/frameworks/base/docs/html/samples/ |
admin.jd | 1 page.title=Admin 5 <div id="samples" class="admin">
|
/cts/hostsidetests/devicepolicy/app/DeviceOwner/res/xml/ |
device_admin.xml | 1 <device-admin xmlns:android="http://schemas.android.com/apk/res/android" android:visible="false"> 6 </device-admin>
|
/packages/apps/Settings/src/com/android/settings/ |
EventLogTags.logtags | 8 # log whether user accepted and activated device admin 11 # log whether user declined activation of device admin
|
/frameworks/base/core/java/android/app/admin/ |
IDevicePolicyManager.aidl | 18 package android.app.admin; 71 void setMaximumFailedPasswordsForWipe(in ComponentName admin, int num, int userHandle); 72 int getMaximumFailedPasswordsForWipe(in ComponentName admin, int userHandle); 83 ComponentName setGlobalProxy(in ComponentName admin, String proxySpec, String exclusionList, int userHandle); 85 void setRecommendedGlobalProxy(in ComponentName admin, in ProxyInfo proxyInfo); 127 boolean installCaCert(in ComponentName admin, in byte[] certBuffer); 128 void uninstallCaCert(in ComponentName admin, in String alias); 129 void enforceCanManageCaCerts(in ComponentName admin); 133 void addPersistentPreferredActivity(in ComponentName admin, in IntentFilter filter, in ComponentName activity); 134 void clearPackagePersistentPreferredActivities(in ComponentName admin, String packageName) [all...] |
package.html | 8 <a href="{@docRoot}guide/topics/admin/device-admin.html">Device Administration</a>
|
DevicePolicyManager.java | 17 package android.app.admin; 23 import android.app.admin.IDevicePolicyManager; 67 * <a href={@docRoot}guide/topics/admin/device-admin.html">device administrator</a>. Additionally, 75 * <a href="{@docRoot}guide/topics/admin/device-admin.html">Device Administration</a> 299 * A String extra holding a url that specifies the download location of the device admin 300 * package. When not provided it is assumed that the device admin package is already installed. 333 * <p>During device owner provisioning a device admin app is set as the owner of the device. 401 * <p>The ComponentName of the profile owner admin is pass in {@link #EXTRA_DEVICE_ADMIN} extr [all...] |
DeviceAdminInfo.java | 17 package android.app.admin; 55 * A type of policy that this device admin can use: device owner meta-policy 56 * for an admin that is designated as owner of the device. 63 * A type of policy that this device admin can use: profile owner meta-policy 71 * A type of policy that this device admin can use: limit the passwords 75 * <p>To control this policy, the device admin must have a "limit-password" 81 * A type of policy that this device admin can use: able to watch login 86 * <p>To control this policy, the device admin must have a "watch-login" 92 * A type of policy that this device admin can use: able to reset the 96 * <p>To control this policy, the device admin must have a "reset-password [all...] |
/developers/build/prebuilts/gradle/BasicManagedProfile/.google/ |
packaging.yaml | 8 categories: [Device Admin] 15 - android:android.app.admin.DevicePolicyManager 16 - android:android.app.admin.DeviceAdminReceiver
|
/external/chromium_org/net/data/ftp/ |
dir-listing-netware-2 | 3 d [RWCEAFMS] Admin 512 Nov 13 07:51 Driver
|
/external/libpcap/ |
chmod_bpf | 7 # This startup item will make it owned by the admin group, 8 # with permissions rw-rw----, so that anybody in the admin 16 # admin group can capture packets. 18 chgrp admin /dev/bpf*
|
/frameworks/base/docs/html/sdk/api_diff/preview-21/changes/ |
