported for other management modes. A with is reported if the Android version is less than 15. |
WIFI_ROAMING_DEFAULT | Default Wi-Fi roaming mode of the device. |
WIFI_ROAMING_AGGRESSIVE | Aggressive roaming mode which allows quicker Wi-Fi roaming. Supported on Android 15 and above on fully managed devices and work profiles on company-owned devices. A with is reported for other management modes. A with is reported if the Android version is less than 15. A with is reported if the device does not support aggressive roaming mode. |
BluetoothSharing
Controls whether Bluetooth sharing is allowed.
Перечисления | |
---|---|
BLUETOOTH_SHARING_UNSPECIFIED | Unspecified. Defaults to BLUETOOTH_SHARING_DISALLOWED on work profiles and BLUETOOTH_SHARING_ALLOWED on fully managed devices. |
BLUETOOTH_SHARING_ALLOWED | Bluetooth sharing is allowed. Supported on Android 8 and above. A |
BLUETOOTH_SHARING_DISALLOWED | Bluetooth sharing is disallowed. Supported on Android 8 and above. A |
PreferentialNetworkServiceSettings
Preferential network service settings.
JSON representation |
---|
{ "preferentialNetworkServiceConfigs": [ { object ( |
Поля | |
---|---|
preferentialNetworkServiceConfigs[] | Required. Preferential network service configurations which enables having multiple enterprise slices. There must not be multiple configurations with the same |
defaultPreferentialNetworkId | Required. Default preferential network ID for the applications that are not in
|
PreferentialNetworkServiceConfig
Individual preferential network service configuration.
JSON representation |
---|
{ "preferentialNetworkId": enum ( |
Поля | |
---|---|
preferentialNetworkId | Required. Preferential network identifier. This must not be set to |
fallbackToDefaultConnection | Optional. Whether fallback to the device-wide default network is allowed. If this is set to |
nonMatchingNetworks | Optional. Whether apps this configuration applies to are blocked from using networks other than the preferential service. If this is set to |
FallbackToDefaultConnection
Whether fallback to the device-wide default network is allowed. Note that while this setting determines whether the apps subject to this configuration have a default network in the absence of a preferential service, apps can still explicitly decide to use another network than their default network by requesting them from the system. This setting does not determine whether the apps are blocked from using such other networks. See
for this setting. nonMatchingNetworks
Перечисления | |
---|---|
FALLBACK_TO_DEFAULT_CONNECTION_UNSPECIFIED | Unspecified. Defaults to FALLBACK_TO_DEFAULT_CONNECTION_ALLOWED . |
FALLBACK_TO_DEFAULT_CONNECTION_ALLOWED | Fallback to default connection is allowed. If this is set, must not be set to NON_MATCHING_NETWORKS_DISALLOWED , the policy will be rejected otherwise. |
FALLBACK_TO_DEFAULT_CONNECTION_DISALLOWED | Fallback to default connection is not allowed. |
NonMatchingNetworks
Whether apps this configuration applies to are allowed to use networks other than the preferential service. Apps can inspect the list of available networks on the device and choose to use multiple networks concurrently for performance, privacy or other reasons.
Перечисления | |
---|---|
NON_MATCHING_NETWORKS_UNSPECIFIED | Unspecified. Defaults to NON_MATCHING_NETWORKS_ALLOWED . |
NON_MATCHING_NETWORKS_ALLOWED | Apps this configuration applies to are allowed to use networks other than the preferential service. |
NON_MATCHING_NETWORKS_DISALLOWED | Apps this configuration applies to are disallowed from using other networks than the preferential service. This can be set on Android 14 and above. A with is reported if the Android version is less than 14. If this is set, must be set to FALLBACK_TO_DEFAULT_CONNECTION_DISALLOWED , the policy will be rejected otherwise. |
ApnPolicy
Access Point Name (APN) policy. Configuration for Access Point Names (APNs) which may override any other APNs on the device. See
and OVERRIDE_APNS_ENABLED
for details. overrideApns
JSON representation |
---|
{ "overrideApns": enum ( |
Поля | |
---|---|
overrideApns | Optional. Whether override APNs are disabled or enabled. See |
apnSettings[] | Optional. APN settings for override APNs. There must not be any conflict between any of APN settings provided, otherwise the policy will be rejected. Two |
OverrideApns
Whether override APNs are disabled or enabled. See DevicePolicyManager.setOverrideApnsEnabled
for more details.
