Android Legacy policies
Last updated June 26th, 2024
With 23.03, Knox Manage no longer supports the Android Legacy (also known as Device Admin ) platform. The Knox Manage team strongly recommends that you migrate to the Android Enterprise platform.
This section describes the policies you can configure for Android Legacy devices.
The availability of each policy varies depending on the OS version.
System
Provides backup and restore settings, developer options, and other features. Updates the operating system on a device.
Policy | Description | Supported system |
---|---|---|
Factory reset |
Allows a device factory reset.
|
Samsung Knox 1.0 and higher |
Power off |
Allows you to shut down and power off the device.
|
Samsung Knox 1.0 and higher |
Backup |
Allows backup of the device data. If you can find the backup function on your device at Google > Backup, it may seem as if you can turn the backup setting on or off, even if this policy is set to Disallow. However, note that when the Backup policy is set to Disallow, the device's backup functionality is limited regardless of the UI shown on the device. |
Samsung Knox 1.0 and higher |
OTA upgrade | Allows an OTA upgrade for the device. | Samsung Knox 1.0 and higher |
Settings | Allows the configuration of the System Settings. | Samsung Knox 1.0 and higher |
System app close | Allows force closing system applications. | Samsung Knox 1.0 and higher |
App crash report to Google | Allows reporting the application error occurrence information to Google. | Samsung Knox 1.0 and higher |
Multiple users | Allows multiple users. | Samsung Knox 1.0 and higher |
Expand status bar | Allows the expansion of the status bar. | Samsung Knox 1.0 and higher |
Wallpaper Change | Allows changing the home and the lock screens. | Samsung Knox 1.0 and higher |
Automatic Date and Time | Allows changing the date and time. | Samsung Knox 1.0 and higher |
Camera |
Allows using the camera. If the camera in the general area is restricted, the camera in the Knox Workspace is also restricted. |
Samsung Knox 1.0 and higher, Android 4 and higher |
>Face recognition camera | Allows use of the camera for face unlock even when the camera is disabled in the Camera policy. This policy is available when Camera is set to Disallow all. | Samsung Knox 3.2.1 and higher |
Screen capture | Allows use of the default screen capture function. | Samsung Knox 1.0 and higher |
Clipboard |
Allows the clipboard feature throughout the entire system.
|
Samsung Knox 1.0 and higher |
Share via apps | Allows the share app function. | Samsung Knox 1.0 and higher |
S Beam | Allows using Android Beam which transfers data using NFC. | Samsung Knox 1.0 and higher |
Encryption for storage | Specifies the encryption of the device's system storage or the external SD card. | Samsung Knox 1.0 and higher, Android 1 and higher |
> Storage encryption |
Check the check box to select the storage to be encrypted. External SD card encryption is applicable to Samsung Galaxy devices only. |
|
External SD Card | Allows using the external SD card. | Samsung Knox 1.0 and higher |
> Write to external SD card |
Allows writing to an external SD card. If the external SD card policy is allowed but the Write to external SD card policy is not, then external SD cards can only be read and do not have reset control. |
Samsung Knox 1.0 and higher |
Unauthorized SD Card | Allows using unauthorized SD cards. | Android 1 (SDK1 and higher) |
If compromised OS is detected |
Select the control function to be triggered if device OS tampering is detected.
Android 10 and higher devices are not supported.
The factory reset (only) function is unsupported in Android 2 and lower. To reset the device, select the Factory reset + Initialized SD card option. |
Samsung Knox 1.0 and higher |
Smart Select | Allows using the Smart Select, which is one of the Samsung device features. It allows users to clip a content by drawing a circle with the S pen. Clipped contents can be used on notes or anywhere else. | Samsung Knox 2.2 and higher |
Device Administrators to install and activate apps |
Specifies to run or install EMM applications other than the Knox Manage application.
You cannot control this policy if another EMM application is active before the policy was set. |
Samsung Knox 2.0 and higher |
> Exceptional app allowlist |
Allows installing or activating select EMM applications by adding them to the allowlist. This policy is available only when the Device Administrator to Install and Activate apps policy is set to Disallow installation or Disallow activation.
|
Samsung Knox 2.0 and higher |
Developer mode | Allows using the developer mode. | Samsung Knox 2.0 and higher |
> Background process limitation |
Allows setting the default number of background processes. If this policy is disabled, the number of background processes is set to the maximum number. |
Samsung Knox 1.0 and higher |
> Quit application upon killing activities |
Enables closing all running applications when the user signs out of the device. If this policy is disabled, the activation setting is disabled on the device and the user cannot control the device settings. |
Samsung Knox 1.0 and higher |
> Mock location |
Allows using the mock location, which specifies an arbitrary location for development or test purposes. Use this policy if location information from the Update Device Information of the Send Device Command seems incorrect. |
Samsung Knox 1.0 and higher |
Safe mode | Allows using Safe Mode. This policy retains device control functions such as camera control, but not Knox Manage applications and preloaded applications. | Samsung Knox 1.0 and higher |
Reboot banner | Allows using the reboot banner which appears on the user's device when the device reboots. | Samsung Knox 1.0 and higher |
> Reboot banners stationery |
Enter the text for the reboot manager. You can enter up to 1000 bytes. You can customize banners for Samsung Knox 2.2 and higher devices. For Samsung Knox 1.0 devices, only the message or banner registered by the manufacturer is displayed. |
Samsung Knox 2.2 and higher |
Domain Blocklist Settings | Allows using the domain blocklist. | Samsung Knox 1.0 and higher |
> Domain Blocklist |
Enter a domain blocklist that should not be used when registering an Exchange or email account.
|
|
Network Time Protocol Settings | Allows using the Network Time Protocol (NTP). Register this server to sync the server time to a device. | Samsung Knox 2.5 and higher |
> Server address | Enter the NTP server address. | Samsung Knox 2.5 and higher |
> Maximum number of attempts |
Set the maximum number of attempts for connecting to the NTP server to retrieve the time information. The value can be between 1–100 times. |
Samsung Knox 2.5 and higher |
> Polling cycle (hr) |
Set the cycle to reconnect to the server using NTP. The value can be between 1–8760 hours (8760 = 1 year). |
Samsung Knox 2.5 and higher |
> Short polling cycle (sec) |
Set the cycle to re-connect to the NTP server after experiencing a timeout. The value can be between 1–1000 seconds. |
Samsung Knox 2.5 and higher |
> Timeout (sec) |
Set the connection timeout on the NTP server. The value can be between 1–1000 seconds. |
Samsung Knox 2.5 and higher |
Notifications when an Event is Set to On. |
Sets the device to display notifications when a device control event is applied. User Defined — Users can set event notifications on the device from the Settings menu of Knox Manage agent. Show notification — Displays the notification when an event for device control is applied. Hide notifications — Hides the notification when an event for device control is applied. |
Samsung Knox 1.0 and higher, Android 1 and higher |
Notifications when an Event is Set to Off. |
Sets the device to display the notifications when an event for device control is disengaged.