android.app.admin.DevicePolicyManager.html | 10 android.app.admin.DevicePolicyManager 74 Class android.app.admin.<A HREF="../../../../reference/android/app/admin/DevicePolicyManager.html" target="_top"><font size="+2"><code>DevicePolicyManager</code></font></A> 86 <A NAME="android.app.admin.DevicePolicyManager.addForwardingIntentFilter_removed(android.content.ComponentName, android.content.IntentFilter, int)"></A> 93 <A NAME="android.app.admin.DevicePolicyManager.clearForwardingIntentFilters_removed(android.content.ComponentName)"></A> 100 <A NAME="android.app.admin.DevicePolicyManager.isApplicationBlocked_removed(android.content.ComponentName, java.lang.String)"></A> 107 <A NAME="android.app.admin.DevicePolicyManager.setApplicationBlocked_removed(android.content.ComponentName, java.lang.String, boolean)"></A> 114 <A NAME="android.app.admin.DevicePolicyManager.setApplicationsBlocked_removed(android.content.ComponentName, android.content.Intent, boolean)"></A> 121 <A NAME="android.app.admin.DevicePolicyManager.setLockTaskComponents_removed(android.content.ComponentName[])"></A> 136 <A NAME="android.app.admin.DevicePolicyManager.addCrossProfileIntentFilter_added(android.content.ComponentName, android.conte (…) [all...] |
/external/smack/src/org/xbill/DNS/ |
SOARecord.java | 17 private Name host, admin; field in class:SOARecord 30 * @param admin The zone administrator's address 40 SOARecord(Name name, int dclass, long ttl, Name host, Name admin, 45 this.admin = checkName("admin", admin); 56 admin = new Name(in); 67 admin = st.getName(origin); 81 sb.append(admin); 118 return admin; [all...] |
/developers/build/prebuilts/gradle/AppRestrictionEnforcer/.google/ |
packaging.yaml | 8 categories: [Admin]
|
/development/samples/browseable/AppRestrictionEnforcer/ |
_index.jd | 2 sample.group=Admin
|
/development/samples/browseable/AppRestrictionSchema/ |
_index.jd | 2 sample.group=Admin
|
/external/libpcap/ChmodBPF/ |
ChmodBPF | 11 # This startup item will make it owned by the admin group, 12 # with permissions rw-rw----, so that anybody in the admin 20 # admin group can capture packets. 22 chgrp admin /dev/bpf*
|
/frameworks/base/docs/html/sdk/api_diff/21/changes/ |
android.app.admin.DevicePolicyManager.html | 10 android.app.admin.DevicePolicyManager 74 Class android.app.admin.<A HREF="../../../../reference/android/app/admin/DevicePolicyManager.html" target="_top"><font size="+2"><code>DevicePolicyManager</code></font></A> 86 <A NAME="android.app.admin.DevicePolicyManager.addCrossProfileIntentFilter_added(android.content.ComponentName, android.content.IntentFilter, int)"></A> 87 <nobr><code>void</code> <A HREF="../../../../reference/android/app/admin/DevicePolicyManager.html#addCrossProfileIntentFilter(android.content.ComponentName, android.content.IntentFilter, int)" target="_top"><code>addCrossProfileIntentFilter</code></A>(<code>ComponentName,</nobr> IntentFilter<nobr>,</nobr> int<nobr><nobr></code>)</nobr> 93 <A NAME="android.app.admin.DevicePolicyManager.addCrossProfileWidgetProvider_added(android.content.ComponentName, java.lang.String)"></A> 94 <nobr><code>boolean</code> <A HREF="../../../../reference/android/app/admin/DevicePolicyManager.html#addCrossProfileWidgetProvider(android.content.ComponentName, java.lang.String)" target="_top"><code>addCrossProfileWidgetProvider</code></A>(<code>ComponentName,</nobr> String<nobr><nobr></code>)</nobr> 100 <A NAME="android.app.admin.DevicePolicyManager.addPersistentPreferredActivity_added(android.content.ComponentName, android.content.IntentFilter, android.content.ComponentName)"></A> 101 <nobr><code>void</code> <A HREF="../../../../reference/android/app/admin/DevicePolicyManager.html#addPersistentPreferredActivity(android.content.ComponentName, android.content.IntentFilter, android.content.ComponentName)" target="_top"><code>addPersistentPreferredActivity</code></A>(<code>ComponentName,</nobr> IntentFilter<nobr>,</nobr> ComponentName<nobr><nobr></code>)</nobr> 107 <A NAME="android.app.admin.DevicePolicyManager.addUserRestriction_added(android.content.ComponentName, java.lang.String)"></A [all...] |
/frameworks/base/docs/html/sdk/api_diff/11/changes/ |