Перечисления | |
---|---|
OVERRIDE_APNS_UNSPECIFIED | Unspecified. Defaults to OVERRIDE_APNS_DISABLED . |
OVERRIDE_APNS_DISABLED | Override APNs disabled. Any configured are saved on the device, but are disabled and have no effect. Any other APNs on the device remain in use. |
OVERRIDE_APNS_ENABLED | Override APNs enabled. Only override APNs are in use, any other APNs are ignored. This can only be set on fully managed devices on Android 10 and above. For work profiles override APNs are enabled via and this value cannot be set. A with is reported if the Android version is less than 10. A with is reported for work profiles. |
ApnSetting
An Access Point Name (APN) configuration for a carrier data connection. The APN provides configuration to connect a cellular network device to an IP data network. A carrier uses this setting to decide which IP address to assign, any security methods to apply, and how the device might be connected to private networks.
JSON representation |
---|
{ "apnTypes": [ enum ( |
Поля | |
---|---|
apnTypes[] | Required. Usage categories for the APN. Policy will be rejected if this field is empty or contains |
apn | Required. Name of the APN. Policy will be rejected if this field is empty. |
displayName | Required. Human-readable name that describes the APN. Policy will be rejected if this field is empty. |
alwaysOnSetting | Optional. Whether User Plane resources have to be activated during every transition from CM-IDLE mode to CM-CONNECTED state for this APN. See 3GPP TS 23.501 section 5.6.13. |
authType | Optional. Authentication type of the APN. |
carrierId | Optional. Carrier ID for the APN. A value of 0 (default) means not set and negative values are rejected. |
mmsProxyAddress | Optional. MMS (Multimedia Messaging Service) proxy address of the APN which can be an IP address or hostname (not a URL). |
mmsProxyPort | Optional. MMS (Multimedia Messaging Service) proxy port of the APN. A value of 0 (default) means not set and negative values are rejected. |
mmsc | Optional. MMSC (Multimedia Messaging Service Center) URI of the APN. |
mtuV4 | Optional. The default MTU (Maximum Transmission Unit) size in bytes of the IPv4 routes brought up by this APN setting. A value of 0 (default) means not set and negative values are rejected. Supported on Android 13 and above. A |
mtuV6 | Optional. The MTU (Maximum Transmission Unit) size of the IPv6 mobile interface to which the APN connected. A value of 0 (default) means not set and negative values are rejected. Supported on Android 13 and above. A |
mvnoType | Optional. MVNO match type for the APN. |
networkTypes[] | Optional. Radio technologies (network types) the APN may use. Policy will be rejected if this field contains |
username | Optional. APN username of the APN. |
password | Optional. APN password of the APN. |
numericOperatorId | Optional. The numeric operator ID of the APN. Numeric operator ID is defined as MCC (Mobile Country Code) + MNC (Mobile Network Code). |
protocol | Optional. The protocol to use to connect to this APN. |
roamingProtocol | Optional. The protocol to use to connect to this APN while the device is roaming. |
proxyAddress | Optional. The proxy address of the APN. |
proxyPort | Optional. The proxy port of the APN. A value of 0 (default) means not set and negative values are rejected. |
ApnType
Usage category for the APN.
