This is already handled with existing permission management capabilities in EMMs, Click here for more details on the change.
Below you’ll find a number of frequently asked questions I receive related to Android Enterprise.
This is already handled with existing permission management capabilities in EMMs, Click here for more details on the change.
Adding accounts allows end-users to head into Settings - Accounts and add an account.
Configure credentials allows an end-user to configure account credentials in-app.
Both options have legitimate uses, for example the adding of accounts and configuring of credentials may be permitted in a COPE deployment as end-users would be allowed to add a Google account and download their own applications complete with personal accounts.
On the other hand, enabling add accounts in a fully managed or work profile deployment scenario would allow end-users to switch to their personal Google account within Google Play, providing full access to the Play Store from which they may install applications which encourage data leakage and raise DLP concerns (Dropbox sat alongside OneDrive, for example).
Restricting Android Device Policy to a single Google Workspace tenant is very straightforward. In your DPC extras, add the line:
{
"android.app.extra.PROVISIONING_ADMIN_EXTRAS_BUNDLE": {
"com.google.android.apps.work.clouddpc.EXTRA_FORCED_DOMAINS": "[\"domain.name\"]"
}
}
If your organisation leans on multiple domains across organisational groups, here's an example of allowlisting 3 domains within the ZT DPC extras for Google Workspace:
{
"android.app.extra.PROVISIONING_ADMIN_EXTRAS_BUNDLE": {
"com.google.android.apps.work.clouddpc.EXTRA_FORCED_DOMAINS": "[\"bayton.org\",\"jason.com\",\"impressivedomain.com\"]"
}
}
When a Google account entered during provisioning doesn't match one of these domains, a small red error will show beneath the text input as follows:
Please enter an email address for one of the following: bayton.org, jason.com, impressivedomain.com.
There is no path to convert a MADA device (GMS/Play Protect certified) to EDLA.
While Google offered a grace period during the introduction of the EDLA licence, this has long since closed. To convert a MADA device to EDLA, it must undergo new EDLA certification, and both SKUs (if >1000 are in market) must be supported for the licence period.
Officially no, these devices are not supported for Android Enterprise. These devices may also be referred to as AOSP, and an excellent example of an uncertified, AOSP device is the Kindle Fire.
Unofficially without GMS certification modern Android devices do allow for limited Android Enterprise management with an EMM that supports closed network or non-GMS management, or a custom DPC that directly interfaces the Device Policy Manager (DPM) APIs on the Android device. Your mileage may vary on what is possible, but assume that account and application based functionality that leans on Google Play services, Google Play, or any other aspect of the GMS suite of applications will not work.
Furthermore, standard provisioning methods will not work, as these are provided by Google's Set Up Wizard (SUW) flow. The only option, unless the AOSP device OEM implements a different solution, is to set an application as a Device Owner (DO) through ADB.
Throughout this site and across Google's official documentation and resources there are multiple references to the bind, or binding of a Google account to an organisation's EMM/MDM platform of choice in order to use Android Enterprise, but what is it?
Android Enterprise consists, very simplistically, of three aspects:
In order to leverage 2 and 3, an enterprise is required. This enterprise is created when an organisation goes through the process of linking a Google account - either via Google Workspace or with a standard consumer Google account (@gmail.com or under an existing email address) - to their EMM.
For the organisation it's a reasonably straightforward sign-in and setup flow (at least for those who don't use Workspace) that'll create an enterprise, which generates the appropriate authentication tokens and assign an enterprise ID to allow the EMM to then handle all account and application management going forward.
What sort of account and application management?
This is a very high-level explanation only, and doesn't cover off the intricacies of things like Play EMM API, AMAPI, differences between Google Workspace and Google accounts, and a multitude of other factors that determine the features and functionality associated with binding for device management.
Android Enterprise was introduced with Android 5.0 Lollipop under the moniker Android for Work.
With that said, very few OEMs originally supported Android Enterprise in the earliest days of its existence; Android Enterprise was not a component of the Android Compatibility Definition Document (CDD) nor did Google throw any significant weight behind it. It is commonly considered a mandatory requirement from Android Marshmallow (6.x) and above, with reasonably universal compatibility almost guaranteed from Android Nougat (7.x).
If considering support for older versions of Android today, AE compatibility should be only one small factor in the decision. Other considerations should include:
No.
While the new signup flow introduced in 2024 now guides administrators towards creating a managed Google Workspace environment, there is no cost to this, and domain validation is optional.
Furthermore, should an organisation choose to opt out of Google Workspace, they can continue creating a bind with a standard Gmail account, and the EMM will create unique and generic managed Google Play service accounts on each Android device that allow sign in to the Google Play Store for application management as it has always been.
The greatest benefit to using a free Google Workspace environment comes from identity, allowing managed devices to authenticate as users in the company domain in order to benefit from user assignment and user-based policies. Google have additionally expanded the signup process to work with Microsoft 365 accounts to tie in automatic external identity management within Google Workspace, removing an additional SSO integration requirement.
I’ve encountered several examples of things not working quite right with AER devices, particularly when diving into the granularity of a specific function with a specific EMM.
The first point of contact for any device based issue would be the EMM vendor. While it may not be an issue which can be replicated on a different model or OEM, the EMM vendor will still investigate it, particularly if it can be replicated on one or more devices of the same model.
