Android Management API policies
Last updated September 25th, 2024
Starting with Knox Manage 23.09, support for management and monitoring of new fully managed Android Management API devices is restricted. To enroll new fully managed devices, use the Android Enterprise platform instead.
Any existing fully managed Android Management API devices and fully managed Android devices are unaffected by this change. You can also continue using work profiles on Android Management API devices.
If you need to enroll new fully managed Android Management API devices, contact the Knox Support team.
This page describes the policies that you can configure for Android devices through the Android Management API.
In order to help reduce potential confusion, settings labelled (default) in a policy description indicate default system and user account behavior. There may also be notation that describes unique default behavior when a policy is unset, or system behavior that by default the device user has control over.
Knox Manage supports a multi-profile structure only for Android Enterprise, iOS, Windows, and macOS. If you assign multiple profiles to Android Management API, only the highest-priority profile gets applied.
System
Policy | Description | Supported system |
---|---|---|
Camera |
Enables all cameras. Values
|
Work profile on personally-owned device Work profile on company-owned device |
Screen Capture |
Allows the device user to take screenshots on the device. Values
|
Work profile on personally-owned device Work profile on company-owned device |
VPN Setting |
Allows the device user to configure the VPN. Values
|
Work profile on personally-owned device Work profile on company-owned device |
Certificate Setting |
Allows the device user to add certificates on the device. Values
|
Fully managed device Work profile on personally-owned device Work profile on company-owned device |
Account Modification |
Allows the device user to add or remove accounts on the device. Values
|
Work profile on personally-owned device Work profile on company-owned device |
> Account Blocklist |
Specifies account names that the device user can't modify or remove. Only available if the Account Modification policy is set to Allow. ValuesTo add an account, enter the name, then click . To remove an account, click next to it. |
Work profile on personally-owned device Work profile on company-owned device |
System Update |
Controls the behavior of system updates on the device. Values
When this policy is unset, the default system update behavior applies. On typical device setups, this means the device user decides when to download and install updates. |
Work profile on company-owned device |
> Schedule (Start — End Time) |
Specifies a time range during the day when system updates are permitted. Only available if the System Update policy is set to Windowed. ValuesEnter a start and end time for the update window, in 24-hour time format. |
Work profile on company-owned device |
> Freeze Period |
Specifies one or more date ranges during which system updates are postponed. When the device's system time is within a freeze period, all incoming system updates, including security patches, are blocked. Only available if the System Update policy is set to Postpone or Windowed. ValuesA freeze period can be a maximum of 90 days long, and there must be a 60-day gap between each period. Freeze periods can't overlap. To add a freeze period, enter a month and day for the Start Date, enter a month and day for the End Date, then click . To delete a freeze period, click next to it. |
Work profile on company-owned device — Android 9 and higher |
Date and Time |
Allows the device user to change the date and time on the device. Values
|
Work profile on company-owned device |
Mount Physical Media |
Allows the device user to mount physical media and media devices. Values
|
Work profile on company-owned device |
Set a Message for Lock Screen |
Specifies the custom message on the lock screen. ValuesEnter the message in the text field. The message can be up to 4096 characters long. Click Lookup to browse and select available lookup items to add to the message. |
Work profile on company-owned device |
Developer Mode |
Allows the device user to enable and use developer options and safe boot. Values
|
Work profile on company-owned device |
Connectivity
Policy | Description | Supported system |
---|---|---|
Printing |
Specifies whether to allow sending print commands to a connected printer. Values
|
Work profile on company-owned device |
Always On VPN |
Allows the device user to configure always-on VPN for apps. Values
|
Work profile on company-owned device |
Mobile Network Setting |
Allows the device user to configure settings related to mobile network and data. Values
|
Work profile on company-owned device |
Tethering Setting |
Allows the device user to configure settings related to portable hotspot mode and tethering. Values
|
Work profile on company-owned device |
Wi-Fi Setting |
Allows the device user to configure settings related to Wi-Fi access points. Values
|
Work profile on company-owned device |
Bluetooth |
Specifies if the device can establish Bluetooth connections with other devices. Values
|
Work profile on company-owned device |
Bluetooth Setting |
Allows the device user to configure Bluetooth settings. Values
|
Work profile on company-owned device |
USB File Transfer |
Enables transferring files over a USB connection. Values