Перечисления | |
---|---|
APN_TYPE_UNSPECIFIED | Unspecified. This value is not used. |
ENTERPRISE | APN type for enterprise traffic. Supported on Android 13 and above. A with is reported if the Android version is less than 13. |
BIP | APN type for BIP (Bearer Independent Protocol). This can only be set on fully managed devices on Android 12 and above. A with is reported if the Android version is less than 12. A with is reported for work profiles. |
CBS | APN type for CBS (Carrier Branded Services). This can only be set on fully managed devices. A with is reported for work profiles. |
DEFAULT | APN type for default data traffic. This can only be set on fully managed devices. A with is reported for work profiles. |
DUN | APN type for DUN (Dial-up networking) traffic. This can only be set on fully managed devices. A with is reported for work profiles. |
EMERGENCY | APN type for Emergency PDN. This is not an IA apn, but is used for access to carrier services in an emergency call situation. This can only be set on fully managed devices. A with is reported for work profiles. |
FOTA | APN type for accessing the carrier's FOTA (Firmware Over-the-Air) portal, used for over the air updates. This can only be set on fully managed devices. A with is reported for work profiles. |
HIPRI | APN type for HiPri (high-priority) traffic. This can only be set on fully managed devices. A with is reported for work profiles. |
IA | APN type for IA (Initial Attach) APN. This can only be set on fully managed devices. A with is reported for work profiles. |
IMS | APN type for IMS (IP Multimedia Subsystem) traffic. This can only be set on fully managed devices. A with is reported for work profiles. |
MCX | APN type for MCX (Mission Critical Service) where X can be PTT/Video/Data. This can only be set on fully managed devices. A with is reported for work profiles. |
MMS | APN type for MMS (Multimedia Messaging Service) traffic. This can only be set on fully managed devices. A with is reported for work profiles. |
RCS | APN type for RCS (Rich Communication Services). This can only be set on fully managed devices on Android 15 and above. A with is reported if the Android version is less than 15. A with is reported for work profiles. |
SUPL | APN type for SUPL (Secure User Plane Location) assisted GPS. This can only be set on fully managed devices. A with is reported for work profiles. |
VSIM | APN type for VSIM (Virtual SIM) service. This can only be set on fully managed devices on Android 12 and above. A with is reported if the Android version is less than 12. A with is reported for work profiles. |
XCAP | APN type for XCAP (XML Configuration Access Protocol) traffic. This can only be set on fully managed devices on Android 11 and above. A with is reported if the Android version is less than 11. A with is reported for work profiles. |
AlwaysOnSetting
Whether User Plane resources have to be activated during every transition from CM-IDLE mode to CM-CONNECTED state for this APN. See 3GPP TS 23.501 section 5.6.13.
Перечисления | |
---|---|
ALWAYS_ON_SETTING_UNSPECIFIED | Unspecified. Defaults to NOT_ALWAYS_ON . |
NOT_ALWAYS_ON | The PDU session brought up by this APN should not be always on. |
ALWAYS_ON | The PDU session brought up by this APN should always be on. Supported on Android 15 and above. A with is reported if the Android version is less than 15. |
Тип аутентификации
Authentication type of the APN.
Перечисления | |
---|---|
AUTH_TYPE_UNSPECIFIED | Unspecified. If is empty, defaults to NONE . Otherwise, defaults to PAP_OR_CHAP . |
NONE | Authentication is not required. |
PAP | Authentication type for PAP. |
CHAP | Authentication type for CHAP. |
PAP_OR_CHAP | Authentication type for PAP or CHAP. |
MvnoType
MVNO match type for the APN.
Перечисления | |
---|---|
MVNO_TYPE_UNSPECIFIED | The MVNO type is not specified. |
GID | MVNO type for group identifier level 1. |
ICCID | MVNO type for ICCID. |
IMSI | MVNO type for IMSI. |
SPN | MVNO type for SPN (service provider name). |
Тип сети
Radio technology (network type) the APN may use.
Перечисления | |
---|---|
NETWORK_TYPE_UNSPECIFIED | Unspecified. This value must not be used. |
EDGE | Radio technology EDGE. |
GPRS | Radio technology GPRS. |
GSM | Radio technology GSM. |
HSDPA | Radio technology HSDPA. |
HSPA | Radio technology HSPA. |
HSPAP | Radio technology HSPAP. |
HSUPA | Radio technology HSUPA. |
IWLAN | Radio technology IWLAN. |
LTE | Radio technology LTE. |
NR | Radio technology NR (New Radio) 5G. |
TD_SCDMA | Radio technology TD_SCDMA. |
UMTS | Radio technology UMTS. |
Протокол
The protocol to use to connect to the APN.
Перечисления | |
---|---|
PROTOCOL_UNSPECIFIED | The protocol is not specified. |
IP | Internet protocol. |
IPV4V6 | Virtual PDP type introduced to handle dual IP stack UE capability. |
IPV6 | Internet protocol, version 6. |
NON_IP | Transfer of Non-IP data to external packet data network. |
PPP | Point to point protocol. |
UNSTRUCTURED | Transfer of Unstructured data to the Data Network via N6. |
DeviceRadioState
Controls for device radio settings.