android.app.admin.DevicePolicyManager.html | 10 android.app.admin.DevicePolicyManager 74 Class android.app.admin.<A HREF="../../../../reference/android/app/admin/DevicePolicyManager.html" target="_top"><font size="+2"><code>DevicePolicyManager</code></font></A> 86 <A NAME="android.app.admin.DevicePolicyManager.getPasswordExpiration_added(android.content.ComponentName)"></A> 87 <nobr><code>long</code> <A HREF="../../../../reference/android/app/admin/DevicePolicyManager.html#getPasswordExpiration(android.content.ComponentName)" target="_top"><code>getPasswordExpiration</code></A>(<code>ComponentName</code>)</nobr> 93 <A NAME="android.app.admin.DevicePolicyManager.getPasswordExpirationTimeout_added(android.content.ComponentName)"></A> 94 <nobr><code>long</code> <A HREF="../../../../reference/android/app/admin/DevicePolicyManager.html#getPasswordExpirationTimeout(android.content.ComponentName)" target="_top"><code>getPasswordExpirationTimeout</code></A>(<code>ComponentName</code>)</nobr> 100 <A NAME="android.app.admin.DevicePolicyManager.getPasswordHistoryLength_added(android.content.ComponentName)"></A> 101 <nobr><code>int</code> <A HREF="../../../../reference/android/app/admin/DevicePolicyManager.html#getPasswordHistoryLength(android.content.ComponentName)" target="_top"><code>getPasswordHistoryLength</code></A>(<code>ComponentName</code>)</nobr> 107 <A NAME="android.app.admin.DevicePolicyManager.getPasswordMinimumLetters_added(android.content.ComponentName)"></A [all...] |
/cts/apps/CtsVerifier/src/com/android/cts/verifier/admin/ |
PolicySerializationTestActivity.java | 17 package com.android.cts.verifier.admin; 23 import android.app.admin.DevicePolicyManager; 155 ComponentName admin = TestDeviceAdminReceiver.getComponent(this); local 157 item.applyExpectedValue(mDevicePolicyManager, admin); 245 void applyExpectedValue(DevicePolicyManager deviceManager, ComponentName admin); 253 void loadActualValue(DevicePolicyManager deviceManager, ComponentName admin); 292 public final void loadActualValue(DevicePolicyManager deviceManager, ComponentName admin) { 293 mActualValue = getDeviceManagerValue(deviceManager, admin); 297 ComponentName admin); 407 public void applyExpectedValue(DevicePolicyManager deviceManager, ComponentName admin) { [all...] |
TestDeviceAdminReceiver.java | 17 package com.android.cts.verifier.admin; 19 import android.app.admin.DeviceAdminReceiver;
|
/frameworks/base/docs/html/guide/topics/admin/ |
device-admin.jd | 27 <li>{@link android.app.admin.DeviceAdminReceiver}</li> 28 <li>{@link android.app.admin.DevicePolicyManager}</li> 29 <li>{@link android.app.admin.DeviceAdminInfo}</li> 62 <p>You use the Device Administration API to write device admin applications that users 63 install on their devices. The device admin application enforces the desired 65 <li>A system administrator writes a device admin application that enforces 81 <li>The system prompts the user to enable the device admin application. How 83 <li>Once users enable the device admin application, they are subject to 87 <p>If users do not enable the device admin app, it remains on the device, but in an inactive state. Users will not be subject to its policies, and they will conversely not get any of the application's benefits—for example, they may not be able to sync data.</p> 98 <p>If a device contains multiple enabled admin applications, the strictest policy i [all...] |
/cts/apps/CtsVerifier/res/xml/ |
device_admin.xml | 16 <device-admin xmlns:android="http://schemas.android.com/apk/res/android"> 25 </device-admin>
|
device_admin_byod.xml | 18 <device-admin xmlns:android="http://schemas.android.com/apk/res/android"> 23 </device-admin>
|
sensor_device_admin.xml | 16 <device-admin xmlns:android="http://schemas.android.com/apk/res/android"> 20 </device-admin>
|
/cts/hostsidetests/devicepolicy/app/ManagedProfile/res/xml/ |
device_admin.xml | 15 <device-admin xmlns:android="http://schemas.android.com/apk/res/android" android:visible="false"> 19 </device-admin>
|