Home | History | Annotate | Download | only in work
      1 page.title=Android for Work Developer Guide
      2 page.tags="work", "android for work", "afw", "developer", "android"
      3 page.metaDescription=Android for Work provides organizations with a secure, flexible, and unified Android mobility platform combining devices, applications, and management.
      4 page.image=images/work/cards/android-studio_600px.png
      5 
      6 @jd:body
      7 
      8 <div id="qv-wrapper">
      9   <div id="qv">
     10     <h2>In this document</h2>
     11     <ul>
     12       <li><a href="#managed-profiles">Managed Profiles</a></li>
     13       <li><a href="#managed-configurations">Implementing Managed Configurations</a></li>
     14       <li><a href="#cosu">COSU Devices</a></li>
     15       <li><a href="#sso">Set up Single Sign-on with Chrome Custom Tabs</a></li>
     16       <li><a href="#testing">Test Your App</a></li>
     17     </ul>
     18   </div>
     19 </div>
     20 
     21 <p>
     22   Android for Work provides organizations with a secure, flexible, and
     23   unified Android mobility platformcombining devices, applications,
     24   and management. By default, Android apps are compatible with Android
     25   for Work. However, there are additional features you can use to make
     26   your Android app work best on a managed device:
     27 </p>
     28 
     29 <ul>
     30   <li>
     31     <a href="#managed-profiles">Managed profile compatibility</a>Modify your Android
     32     app so it functions best on an Android device with a work profile.
     33   </li>
     34   <li>
     35     <a href="#managed-configurations">Managed configurations</a>Modify
     36     your app to allow IT administrators the option to specify custom
     37     settings for your apps.
     38   </li>
     39   <li>
     40     <a href="#cosu">Corporate-owned, single-use (COSU)</a>Optimize your
     41     app so that it can be deployed on an Android device as a kiosk.
     42   </li>
     43   <li>
     44     <a href="#sso">Single Sign-On (SSO)</a>Simplify the sign-on process
     45     for users signing in to different apps on their Android device
     46     running Android for Work.
     47   </li>
     48 </ul>
     49 
     50 <h3>Prerequisites</h3>
     51 
     52 <ol>
     53   <li>Youve created an Android app.</li>
     54   <li>Youre ready to modify your app so that it works best with
     55     Android for Work.</li>
     56   <li>Minimum version: Android 5.0 Lollipop recommended version:
     57     Android 6.0 Marshmallow and later.</li>
     58 </ol>
     59 
     60 <p>
     61   <strong>Note:</strong> Android for Work functions natively on most
     62   Android 5.0 devices; however, Android 6.0 and later offers
     63   additional features for Android for Work, especially with regard to
     64   COSU.
     65 </p>
     66 
     67 <h2 id="managed-profiles">Manage Profiles</h2>
     68 
     69 <p>
     70   You can manage a users business data and applications through a
     71   work profile. A work profile is a managed corporate profile
     72   associated with the primary user account on an Android device. A
     73   work profile securely isolates work apps and data from personal apps
     74   and data. This work profile is in a separate container from the
     75   personal profile, which your user controls. These separate profiles
     76   allow organizations to manage the business data they care about, but
     77   leave everything else on a users device under the users control.
     78   For a deep dive into best practices, see the
     79   <a href="{@docRoot}work/managed-profiles.html">Set up Managed Profiles</a>
     80   guide. For an overview of those best practices, see below.