|
Samsung Knox 1.0 and higher, Android 1 and higher |
Fix Event Notification |
Set the removal of the notification from the device Quick panel.
|
Samsung Knox 1.0 and higher, Android 1 and higher |
Power Saving Mode Control | Allows power saving control on the device. | Samsung Knox 2.8 and higher |
Firmware download mode control |
Allows using the hardware key on the device to update firmware.
|
Samsung Knox 2.0 and higher |
Samsung Keyboard settings control | Allows accessing the settings key from the Samsung keyboard. | Samsung Knox 2.0 and higher |
Data Saver Mode | Allows the device to use the data saver mode automatically. | Samsung Knox 3.0 and higher |
Connectivity
Controls the network settings, such as Bluetooth, Wi-Fi Direct, and tethering.
Policy | Description | Supported system |
---|---|---|
Wi-Fi |
Allows using Wi-Fi. If the Wi-Fi policy is not applied successfully, the device tries to apply it again 30 minutes later after Knox Manage is activated.
|
Samsung Knox 1.0 and higher, Android 1 and higher |
> Wi-Fi Direct |
Allows use of the Wi-Fi Direct (Wi-Fi P2P) connection.
|
Samsung Knox 1.0 and higher |
Wi-Fi hotspot | Allows use of the Wi-Fi hotspot. | Samsung Knox 1.0 and higher, Android 2.3 and higher |
Wi-Fi SSID allowlist setting |
Allows using the Wi-Fi SSID allowlist. Devices can only connect to the Wi-Fi APs on the allowlist. For non-Samsung devices with Android 8 or a higher version, this policy can only be applied the device user agrees to grant access to location information. |
Samsung Knox 1.0 and higher, Android 1 and higher |
> Wi-Fi SSID allowlist |
Add Wi-Fi APs to the allowlist. This policy is irrelevant to adding or deleting the Wi-Fi setting profile.
|
Android 1 (SDK1) and higher Samsung Knox 1.0 and higher |
Wi-Fi SSID Blocklist Setting |
Allows using the Wi-Fi SSID blocklist. Devices cannot connect to Wi-Fi APs on the blocklist. For non-Samsung devices with Android 8 or a higher version, this policy can only be applied when the device user agrees to grant access to location information. |
|
> Wi-Fi SSID Blocklist |
Add Wi-Fi APs to the blocklist. This policy is irrelevant to adding or deleting the Wi-Fi setting profile.
|
Samsung Knox 1.0 and higher, Android 1 and higher |
Wi-Fi auto connection | Allows automatic connection to Wi-Fi SSID already stored in the device. | Samsung Knox 1.0 and higher |
Wi-Fi minimum security level setting |
Set a minimum security level for Wi-Fi. The security level increases in the following ascending order: OPEN < WEP < WPA < LEAP, PWD < FAST, PEAP < TSL, TTLS, SIM, AKA, AKA' |
Samsung Knox 1.0 and higher |
Wi-Fi Proxy Setting |
Block a device's Wi-Fi proxy information from showing on the device. When this policy is set, device users cannot see the proxy menu under device settings > Wi-Fi. Currently, this feature is only available for Galaxy Tab A (SM-T585) devices, running the latest firmware version.
|
Samsung Knox 3.0 |
Bluetooth |
Allows using Bluetooth.
|
Samsung Knox 1.0 and higher, Android 1 and higher |
> Desktop PC connection | Allows Desktop PC connections with the user's device using Bluetooth. | Samsung Knox 1.0 and higher |
> Data transfer | Allows data exchanges with other devices using Bluetooth connection. | Samsung Knox 1.0 and higher |
> Search mode | Allows device search using Bluetooth. | Samsung Knox 1.0 and higher |
> Bluetooth tethering | Allows Bluetooth tethering to share the internet connection with another device. | Samsung Knox 1.0 and higher, Android 4.2 and higher |
Bluetooth UUID Block/Allowlist |
Select a method to connect Bluetooth devices based on their Universal Unique Identifier (UUID).
|
|
> Bluetooth UUID blocklist |
Select devices to block Bluetooth connections with. Click the check boxes for Audio, File transfer, Phonebook, Headsets, or Hands-free. When updating the policy, current Bluetooth connection gets disconnected. Users must reconnect. |
Samsung Knox 1.0 and higher |
> Bluetooth UUID allowlist |
Select devices to allow Bluetooth connections with. Click the check boxes for Audio, File transfer, Phonebook, Headsets, or Hands-free. When updating the policy, the current Bluetooth connection gets disconnected. Users must reconnect. |
Samsung Knox 1.0 and higher |
NFC control |
Allows NFC (Near Field Communication) control.
|
Samsung Knox 1.0 and higher |
PC connection | Allows connecting user's device to their computer. | Samsung Knox 1.0 and higher, Android 1 and higher |
USB tethering | Allows USB tethering. | Samsung Knox 1.0 and higher, Android 1 and higher |
USB host storage (OTG) |
Allows a device connection using OTG (On the Go). OTG controls only the storage items and not the non-storage items, such as a keyboard or mouse. To use DeX when the USB host storage (OTG) policy is disallowed, enable DeX in the Set USB exception allowed list policy. Then configure the Allow DeX mode policy to Allow. |
Samsung Knox 1.0 and higher |
> Set usb exception allowed list | Specify the use for the exception allowed list once the USB host storage (OTG) policy is disallowed. | Samsung Knox 3.0 and higher |
> USB exception allowed list | Select the USB interface to use if the USB host storage (OTG) policy is disallowed. | Samsung Knox 3.0 and higher |
USB debugging | Allows USB debugging. | Samsung Knox 1.0 and higher |
Microphone | Allows use of the microphone. | Samsung Knox 1.0 and higher, Android 1 and higher |
> Recording | Allows the use of microphone recording. | Samsung Knox 1.0 and higher |
> S Voice | Allows the use of S Voice. | Samsung Knox 1.0 and higher |
GPS |
Allows using GPS.
Consider the following:
|
Samsung Knox 1.0 and higher |
Wearable equipment policy inheritance | Set to use the existing Mobile policy for the Gear policy. | Samsung Knox 2.6 and higher |
Security
Configures the security settings, such as the password and lock screen.
