- Welcome
- Basics
- Device apps
- Overview
- Knox licenses
- Knox SDK
- Overview
- About the SDK
- What's new
- What's new
- Migrations
- Android 11
- Android Enterprise
- Device admin deprecation
- DA deprecation and Samsung
- DA deprecation and VMware
- FAQs
- FAQ Index
- What is DA Deprecation?
- What is being deprecated with device admin?
- What is API level 29, as it relates to DA deprecation?
- What is the impact of DA deprecation to Knox?
- As a Knox partner, what do I need to do?
- What happens to DA apps when upgraded to Android Q?
- When can I safely upgrade to Android Q?
- What if a device already has Android Q?
- Can my DA app coexist with a UEM app running as DO?
- Are there changes to Knox Configure due to DA deprecation?
- Can I use my DA app alongside Knox Configure?
- Does KME still support device enrollment using DA?
- As DA is not in Android Q, can I enroll via KME to Work Profile?
- Get started
- Sample app tutorials
- Features
- Independent Software Vendors
- ML Developers
- Introduction
- Whitepaper
- Model Protection APIs
- Protect ML model
- ML Encryption Tool
- Knox ML Encryption Tool Revision
- FAQs
- Are there any additional steps for Linux to give execute permissions to conversion tool?
- Do I to change my app to run the encrypted model?
- Where are the encrypted files saved?
- Which devices support Knox for Model Protection?
- Which ML file types are supported by Knox for Model Protection?
- Which operating systems (OS) support Knox ML Model Conversion Tool?
- Independent Software Vendors (DA)
- MDM Providers
- System Integrators
- VPN Providers
- Storage Providers
- API Reference
- Tools
- FAQs
- FAQ Index
- General
- What is the Samsung Knox SDK?
- Where can I obtain a white paper for Samsung Knox?
- What versions of Android support the Knox SDK?
- How can I check if my device firmware is an engineering or commercial build?
- How can I access the binaries before they are released?
- What is a deprecated API method?
- What kind of support is offered after an API is deprecated?
- Why were the API classes deprecated?
- What are the features by default set to hidden/disabled in ProKiosk mode?
- What are credentials?
- What is Knox TIMA CCM?
- Is Knox supported on other platforms, such as windows?
- Which hardware control features can be managed inside Knox Workspace, using the Knox SDK?
- Why do a few Knox SDK APIs not work on some devices?
- Can Google Play used to deploy Knox apps?
- Can I use managed configurations for Samsung Knox features?
- Can a third-party app use the Knox SDK to get LDAP information?
- How do I enable users to select a 3rd party keyboard?
- How does my device's serial number change with Knox 3.2.1?
- If I don’t use the UCM APIs of the Knox SDK, what are my options for credential storage?
- What are the changes in Samsung Calendar data sharing in Knox SDK 3.8?
- What are the alternative Google APIs for Samsung Knox Wi-fi deprecation?
- Installation
- How do I use an SDK packaged as an Eclipse IDE add-on with the Android Studio IDE?
- Is it possible to install an app silently on a device using Knox SDK?
- Why am I still able to download an app even though I have added it to blacklist with the method addAppPackageNameToBlackList(), from the Knox SDK?
- How can an app find out which apps are installed in and outside a container, using the Knox SDK?
- How can an app block the installation of a non-trusted app, using the Knox SDK?
- What does "Security policy prevents installation of this application" mean?
- Can I prevent an end user from installing certificates, with the Knox SDK?
- Does API method installApplication(String packageName) download apps from the play store and install them silently?
- Does the API method setApplicationUninstallationDisabled disable the uninstallation of apps inside the container, when using the Knox SDK?
- Why is the installCertificate API method not successfully installing a certificate on my device?
- Licensing
- How do I use license keys?
- What is the KPE Premium license key and why should I use it?
- What is the backwards compatible key?
- When do I need to use the backwards compatible key?
- Do I need to associate my app with a backwards compatible key?
- How have license key names changed?
- Which keys can be used in combination with each other?