     81 </p>
     82 
     83 <h3>Key features of a managed profile</h3>
     84 
     85 <ul>
     86   <li>Separate and secure profile</li>
     87   <li>Google Play for Work for application distribution</li>
     88   <li>Separate badged work applications</li>
     89   <li>Profile-only management capabilities controlled by an administrator</li>
     90 </ul>
     91 
     92 <h3>Managed profile benefits on Android 5.0+</h3>
     93 
     94 <ul>
     95   <li>Full device encryption</li>
     96   <li>One Android application package (APK) for both profiles when
     97     theres a personal profile and a work profile present on the device</li>
     98   <li><a href="https://support.google.com/work/android/answer/6192678"
     99       >Device policy controller</a> (DPC) is limited to the managed profile</li>
    100   <li>Device administration via the
    101     <a href="{@docRoot}reference/android/app/admin/DevicePolicyManager.html"
    102     >DevicePolicyManager</a> class</li>
    103 </ul>
    104 
    105 <h3>Considerations for managed profiles</h3>
    106 <ul>
    107   <li>The Android system prevents intents
    108     <a href="{@docRoot}reference/android/app/admin/DevicePolicyManager.html#clearCrossProfileIntentFilters(android.content.ComponentName)"
    109     >from crossing profiles</a> and IT administrators can
    110     <a href="{@docRoot}reference/android/app/admin/DevicePolicyManager.html#enableSystemApp(android.content.ComponentName,%20java.lang.String)"
    111     >enable or disable system apps</a>.</li>
    112   <li>A file path (Uniform Resource Identifier [URI]) thats valid on
    113     one profile may not be valid on the other.</li>
    114 </ul>
    115 
    116 <h3>Prevent intents from failing between profiles</h3>
    117 <p>
    118   Its difficult to know which intents can cross between profiles, and
    119   which ones are blocked. The only way to know for sure is by testing.
    120   Before your app starts an activity, you should verify that the
    121   request is resolved by calling
    122   <a href="{@docRoot}reference/android/content/Intent.html#resolveActivity(android.content.pm.PackageManager)"
    123   ><code>Intent.resolveActivity()</code></a>.
    124   <ul>
    125     <li>If it returns <code>null</code>, the request doesnt resolve.</li>
    126     <li>If it returns something, it shows that the intent resolves,
    127       and its safe to send the intent.</li>
    128   </ul>
    129 </p>
    130 <p>
    131   <strong>Note</strong>: For detailed testing instructions, see
    132   <a href="{@docRoot}work/managed-profiles.html#prevent_failed_intents"
    133   >Prevent Failed Intents</a>.
    134 </p>
    135 
    136 <h3>Share files across profiles</h3>
    137 <p>
    138   Some developers use URIs to mark file paths in Android. However,
    139   with Android for Work, because there are separate profiles, we
    140   recommend:
    141 </p>
    142 
    143 <table>
    144   <tr>
    145     <td style="white-space:nowrap;">
    146       <strong>Use:</strong><br/>
    147       Content URIs
    148     </td>
    149     <td>
    150       <ul>
    151         <li>
    152           The <a href="{@docRoot}reference/android/content/ContentUris.html"
    153           >content URIs</a> contain the authority, path, and ID for a
    154           specific file. You can generate this using
    155           <a href="{@docRoot}reference/android/support/v4/content/FileProvider.html"
    156           >FileProvider</a> subclass.
    157           <a href="{@docRoot}training/secure-file-sharing/index.html">Learn more</a>
    158         </li>
    159         <li>
    160           Share and grant permissions to access the content URI using
    161           an Intent. Permissions can only be passed across the profile
    162           boundary using Intents. If you grant another app access rights
    163           to your file using
    164           <a href="{@docRoot}reference/android/content/Context.html#grantUriPermission(java.lang.String,%20android.net.Uri,%20int)"
    165           ><code>Context.grantUriPermission()</code></a>, it only is granted for
    166           that app in the same profile.</li>
    167       </ul>
    168     </td>
    169   </tr>
    170   <tr>
    171     <td style="white-space:nowrap;">
    172       <strong>Don't use:</strong><br/>
    173       File URI
    174     </td>
    175     <td>
    176       <ul>
    177         <li>Contains the absolute path of the file on the devices
    178           storage.</li>
    179         <li>A file path URI thats valid on one profile isnt valid on
    180           the other.</li>
    181         <li>If you attach a file URI to an intent, a handler is unable
    182           to access the file in another profile.</li>
    183       </ul>
    184     </td>
    185   </tr>
    186 </table>
    187 
    188 <p>
    189   <strong>Next steps</strong>: Once your app supports managed
    190   profiles, test it in a work profile. See
    191   <a href="#testing">Test your app with Android for Work</a>.