Policy | Description | Supported system |
---|---|---|
Device Password |
Set the password for the device screen lock. Use of the camera is prohibited when the device is screen locked. Consider the following:
|
|
Secure Startup |
Allow or disallow users from setting the Secure Startup feature on devices. When Secure Startup is set and the user enters the wrong password 30 times, the device is factory reset even if you have restricted factory resets through a policy. To avoid this situation, set this policy to Disallow. This condition is applicable to devices running an OS earlier than Android P. |
|
Lock screen | Set to allow or disallow the user to change Lock Screen setting. | Samsung Knox 3.0 and higher |
> Minimum strength |
Set the minimum password strength on the screen. The password strength increases in the following ascending order: Pattern < Numeric < Must be alphanumeric < Must include special characters.
|
Samsung Knox 2.0 and higher, Android 2.2 and higher |
>> Maximum Failed Login Attempts |
Set the maximum number of incorrect password attempts before access is restricted. The value can be between 1 - 10 times. You can set this value only when type of password is set to Numeric, Alphanumeric, or Complex. |
Samsung Knox 2.0 and higher, Android 2.2 and higher |
>>> If maximum failed login attempts exceeded |
Select the action to be performed when the maximum number of failed attempts is reached. Knox Workspace devices support Samsung Knox 1.0 and higher.
Android 10 and higher devices are not supported.
|
Samsung Knox 2.0 and higher, Android 2.2 and higher |
>> Minimum length |
Set the minimum length of the password. The value can be between 4 - 16 characters. Minimum length of the pattern password refers to the number of lines connecting each dot. For example, if the policy value is 4, at least four lines connecting five dots must be entered. |
Samsung Knox 2.0 and higher, Android 2.2 and higher |
>> Expiration after (days) |
Set the maximum number of days before the password must be reset. The value can be between 0 - 365 days. Samsung Knox 2.0 and higher is supported for Knox Workspace devices. |
Samsung Knox 1.0 and higher, Android 3 and higher |
>> Manage password history (times) |
Set the minimum number of new passwords that the user must use before they can reuse the previous password. The value can be between 0 - 10 times. If the password is Knox123! and the minimum value is set to 10, the user must use ten other passwords before reusing Knox123! as password. |
Samsung Knox 1.0 and higher, Android 3 and higher |
>> Screen Lock Timeout (min) |
Set the duration for locking the device when the user has not set up a password for the screen lock. The value can be between 0 - 60 minutes. |
Samsung Knox 1.0 and higher |
>> Maximum length of sequential numbers |
Set the maximum number of consecutive numeric characters allowed in a password. The value can be between 1 - 10 words. |
Samsung Knox 1.0 and higher |
>> Maximum length of sequential characters |
Set the number of consecutive letters allowed in a password. The value can be between 1 - 10 words. |
Samsung Knox 1.0 and higher |
>> Block function setting on lock screen |
Allows blocking functions on the lock screen. Consider the following:
|
Android 5 and higher |
>>> Block functions on lock screen |
Select the function to be blocked on the lock screen when a password policy is set on a device.
You can only implement this policy when the password level is set to pattern and higher. |
|
> Maximum screen timeout | Set the maximum time limit that a user can linger before screen timeout. | Samsung Knox 2.0 and higher, Android 2.2 and higher |
Connection attempt between server and device | Allows Knox Manage to retry connecting according to the value that you specified when the device is disconnected from Knox Manage. If not specified, communication is reattempted twice every 15 minutes. | |
> Communication retry count |
Set a retry count when a device is disconnected from Knox Manage and Knox Manage retries connecting to the device in 1 minute intervals. If the device is disconnected continuously despite retrying on the specified count, Knox Manage retries connections according to the Communication retry interval (min) below. The value can be between 1 - 60 times. |
Android 1 (SDK 1) and higher |
> Communication retry interval (min) |
Set a retry interval for when a device is disconnected from Knox Manage. If Knox Manage receives the event that the device is available, the server tries to reconnect immediately despite the waiting time. The value can be between 1 to 60 minutes. |
Android 1 (SDK 1) and higher |
Smartcard Browser Authentication |
Allows Smartcard Browser Authentication within the internet browser. When the policy is allowed, the Bluetooth security mode is applied while the device is connected to the smart card reader and the device does not accept other Bluetooth connections. Consider the following:
|
Samsung Knox 1.0 and higher |
Certificate deletion | Prevents users from deleting the certificate in the Settings menu of the device. | Samsung Knox 1.0 and higher |
Certificate verification during installation | Set the system to validate the certificate during installation. If the certificate fails validation, it cannot be installed. | Samsung Knox 1.0 and higher |
Attestation | Communicates with the attestation server to determine whether the user's device is forged. If no option is selected, attestation is not processed. | Samsung Knox 1.0.1 and higher |
> Action when verification fails |
Set the measure for when forgery of the device firmware is detected. If detected, the creation of a new Knox Workspace and the use of the existing Knox Workspace are prohibited.
|
Kiosk
Configures Kiosk applications on a Kiosk device and controls the device settings.
Policy | Description | Supported system |
---|---|---|
Kiosk app settings |
Select a Kiosk feature to use on a device. Single App Mode — Runs a single application on the device's home screen. Multi App Mode — Runs multiple applications that are developed using the Kiosk Wizard. Web Mode — Opens webpages that are specified by the administrator. Consider the following:
|
Samsung Knox 1.0 and higher |
> Set application |
Click Select and select a single Kiosk application from the list. Alternatively, click Add and manually add applications. For more information about adding single applications, see Create a kiosk using the Kiosk Wizard. |
Samsung Knox 1.0 and higher |
> Set application |
Click Select and select multiple Kiosk applications from the list. Alternatively, click New and create a MultiApp Kiosk using the Kiosk Wizard. To learn how to use the Kiosk Wizard, see Exploring Kiosk Wizard. |
Samsung Knox 1.0 and higher |
> Set Kiosk Browser | When setting up the Kiosk Browser, the package name of the application registered as the Kiosk Browser is automatically selected. | |
> Default URL | Set the default page URL to call in the Kiosk Browser. | |
App Auto Update | Set the Kiosk Browser to receive automatic app updates. | |
> Screen Saver |
Use the screen saver for the Multi App Kiosk and the Kiosk Browser. When no user activity is sensed for a certain amount of time, as set in the Auto Screen Off or Session Timeout settings on the device, the registered images or video files are shown on the device display.
|
|
>> Screen Saver Type | Select either an image or video type screensaver. | |
>>> Image |
Select image files for the screen saver. You can add up to 10 image files in PNG, JPG, JPEG, or GIF formats (animated files are not supported). Each image file must be less than 5 MB.