- What is automatic license seat release?
- What are license permissions?
- What is the difference between Standard and Premium permissions?
- How do I declare permissions?
- Deprecated licenses
- Operations
- Are the Knox SDK browser policies applicable to Chrome as well?
- How can an enterprise disable roaming access over an enterprise APN, using the Knox SDK?
- Can an app using the Knox SDK clear an email signature?
- Can I add system or pre-installed app packages, using the Knox SDK, to the notification blacklist?
- Can I use Google push notifications inside a Knox Workspace container?
- Can I use SDP for an app that is outside the Knox container?
- Can multi-window mode be disabled through blocklisting, using the Knox SDK?
- Does my launcher app need a special intent to work in Kiosk mode?
- Does the API method enforceMultifactorAuthentication(), in the Knox SDK, come into effect immediately?
- How can I disable GPS on the device using the Knox SDK?
- How can I move an app from the user's personal mode to the Knox container using an API in the Knox SDK?
- How does the Knox API method EmailPolicy.setAllowEmailForwarding work?
- How does the Knox SDK method, setAllowChangeDataSyncPolicy(), sync contacts with the container so they are visible on the personal side?
- How do I disable the USB port except for charging, using the Knox SDK?
- How do I use the Knox SDK to allow or block phone numbers?
- How do I use the SDK to prevent launching the screen saver when an app is running?
- Is an APN validated when I use the Knox SDK to add it to a device?
- Is it possible to block application access to data while roaming, using the Knox SDK?
- Is there a limit to the number of applications that can be blocked or allowed using the Knox SDK?
- Is there any way to create IMAP, POP, or Exchange accounts in the emulator?
- What does the RCPPolicy.NOTIFICATIONS argument do in the API method setAllowChangeDataSyncPolicy?
- What Keystores can I use?
- What kind of phone numbers are allowed after setting setEmergencyCallOnly(true) in the Knox SDK?
- What secure hardware can I use with the UCM APIs to store credentials?
- What should I do if I find API errors?
- Why are app shortcuts not showing up in Kiosk mode for the Knox SDK?
- Why are Knox Customization policies still active on my device even after my app is uninstalled?
- Why can't you enable the camera inside a container when it is blocked in the personal space?
- Why does the allowOTAUpgrade API method, in the Knox SDK, have no effect when allowFirmwareRecovery() is set to false?
- Why does the API method call setEnableApplication(), using the Knox SDK, disable the app?
- Why does the createVpnProfile method, in the Knox SDK, fail when a Profile name has whitespace?
- Why does the SDK return a NullPointerException when I access the SMS/MMS content URI?
- Why is video recording also blocked when I use the Knox SDK to block audio recording?
- Standard features
- Can I force a device to update to the latest firmware?
- Can multi-window mode be disabled through blacklisting, using the Knox SDK?
- Does the API method setApplicationUninstallationDisabled disable the uninstallation of apps inside the container, when using the Knox SDK?
- What is the difference between hideStatusBar() and hideSystemBar() in the Knox SDK?
- What Knox SDK API methods are available to manage device firmware?
- Why do a few Knox SDK APIs not work on some devices?
- Will the legacy ELM and KLM keys still work with the Knox Platform for Enterprise (KPE) key?
- Premium features
- Customization
- Security
- As a developer, how can I access the device root key?
- Can an app prevent access to specific networks, using the Knox SDK?
- Can fingerprint be used as a substitute for other forms of screen unlock methods, when using the Knox SDK?
- Can I use the Knox SDK to disable the "Unlock Via Google" password unlock option?
- Can I use the Knox SDK to encrypt the SD card?
- Can I use the Knox SDK to modify the fingerprint passcode requirements?
- Does a Knox container enforce authentication by default?
- Do the SDP APIs support a security standard?
- How can I ensure that certificates are stored in the TIMA KeyStore, using the Knox SDK?
- How does SDP secure the cryptographic keys used for data encryption?
- How do you programmatically unlock the container after the maximum amount of failed attempts, using the Knox SDK?