|
Work profile on company-owned device |
Transfer Data Using NFC |
Allows the device user to use NFC to transfer data. Values
|
Fully managed device |
Security
Policy | Description | Supported system |
---|---|---|
Play Integrity |
Allows device verification and data security using the Play Integrity API. Values
|
Fully managed device Work profile on personally-owned device Work profile on company-owned device |
> Verification Failure Policy (During Enrollment) |
Select a measure. Values
|
|
> Verification Failure Policy (After Enrollment) |
Select a measure. Values
|
Lock Screen
Policy | Description | Supported system |
---|---|---|
Screen Lock Policies |
Allow screen lock on a device or work profile. Values
|
Work profile on personally-owned device Work profile on company-owned device |
> Screen Lock Quality |
Specifies the minimum strength or complexity of the device's lock. Only available if the Screen Lock Policies is set to Apply. ValuesFor Android 11 and lower devices, choose a minimum strength level for the lock. Each strength level uses a lock type with minimum strength requirements. For PINs and passwords, you can specify the minimum length. The strength levels are:
The security of lock strength levels, ordered from weakest to strongest, is as follows: Weak Biometric < Pattern < Numeric < Numeric Complex < Alphabetic < Alphanumeric < Complex For the primary profile on Android 12 and higher devices, choose a complexity level for the lock. Each complexity level uses a lock type with escalating pre-defined restrictions. The device user can't set a lock that's less complex than the chosen level. You must also define all additional minimum restrictions of the complexity by setting every password sub-policy, such as Minimum Number of Letters and so on. The complexity levels are:
|
Work profile on personally-owned device Work profile on company-owned device |
>> Minimum Length |
Specifies the minimum number of points (in the case of a pattern) or characters (in the case of a PIN or password) required in the lock. Only available if the Screen Lock Quality policy is set to PIN, Numeric Complex, Alphabetic, Alphanumeric, Complex, Complexity Low, Complexity Medium, or Complexity High. ValuesEnter a minimum length. The value can be 4–16. |
Work profile on personally-owned device Work profile on company-owned device |
>> Minimum Letters |
Specifies the minimum number of letters required in the lock password. Only available if the Screen Lock Quality policy is set to Complexity Low, Complexity Medium, or Complexity High. ValuesEnter the minimum number of letters. The value can be 1–10. |
Work profile on personally-owned device Work profile on company-owned device |
>> Minimum Non-Letters |
Specifies the minimum number of non-letter characters required in the lock password. Only available if the Screen Lock Quality policy is set to Complexity Low, Complexity Medium, or Complexity High. ValuesEnter the minimum number of non-letters. The value can be 2–10. |
Work profile on personally-owned device Work profile on company-owned device |
>> Minimum Lowercase Letters |
Specifies the minimum number of lowercase letters required in the lock password. Only available if the Screen Lock Quality policy is set to Complexity Low, Complexity Medium, or Complexity High. ValuesEnter the minimum number of lowercase letters. The value can be 3–10. |
Work profile on personally-owned device Work profile on company-owned device |
>> Minimum Capital Letters |
Specifies the minimum number of uppercase letters required in the lock screen password. Only available if the Screen Lock Quality policy is set to Complexity Low, Complexity Medium, or Complexity High. ValuesEnter the minimum number of uppercase letters. The value can be 1–10. |
Work profile on personally-owned device Work profile on company-owned device |
>> Minimum Numeric Characters |
Specifies the minimum number of digits required in the lock password. Only available if the Screen Lock Quality policy is set to Complexity Low, Complexity Medium, or Complexity High. ValuesEnter the minimum number of digits. The value can be 1–10. |
Work profile on personally-owned device Work profile on company-owned device |
>> Minimum Special Characters |
Specifies the minimum number of special characters required in the password. Only available if the Screen Lock Quality policy is set to Complexity Low, Complexity Medium, or Complexity High. ValuesEnter the minimum number of special characters. The value can be 1–10. |
Work profile on personally-owned device Work profile on company-owned device |
> Screen Lock Requirements |
Enable setting of specific screen lock requirements for the device and its work area. ValuesApply — Automatically set when you select a Screen Lock Quality. |
Work profile on personally-owned device Work profile on company-owned device |
>> Screen Lock Expiration (Days) |
Specifies the number of days before the lock must be reset. ValuesEnter a number of days. The value can be 0–365. |
Work profile on personally-owned device Work profile on company-owned device |
>> Unlock Attempt Limit |
Specifies the maximum number of incorrect unlock attempts before access is restricted. ValuesEnter the maximum number of unlock attempts. The value can be 0–10. |
Work profile on personally-owned device Work profile on company-owned device |
>> Screen Lock History |