The device control command must be transferred to the device to apply an image file to it. |
|
>>> Video |
Select a video file for the screen saver. You can add only one video file in the MP4 or MKV format. The video file must be less than 50 MB.
The device control command must be transferred to the device to apply a video to it. |
|
> Session timeout |
Allows the use of the session timeout feature for the Kiosk Browser. If the user does not use the device for a set time, the device deletes user information, such as the cache and cookies, in the device Kiosk Browser and goes to the main page URL.
|
|
>> Time (sec) |
Set the session timeout in seconds for the Kiosk Browser. The value must be between 10 - 3600 seconds. The default value is 1800 seconds. |
|
> Text Copy | Allows the copying of text strings in the Kiosk Browser. | |
> Javascript | Allows the running of the JavaScript contained in websites. | |
> Http Proxy | Allows the use of an HTTP proxy for communications in the Kiosk Browser. | |
>> IP/Domain:Port | Set the HTTP proxy server IP or domain address, and Port. When not entered, the Port number is automatically set to 80. | |
> User agent settings key value |
Set the key value to be added to the user agent. Allow the Kiosk Browser to access the Web server and the user agent key values contained in the HTTP header. User agent key settings can be used to detect access to non-Kiosk Browsers on the web server. |
|
> File Upload |
Allows the user to upload files to websites through the Kiosk Browser. Disallow is the default value. |
|
Delete Kiosk app when policy is removed | Allows deleting applications along with policies from the device when the applied policy is deleted. | Samsung Knox 1.0 and higher |
Task manager |
Allows the use of the Task Manager. You can use the function to disable the hardware key on SDK 2.5 or later. |
Samsung Knox 1.0–2.4 and higher |
System bar |
Use the System bar which refers to the Status bar in the Notifications area at the top of the device and the Navigation bar in the Buttons area at the bottom. For non-Samsung devices, irrespective of whether you select Allow status bar only or Allow navigation bar only, both the status bar and the navigation bar are disabled. |
Samsung Knox 1.0 and higher |
Prohibit hardware key | Allows the use of the hardware keys. | Samsung Knox 1.0 and higher |
> Disallow hardware keys |
Select hardware keys to disable. The availability of Hardware keys can vary by device. If you do not allow the use of the Task Manager, then it does not run, even if the user tries to activate it by tapping the left menu key in the Navigation bar at the bottom of the device. |
Samsung Knox 1.0 and higher |
Multi windows | Allows the use of multiple windows. This feature is available for devices that provide the functionality of multiple windows. | Samsung Knox 1.0 and higher |
Air command | Allows the use of Air command. Air command is a function provided on Samsung devices. Menu items show on the screen appear when the user brings an S pen close to the screen. | Samsung Knox 2.2 and higher |
Air view | Allows the use of Air view. Air view is a function provided on Samsung devices. Users can preview a picture or email when they bring the S pen or finger close to the picture or other content. | Samsung Knox 2.2 and higher |
Edge screen | Allows the use of the Edge screen of the device. The Edge screen allows users to create shortcuts on the edges of the screen panel to frequently used applications, favorite contacts, or the camera. | Samsung Knox 2.5 and higher |
App Restrictions
Configures options for application controls such as installation, verification, and permission.
Policy | Description | Supported system |
---|---|---|
Installation of application from untrusted sources |
Allows the installation of applications from untrusted sources instead of just the Google Play Store. Android 8 and higher is supported for Knox Workspace devices. |
Samsung Knox 1.0 and higher |
Play Store | Allows the use of the Google Play Store. | Samsung Knox 1.0 and higher |
YouTube | Allows the use of YouTube. | Samsung Knox 1.0 and higher |
App Installation Block/Allowlist Setting |
Set to control the app installation policies. If no apps are added to the Application installation blocklist and the Application installation allowlist, then no other apps except the Knox Manage agent are installed or run. |
|
> App installation blocklist |
Add apps to prohibit their installation.
|
Samsung Knox 1.0 and higher |
> App installation allowlist |
Add apps to allow their installation.
|
Samsung Knox 1.0 and higher |
App execution Block/Allowlist Setting |
Set to control the app execution policies. If the policy changes or Knox Manage is unenrolled, hidden apps reappear. Android 8 (Oreo) or below is supported for non-Samsung devices. |
|
> App execution blocklist |
Add apps to prevent their execution. Icon of the blocked app disappears and users cannot run the app. To add an app, click Add, and then select apps in the Select Application window. To delete an app, click next to the added app. |
Samsung Knox 1.0 and higher, Android 2.2 and higher |
> App execution allowlist |
Add apps to allow their execution. Icons of apps that are not on the allowlist disappear automatically. Knox Manage and the preloaded apps are automatically registered on the allowlist.
You cannot add app that was added to the Application installation allowlist to the blocklist. |
Samsung Knox 1.0 and higher, Android 2.2 and higher |
App force stop prohibition list setting | Set to prohibit apps from force stop. | |
> App force stop blocklist | Add apps to prohibit from force stop. | Samsung Knox 1.0 and higher |
App execution prevention list setting | Allows app installation but prevents app execution. | |
> App execution prevention list |
Add apps to be displayed but not executable. Listed apps can be installed and the icons are shown on the screen, but they are not allowed to run.
You cannot add an app that is on the Application installation blocklist to the allowlist. |
Samsung Knox 2.0 and higher |
App uninstallation prevention list Settings | Set to control the app uninstallation policies. | |
> App uninstallation prevention list |
Add apps to prevent their uninstallation.
|
Samsung Knox 1.0 and higher |
Action when apps are compromised |
Select from one of the following actions to take if an internal or a kiosk application is compromised:
|
Location
Allows the use of GPS or collecting location data from a device.
Policy | Description | Supported system |
---|---|---|
Report device location |
Allows collection of location data. User consent — Allows location data collection only with the user's consent.
|
Samsung Knox 1.0 and higher, Android 2.3 and higher |
> Report device location interval |
Set an interval period to save the location data of the device. To set the collection interval, select either Allow or User Consent for the Report device location policy. |
Samsung Knox 1.0 and higher, Android 2.3 and higher |
High Accuracy Mode | Set to use for collecting accurate GPS locations of the devices. | Samsung Knox 1.0 and higher, Android 2.3 and higher |
Browser
Allows the use of the default web browser and configures the settings for it.
Browsers must restart before the changes are applied.