- What does "Security policy prevents installation of this application" mean?
- What is the maximum length allowed for a Wi-Fi SSID, when using the Knox SDK?
- What is the scope of the setPasswordVisibilityEnabled() API method, in the Knox SDK?
- When I call the Knox SDK API method setExternalStorageEncryption, why doesn't the device prompt the user to encrypt?
- Why are HTTPS requests bypassing global proxy settings in the Knox SDK?
- Why doesn't the Knox method "isActivePasswordSufficient" check for forbidden strings?
- Why do I see "Cannot safely connect to server" when I create an email account using SSL??
- Why is my timeout of 15 minutes not working for the resetContainerPassword() method, using the Knox SDK?
- Why is the Knox API method setMaximumTimeToLock() not showing the time I configured?
- SDP
- UCM
- VPN
- VPN Provider
- Does the Knox framework store any type of data passed during profile creation?
- Do I need a license to use the Knox VPN SDK?
- How can I verify if the VPN connection that is starting belongs to the Knox profile or the default Android VPN profile?
- How do I add all apps inside AND outside the container to a VPN profile?
- How is the Knox container affected by VPN On-Premise Bypass?
- How should the network state change be handled by the VPN Client Integration?
- If the framework takes the responsibility of starting the VPN connection, and since it is MDM-controlled, how will the user be able to connect to the VPN if a time-out or networking error occurs?
- Under what circumstances does the framework trigger the start connection?
- What API do I use to create a On-Premise Bypass VPN profile?
- What is VPN On-Premise Bypass?
- When should the various Android VPN service APIs be called?
- Workspace
- Samsung DeX
- Containers
- How does an app detect if a container was created using the Knox SDK?
- How do I install the MDM agent inside the Knox container?
- I have created a "container only mode" container and I am locked inside, using the Knox SDK. How do I exit?
- Why do I get error KnoxContainerManager.ERROR_INTERNAL_ERROR(-1014) while creating a container?
- KBAs
- Knox POS SDK
- Knox Capture SDK
- Knox Tizen SDK
- Overview
- About the SDK
- What's new
- Get started
- Tutorials
- API Reference
- Sample Apps
- FAQs
- FAQ Index
- General
- How is Tizen related to Knox?
- Which devices support the Knox Tizen SDK for Wearables?
- What version of the Tizen SDK should I install before installing the Samsung Knox Tizen SDK for Wearables?
- Should I install any extension SDK before installing the Samsung Knox Tizen SDK for Wearables?
- What are the modes in which you can use the Samsung wearable device?
- What are the supported Wi-Fi security types?
- How do I get the attestation blob?
- What is a nonce and why is it valid for a short time period?
- What is ProKiosk mode?
- Licensing
- Samsung India Identity SDK
- Overview
- About the SDK
- What's new
- Get started
- Features
- API Reference
- Sample Apps
- FAQs
- FAQ Index
- General
- Installation
- Licensing
- Usage
- How do I verify if my device supports Samsung India Identity SDK?
- Should I capture the IRIS image of one or both eyes?
- When do I use the UIDAI Staging server and UIDAI Production server?
- What are the URLs that need to be whitelisted for enterprise-managed devices using the Samsung India Identity SDK APIs?
- Who is impacted by the upgrade of the biometric public devices to registered devices?
- Is there any hardware change required to upgrade the public devices to registered devices?
- What are the application (APK) changes required to upgrade the public devices to registered devices?
- Web services
- Managed configurations
- Introduction
- Deploy managed configurations
- FAQs
- FAQ Index
- What are managed configurations?
- Why should I use managed configurations?
- How do managed configurations work?
- Can I use managed configurations for Samsung Knox features?
- What is a managed configurations XML schema file?
- Which Samsung apps support managed configurations?
- How do I deploy managed configurations on an MDM console?
- Where can I get the XML schemas for Samsung apps that support managed configurations?
- Is there sample code showing how an MDM web console can deploy an iframe that renders a managed configurations XML schema?
- What email app is preloaded on Samsung devices?