Specifies the minimum number of new locks that must be used before the device user can reuse a previous lock. For example, if the lock is the password Knox123! and this policy is set to 10, the user must use ten other passwords before they can reuse Knox123!. ValuesEnter the minimum number of new locks before reuse is allowed. The value can be 1–10. |
Work profile on personally-owned device Work profile on company-owned device |
>> Screen Lock Timer (hours) |
If using a weak authentication method, such as weak biometric, specifies the time in hours after which the screen is automatically locked. ValuesEnter the number of hours. |
Work profile on personally-owned device Work profile on company-owned device |
> Block After Days (If Screen Lock Compliance is Violated) |
Specifies how long, in days, that a lock can violate the restrictions set by the Screen Lock Quality policy before the device user is blocked from accessing the device or the work profile. ValuesEnter the number of days before the device blocks the user. The minimum value is 0. If set to 0, then the device user is immediately blocked. Must be less than the value of the Wipe After Days policy. If this value is unset, then the device user isn't blocked for violating the lock restrictions. |
Work profile on personally-owned device Work profile on company-owned device |
> Wipe After Days (If Screen Lock Compliance is Violated) |
Specifies how long, in days, that a lock can violate the restrictions set by the Screen Lock Quality policy before the device is remotely wiped. ValuesEnter the number of days before the device blocks the user. The minimum value is 1. Must be greater than the value of the Block After Days policy. If this value is unset, then the device user isn't blocked for violating the lock restrictions. |
Work profile on personally-owned device Work profile on company-owned device |
KeyGuard (Block Functions on the Lock Screen) |
Blocks device features and functionality are blocked when the screen is locked. This policy doesn't take effect until after a lock is set on the device. Values
If this value is unset, then KeyGuard is disabled. |
Work profile on personally-owned device Work profile on company-owned device |
> Select Functions to Block |
Specifies which device features and functionality are disabled when KeyGuard is enabled. Only available if the Keyguard policy is set to Apply. ValuesSelect the features and functionality to disable:
|
Work profile on personally-owned device Work profile on company-owned device |
Maximum Screen Timeout Allowed |
Specifies how long the device can idle before the screen locks. Values
If this value isn't set, then the screen lock timeout falls back to the duration specified in the device settings. |
Work profile on personally-owned device Work profile on company-owned device |
App Restrictions
Policy | Description | Supported system |
---|---|---|
Play Store Mode |
Determines how to restrict apps on Google Play. In order to restrict an app, it must have a profile in the Knox Manage tenant. Values
If this value is not set, then no apps are restricted on Google Play. |
Work profile on company-owned device |
> App list |
Defines the allowlist or blocklist to restrict apps based on the value of the Play Store Mode policy. Only available if the Play Store Mode policy is set. ValuesAdd apps to include or exclude. If the Play Store Mode policy is set to Allowlist, then this list defines an exclusive list of allowed apps. If that policy is set to Blocklist, then this list only defines apps that aren't allowed. To add one or more apps:
To remove an app, next to it. |
Work profile on company-owned device |
App Installation from Other Sources |
Allows the device user to install apps from unknown sources. Values
|
Work profile on personally-owned device Work profile on company-owned device |
App Permission |
Controls how apps can request permissions during runtime. Values
The App Permission policy is relevant to all apps. It is only applied when an app requests it, regardless of when an IT admin sets device permissions. |
Work profile on personally-owned device Work profile on company-owned device |
> App Permission Exception Policy List |
Specifies a list of apps that are exempt from the permission behavior defined by the App Permission policy. Only supported for Managed Google Play public apps, and if the App Permission policy is set. This policy takes priority over the App Permission policy when both are applied, and takes effect as soon as you set it. ValuesTo add one or more apps:
To remove an app, click next to it. |
Work profile on personally-owned device Work profile on company-owned device |
App Delegation Scope Management |
Enables delegated scopes for apps, which is a device policy controller function that grants elevated API and policy control to an app. An app with delegated scopes can dictate policies and configuration settings to other apps.application-app-delegation-scope Values
If this value is unset, then delegation scopes are disabled. |
Work profile on personally-owned device Work profile on company-owned device |
> App Delegation Scope |
Configures delegated scopes for apps. Each configuration targets an app with a profile in the Knox Manage tenant and assigns scopes to it. You can only manage one delegation configuration per app. Only available if the App Delegation Scope Management policy is set to Apply. ValuesTo assign delegated scopes to an app:
The available scopes are:
To remove the delegated scopes for an app:
