Issues related to specific deployments
Last updated July 26th, 2023
This section outlines any rare issues you may encounter with specific deployments.
|Dual DAR||Dual DAR is not working on my devices.||
You must meet the following requirements to use Dual DAR.
- Devices should support Dual DAR 1.1 version or higher (check by going to Device Settings > About phone > Software information > Knox version)
- Only works for fully managed device with a work profile deployments for the encryption of Work Profiles within the managed devices
NOTE: KSP does not initiate Dual DAR, it only helps activate a KPE Premium Dual DAR license. You configure the parameters after it is setup during enrollment by KME.
|Devices set up with File Based Encryption (FBE)||
KSP does not receive policies pushed to devices that are set up with File-based encryption (FBE)
This can occur only if a device is rebooted and has not yet been unlocked.
|The user must unlock the mobile device with their chosen authentication in order to decrypt it. Once this is done, the KSP policies are pushed to the device.|
|Device restrictions or advanced restrictions||
Native UEM policies should take precedence over KSP policies.
If your UEM console natively supports a policy. You should use it instead of the KSP equivalent. This can help avoid unpredictable behavior on the device.
If a KSP policy is used, the value may be overridden by your UEM in future deployment, depending on how you have set up your deployment schedule.
|Example: if your UEM console supports disable NFC and KSP also supports disable NFC, use the native UEM console policy.|
Multifactor authentication (2FA) and biometrics
A conflict between multifactor authentication (2FA) and Biometric policies can cause a device to become "Admin locked." When this occurs, the user can't unlock the device without admin assistance.
This can occur if you turn off biometric unlock before you turn off 2FA.
To avoid Admin Lock:
We also strongly recommend you disable One Lock on devices where 2FA is used for Work Profile authentication. One Lock policies are supported by your native UEM console and outside the scope of KSP.
NOTE: 2FA only works with Iris and Fingerprint (FP) only. Face recognition is independent and is not linked to 2FA.
|DeX Customization features not working||DeX Customization error messages are not showing up in debug mode.||
Many DeX Customization features do not return errors (regardless of debug mode or normal operation). If your device has correct OS and DeX version then these will be applied, if not they will be ignored.
To see the debug messages, use a device with a version of Knox that supports the DeX features you are using.
|Knox built-in VPN (Strong Swan)||Certificate based authentication with a Device Owner (DO) does not work with Knox built-in VPN (Strong Swan).||No resolution. Knox built-in VPN (Strong Swan) does not support certificate based authentication when deployed to a DO device.|
|Dual SIM||KSP is currently able to restrict operations on the second SIM but is unable to hide the second SIM's UI on the device.||No resolution. The current implementation does not block the UI, however, it restricts calls, SMS, MMS, and data connections using internal radio layer APIs on the second SIM's internal.|
Is this page helpful?
Thank you for your feedback!