- Knox Service Plugin
- Samsung Email
Install and get credentials through UCM
This section describes how applications can access credentials through the UCM framework. The UCM framework provides a single set of APIs to access credentials on a variety of third-party storage devices. To browse the APIs available, see the package com.samsung.android.knox.ucm.configurator. If you are new to the UCM framework, see How UCM works. If you are developing a UCM plugin, see Create a UCM plugin.
Before developing with Knox, ensure that you have activated your Knox license.
Check available credential storage
To find all the available credential storage on a device, call getAvailableCredentialStorage
:
// System User Configuration UniversalCredentialManager ucmManager = UniversalCredentialManager.getUCMManager(mContext); CredentialStorage[] storages = ucmManager.getAvailableCredentialStorages(); for (CredentialStorage cs: storages) { String name = cs.name; String packageName = cs.packageName; String manufacturer = cs.manufacturer; String signature = cs.signature; }
If your application is running in a secure container, identify the container as follows:
// Container User Configuration UniversalCredentialManager ucmManager = UniversalCredentialManager.getUCMManager(mContext, containerId); CredentialStorage[] storages = ucmManager.getAvailableCredentialStorages(); for (CredentialStorage cs: storages) { String name = cs.name; String packageName = cs.packageName; String manufacturer = cs.manufacturer; String signature = cs.signature; }
Manage a credential storage space
A credential storage can be either:
- managed: The credential storage can be used by only allowed applications. This is described below.
- unmanaged: The credential storage can be used by any application and no allowlist is enforced. This is described in Configure Keyguard settings.
Your app can manage a storage space through the UCM APIs. Managing storage space means performing the following:
- Allow only specific apps to install certificates in the storage space. All other apps are forbidden to do so.
- Create a list of approved apps that are allowed to access the storage space.
- Create a list of approved apps that are allowed to access the credentials stored in the storage space.
- Configure the storage space.
- Use the storage space to keep the password for unlocking the device. If needed, the password can be retrieved by way of PIN authentication.
- Use the storage space to keep the On-Device Encryption (ODE) key. If needed, the password can be retrieved by way of PIN authentication.
UniversalCredentialManager ucmManager = UniversalCredentialManager.getUCMManager(mContext); CredentialStorage cs = selectCredentialStorage(); // manage Credential Storage int ret = ucmManager.manageCredentialStorage(cs, true); boolean managed = ucmManager.isCredentialStorageManaged(cs); // unmanage Credential Storage ret = ucmManager.unmanageCredentialStorage(cs, false);
Install a certificate in a storage space
Your app can install or remove certificates from a managed storage space. You can identify certificates used to authenticate access to VPN or Wi-Fi.
Your app can manage only the certificates it installs, and cannot managed certificates installed by other apps in the storage.
UniversalCredentialManager ucmManager = UniversalCredentialManager.getUCMManager(mContext); CredentialStorage cs = selectCredentialStorage(); // Read certificate file File certFile = new File("/mnt/sdcard/cert.p12"); byte certBuffer[] = new byte[(int) certFile.length()]; FileInputStream certfis = new FileInputStream(certFile); certfis.read(certBuffer); certfis.close(); String alias = "Test"; String password = "1234"; Bundle options = new Bundle(); // To install certificate for Wi-Fi options.putBoolean(UniversalCredentialManager.BUNDLE_EXTRA_ALLOW_WIFI, true); // To install certificate for VPN and apps options.putBoolean(UniversalCredentialManager.BUNDLE_EXTRA_ALLOW_WIFI, false); int result = ucmManager.installCertificate(cs, certByffer, alias, password, options);
Allow an app for storage access
To allow an application to access credential storage, you must first set up a managed credential storage as described above. Then, to add the application to the allowlist:
UniversalCredentialManager ucmManager = UniversalCredentialManager.getUCMManager(mContext); CredentialStorage cs = selectCredentialStorage(); List<AppIdentity> appList = new ArrayList<AppIdentity>(); AppIdentity pkg = new AppIdentity(); pkg.setPackageName("com.android.email"); String signatureHash = "ABCDEF"; // Application signature is optional, but it is recommended to send application signature for security purpose. pkg.setSignature(signatureHash); appList.add(pkg); // add allowlist application to access Credential Storage Bundle data = new Bundle(); data.putInt(BUNDLE_EXTRA_ACCESS_TYPE, UCM_ACCESS_TYPE_STORAGE); int result = mUCM.addPackagesToWhiteList(cs, appList, data); // add allowlist application to access the certificate stored inside Credential Storage data.putInt(BUNDLE_EXTRA_ACCESS_TYPE, UCM_ACCESS_TYPE_CERTIFICATE); String alias = "TestCertificate"; data.putString(BUNDLE_EXTRA_ALIAS, alias); result = mUCM.addPackagesToWhiteList(cs, appList, data);
You can use the wild character (*) to add all applications to the allowlist, then remove select applications that you don't want to access the storage.