Before contacting the EMM, the organisation should ensure the issue can be replicated on more than one device. If so, attempt to collect logs from the EMM, the device (a bug report, though be aware this will collect personal account information also) and steps to replicate it along with all of the normal details – make, model, Android version, build number, etc. A video is always appreciated though do add the steps on paper also.
If the EMM can replicate it but cannot resolve it, they will have OEM contacts to reach out to progress it. If necessary, Google will be involved once all other avenues are exhausted, or it’s determined to be a platform issue.
I do a fair amount of device testing, so if you do come across something and your EMM is not providing the support needed, feel free to reach out and I’ll be happy to help.
Historically this has not been possible. An Android Enterprise ID (organisation ID) is associated with only one EMM at a time, and a Google account can only manage one bind at a time; under all normal circumstances attempting to bind with the same Google account on another EMM will return an error stating an Enterprise already exists.
From mid-2024 however, with the roll-out of Google's new customer signup process designed to bring the enterprise arms of Google Cloud, Google Chrome/ChromeOS, and Android under one domain-managed account, this is no longer a limitation.
With a new, enterprise domain-led bind approach, all organisations binding with their EMMs will be able to create an organisation account associated with a zero-cost managed Google Enterprise domain (think Google Workspace, or perhaps more apt, a Google Cloud Identity tenant). With this approach, once the domain is verified as owned by the organisation, multiple EMMs (or multiple accounts under one EMM) can create as many organisation IDs as desired, and all will be managed under one Google Enterprise console.
For organisations with existing binds to EMMs using a consumer Google/Gmail account, the existing, legacy behaviour still currently applies:
Attempting to bind with the same Google account on another EMM will return an error stating an Enterprise already exists.
It is possible to unbind from one EMM and then bind with another, however this will delete the existing Enterprise and create a brand new one, losing all approved applications, etc.
The only exception to the above is in high availability and/or disaster recovery scenarios where an instance of an EMM may be replicated, but no two EMMs should be generating managed Google Play accounts from the same Google account simultaneously.
Google are expected to support migrations to Google Workspace domains for existing organisations in the future.
Not all Android devices come with GMS, or Google Mobile Services, certification.
What is GMS?
GMS certified devices, or more recently rebranded by Google as Play Protect certified devices, are Android devices that have undergone the 60+ hour testing and approval process with Google or a 3PL lab on Google's behalf. This testing, which consists of various security & compatibility validations, ensure the Android device under test behaves, looks, and feels consistent with the rest of the Android ecosystem. It ensures an OEM doesn't preload harmful (as in malware, but also as in privacy) applications, it ensures the OEM builds are up-to-date on vulnerability management and have patched all known CVEs over 60 days old, and it ensures apps install properly, work consistently, and all ecosystem-wide behaviours and implementations meet Google's strict requirements.
Most of the requirements for an Android device heading to GMS certification can be found through the CDD, or Compatibility Definition Document. This is a public document that outlines every requirement for Android under MUST, SHOULD, and MAY.
If you come across references to CTS, VTS, BTS, STS, GTS, or less generally grouped as "XTS", these are the individual tests that make up the validation & certification process for GMS.
Before putting an Android device through these tests, the OEM must sign an agreement with Google; the GMS - Google Mobile Services - agreement is an additional contract that defines requirements for bundling Google applications on the Android device. Requirements include mandatory and optional Google apps (Google core and Google optional, respectively), home screen layouts, app icon positioning and much more. These requirements are further broken up into regional and use case agreements, such as MADA for most of the world, eMADA for Europe, EDLA for enterprise or non-standard form factors, and others. Each agreement also comes with requirements for longevity, transparency (i.e. period of support for software on a device lifecycle published publicly, etc).
Understandably a lot of this is NDA, so it's not easy to be overly transparent about Google's requirements and processes for certification.
How do I validate a device is GMS certified?
This is surprisingly not that easy to discern for the general public, as Google doesn't explicitly maintain a list of certified devices under the heading of certified devices.
Instead, there are three indirect means of validating devices are certified:
If the OEM/ODM is listed in link 1, there's a reasonable assumption the hardware they provide has certification, since Google leans on OEMs to certify the hardware they make once they're granted an agreement.
But if the device is listed in link 2, you know for sure it's certified. These lists aren't updated daily, so the absence of a device doesn't immediately indicate a device isn't certified.
The caveat for 3 is a device may be whitelisted with Google before getting formal approval, so may not have passed GMS testing just yet. This can be cross-checked with the above links to form a reliable opinion.
Customer signup bind management
When a bind is associated to the customer signup flow introduced in 2024, it is permanently associated with the Google Workspace environment/domain used during the bind setup process.
While bind migration between Google Workspace environments is not currently documented by Google, it is no longer associated to a single Google account, and any user with the appropriate permissions within the Google Workspace tenant is able to manage the bind.
Information on user role management in Google Workspace can be found here, while managing users can be found here.
Legacy bind management
Yes, it is more recently possible to configure the accounts responsible for managing the Android Enterprise organisation (enterprise) ID
Add an account