    192 </p>
    193 
    194 <h2 id="managed-configurations">Implementing Managed Configurations</h2>
    195 
    196 <p>
    197   Managed configurations are a set of instructions that IT administrators
    198   can use to manage their users mobile devices in a specific way.
    199   These instructions are universal and work across any EMM, allowing
    200   administrators to remotely configure applications on their users
    201   phones.
    202 </p>
    203 
    204 <p>
    205   If youre developing apps for business or government, you may need
    206   to satisfy your industrys specific set of requirements. Using
    207   managed configurations, the IT administrator can remotely specify
    208   settings and enforce policies for their users Android apps; for
    209   example:
    210 </p>
    211 
    212 <ul>
    213   <li>Configure if an app can sync data via cellular/3G, or only Wi-Fi</li>
    214   <li>Whitelist or blacklist URLs on a web browser</li>
    215   <li>Configure an app's email settings</li>
    216   <li>Enable or disable printing</li>
    217   <li>Manage bookmarks</li>
    218 </ul>
    219 
    220 <h3>Best practices for implementing managed configurations</h3>
    221 
    222 <p>
    223   The <a href="{@docRoot}work/managed-configurations.html">Set up Managed Configurations</a>
    224   guide is the key source for information on how to build and deploy
    225   managed configurations. After youve reviewed this documentation, see
    226   recommendations below for additional guidance.
    227 </p>
    228 
    229 <h4>When first launching the app</h4>
    230 <p>
    231   As soon as you launch an application, you can see if managed
    232   configurations are already set for this app in <code>onStart()</code> or
    233   <code>onResume()</code>. Additionally, you can find out if your
    234   application is managed or unmanaged. For example, if
    235   <a href="{@docRoot}reference/android/content/RestrictionsManager.html#getApplicationRestrictions()"
    236   ><code>getApplicationRestrictions()</code></a> returns:
    237   <ul>
    238     <li><strong>A set of application-specific restrictions</strong>You
    239       can configure the managed configurations silently (without requiring
    240       user input).</li>
    241     <li><strong>An empty bundle</strong>Your application acts like
    242       its unmanaged (for example, how the app behaves in a personal
    243       profile).</li>
    244     <li><strong>A bundle with a single key value pair with
    245       <a href="{@docRoot}reference/android/os/UserManager.html#KEY_RESTRICTIONS_PENDING"
    246       ><code>KEY_RESTRICTIONS_PENDING</code></a> set to true</strong>your
    247       application is being managed, but the DPC isnt configured
    248       correctly. You should block this user from your app, and direct
    249       them to their IT administrator.</li>
    250   </ul>
    251 </p>
    252 
    253 <h4>Listen for changes to managed configurations</h4>
    254 <p>
    255   IT administrators can change managed configurations and what
    256   policies they want to enforce on their users at any time. Because of
    257   this, we recommend you ensure that your app can accept new
    258   restrictions for your managed configuration as follows:
    259 </p>
    260 
    261 <ul>
    262   <li><strong>Fetch restrictions on launch</strong>Your app should
    263     call <code>getApplicationRestrictions()</code> in <code>onStart()</code>
    264     and <code>onResume()</code>, and compare against old restrictions
    265     to see if changes are required.</li>
    266   <li><strong>Listen while running</strong>Dynamically register
    267     <a href="{@docRoot}reference/android/content/Intent.html#ACTION_APPLICATION_RESTRICTIONS_CHANGED"
    268     ><code>ACTION_APPLICATION_RESTRICTIONS_CHANGED</code></a> in your
    269     running activities or services, after youve checked for new
    270     restrictions. This intent is sent only to listeners that are
    271     dynamically registered, and not to listeners declared in the app
    272     manifest.</li>
    273   <li><strong>Unregister while not running</strong>In <code>onPause()</code>,
    274     you should unregister for the broadcast of
    275     <code>ACTION_APPLICATION_RESTRICTIONS_CHANGED</code>.</li>
    276 </ul>
    277 
    278 <h2 id="cosu">COSU Devices</h2>
    279 
    280 <p>
    281   Corporate-owned, single-use devices (COSU) are kiosk devices used
    282   for a single purpose, such as digital signage displays, ticket
    283   printing kiosks, or checkout registers.
