- Basics
- About Knox
- Knox licenses
- Knox white paper
- Sign up for Samsung Knox
- Latest release notes
- General Knox FAQ
- General Knox KBAs
- Submit a support ticket
- User Acceptance Testing
- For IT admins
- Knox Admin Portal
- Knox Suite
- Knox Platform for Enterprise
- Introduction
- How-to videos
- Before you begin
- Get started with UEMs
- Introduction
- Blackberry UEM
- Citrix Endpoint Management
- FAMOC
- IBM MaaS360
- Microsoft Intune
- MobileIron Cloud
- MobileIron Core
- Samsung Knox Manage
- SOTI MobiControl
- VMware Workspace ONE UEM
- Knox Service Plugin
- Release notes
- Migrate to Android 11
- FAQs
- Troubleshoot
- KBAs
- Knox Mobile Enrollment
- Knox Configure
- Mobile
- Wearables
- Shared Device
- FAQ
- KBAs
- Knox Capture
- Introduction
- How it works
- How-to videos
- IT admins: Get started
- Getting started with Knox Capture
- Step 1: Launch Knox Capture
- Step 2: Create a scanning profile
- Step 3: Select apps and activities
- Step 4: Configure the scanner
- Step 5: Set keystroke output rules
- Step 6: Test apps in your configuration
- Step 7: Share your configuration
- Step 8: Deploy Knox Capture in Managed mode
- End users: Get started
- Features
- Release notes
- FAQ
- KBAs
- Troubleshoot
- Knox Asset Intelligence
- Knox Manage
- Introduction
- How-to videos
- Get started
- Video: Getting started with Knox Manage
- Integration with Managed Service Provider
- Access Knox Manage
- Configure basic environments
- Create user accounts
- Create groups
- Create organization
- Set up devices and profiles
- Create a new profile
- Assign profiles to groups and organizations
- Enroll devices
- Shared Android device quickstart
- Non-shared Android device enrollment quickstart
- Android Management API device enrollment quickstart
- Apple User Enrollment quickstart
- View device information
- Apply profiles to organizations
- Set up Knox Manage deployment with a Knox Suite license
- Manage Chromebooks
- Manage Android devices with the Android Management API
- Manage Shared iPads
- Configure
- Licenses
- Organization
- Users
- Sync user information
- Groups
- Devices
- Content
- Applications
- Profile
- Knox E-FOTA
- Certificates
- Advanced settings
- Monitor
- Kiosk devices
- Knox Remote Support
- Active Directory
- Microsoft Exchange
- Mobile Admin
- Appendix
- Release notes
- Features
- FAQ
- KBAs
- Knox E-FOTA
- Introduction
- How-to videos
- Get started
- Features
- EMM integration
- Appendix
- Release notes
- FAQ
- KBAs
- Troubleshoot
- Knox E-FOTA On-Premises
- Legacy Knox E-FOTA products
- Knox Guard
- Introduction
- How-to video
- Get started
- Using Knox Guard
- Dashboard
- Manage devices
- Device management
- Accept or reject devices
- Upload devices
- Delete devices
- Complete device management
- Send notifications
- Enable or disable SIM control
- Download devices as CSV
- View device log
- View device deletion log
- Start and stop blinking reminder
- Lock and unlock devices
- Update lock message
- Send relock timestamp
- Turn on/off relock reminder
- Manage policies
- Manage licenses
- Manage resellers
- Manage admins and roles
- Activity log
- Knox Deployment App
- Release notes
- FAQ
- KBAs
- Support
- Knox Guard REST API
- Samsung Care+ for Business
- For Knox Partners
- Knox Deployment Program
- Knox MSP Program
DualDAR with work profile on company-owned devices
Knox DualDAR today secures enterprise data with two independent layers of encryption. All data placed inside an Android Enterprise work profile is dually encrypted. As such, Knox DualDAR is supported on both work profile only and fully managed devices with work profile configurations.
In Android 11, the work profile is enhanced for company-owned devices. Existing deployments of fully managed devices with work profile are upgraded to the new work profile on company-owned devices. For more info, see Device management modes.
This impacts existing customers who have deployed DualDAR on fully managed devices with work profiles and new customers who are looking to deploy DualDAR on company-owned devices.
Here, we provide an overview of Android 11 migration for existing customers and new enrollments of DualDAR for new customers.
Existing deployments
During Android 11 FOTA deployments, a fully managed device with a work profile is migrated to the new work profile on company-owned device.
The DualDAR work profile will remain after the Android 11 FOTA. However, as the device is no longer fully managed, the IT admin will lose some controls at the device level (or user0 side).
New deployments
UEM providers today have two options to support DualDAR:
- Deep API integration using the Knox SDK
- Knox Mobile Enrollment (KME) and Knox Service Plugin (KSP)
Details are provided in DualDAR UEM integration.
Special consideration for third-party crypto library
The DualDAR architecture enables a plugin interface where a third-party ISV can provide their own second-layer encryption app. This app must be installed in user0 outside of the work profile.
However, in the new work profile on company-owned device, an IT admin can no longer install an app in user0. Starting with Android 11, Samsung will install the second-layer encryption app as part of enabling DualDAR. The precise steps depends on how a UEM provider supports DualDAR.
Option 1: Deep API integration
In this option, the UEM provider has integrated DualDAR APIs natively.
- The customer provides their second-layer encryption app (apk) to the UEM provider.
- The UEM provider stores the app on the device (external storage sdcard area) during provisioning.
- Samsung then installs the app in user0.
Here is how UEM providers use the DualDAR APIs to set the file path to the encryption app:
// Create Dual DAR with configuration bundle PersistableBundle adminExtras = new PersistableBundle(); adminExtras.putBoolean(DualDARPolicy.KEY_DUAL_DAR_CONFIG, true); adminExtras.putString(DualDARPolicy.KEY_CONFIG_CLIENT_PACKAGE, DUALDAR_CLIENT_EXAMPLE_PACKAGE_NAME); adminExtras.putString(DualDARPolicy.KEY_CONFIG_CLIENT_SIGNATURE, DUALDAR_CLIENT_EXAMPLE_PACKAGE_SHA256_SIGNATURE); // Set the file path of the app location adding "file://" prefix. String DUALDAR_CLIENT_PACKAGE_DOWNLOAD_LOCATION = getExternalFilesDir(null) + "/client_example_app.apk"; adminExtras.putString(DualDARPolicy.KEY_CONFIG_CLIENT_LOCATION, "file://" + DUALDAR_CLIENT_PACKAGE_DOWNLOAD_LOCATION); // Param field in admin extras bundle passed as DevicePolicyManager.EXTRA_PROVISIONING_ADMIN_EXTRAS_BUNDLE Intent intent = new Intent(); if (adminExtras !=null && adminExtras.size() > 0) { intent.putExtra(DevicePolicyManager.EXTRA_PROVISIONING_ADMIN_EXTRAS_BUNDLE, adminExtras); } // Return DevicePolicyManager.PROVISIONING_MODE_MANAGED_PROFILE in DevicePolicyManager.EXTRA_PROVISIONING_MODE as result. intent.putExtra(DevicePolicyManager.EXTRA_PROVISIONING_MODE, DevicePolicyManager.PROVISIONING_MODE_MANAGED_PROFILE);
Option 2: KME and KSP
In this scenario, the UEM provider has not integrated DualDAR APIs.
- The customer enables DualDAR in their KME profile, providing the URL where the third-party app is hosted.
- During device provisioning, Samsung pulls the third-party app from the provided location and installs it in user0.