Note: As described in How the UCM framework works, your app cannot control the allowlist of pre-installed certificates. If the credential storage has pre-installed certificates, an app can use the certificate only through storage access permissions.
Manage storage space properties
Some credential storage has plugin-specific properties such as a PIN unlock from timing out. You can configure the properties as follows:
UniversalCredentialManager ucmManager = UniversalCredentialManager.getUCMManager(mContext); CredentialStorage cs = selectCredentialStorage(); Bundle data = new Bundle(); // Set Property String propertyTag = "PIN_TIMEOUT"; // This value should be supported by plugin vendor int timeoutInterval = 10; data.putInt(propertyTag, timeoutInterval); Bundle result = ucmManager.setCredentialStorageProperty(cs, data); // Get Property Bundle retrived = ucmManager.getCredentialStorageProperty(cs, data);
Secure credentials using JCE
The UCM framework supports standard Java Cryptography Extension (JCE) APIs to encrypt credentials.
Your application can add a UCM plugin keystore provider, create a keystore instance, and perform cryptographic operations on credentials in the keystore.
The JCE framework and UCM framework route calls to the correct UCM provider and credential storage as shown below:
To add a UCM keystore provider and create an instance of a keystore:
UniversalCredentialManager ucmManager = UniversalCredentialManager.getUCMManager(mContext); CredentialStorage cs = selectCredentialStorage(); // Add providers UniversalCredentialUtil ucmUtil = UniversalCredentialUtil.getInstance(); Provider[] providerList = ucmUtil.getProviders(); String providerName = ""; for (Provider provider: providerList) { providerName = provider.getName(); // Plugin Properties String pluginId = provider.getProperty(UniversalCredentialUtil.AGENT_ID); String pluginSummary = provider.getProperty(UniversalCredentialUtil.AGENT_SUMMARY); String pluginTitle = provider.getProperty(UniversalCredentialUtil.AGENT_TITLE); String pluginVendorId = provider.getProperty(UniversalCredentialUtil.AGENT_VENDORID); int position = Security.addProvider(provider); } // Get provider KeyStore ucmKeystore = KeyStore.getInstance("KNOX", providerName); ucmKeyStore.load(null);
Get credentials from a UCM keystore
The UCM framework is integrated with the Android KeyChain class. This means that apps that are already using the KeyChain API to access certificates can continue to do so when those certificates are stored by way of the UCM framework.
Of course, the app still needs to be allowed for the particular storage space which contains the certificate and the certificate must also be allowed for the app.
Each credential storage has an alias by which applications refer to the certificate when retrieving it. As multiple storage providers may be used, alias name clash is an issue. So UCM expands the alias to include the source credential storage as well in the following URI scheme:
ucmkeychain://source/resourceId/uid/alias
source
is the name of the credential storage providerresourceId
is an integer which indicates one of the following types:- Private KeyChain
- Public KeyChain
- WiFI KeyChain
- All
uid
is the Android UID for the requesting applicationalias
is the name provided by the storage vendor's plugin for the storage space
Your application can retrieve the full URI for a credential directly as shown below. After the URI is known, your application can call a KeyChain API such as getPrivateKey()
or getCertificateChains()
to retrieve the credentials.