    284 </p>
    285 <p>
    286   When an Android device is configured as a COSU device, the user sees
    287   an application locked to the screen with no Home or Recent Apps
    288   buttons to escape the app. COSU can also be configured to show a set
    289   of applications, such as a library kiosk with an app for the library
    290   catalog and a web browser.
    291 </p>
    292 <p>
    293   For instructions, see
    294   <a href="{@docRoot}work/cosu.html">Set up Single-Purpose Devices</a>.
    295 </p>
    296 
    297 <h2 id="sso">Set up Single Sign-on with Chrome Custom Tabs</h2>
    298 
    299 <p>
    300   Enterprise users often have multiple apps on their device, and they
    301   prefer to sign in once to access all of their work applications.
    302   Typically, users sign in through a
    303   <a href="https://developer.chrome.com/multidevice/webview/overview">WebView</a>;
    304   however, there are a couple reasons why this isnt ideal:
    305 </p>
    306 <ol>
    307   <li>
    308     Users often need to sign in multiple times with the same
    309     credentials. The WebView solution often isnt a true Single
    310     Sign-On (SSO) experience.
    311   </li>
    312   <li>
    313     There can be security risks, including malicious applications
    314     inspecting cookies or injecting JavaScript to access a users
    315     credentials. Even trusted developers are at risk if they rely on
    316     potentially malicious third-party SDKs.
    317   </li>
    318 </ol>
    319 
    320 <p>
    321   A solution to both problems is to authenticate users using browser
    322   Custom Tabs, instead of WebView. This ensures that authentication:
    323 </p>
    324 <ul>
    325   <li>
    326     Occurs in a secure context (the system browser) where the host app
    327     cannot inspect contents.
    328   </li>
    329   <li>
    330     Has a shared cookie state, ensuring the user has to sign in only
    331     once.
    332   </li>
    333 </ul>
    334 
    335 <h3>Requirements</h3>
    336 
    337 <p>
    338   <a href="https://developer.android.com/topic/libraries/support-library/features.html#custom-tabs"
    339   >Custom Tabs</a> are supported back to API level 15 (Android 4.0.3).
    340   To use Custom Tabs you need a supported browser, such as Chrome.
    341   Chrome 45 and later implement this feature as
    342   <a href="https://developer.chrome.com/multidevice/android/customtabs">Chrome Custom Tabs</a>.
    343 </p>
    344 
    345 <h3>How do I implement SSO with Custom Tabs?</h3>
    346 
    347 <p>
    348   Google has open sourced an OAuth client library that uses Custom
    349   Tabs, contributing it to the OpenID Connect working group of the
    350   OpenID Foundation. To set up Custom Tabs for SSO with the
    351   AppAuth library, see the <a href="https://github.com/openid/AppAuth-Android"
    352   >documentation and sample code on GitHub</a>, or try
    353   <a href="https://codelabs.developers.google.com/codelabs/appauth-android-codelab/"
    354   >the codelab</a>.
    355 </p>
    356 
    357 <h2 id="testing">Test your App with Android for Work</h2>
    358 
    359 <p>
    360   Once youve developed your app, youll want to test it in a work
    361   profileboth as a profile owner and device owner. See the
    362   instructions below.