Policy | Description | Supported system |
---|---|---|
Android browser |
Allows using the Android browser. The disallowed setting or blocklist setting takes priority over others. If the disallowed setting is configured in any of the Android browser or the application blocklist policies, the Samsung Internet browser is launched. |
Samsung Knox 1.0 and higher |
> Cookies |
Allows cookies in the Android browser. If cookies are not allowed, you cannot access websites that authenticate users with cookies. |
Samsung Knox 1.0 and higher |
> JavaScript | Allows JavaScript in the Android browser. | Samsung Knox 1.0 and higher |
> Autofill | Allows auto-completion of information that you enter on websites in the Android browser. | Samsung Knox 1.0 and higher |
> Pop-up block | Allows blocking pop-ups in the Android browser. | Samsung Knox 1.0 and higher |
Browser proxy URL |
Set the proxy server address for the Android browser in the general area. Enter the value in the form of IP:port or domain:port in the fields.
|
Samsung Knox 1.0.1 and higher |
Phone
Configures the phone settings, such as airplane mode, the microphone, and the cellular network settings.
Policy | Description | Supported system |
---|---|---|
Airplane mode | Allows the use of airplane mode. | Samsung Knox 2.0 and higher |
Cellular data connection |
Allows the use of a cellular data connection. This policy is applied after internal applications that have been set as Automatic (Non-removable) are installed. If the cellular data connection policy is not applied successfully, the device tries again to apply this policy 30 minutes later after Knox Manage is activated. |
Samsung Knox 1.0 and higher |
Prohibit voice call | Prohibits incoming and outgoing voice calls. | Samsung Knox 1.0 and higher |
> Voice call |
Specifies the types of voice call to block:
If both are selected, only emergency calls can be received or made. |
|
> Incoming Call Blocklist |
Add phone numbers to the blocklist to block incoming voice calls.
|
|
> Outgoing Call Blocklist |
Add phone numbers to the blocklist to block outgoing voice calls.
|
|
Data usage limit | Allows the limiting of data usage. | Samsung Knox 1.0 and higher |
Data usage restrictions |
Limits the maximum data usage for user devices. If data usage exceeds the limit set on a device, data use is no longer available. To get precise information on the amount of usage, changing the date and time must not be allowed. |
Samsung Knox 1.0 and higher |
> Maximum usage |
Set the maximum data amount for user devices for 1 day, 1 week, or 1 month.
|
|
Data connection during roaming | Allows data connection when roaming. | Samsung Knox 1.0 and higher |
WAP push during roaming | Allows WAP push communication while using roaming. | Samsung Knox 1.0 and higher |
Data sync during roaming | Allows data synchronization while roaming. | Samsung Knox 1.0 and higher |
Voice calls during roaming | Allows voice calls while roaming. | Samsung Knox 1.0 and higher |
Disallow SMS and MMS | Prohibits sending and receiving SMS or MMS messages. | Samsung Knox 1.0 and higher |
> Disallow Incoming and Outgoing SMS and MMS |
Specifies the types of SMS and MMS messages to block. At least one of the types should be selected. |
|
> Incoming SMS Blocklist |
Add phone numbers to the blocklist to block incoming SMS/MMS messages.
|
|
> Outgoing SMS Blocklist |
Add phone numbers to the blocklist to block outgoing SMS/MMS messages.
|
|
Set app voice recording allowlist |
Allows recording phone conversations. If unspecified, voice recording is not allowed. |
Samsung Knox 3.0 and higher |
> App voice recording allowlist |
Add applications that are allowed to record phone conversations to the allowlist.
|
Samsung Knox 3.0 and higher |
Firewall
Configures the IP or a domain firewall policy for each application.
The firewall supports IPv6 for SDK 2.6 or above. Even if the IPv4 and the IPv6 indicate the same address, a separate configuration is required.
- If there are multiple firewalls, restricted firewalls have a higher priority.
- If a firewall is configured to all applications as well as in specific applications, the policy for each application has a higher priority.
Policy | Description | Supported system |
---|---|---|
Firewall |
Set to use the firewall to set target IP addresses. The firewall policy is enabled by default. Samsung Knox 1.0 - 2.4.1 is supported for Knox Workspace devices. |
Samsung Knox 1.0 - 2.4.1 |
> Permitted Policy (IP) |
Input values to permit the target IP and port address. Configure the following:
|
|
> Prohibited Policy (IP) |
Input values to permit the target IP and port address. Configure the following:
|
Samsung Knox 2.5 and higher |
> Permitted Policy (Domain) |
Input values to permit the target domain address.
|
Samsung Knox 2.6 and higher |
> Prohibited policy (Domain) |
Input values to disable the target domain address.
|
Samsung Knox 2.6 and higher |
> DNS setting |
Input values to specify the domain server address of all applications or registered applications.
Only one DNS per application can be set and it is effective only when there are no VPN or Proxy policies assigned to the application. |
Samsung Knox 2.7 and higher |
Logging
Allows performing logging and configuring the settings.
Policy | Description | Supported system |
---|---|---|
Save logs |
Set to enable the save logs feature. Enable — Set to perform logging. This is the default value. Disable — Cannot record device logs. If this policy is not specified, the Knox Manage performs logging with the DEBUG level. |
Samsung Knox 1.0 and higher, Android 1 and higher |
> Log level |
Select a log level.
|
Samsung Knox 1.0 and higher, Android 1 and higher |
> Maximum log size (MB) |
Enter value for the maximum log size. The value can be between 1 - 20 MB. |
Samsung Knox 1.0 and higher, Android 1 and higher |
> Maximum days for storage (day) |
Enter value for the maximum days for log storage. The value can be between 1–30 MB. |
Samsung Knox 1.0 and higher, Android 1 and higher |
DeX
Allows the use of DeX mode, an interface to use a mobile device like a desktop.
Samsung DeX is an accessory that extends the functionality of a mobile device. By connecting a monitor, keyboard, and mouse to a DeX docking station, the mobile device can function as a desktop computer.
In Knox Manage, you can allow the use of DeX mode and control applications according to the Application execution blocklist setting.
Policy | Description | Supported system |
---|---|---|
DeX mode |
Allows the use of DeX mode.
|
Samsung Knox 3.0 and higher |
Ethernet only | Allows ethernet only for DeX. Mobile data, Wi-Fi, and tethering are blocked. | Samsung Knox 3.0 and higher |
Application execution blocklist(Android) | Use the blocklist for running DeX applications. | Samsung Knox 3.0 and higher |
> Application execution blocklist |
Prohibits launching the specified applications.
|
Wi-Fi
Configures the Wi-Fi settings, such as SSID, security type, and proxy.
Click to add a configuration.
You can add or edit up to 50 configurations when you save the profile.