JSON representation |
---|
{ "wifiState": enum ( |
Поля | |
---|---|
wifiState | Controls current state of Wi-Fi and if user can change its state. |
airplaneModeState | Controls whether airplane mode can be toggled by the user or not. |
ultraWidebandState | Controls the state of the ultra wideband setting and whether the user can toggle it on or off. |
cellularTwoGState | Controls whether cellular 2G setting can be toggled by the user or not. |
minimumWifiSecurityLevel | The minimum required security level of Wi-Fi networks that the device can connect to. |
WifiState
Controls whether the Wi-Fi is on or off as a state and if the user can change said state. Supported on company-owned devices running Android 13 and above.
Перечисления | |
---|---|
WIFI_STATE_UNSPECIFIED | Unspecified. Defaults to
|
WIFI_STATE_USER_CHOICE | User is allowed to enable/disable Wi-Fi. |
WIFI_ENABLED | Wi-Fi is on and the user is not allowed to turn it off. A with is reported if the Android version is less than 13. |
WIFI_DISABLED | Wi-Fi is off and the user is not allowed to turn it on. A with is reported if the Android version is less than 13. |
AirplaneModeState
Controls the state of airplane mode and whether the user can toggle it on or off. Supported on Android 9 and above. Supported on fully managed devices and work profiles on company-owned devices.
Перечисления | |
---|---|
AIRPLANE_MODE_STATE_UNSPECIFIED | Unspecified. Defaults to . |
AIRPLANE_MODE_USER_CHOICE | The user is allowed to toggle airplane mode on or off. |
AIRPLANE_MODE_DISABLED | Airplane mode is disabled. The user is not allowed to toggle airplane mode on. A with is reported if the Android version is less than 9. |
UltraWidebandState
Controls the state of the ultra wideband setting and whether the user can toggle it on or off. Supported on Android 14 and above. Supported on fully managed devices and work profiles on company-owned devices.
Перечисления | |
---|---|
ULTRA_WIDEBAND_STATE_UNSPECIFIED | Unspecified. Defaults to . |
ULTRA_WIDEBAND_USER_CHOICE | The user is allowed to toggle ultra wideband on or off. |
ULTRA_WIDEBAND_DISABLED | Ultra wideband is disabled. The user is not allowed to toggle ultra wideband on via settings. A with is reported if the Android version is less than 14. |
CellularTwoGState
Controls the state of cellular 2G setting and whether the user can toggle it on or off. Supported on Android 14 and above. Supported on fully managed devices and work profiles on company-owned devices.
Перечисления | |
---|---|
CELLULAR_TWO_G_STATE_UNSPECIFIED | Unspecified. Defaults to . |
CELLULAR_TWO_G_USER_CHOICE | The user is allowed to toggle cellular 2G on or off. |
CELLULAR_TWO_G_DISABLED | Cellular 2G is disabled. The user is not allowed to toggle cellular 2G on via settings. A with is reported if the Android version is less than 14. |
MinimumWifiSecurityLevel
Defines the different minimum Wi-Fi security levels required to connect to Wi-Fi networks. Supported on Android 13 and above. Supported on fully managed devices and work profiles on company-owned devices.