    363 </p>
    364 
    365 <h3>Use TestDPC to test your Android app</h3>
    366 
    367 <p>
    368   TestDPC is a tool you can use to test your Android app in a variety
    369   of Android for Work environments. You can configure it as a profile
    370   owner or a device owner to launch management APIs on your device,
    371   using one of these methods:
    372 </p>
    373 <ul>
    374   <li>Download the source code for TestDPC from
    375     <a href="https://github.com/googlesamples/android-testdpc">GitHub</a>.</li>
    376   <li>Install TestDPC directly from
    377     <a href="https://play.google.com/store/apps/details?id=com.afwsamples.testdpc"
    378     >Google Play</a>.</li>
    379 </ul>
    380 <p>
    381   For more information on how to configure TestDPC, see the
    382   instructions below and the
    383   <a href="https://github.com/googlesamples/android-testdpc">TestDPC User Guide</a>.
    384 </p>
    385 
    386 <p>
    387   <strong>REQUIRED</strong>: Your test Android device needs to run
    388   Android 5.0 or later and be able to natively support Android for Work.
    389 </p>
    390 
    391 <h3>Provision a profile owner</h3>
    392 
    393 <p>
    394   To test your app in a work profile, you need to first provision a
    395   profile owner on the TestDPC app:
    396 </p>
    397 
    398 <ol>
    399   <li>Launch the TestDPC app and click <strong>Set up profile</strong>.</li>
    400   <li>When prompted, click <strong>Set up</strong>, ensuring the
    401     TestDPCs logo is highlighted on the screen.</li>
    402   <li>If your device isnt encrypted, you need to encrypt your device.
    403     Follow the briefcase notification after reboot to continue
    404     provisioning.<br/>
    405     Once youve provisioned the profile owner correctly, badged
    406     applications appear at the end of your app tray. Install your app
    407     on the device and test to see how it runs in the work profile.
    408   </li>
    409   <li>
    410     Install your app on the device and test to see how it runs in the
    411     work profile.
    412   </li>
    413 </ol>
    414 
    415 <h3>Provision a device owner</h3>
    416 
    417 <p>
    418   Testing your app as a device owner requires more steps than testing
    419   as a profile owner. You first need to provision the device owner on
    420   your test device using the
    421   <a href="{@docRoot}samples/NfcProvisioning/index.html"
    422   >NfcProvisioning sample app</a>. For complete instructions to
    423   provision TestDPC in device owner mode using the NfcProvisioning
    424   app, see the <a href="https://github.com/googlesamples/android-testdpc"
    425   >TestDPC User Guide</a>.
    426 </p>
    427 
    428 <ol>
    429   <li>Download the <a href="{@docRoot}samples/NfcProvisioning/index.html"
    430     >NfcProvisioning</a> app sample files to your development environment.</li>
    431   <li>Unpack the project, open your shell, and <code>cd</code> to the project directory.</li>
    432   <li>Add a file to the directory with the <code>local.properties</code> name
    433     and the following content:
    434     <pre>sdk.dir=/path/to/your/android/sdk</pre>
    435   </li>
    436   <li>While in the project directory, enter these commands to build the NfcProvisioning APK:
    437     <pre>./gradlew init
    438 ./gradlew build</pre>
    439     The NfcProvisioning APK you need is now located in <code>./Application/build/outputs/apk</code>.
    440   </li>
    441   <li>Install the APK on your programmer device, which you can use to provision other devices.</li>
    442   <li>Create a text file called <code>nfcprovisioning.txt</code> and
    443     include the following information:
    444     <pre>android.app.extra.PROVISIONING_DEVICE_ADMIN_PACKAGE_NAME=com.afwsamples.testdpc
    445 android.app.extra.PROVISIONING_DEVICE_ADMIN_PACKAGE_DOWNLOAD_LOCATION=https://testdpc-latest-apk.appspot.com
    446 android.app.extra.PROVISIONING_DEVICE_ADMIN_SIGNATURE_CHECKSUM=gJD2YwtOiWJHkSMkkIfLRlj-quNqG1fb6v100QmzM9w=
    447 # note: checksum must be URL-safe
    448 android.app.extra.PROVISIONING_LOCALE=en_US
    449 android.app.extra.PROVISIONING_TIME_ZONE=America/New_York</pre>
    450     <p>
    451       <strong>Note:</strong> If youre developing for Android 5.0
    452       Lollipop, see the instructions in the
    453       <a href="https://github.com/googlesamples/android-testdpc"
    454       >TestDPC User Guide</a>.
