- *BASICS*
- The Knox Ecosystem
- White Paper
- Samsung Knox Portal
- Knox Cloud Services
- General Knox Support
- Knox Licenses
- *FOR IT ADMINS*
- Knox Admin Portal
- Knox Suite
- Knox Platform for Enterprise
- Introduction
- How-to videos
- Before you begin
- Get started with UEMs
- Introduction
- Blackberry UEM
- Citrix Endpoint Management
- FAMOC
- IBM MaaS360
- Microsoft Intune
- MobileIron Cloud
- MobileIron Core
- Samsung Knox Manage
- SOTI MobiControl
- VMware Workspace ONE UEM
- Knox Service Plugin
- Release notes
- Migrate to Android 11
- FAQs
- Troubleshoot
- KBAs
- Knox Mobile Enrollment
- Introduction
- How-to videos
- Get started
- Features
- Register resellers
- Add an admin
- Create profiles
- Google device owner support
- MDM compatibility matrices
- Device users
- Activity log
- Enroll and unenroll devices
- Configure devices
- Provide KME feedback
- Use the Knox Deployment App (KDA)
- Recover Google FRP locked devices using KME
- Role-based access control (RBAC)
- Release notes
- FAQs
- Troubleshoot
- KBAs
- On-Premise
- Knox Configure
- Mobile
- Wearables
- Shared Device
- KBAs
- Knox Capture
- Introduction
- How it works
- How-to videos
- IT admins: Get started
- Getting started with Knox Capture
- Step 1: Launch Knox Capture
- Step 2: Create a scanning profile
- Step 3: Select apps and activities
- Step 4: Configure the scanner
- Step 5: Set keystroke output rules
- Step 6: Test apps in your configuration
- Step 7: Share your configuration
- Step 8: Deploy Knox Capture in Managed mode
- End users: Get started
- Features
- Release notes
- FAQs
- Troubleshoot
- Knox Asset Intelligence
- Knox Manage
- Introduction
- How-to videos
- Get started
- Video: Getting started with Knox Manage
- Integration with Managed Service Provider
- Access Knox Manage
- Configure basic environments
- Create user accounts
- Create groups
- Create organization
- Set up devices and profiles
- Set up Knox Manage deployment with a Knox Suite license
- Manage Chromebooks
- Manage Android devices with the Android Management API
- Manage Shared iPads
- Configure
- Licenses
- Organization
- Users
- Sync user information
- Groups
- Devices
- Content
- Applications
- View applications
- Add applications
- Introduction
- Add internal Android and iOS applications
- Add internal Windows applications
- Add public applications using Google Play Store
- Add public applications using iOS App Store
- Add public applications using Managed Google Play
- Add public applications using Managed Google Play Private
- Add public applications using Managed Google Play Store Private Web
- Add public applications using Microsoft Store
- Add Chrome OS applications
- Assign applications
- Introduction
- Assign internal Android and iOS apps
- Assign iOS App Store applications
- Assign Google Play applications
- Assign Managed Google Play applications
- Assign Managed Google Play Private applications
- Assign Managed Google Play public web apps
- Assign Windows applications
- Assign Chrome OS applications
- Manage applications
- Volume Purchase Program for iOS
- Profile
- Knox E-FOTA
- Certificates
- Advanced settings
- Monitor
- Kiosk devices
- Knox Remote Support
- Active Directory
- Microsoft Exchange
- Mobile Admin
- Appendix
- Release notes
- Features
- FAQs
- KBAs
- Knox E-FOTA
- Introduction
- How-to videos
- Get started
- Features
- EMM integration
- Appendix
- Release notes
- FAQs
- KBAs
- Troubleshoot
- Knox E-FOTA On-Premises
- Legacy Knox E-FOTA products
- Knox Guard
- Introduction
- How-to video
- Get started
- Using Knox Guard
- Dashboard
- Manage devices
- Introduction
- Accept or reject devices
- Upload devices
- Delete devices
- Complete payment
- Send payment overdue notification
- Enable or disable SIM control
- Download devices as CSV
- View device log
- View device deletion log
- Start and stop blinking reminder
- Lock and unlock devices
- Update lock message
- Send relock timestamp
- Turn on/off relock reminder
- Manage policies
- Manage licenses
- Manage resellers
- Manage admins and roles
- Activity log
- Knox Deployment App
- Release notes
- FAQs
- KBAs
- Support
- Samsung Care+ for Business
- *FOR RESELLERS*
- Knox Deployment Program
- *FOR MANAGED SERVICE PROVIDERS*
- Knox MSP Program
Universal
Credential Management (UCM)
KSP provides a group of policies to manage universal authentication credentials in both external and internal device storage, for example, a smartcard, micro SD card, or embedded Secure Element. Depending upon your network and security needs, you can enable or disable UCM policies as well as configure advanced settings for your UCM plugins.
Before you can enable UCM plugins for your devices, you must create and configure at least one UCM configuration policy.
1. Create UCM configuration policy
The following example describes the process to create a new UCM configuration policy, called Screen lock, that dictates how the UCM plugin restricts access to specific apps on the target device when the device is locked.
- In your UEM console, open the Device Configuration Profile that is associated with your target devices > click the appropriate option to edit the profile.
- On the policy settings homepage, next to UCM plugin configurations, click Configure. The page refreshes to show the UCM plugin configurations menu item on the left hand navigation menu.
- On the refreshed navigation menu, click UCM plugin configurations > Add setting. The UCM plugin configuration page opens to show a set of fields that help you create and customize your UCM plugin.
-
On the UCM plugin configuration page, do as follows:
- In the Name of UCM plugin configuration field, enter Screen lock.
In the Package name of UCM plugin application field, enter the package name for your UCM vendor's application. Sample format is
com.mycompany.ucm.plugin
. Refer to the UCM vendor application's Google Play Store page for the correct package name.In the Credential usage list, select Screen lock.
If your UCM vendor's plugin supports PIN caching, in the Pin properties area > in the PIN timeout type list > select Same as screen lock. The UCM plugin now requires re-authentication whenever the screen locks.
In the Application access controls area > Type of access restrictions list > select Unrestricted access.
In the Access control when device or workspace is locked area > Lock credential storage when device or workspace is locked list > click True.
- In the List of apps allowed to access credential storage when locked field, enter the package names—in a comma-separated list—to allow specific apps to access UCM credential storage when the device is locked.
List of certificates to install on this credential storage after configuration.
NOTE—Always choose a name that highlights the main feature or use of the UCM plugin configuration that you are setting up. You can then reference this name in KSP to apply these settings to the target device. - Click OK to save this new UCM configuration. This UCM configuration restricts all apps' access to UCM credential storage, with the exception of specific apps, when the device is locked.
2. Use an existing UCM configuration policy
The following example shows you how to use the Screen lock UCM configuration policy that you created earlier to automatically secure target devices in the High security devices device group when the screen is locked.
- After you've created the Screen lock UCM configuration policy in your chosen Device Configuration Policy, go to Groups > All groups.
- On the All groups page, confirm that the High security devices device group exists. Refer to your UEM console's help documentation for information on creating a new or editing an existing device group.
- Go to the Device Configuration Policy that contains the Screen lock UCM configuration policy > click Assignments > Include tab.
- On the Include page, in the Assign to list, select High security devices > click Save.
- Depending upon the settings you've chosen for deploying Device Configuration Policy changes, the new UCM Configuration Policy is deployed on the devices in the High security devices group.