Перечисления | |
---|---|
MINIMUM_WIFI_SECURITY_LEVEL_UNSPECIFIED | Defaults to , which means the device will be able to connect to all types of Wi-Fi networks. |
OPEN_NETWORK_SECURITY | The device will be able to connect to all types of Wi-Fi networks. |
PERSONAL_NETWORK_SECURITY | A personal network such as WEP, WPA2-PSK is the minimum required security. The device will not be able to connect to open wifi networks. This is stricter than . A with is reported if the Android version is less than 13. |
ENTERPRISE_NETWORK_SECURITY | An enterprise EAP network is the minimum required security level. The device will not be able to connect to Wi-Fi network below this security level. This is stricter than . A with is reported if the Android version is less than 13. |
ENTERPRISE_BIT192_NETWORK_SECURITY | A 192-bit enterprise network is the minimum required security level. The device will not be able to connect to Wi-Fi network below this security level. This is stricter than . A with is reported if the Android version is less than 13. |
CredentialProviderPolicyDefault
Controls which apps are allowed to act as credential providers on Android 14 and above. These apps store credentials, see this and this for details. See also
. credentialProviderPolicy
Перечисления | |
---|---|
CREDENTIAL_PROVIDER_POLICY_DEFAULT_UNSPECIFIED | Unspecified. Defaults to CREDENTIAL_PROVIDER_DEFAULT_DISALLOWED. |
CREDENTIAL_PROVIDER_DEFAULT_DISALLOWED | Apps with unspecified are not allowed to act as a credential provider. |
CREDENTIAL_PROVIDER_DEFAULT_DISALLOWED_EXCEPT_SYSTEM | Apps with unspecified are not allowed to act as a credential provider except for the OEM default credential providers. OEM default credential providers are always allowed to act as credential providers. |
PrintingPolicy
Controls whether printing is allowed. This is supported on devices running Android 9 and above.
Перечисления | |
---|---|
PRINTING_POLICY_UNSPECIFIED | Unspecified. Defaults to . |
PRINTING_DISALLOWED | Printing is disallowed. A with is reported if the Android version is less than 9. |
PRINTING_ALLOWED | Printing is allowed. |
Настройки дисплея
Controls for the display settings.
JSON representation |
---|
{ "screenBrightnessSettings": { object ( |
Поля | |
---|---|
screenBrightnessSettings | Optional. Controls the screen brightness settings. |
screenTimeoutSettings | Optional. Controls the screen timeout settings. |
ScreenBrightnessSettings
Controls for the screen brightness settings.
JSON representation |
---|
{
"screenBrightnessMode": enum ( |
Поля | |
---|---|
screenBrightnessMode | Optional. Controls the screen brightness mode. |
screenBrightness | Optional. The screen brightness between 1 and 255 where 1 is the lowest and 255 is the highest brightness. A value of 0 (default) means no screen brightness set. Any other value is rejected. |
ScreenBrightnessMode
Controls the screen brightness mode.
Перечисления | |
---|---|
SCREEN_BRIGHTNESS_MODE_UNSPECIFIED | Unspecified. Defaults to . |
BRIGHTNESS_USER_CHOICE | The user is allowed to configure the screen brightness. must not be set. |
BRIGHTNESS_AUTOMATIC | The screen brightness mode is automatic in which the brightness is automatically adjusted and the user is not allowed to configure the screen brightness. can still be set and it is taken into account while the brightness is automatically adjusted. Supported on Android 9 and above on fully managed devices. A with is reported if the Android version is less than 9. Supported on work profiles on company-owned devices on Android 15 and above. |
BRIGHTNESS_FIXED | The screen brightness mode is fixed in which the brightness is set to and the user is not allowed to configure the screen brightness. must be set. Supported on Android 9 and above on fully managed devices. A with is reported if the Android version is less than 9. Supported on work profiles on company-owned devices on Android 15 and above. |
ScreenTimeoutSettings
Controls the screen timeout settings.
JSON representation |
---|
{
"screenTimeoutMode": enum ( |
Поля | |
---|---|
screenTimeoutMode | Optional. Controls whether the user is allowed to configure the screen timeout. |
screenTimeout | Optional. Controls the screen timeout duration. The screen timeout duration must be greater than 0, otherwise it is rejected. Additionally, it should not be greater than A duration in seconds with up to nine fractional digits, ending with ' |
ScreenTimeoutMode
Controls whether the user is allowed to configure the screen timeout.
Перечисления | |
---|---|
SCREEN_TIMEOUT_MODE_UNSPECIFIED | Unspecified. Defaults to . |
SCREEN_TIMEOUT_USER_CHOICE | The user is allowed to configure the screen timeout. must not be set. |
SCREEN_TIMEOUT_ENFORCED | The screen timeout is set to and the user is not allowed to configure the timeout. must be set. Supported on Android 9 and above on fully managed devices. A with is reported if the Android version is less than 9. Supported on work profiles on company-owned devices on Android 15 and above. |
AssistContentPolicy
Controls whether AssistContent is allowed to be sent to a privileged app such as an assistant app. AssistContent includes screenshots and information about an app, such as package name. This is supported on Android 15 and above.