Policy | Description |
---|---|
Configuration ID | Assign a unique ID for each Wi-Fi setting. |
Description | Enter a description for each Wi-Fi setting. |
Network Name (SSID) |
Enter an identifier of a wireless router to connect to. You can also click Lookup to open the reference items list and select an item from it. The reference value is automatically entered. |
Remove available | Allows users to delete the Wi-Fi settings. |
Security type | Specifies the access protocol used and whether certificates are required. |
> WEP | Set a WEP KEY from WEP KEY 1 to 4. |
> WPA/WPA2-PSK | Enter a password. |
> 802.1xEAP |
Configure the following items:
|
Proxy configuration | Select a proxy server configuration method. You can use the server to route through the proxy server when the device is connected to Wi-Fi. |
> Manual |
Configure the proxy server manually.
|
> Proxy automatic configuration |
Configure the proxy server automatically. You should enter a PAC web address in the PAC web address field, the URL of the PAC file that automatically determines which proxy server to use. |
Exchange
Configures the settings of Microsoft Exchange ActiveSync accounts to synchronize data with it.
You can add more Exchange policy sets by clicking .
Policy | Description |
---|---|
Configuration ID | Assign a unique ID for each exchange setting. |
Description | Enter a description for each exchange setting. |
Remove available | Allows users to delete the exchange settings. |
Office 365 | Allows to configure the Exchange settings by automatically filling out the Exchange server address and the SSL option as Use. |
User information input method | Select an input method for entering user information. |
> Manual Input |
Select to manually enter the email address, account ID, and password of a user. You can also click Lookup to open the reference items list and select an item from it. The reference value is automatically entered. |
> Connector interworking |
Select to choose a connector from the User Information Connector list. All the connectors are listed in Advanced > System Integration > Directory Connector. |
> User Information | Select to access the exchange server using the registered Knox Manage email and ID. The password must be entered from the user's device. |
Domain |
Enter a domain address for the exchange server. You can also click Lookup to open the reference items list and select an item from it. The reference value is automatically entered. |
Exchange server address |
Enter the exchange server information such as IP address, host name or URL. If Office365 is selected, outlook.office365.com is automatically entered. |
Sync measure for the early data | Select the interval period to sync the past emails. The sync interval and synchronization are in accordance with the email application settings. |
User certificate input method | Select an input method for entering certificate information. |
> EMM Management Certificate |
Register an external certificate on the Knox Manage server for each network setting, and then verify each network setting using that certificate. All users share this one certificate for each network setting. Navigate to Advanced > Certificate > External Certificate to register network settings for each purpose.
|
> Connector interworking |
Verifies network settings using the user information obtained by applying the filter set for the connector. To verify the network settings on the device, you should set the Service Type as Profile Configuration (Certification) when you register a connector in Advanced > System Integration > Directory Connector. To learn more about how to add a directory connector, see Connect to AD/LDAP. When you search for a user using the filter set for the connector, the user certificate (.p12 or .pfx) corresponding to the obtained user information is applied along with a profile, allowing you to use this certificate to verify the user.
|
> Issuing external CA |
Register a certificate obtained from an external certificate authority to Advanced > Certificate > Certificate Template. Then, you register a certificate template for each network setting, and verify it as a user certificate. To learn more about how to add an external certificate, see Add external certificates.
|
Sync calendar | Syncs schedules on a calendar from an Exchange server or a mail server to a device. |
Sync contacts | Syncs contact information in a phone book from a server to a device. |
Sync task | Syncs tasks items from a server to a device. |
Sync notes | Syncs notes from a server to a device. |
SSL |
Set to use SSL for email encryption. If Office365 is selected, the SSL option is automatically set to Use. |
Signature | Enter the email signature to use. |
Notification | Notifies the user of new emails. |
Always vibrate on notification | Notifies the user of new emails with a vibration. |
Silent notification |
Mutes email notifications. Always vibrate on notification and Silent notification cannot be used at the same time. |
Attachment capacity (byte) |
Enter the email attachment file size limit in bytes. The input value ranges from 1 to 52428800 (50MB). |
Maximum Size of Email Body (Kbyte) | Select a maximum value for the email body size. This value is only set once during the initial Exchange ActiveSync setup. |
> Default Size of Email Body (Kbyte) | Select the default value for the email body size. This value is only set once during the initial Exchange ActiveSync setup. |
Email Account
Configures the settings of a POP or IMAP email account.
Click to add a configuration.
You can add or edit up to 50 configurations when you save the profile.
Policy | Description |
---|---|
Configuration ID | Assign a unique ID for each email account setting. |
Description | Enter a description for each email account setting. |
Remove available | Allows users to delete the email account settings. |
Default Account | Specifies to use the default account. |
User information Input Method | Select an input method for entering user information. |
> Manual Input |
Select to manually enter the email address, server ID and password of a user. You can also click Lookup to open the reference items list and select an item from it. The reference value is automatically entered. |
> Connector interworking |
Select a connector from the user information connector list. The connectors are listed in Advanced > System Integration > Directory Connector. |
> User information |
Select to access the relevant mail server using the registered Knox Manage email, ID, and password. You must enter the password from the user's device. |
Incoming Server Protocol | Select between the POP3 (pop3) and IMAP (imap) protocol. |
Outgoing Server Protocol | Entered automatically as SMTP. |
Incoming Server Address/port | Enter the Incoming Server address/port in a provided format. |
Outgoing Server Address/port | Enter the outgoing server address/port and port in a provided format. |
Incoming Server ID |
Enter an incoming server ID to sign in to the incoming mail server manually. You can also click Lookup to open the reference items list and select an item from it. The reference value is automatically entered. This protocol is only available when Manual Input is selected. |
Outgoing Server ID |
Enter an outgoing server ID to manually sign in to the outgoing mail server. You can also click Lookup to open the reference items list and select an item from it. The reference value is automatically entered. This protocol is only available when Manual Input is selected. |
Incoming Server Password |
Enter an incoming server password to manually sign in to the incoming mail server. You can also click Lookup to open the reference items list and select an item from it. The reference value is automatically entered. This protocol is only available when Manual Input is selected. |
Outgoing Server Password |
Enter an outgoing server password to manually sign in to the outgoing mail server You can also click Lookup to open the reference items list and select an item from it. The reference value is automatically entered. This protocol is only available when Manual Input is selected. |
Incoming SSL | Select to use SSL for encryption. |
Outgoing SSL | Select to use SSL for encryption. |
Notification |
Select an email notification method.
|
All incoming certificates | Allows receiving certificates. |
All outgoing certificates | Allows sending certificates. |
Signature | Enter an email signature to use. |
Account Name | Assign an account name. |
Sender Name | Assign a sender name. |
Bookmark
Configures the bookmark settings, such as the configuration ID and installation area.