    455     </p>
    456   </li>
    457   <li>Push that text file to your programmer device by entering:
    458     <pre>adb push &lt;path-to-nfcprovisioning.txt&gt; /sdcard/</pre>
    459   </li>
    460   <li>
    461     Ensure that the programmer device is connected to Wi-Fi on either
    462     an unsecured or WPA2 secured network.
    463     <p>
    464       The NFC Provisioning app will automatically pass those Wi-Fi
    465       credentials onto the target device.
    466     </p>
    467   </li>
    468   <li>Open the NFC Provisioning app and ensure <code>com.google.android.testdpc</code>
    469     is auto-populated.</li>
    470   <li>Bump the devices to transfer the data.</li>
    471   <li>Follow the onscreen instructions to set up your target device.</li>
    472   <li>Once youve completed provisioning the device owner, you can test your app on that device. You
    473     should specifically test how
    474     <a href="{@docRoot}work/managed-configurations.html">managed configurations</a>,
    475     <a href="{@docRoot}work/managed-profiles.html#sharing_files">URIs</a>, and
    476     <a href="{@docRoot}work/managed-profiles.html#prevent_failed_intents">intents</a>
    477     work on that device.</li>
    478 </ol>
    479 
    480 <h3>End-to-end testing</h3>
    481 
    482 <p>
    483   After youve finished testing your app in the environments above,
    484   youll likely want to test your app in an end-to-end production
    485   environment. This process includes the steps a customer needs to
    486   take to deploy your app in their organization, including:
    487 </p>
    488 
    489 <ul>
    490   <li>App distribution through Play</li>
    491   <li>Server-side managed configuration</li>
    492   <li>Server-side profile policy control</li>
    493 </ul>
    494 
    495 <p>
    496   You need to access an EMM console to complete the end-to-end
    497   testing. The easiest way to get one is to request a testing console
    498   from your EMM. Once you have access, complete these tasks:
    499 </p>
    500 
    501 <ol>
    502   <li>Create a test version of your application with a
    503     <a href="http://tools.android.com/tech-docs/new-build-system/applicationid-vs-packagename"
    504     >new ApplicationId</a>.</li>
    505   <li>Claim a <a href="https://support.google.com/work/android/answer/6174056"
    506     >managed Google domain</a> and bind it to your EMM. If you
    507     already have a testing domain thats bound to an EMM, you may need
    508     to unbind it to test it with your preferred EMM. Please consult your
    509     EMM for the specific unbinding steps.</li>
    510   <li><a href="https://support.google.com/a/answer/2494992"
    511     >Publish your application to the private channel</a> for their
    512     managed Google domain.</li>
    513   <li>Use the EMM console and EMM application to:
    514     <ol>
    515       <li>Set up work devices.</li>
    516       <li>Distribute your application.</li>
    517       <li>Set managed configuration.</li>
    518       <li>Set device policies.</li>
    519     </ol>
    520 </ol>
    521 
    522 <p>
    523   This process will differ based on your EMM. Please consult your
    524   EMMs documentation for further details. Congrats! Youve completed
    525   these steps and verified that your app works well with Android for
    526   Work.
    527 </p>
    528 
    529 <p>
    530   <a href="https://www.google.com/work/android/developers/applyDevHub/">
    531     <span class="dac-sprite dac-auto-chevron"></span>
    532     Learn about the Android for Work DevHub.
    533   </a>
    534 </p>
    535