Перечисления | |
---|---|
ASSIST_CONTENT_POLICY_UNSPECIFIED | Unspecified. Defaults to . |
ASSIST_CONTENT_DISALLOWED | Assist content is blocked from being sent to a privileged app. Supported on Android 15 and above. A |
ASSIST_CONTENT_ALLOWED | Assist content is allowed to be sent to a privileged app. Supported on Android 15 and above. |
WorkAccountSetupConfig
Controls the work account setup configuration, such as details of whether a Google authenticated account is required.
JSON representation |
---|
{
"authenticationType": enum ( |
Поля | |
---|---|
authenticationType | Optional. The authentication type of the user on the device. |
requiredAccountEmail | Optional. The specific google work account email address to be added. This field is only relevant if |
AuthenticationType
The authentication type of the user on the device.
Перечисления | |
---|---|
AUTHENTICATION_TYPE_UNSPECIFIED | Unspecified. Defaults to . |
AUTHENTICATION_TYPE_NOT_ENFORCED | Authentication status of user on device is not enforced. |
GOOGLE_AUTHENTICATED | Requires device to be managed with a Google authenticated account. |
WipeDataFlag
Wipe flags to indicate what data is wiped when a device or profile wipe is triggered due to any reason. (For example, when the device is non-compliant). This does not apply to the
method. enterprises.devices.delete
Перечисления | |
---|---|
WIPE_DATA_FLAG_UNSPECIFIED | This value must not be used. |
WIPE_ESIMS | For company-owned devices, setting this in will remove all eSIMs on the device when wipe is triggered due to any reason. On personally-owned devices, this will remove only managed eSIMs on the device. (eSIMs which are added via the command). This is supported on devices running Android 15 and above. A with is reported if the Android version is less than 15. |
EnterpriseDisplayNameVisibility
Controls whether the
is visible on the device (eg lock screen message on company-owned devices). enterpriseDisplayName
Перечисления | |
---|---|
ENTERPRISE_DISPLAY_NAME_VISIBILITY_UNSPECIFIED | Unspecified. Defaults to displaying the enterprise name that's set at the time of device setup. In future, this will default to ENTERPRISE_DISPLAY_NAME_VISIBLE . |
ENTERPRISE_DISPLAY_NAME_VISIBLE | The enterprise display name is visible on the device. Supported on work profiles on Android 7 and above. Supported on fully managed devices on Android 8 and above. A with is reported if the Android version is less than 7. A with is reported on fully managed devices on Android 7. |
ENTERPRISE_DISPLAY_NAME_HIDDEN | The enterprise display name is hidden on the device. |
AppFunctions
Controls whether apps on the device for fully managed devices or in the work profile for devices with work profiles are allowed to expose app functions.
Перечисления | |
---|---|
APP_FUNCTIONS_UNSPECIFIED | Unspecified. Defaults to . |
APP_FUNCTIONS_DISALLOWED | Apps on the device for fully managed devices or in the work profile for devices with work profiles are not allowed to expose app functions. If this is set, must not be set to , otherwise the policy will be rejected. |
APP_FUNCTIONS_ALLOWED | Apps on the device for fully managed devices or in the work profile for devices with work profiles are allowed to expose app functions. |
DefaultApplicationSetting
The default application setting for a
. DefaultApplicationType
JSON representation |
---|
{ "defaultApplicationType": enum ( |
Поля | |
---|---|
defaultApplicationType | Required. The app type to set the default application. |
defaultApplications[] | Required. The list of applications that can be set as the default app for a given type. This list must not be empty or contain duplicates. The first app in the list that is installed and qualified for the If the A When applying to |
defaultApplicationScopes[] | Required. The scopes to which the policy should be applied. This list must not be empty or contain duplicates. A |
DefaultApplication
Information about the application to be set as the default.
JSON representation |
---|
{ "packageName": string } |
Поля | |
---|---|
packageName | Required. The package name that should be set as the default application. The policy is rejected if the package name is invalid. |
Методы | |
---|---|
| Deletes a policy. |
| Gets a policy. |
| Lists policies for a given enterprise. |
| Updates or creates applications in a policy. |
| Updates or creates a policy. |
| Removes applications in a policy. |