Lines Matching full:application
39 <p>In this lesson, you will learn how to create a security-aware application that manages access to
40 its content by enforcing device management policies. Specifically, the application can be configured
50 <p>You must declare the selected policy set, which will be enforced by the application, in the
56 uppercase characters are two examples). If an application attempts to invoke methods whose
59 such as <code>force-lock</code>, are available if the application intends to manage
89 <p>Create a Device Administration broadcast receiver, which gets notified of events related to the policies you?ve declared to support. An application can selectively override callback methods.</p>
91 <p>In the sample application, Device Admin, when the device administrator is deactivated by the
93 business logic that is relevant to your use case. For example, the application might take some
116 <p>Before enforcing any policies, the user needs to manually activate the application as a device
118 user can activate your application. It is good practice to include the explanatory text to highlight
119 to users why the application is requesting to be a device administrator, by specifying the
139 // explain to user why the application is requesting to be a device
151 <p>If the user chooses "Activate," the application becomes a device administrator and can begin
154 <p>The application also needs to be prepared to handle set back situations where the user abandons
163 <p>After the device administrator is activated successfully, the application then configures Device
165 Android with each release. It is appropriate to perform version checks in your application if using
182 <p>At this point, the application is able to enforce the policy. While the application has no access
186 corrective action. It is the application?s responsibility to explicitly launch the system
205 <p>Once the device is properly secured by setting up a proper screen-lock password, the application