|
Work profile on personally-owned device Work profile on company-owned device |
Block Certain Apps from Running |
Specifies whether to apply the app execution blocklist. You can't block core system apps, such as apps with device admin (DA) permissions, the active launcher, package installers, package uninstallers, package verifiers, the default dialer, and the permission controller. Values
|
Work profile on personally-owned device Work profile on company-owned device |
> App list |
Specifies the apps to block from running on the device. Blocked apps are hidden from the interface. Values
|
|
Activates Certain Pre-installed System Apps |
Specifies whether to apply the allowlist of pre-installed system apps. If the app is a member of the App Execution Blocklist, that policy takes precedence. Note To view the list of available system apps on a device, go to Profile > Manage System App. Values
|
|
> App list |
Specifies the pre-installed system apps to be allowed on the device. Values
|
|
Skip App Tutorial |
Instructs apps to skip all first-time tutorials and hints, if they have any. Values
|
Work profile on personally-owned device Work profile on company-owned device |
App Installation |
Allows the device user to install apps. Values
|
Work profile on personally-owned device Work profile on company-owned device |
App Uninstallation |
Allows the device user to remove apps. Values
|
Work profile on personally-owned device Work profile on company-owned device |
Google Play Protect Verify Apps |
Controls the use of Google Play Protect on the device. Values
|
Work profile on personally-owned device Work profile on company-owned device |
Work and Personal Apps Connection |
Allows apps to communicate across device profiles. For example, if the same calculator app were simultaneously installed on the device's primary profile and work profile, then both instances of the app could share data. This data sharing requires consent from the device user. Values
If this value is unset, then app connections are disabled. |
Work profile on personally-owned device Work profile on company-owned device |
> App List |
Specifies an allowlist of apps that can connect across device profiles. Only available if the Work and Personal Apps Connection policy is set to Allowlist. ValuesTo add one or more apps:
To remove an app, click next to it. |
Work profile on personally-owned device Work profile on company-owned device |
Location
Policy | Description | Supported system |
---|---|---|
Location Mode |
Controls location data gathering on the device. Values
|
Work profile on personally-owned device Work profile on company-owned device |
Phone
Policy | Description | Supported system |
---|---|---|
Airplane mode |
Allows the device user to turn on airplane mode. Values
|
Work profile on company-owned device |
Call Broadcasting Setting |
Enables the reception of Cell Broadcast messages on the device. Carriers use these messages to broadcast public warnings and emergencies to device users across entire regions, so you should exercise caution before disabling this technology. Values
|
Work profile on company-owned device |
Microphone |
Allows the device user to mute the microphone and adjust its input level. Values
|
Work profile on company-owned device |
Outgoing Calls |
Allows the user to make outgoing phone calls. Values
|
Work profile on company-owned device |
SMS |
Allows the user to send and receive messages through SMS. Values
|
Work profile on company-owned device |
Data Roaming |
Enables data roaming on the device. Values
|
Work profile on company-owned device |
Container
Policy | Description | Supported system |
---|---|---|
Copy and Paste Clipboard per Profile |
Allows the device user to copy and paste data between the primary profile and work profile. Values
|
Work profile on personally-owned device Work profile on company-owned device |
Set a Message for Profile Wipe |
Allows IT admins to set a custom message to warn the user when the data on the Work profile is wiped. Values
|
Work profile on personally-owned device |
Set a Maximum Period for Profile Turned Off (Days) |
Specifies the maximum duration, in days, that the device user can pause the work profile before their access is suspended. If the profile is paused for longer than this duration, all personal apps except for critical system apps (Phone, Messages, Google Play) are suspended and hidden. Work profile apps are unaffected. ValuesEnter a pause timeout, in days. The value can be 3–30. If this value is unset, then there is no maximum duration. |
Work profile on personally-owned device Work profile on company-owned device |
Phone Book Access Profile (PBAP) via Bluetooth |
Allows the device user to share phone book contacts from the work profile to other devices over Bluetooth. Values
|
Work profile on personally-owned device Work profile on company-owned device |
Factory Reset Protection
Policy | Description | Supported system |
---|---|---|
Factory Reset Protection |
Enables factory reset protection. When this security measure is enabled, if the device undergoes a factory reset it can't be reactivated without the previous user's Google Account. Values
To enable factory reset protection:
|
Work profile on company-owned device |
Wi-Fi
Configures the Wi-Fi settings, such as SSID, security type, and proxy.
Click to add a configuration.
You can add or edit up to 50 configurations when you save the profile.