You can add, modify, or delete the bookmarks in the Samsung S browser, the default browser on Samsung Galaxy devices. Click to add a configuration.
You can add or edit up to 100 configurations when you save the profile.
- Browsers must be closed and opened again to apply the changes.
- Even if a user modifies a registered bookmark or registers a bookmark with the same URL and name, it is not deleted when the bookmark setting is deleted.
- Even if a user manually deletes the set bookmark, due to the limitations of Samsung devices, the application may still appear to be installed. In this case, you have to delete the bookmark in the profile, and then recreate the bookmark.
- The auto-installation of Bookmark settings is supported on devices running Android 6 Marshmallow or Android 7 Nougat, and only when BookMark is chosen in the Installation area.
Policy | Description |
---|---|
Configuration ID | Assign a unique ID for each bookmark setting. |
Description | Enter a description for each bookmark setting. |
Installation area |
Specifies a location to install the bookmark.
|
Bookmark page URL | Enter a website address to go to when a bookmark is selected. |
Bookmark name | Enter the bookmark name to be displayed as a title in the bookmark. |
APN
Configures the APN (Access Point Name) settings.
Click to add a configuration.
You can add or edit up to 20 configurations when you save the profile.
Policy | Description |
---|---|
Configuration ID | Enter an APN name to be displayed on the device. |
Description | Enter a description for an APN. |
Remove available | Allows users to delete APN settings. If you choose Disallow, then the button used to delete APN settings is disabled. |
Access Point Name (APN) | Enter the name of the access point. |
Access Point Type |
Select the type of the access point.
|
Mobile Country Code (MCC) | Enter the country code for the APN. |
Mobile Network Code (MNC) | Enter the carrier network code for the APN. |
MMS Server (MMSC) |
Enter the server information for sending multimedia messages.
|
Server | Enter the WAP gateway server name. |
Proxy Server | Enter the information of the proxy server. |
Proxy Server Port | Enter the port number of the proxy server. |
Access Point User Name |
Enter the user name of the access point. You can also click Lookup to open the reference items list and select an item from it. The reference value is automatically entered. |
Access Point Password |
Enter the password of the access point. You can also click Lookup to open the reference items list and select an item from it. The reference value is automatically entered. |
Authentication Method |
Select an authentication method.
|
Set as Preferred APN | Applies APN settings to the device. |
Knox VPN
Configures a VPN (Virtual Private Network) on Samsung Galaxy devices.
Knox VPN settings are provided to help you set up a VPN on a Samsung Galaxy device more easily. Click to add a configuration.
You can add or edit up to 20 configurations when you save the profile.
When Knox Workspace is used on an Android Legacy device, only one Knox VPN can be set on a device regardless of the Knox Workspace area or general area. If the Knox VPN vendor is Cisco, then it can be installed in both areas. To use a Knox VPN on both areas, you need to install the vendor’s VPN Client application in each area.
Policy | Description |
---|---|
Configuration ID | Assign a unique ID for the Knox VPN setting. |
VPN name | Enter a VPN name to display on the user device. |
Description | Enter a description for the Knox VPN setting. |
Remove available | Allows users to delete the Knox VPN settings. |
VPN vendor name |
Select a VPN vendor from between Cisco and User defined. Input fields vary depending on the selected VPN vendor name. Select User defined to set up a different vendor's VPN service, such as the Sectra mobile VPN. |
VPN client vendor package name | Entered automatically according to the selected VPN vendor name. If User defined is selected, you must manually enter this protocol. |
VPN type | Select a protocol. |
Entering methods for Knox VPN |
Select an entering method for Knox VPN information.
Input fields vary depending on the selected VPN vendor and the entering method. |
Upload Knox VPN profile |
Allows uploading a Knox VPN profile when you set Entering methods for Knox VPN to Upload profile. You can upload a text file in the JSON format. JSON varies depending on the VPN vendor and VPN type. For more information about sample files, see the sample file of a Sectra Mobile VPN configuration in Entering a VPN vendor manually and see the sample file of Cisco VPN configuration in Sample file for uploading a Knox VPN profile. |
User certificate input method |
Select an input method for entering certificate information.
|
CA Certificate | Select a certificate to use from the CA certificate list. Among the certificates registered in Advanced > Certificate > External Certificate, those with the Purpose set as Knox VPN and the Type set as Root shows on the list. |
Server certificate | Select a certificate to use from the certificate list. Among the certificates registered in Advanced > Certificate > External Certificate, those with the Purpose has been set as Knox VPN and the Type set as User shows on the list. |
FIPS mode |
Allows the use of FIPS mode. FIPS (US Federal Information Processing Standards) encrypts all data with FIPS-140-2 authentication modules between the server and client. |
Auto Re-connection | Allows connecting automatically when an error occurs. |
VPN route type by application |
Select to use a VPN for selected applications or for all applications in the General area.
|
Entering a VPN vendor manually
To use a VPN provided by a vendor other than Cisco, select User defined in the VPN vendor name field. Then upload a text profile in the JSON format. You must install the VPN Client on the device before using a VPN.
For example, when a Sectra VPN is used, set the options as follows:
- Enter com.sectra.mobilevpn in the VPN client vendor package name field.
- Set VPN type to SSL.
- Click Add next to Upload Knox VPN profile and upload a configuration file with the Sectra Mobile VPN configuration parameters set.
- Upload a file in the JSON format to fully integrate the Sectra Mobile VPN on the Knox Manage console.
- Set the parameters as shown in the example below.
Parameter | Description | Example |
---|---|---|
profileName | The name of the VPN configuration profile that is listed on the Knox Manage application and the VPN client GUI. | Sectra Mobile VPN |
servers | A list of 1–6 VPN servers with IP addresses and a network port. This list is in an order of priority, with the default VPN server being the first on the list. The remaining VPN servers are used only if the default server is damaged. |
[ {"address":"1.1.1.1","port":443}, {"address":"2.2.2.2", "port":444}, {"address":"3.3.3.3", "port":445} ] |
pkcx12BaseUrl | A download server's HTTP/S URL, where the encrypted key materials are downloaded to. | http://download.server.com/certs/ |
mtuSize |
The MTU (Magnetic Tape Unit) is a size used on Knox Manage's virtual network interface. It is the maximum size for the outgoing UDP (User Datagram Protocol) tunnel packets before being fragmented The value must be between 576–1500 bytes. |
1300 |
UseDtle |
Determines whether a DTLS tunnel is used. A DTLS tunnel should be used if sensitive data is being transmitted in real-time. For example, when streaming video and/or using VoIP calls. The value must be either True or False. If unsure, set to True. |
True |
diffServe |
Tunnel packets' Quality of Service (QoS) tag sent from a client. Differentiated service is part of an IP header. The value must be between 0–63. 0 means disabled. |
0 |
tcpKeepAlive |
Timer value for the interval of a KeepAlive packet sent from a TCP tunnel. The value must be between 1–18000.