// Use Knox UCM to get URI string that represents credential storage and its resource from keychain String ucmAlias = UniversalCredentialUtil.getKeychainUri("com.samsung.testplugin:pluginname", "TestCertificate"); // Get credentials PrivateKey privatekey = KeyChain.getPrivateKey(getApplicationContext(), ucmAlias); X509Certificate[] certList = KeyChain.getCertificateChain(getApplicationContext(), ucmAlias);
Your application can also retrieve the credentials from a UCM keystore by calling the Android KeyChainAliasCallback()
API as follows:
// Use Android KeychainAliasCallback to get credentials public class MainActivity extends Activity implements KeyChainAliasCallback { @Override public void alias(final String alias) { String ucmAlias = alias; PrivateKey privatekey = KeyChain.getPrivateKey(getApplicationContext(), ucmAlias); X509Certificate[] certList = KeyChain.getCertificateChain(getApplicationContext(), ucmAlias); } }
Store Keyguard credentials in UCM keystore
Android's Keyguard uses the Gatekeeper and KeyMaster components to authenticate device users based on their pattern, PIN, or password. The UCM framework is integrated with Keyguard such that an application can store the device unlock credentials in a secure UCM keystore.
An application must have the appropriate privileges and permissions to do so, through either Device Admin or Android Enterprise DO/PO.
UCM passes the user unlock data to the credential storage for verification. Upon success, the credential storage gives the generated password to the UCM framework which, in turn, verifies whether or not the password is proper with the Gatekeeper.
The following diagram shows the flow for this process:
The UCM Keyguard is based on user authentication so the storage vendor's plugin must support password generation by way of the generateKeyguardPassword()
call.
UniversalCredentialManager ucmManager = UniversalCredentialManager.getUCMManager(mContext); CredentialStorage cs = selectCredentialStorage(); // enforce UCM Keyguard Bundle options = new Bundle(); int result = ucmManager.enforceCredentialStorageAsLockType(cs, options); // check enforced Credential Storage CredentialStorage enforced = ucmManager.getEnforcedCredentialStorageForLockType(); String name = cs.name; String packageName = cs.packageName; String manufacturer = cs.manufacturer String signature = cs.signature; // disable UCM Keyguard result = ucmManager.enforceCredentialStorageAsLockType(null, null);
Enabling UCM Keyguard requires user interaction because a notification appears when the app calls the enforceCredentialStorageAsLockType
.
If the device lock type is changed to the UCM Keyguard by a someone other than your application, the lock type can't be altered by anyone other than the user who set it initially.
When the UCM Keyguard status changes (set or unset), an application can receive an intent that includes status and package information as shown in the following code sample:
private BroadcastReceiver mUcmReceiver = new BroadcastReceiver() { @Override public void onReceive(Context context, Intent intent) { if (intent.getAction().equals(UniversalCredentialManager.ACTION_UCM_KEYGUARD_SET)) { Bundle data = intent.getExtras(); if (data != null) { int usertId = data.getInt(UniversalCredentialManager.BUNDLE_EXTRA_USER_ID, 0); String packageName = data.getString(UniversalCredentialManager.BUNDLE_EXTRA_PACKAGE); } } else if (intent.getAction().equals(UniversalCredentialManager.ACTION_UCM_KEYGUARD_UNSET)) { Bundle data = intent.getExtras(); if (data != null) { int usertId = data.getInt(UniversalCredentialManager.BUNDLE_EXTRA_USER_ID, 0); String packageName = data.getString(UniversalCredentialManager.BUNDLE_EXTRA_PACKAGE); } } } }; IntentFilter filter = new IntentFilter(); filter.addAction(UniversalCredentialManager.ACTION_UCM_KEYGUARD_SET); filter.addAction(UniversalCredentialManager.ACTION_UCM_KEYGUARD_UNSET); registerReceiver(mUcmReceiver, filter);