Android 15 launched officially for Pixel on October 15th.
I've been running through standard enterprise validation, ensuring to include the new Private Space feature given its cohabitation with enterprise functionality, and unlike Pixels of yonder, the enterprise functionality this year has led to more than one eyebrow raise.
If you're deploying Pixel 9 with Android 15 to your estate, here are some (non-exhaustive) issues to be aware of:
Unless otherwise stated, the issues described below have only been replicated on my Pixel 9 XL Pro. Other devices running Android 15 may be fine.
Undertake your own testing accordingly, and feel free to get in touch with feedback!
During the provisioning and setup flow, users are deferred to the setup wizard to add a personal account and set up their device normally. After the PAI screen offering Googles suite of applications, setup completes and apps begin installing & updating.
On update, both Pixel Studio and Pixel Screenshots find their way into the managed work profile. This is despite neither app being in the PAI list, they appear to update shortly after setup completes, and the act of updating is what triggers their arrival within the work profile.
Via policy the following also has no effect on the appearance of these apps within the profile:
{
"packageName": "com.google.android.apps.pixel.agent",
"installType": "BLOCKED"
},
{
"packageName": "com.google.android.apps.pixel.creativeassistant",
"installType": "BLOCKED"
}
It's unusual to see apps pop into the profile after provisioning, which suggests to me the vital apps config isn't to blame directly, but nonetheless, a configuration somewhere is leading to this:
For further clarity, updating these apps manually from Google Play after setup, if automatic setup is skipped/stopped for example, will result in the same behaviour. This confirms to me, it is the act of pushing a new version of the app to devices, as until that happens these apps remain where they belong, in the parent profile.
As of December 9th, this has been fixed by Android engineering
One affecting me directly as I spend more time adding delegated admin features to PACKAGE SEARCH and MANAGED INFO, it's seemingly not possible to fetch managed scopes from within the work profile in 15. I've tested this again in the company-owned work profile and personally-owned work profile deployment scenario. When calling:
val dpm = context.getSystemService(Context.DEVICE_POLICY_SERVICE) as DevicePolicyManager
val delegatedScopes = dpm.getDelegatedScopes(null, context.packageName)
The expected response if a scope has been delegated is [CERT_INSTALL]
(for example). What returns instead is []
.
In testing on a Pixel 6 Pro running Android 14, I faced no issue from within the work profile. Likewise on 15 this works perfectly fine from the parent profile, in a fully managed deployment scenario. It also works fine on the Pixel 6 Pro when updated to 15 as a company-owned device, but I can replicate it on personally-owned (BYOD), so it's something of an inconsistent one. Below are two Pixels, one on 14 and one on 15 leveraging the exact same policy as a company-owned work profile device:
Nothing I'm aware of just yet.
This has been escalated to Android engineering.
After enrolment - once more in both company-owned work profile and personally-owned work profile deployment scenarios - applications appear to be vanishing:
In my testing, the application may return at a later point, but it risks disappearance once more when the policy updates.
The replication steps, if the video isn't your cup of tea, are:
Here's the policy deployed, this is via AMAPI:
{
"name": "enterprises/LC01qtbcq4/policies/missingapps",
"version": "1",
"applications": [
{
"packageName": "org.bayton.managedinfo",
"installType": "FORCE_INSTALLED",
"managedConfiguration": {
"customisation_settings": {
"organisation_id": "testytesty",
"enable_device_identifiers": true
}
},
"delegatedScopes": [
"CERT_INSTALL"
]
},
{
"packageName": "com.google.android.apps.pixel.agent",
"installType": "BLOCKED"
},
{
"packageName": "com.google.android.apps.pixel.creativeassistant",
"installType": "BLOCKED"
},
{
"packageName": "org.bayton.packagesearch",
"installType": "FORCE_INSTALLED",
"delegatedScopes": [
"MANAGED_CONFIGURATIONS"
],
"userControlSettings": "USER_CONTROL_DISALLOWED"
}
],
"defaultPermissionPolicy": "GRANT",
"playStoreMode": "WHITELIST",
"advancedSecurityOverrides": {
"untrustedAppsPolicy": "ALLOW_INSTALL_DEVICE_WIDE",
"developerSettings": "DEVELOPER_SETTINGS_ALLOWED"
},
"crossProfilePolicies": {
"crossProfileCopyPaste": "CROSS_PROFILE_COPY_PASTE_ALLOWED",
"crossProfileDataSharing": "CROSS_PROFILE_DATA_SHARING_ALLOWED"
}
}
Of 9 personally-owned work profile and 23 company-owned work profile deployments I've set up testing this, across two different, unique enterprise IDs, this has been consistently replicable.
None I'm aware of at the moment.
This has been escalated to Android Engineering.
Not something I've been able to replicate reliably, but it does appear occasionally the above apps pop up in the Private Space, and they're not supposed to be there. Private Space has no inbuilt functionality for secure calls or messages (though that would be cool, perhaps via dedicated eSIM), and this is confirmed as the applications are mostly non-functional when interacted with.
None I'm aware of.
This has been escalated to Android Engineering.
As of Monday October 28, this has been fixed with a Google Play update
Another COPE issue, the documentation suggests personalUsagePolicies
for personalPlayStoreMode
that define application availability within the parent profile of a company-owned work profile device are also applicable to the Play Store within the Private Space.
In my test case, I have applied personal use policies to my Pixel 9:
"personalUsagePolicies": {
"personalPlayStoreMode": "ALLOWLIST",
"personalApplications": [
{
"packageName": "org.bayton.packagesearch",
"installType": "AVAILABLE"
}
]
},
Unfortunately the policy doesn't apply. This GIF shows the correct application in the personal Play Store, but the Private Space Play Store does not respect the policy applied.
Don't permit Private Space until this is fixed, if this is a concern. This is with Android Engineering, and a Google Play update is expected to resolve this in due course.
It's not unusual to find issues with new releases, and these examples prove yet again the importance of testing and validating all of your organisation's managed device use cases before rolling out a major release or brand-new device.
🛟 For help or guidance, feel free to reach out.