The timer value is an important parameter and you must exercise caution when selecting it. |
1200 |
dtlsInactivityTimeout |
The timer value for the standby period of a DTLS tunnel that determines how long it idles without receiving any data before it goes inactive. The value must be between 1–300 seconds. Sectra does not recommend setting this value to 300 seconds. |
30 |
trafficProfiles | 1–3 traffic profiles the users can choose, for when a normal configuration is not sufficient. Traffic profiles can change the following configuration parameters: mtuSize, useDtls, diffServ, tcpKeepAlive and/or dtlsInactivityTimeout. The traffic profile also requires the name of the profile which is shown in the client GUI. |
[ {"profileName":"BadNetworkProfile","mtuSize":800, "tcpKeepAlive":600}, {"profileName":"RealTimeProfile","mtuSize":1500, "useDtls":"true", "diffServ":63} ] |
Sample file for uploading a Knox VPN profile
The following is a sample file of a Sectra Mobile VPN configuration:
{
"KNOX_VPN_PARAMETERS": {
"profile_attribute": {
"profileName":"Sectra Mobile VPN",
"vpn_type":"ssl",
"vpn_route_type":1
},
"knox": {
"connectionType":"keepon"
},
"vendor": {
"connection": {
"servers": [
{
"address":"1.1.1.1",
"port":443
},
{
"address":"2.2.2.2",
"port":444
},
{
"address":"3.3.3.3",
"port":555
}
],
"ssl": {
"basic": {
"pkcs12BaseUrl":"http://download.server.com/certs/",
"mtuSize":1300,
"useDtls":true,
"diffServ":0,
"tcpKeepalive":1200,
"dtlsInactivityTimeout":30
}
}
},
"trafficProfiles": [
{
"profileName": "BadNetworkProfile",
"mtuSize":800,"tcpKeepAlive":600
},
{
"profileName":"RealTimeProfile",
"mtuSize":1500,
"useDtls":"true",
"diffServ":63
}
]
}
}
}
Configuring a Knox VPN profile manually
You can manually enter a profile only when the VPN vendor is Cisco. Select Manual Input in the Entering method for Knox VPN field. Then set the options as follows:
- Enter the IP address, host name, or URL of the VPN server in the Server address.
- The VPN route type, which enables the use of VPN tunneling, is automatically entered.
- Select to use user authentication.
- Select a VPN connection type.
- Keep On — Keep the VPN connection acitve.
- On Demand 0151Connect to the VPN upon request.
- Select the chaining type.
- Select to use the UID PID.
Sample file for uploading a Knox VPN profile
The following is a sample file with Cisco as the VPN vendor and IPSec as the VPN type:
{
"KNOX_VPN_PARAMETERS": {
"profile_attribute": {
"profileName":"c1",
"host":"12.3.456.78",
"isUserAuthEnabled":true,
"vpn_type":"ipsec",
"vpn_route_type":1
},
"ipsec": {
"basic": {
"username":"",
"password":"",
"authentication_type":1,
"psk":"",
"ikeVersion":1,
"dhGroup":0,
"p1Mode":2,
"identity_type":0,
"identity":"test@sta.com",
"splitTunnelType":0,
"forwardRoutes": [
{"route":""}
]
},
"advanced": {
"mobikeEnabled":false,
"pfs":true,
"ike_lifetime":"10",
"ipsec_lifetime":"25",
"deadPeerDetect":true
},
"algorithms": {
}
},
"knox": {
"connectionType":"keepon",
"chaining_enabled":"-1",
"uidpid_search_enabled":"0"
},
"vendor": {
"setCertCommonName":"space",
"SetCertHash":"pluto",
"certAuthMode":"Automatic"
}
}
}
The following is a sample file with Cisco, as the VPN vendor, and SSL, as the VPN type:
{
"KNOX_VPN_PARAMETERS": {
"profile_attribute": {
"profileName":"c3",
"host":"cisco-asa.gnawks.com",
"isUserAuthEnabled":true,
"vpn_type":"ssl",
"vpn_route_type":1
},
"ssl": {
"basic": {
"username":"demo",
"password":"samsung",
"authentication_type":1,
"splitTunnelType":0,
"forwardRoutes": [{
"route":""
}]},
"algorithms": {
"ssl_algorithm":0
}
},
"knox": {
"connectionType":"keepon",
"chaining_enabled":"-1",
"uidpid_search_enabled":"0"
},
"vendor": {
"setCertCommonName":"space",
"SetCertHash":"pluto",
"certAuthMode":"Automatic"
}
}
}
VPN
Configures a VPN (Virtual Private Network) on Android devices.
You can configure the VPN settings to connect to a private network through a public network. Click to add a configuration.
You can add or edit up to 20 configurations when you save the profile.
Policy | Description |
---|---|
Configuration ID | Assign a unique ID for the VPN setting. |
VPN Name | Enter a VPN name to display on the user device. |
Description | Enter a description for the VPN setting. |
Remove available | Allows users to delete the VPN settings. |
Connection type |
Select a connection type and enter the parameters. Required parameters vary depending on the selected connection type.
|
Server address | Enter the IP address, host name, or URL of the VPN server that the device needs to access. |
User information input method |
Select an input method for entering user information.
|
PPP Encryption (MPPE) | Allows to encrypt data for the VPN connection. |
DNS search domain | Enter the DNS name. |
DNS server | Enter the DNS server address. |
Forwarding route | This is automatically entered when Subnet Bits is selected. |
Subnet Bits | The value can be set as none or select from /1 to /30. |
Certificate
Allows using new certificate authority (CA) certificates and configuring the certificate settings.
You can install a user certificate on a device and use the certificate through Wi-Fi or on websites. Click to add a configuration.
You can add or edit up to 20 configurations when you save the profile.
Policy | Description |
---|---|
Configuration | Assign a unique ID for each certificate setting. |
Description | Enter a description for each certificate setting. |
User certificate input method |
Select an input method for entering certificate information.
|
Certification category |
Select a certification category when EMM Management Certificate is selected in User certificate input method,
|
On this page
Is this page helpful?