Configuration setting | Description | |
---|---|---|
Configuration ID |
Assigns the name of the Wi-Fi configuration. ValuesEnter a name. The name must be unique among Wi-Fi configurations. |
|
Description |
Adds a text description of the configuration for other admins. ValuesEnter a description. |
|
Network Name (SSID) |
Enter the SSID of the target Wi-Fi access point. ValuesEnter an SSID. |
|
Hides the access point from the list of Wi-Fi networks on the device. Values
|
||
Attempt Automatic Connection |
Allows the device to automatically connect to a known Wi-Fi network. Values
|
|
Randomized MAC Address |
Randomizes the device's MAC address when connecting to a Wi-Fi network. Available on devices running Android 13 and higher. Values
|
|
Security Type |
Specifies the Wi-Fi security protocol and authentication scheme of the access point. Values
|
|
Password |
Specifies the password of the target Wi-Fi access point. Only available if the Security Type configuration setting is set to WEP-PSK or WPA-PSK. ValuesEnter a password. |
|
EAP Outer |
Specifies the outer EAP authentication method. Only available if the Security Type configuration setting is set to WPA-EAP. Values
|
|
EAP Inner |
Specifies the inner, tunneled EAP authentication method. Only available if the Security Type configuration setting is set to WPA-EAP. Values
|
|
User Information Input Method |
Specifies how the user information and credentials are delivered. Only available if the Security Type configuration setting is set to WPA-EAP. Values
|
|
ID |
Specifies the user name to submit during authentication. Only available if the Security Type configuration setting is set to WPA-EAP and the User Information Input Method configuration setting is set to Manual Input. ValuesEnter a user name. Click Lookup to browse and select available lookup items to add to the name. |
|
Password |
Specifies the password to submit during authentication. Only available if the Security Type configuration setting is set to WPA-EAP and the User Information Input Method configuration setting is set to Manual Input. ValuesEnter a password. |
|
User Information Connector |
Specifies the directory connector to employ for the user. To learn more about directory connectors in Knox Manage, see Connect to AD/LDAP. Only available if the Security Type configuration setting is set to WPA-EAP and the User Information Input Method configuration setting is set to Connector Interworking. ValuesSelect a connector from the list. |
|
Anonymous Identity |
Specifies an anonymous ID for the user. Only available if the Security Type configuration setting is set to WPA-EAP. ValuesEnter a name |
|
User Certificate Input Method |
Specifies the confirmation method for the user certificate. Register an external certificate for each network configuration, and then verify each network configuration using that certificate. All users share this one certificate for each network configuration. Go to Advanced > Certificate > External Certificate to register network settings for each purpose. Only available if the Security Type configuration setting is set to WPA-EAP. Values
|
|
User Certificate (Alias) |
Specifies the certificate to apply for the user. The user certificate (P12 or PFX file) corresponding to the obtained user information is applied along with a profile to verify the user. Only available if the Security Type configuration setting is set to WPA-EAP. ValuesSelect a certificate from the list. |
|
CA Certificate (Alias) |
Specifies the root certificate to apply. The available certificates are those registered in Advanced > Certificate > External Certificate with the Purpose set to Wi-Fi and the Type set to Root. For more information on how to add an external certificate, see External certificates. Only available if the Security Type configuration setting is set to WPA-EAP. ValuesSelect a certificate from the list. |
|
Domain |
Enter the domain addresses that can be accessed via Wi-Fi. You must provide either Domain or Alternate Subject in the Wi-Fi settings. |
|
Alternate Subject |
Enter the alternate subject names. You must provide either Domain or Alternate Subject in the Wi-Fi settings. |
Certificate
Allows using new certificate authority (CA) certificates and configuring the certificate settings. You can install a user certificate on a device and use the certificate through Wi-Fi or on websites.
Click to add a configuration. You can add or edit up to 20 configurations when you save the profile.
In addition to the general considerations applicable to all policies, consider the following when configuring certificates:
- If a device user deletes the initial auto-applied configuration, the deleted configuration is automatically re-applied when the device is rebooted.
- If you configure multiple policies under a policy group, the device user must apply the policy settings manually.
Policy | Description |
---|---|
Configuration ID | Assign a unique ID for each certificate setting. |
Description | Enter a description for each certificate setting. |
Install Area |
Specify where the certificate should be installed. Value:
|
User Certificate Input Method |
Select an input method for entering certificate information. Value:
Navigate to Advanced > Certificate > External Certificate to register network settings for each purpose. |
> Certificate Category |
Select a certification category when EMM Management Certificate is selected as the user certificate input method. Values:
|
>> CA Certificate (Alias) | Select a CA certificate name. This option is available when CA Certificate is selected as the Certificate Category. |
>> User Certificate (Alias) | Select a user certificate name. This option is available when User Certificate is selected as the Certificate Category. |
On this page
Is this page helpful?