Adjust permissions

NB: Owners can add and remove other accounts, while Admins are limited to only managing the enterprise. This follows the same permissions model as other enterprise solutions Google offers, such as zero-touch.
Remove an account

Notes
The same recommendations continue to apply when adding new accounts - if you're making a new Google account to add in, please use the "current email address" option and associate the Google account with a work email address. This makes account recovery much simpler, and avoids questions around why emm.account.3@gmail.com exists in future.

In other words, don't do what I did when I bound my EMM to emmsetup@gmail.com back in 2017 (see above).
Note also that Google Workspace accounts are not supported for administering enterprises with the legacy bind management flow. If a Google Workspace user is invited, they will receive an invite only to be informed "G Suite users are not supported":

Perhaps this will be addressed in future, or at the very least engineering will update the message to reflect the Google Workspace branding.
One final point to mention, a Google account can only administer one enterprise. If an invited account is already administering another enterprise, they will see an error:

Yes, on userdebug and engineering builds.
By design, production Play Protect Certified Android builds ship with /system mounted read-only and protected by dm-verity. This ensures the partition can’t be tampered with, maintaining the integrity of the OS. On non-production builds, however, you can temporarily disable verity and remount /system as read-write in order to make changes.
Steps
adb root
adb disable-verity
adb reboot
/system:adb root
adb remount
adb shell
mount -o rw,remount /system
At this point /system is writable and you can make modifications.
adb root
adb enable-verity
adb reboot
Considerations
/system can break the OS or prevent booting, so proceed with caution.This approach is intended for development and testing. For production devices, modifying /system is not supported.
If you see errors similar to:
..or any message similar to the above, this will be due to Google's choice to prevent anyone from using the Android Management API without business justification & approval.
Older projects, those created in early 2025 or prior, may only see this in relation to an unverified project exceeding 500 devices. In all cases the approach to unlock AMAPI for your organisation is to read, accept, and submit a quota increase form via the Permissible Usage page under AMAPI Guides:
https://developers.google.com/android/management/permissible-usage#quotas_and_restrictions
This process can take multiple weeks, so patience is required. It is imperative not to progress with development or engagements prior to approval being given.
Also note, approval for a quota does not mean product verification. Quotas still remain after approval is given. Verification is undertaken through the Android Enterprise Partner Portal.
There are many reasons an application may not be able to install on a device, from compatibility to environmental issues, but this document focuses on policy-induced issues.
Devices managed using Android Enterprise may restrict the ability to install or uninstall applications.
What causes this restriction?
An administrator has enabled one or both of the following restrictions:
When enabled, Android blocks these actions at the system level. This applies to all installation methods, including Google Play, APK files, and third-party app stores. This also includes any EMM-derived app installs or removals.
What will I see as an end user?
The experience varies slightly by Android version and device manufacturer, but commonly includes:
This can appear as a fault, but it is expected behaviour when the policy is active.
Why would an organisation enable this?
These restrictions are what could be considered the nuclear option, and override all other known application restriction policies. It means no matter what policies could be applied, the device will not deviate from the state it was in when the policies were set.
Can I bypass this restriction?
No.
How do I install or remove an app I need?
You’ll need to contact your organisation’s IT administrator or support team. They can:
Is this a bug?
No.
If app installation or removal is blocked, the device is functioning exactly as configured. If the restriction is no longer required, the policy must be updated by the administrator.
Unfortunately this policy is set all too often as a default with the expectation EMM-derived application changes will override this policy. This is not the case.
If in doubt about app install/uninstall issues, validate these restrictions have not been set.
While it’s indeed true Android Enterprise was introduced as Android for Work with Lollipop (and supported even earlier with the app (but we don’t talk about that), Android Enterprise was an opt-in feature with little uptake and a lot of teething issues. From Android Marshmallow (6.0) it became a mandatory requirement.
In other words, Marshmallow is chosen as a reasonably reliable reference point for when Android Enterprise was guaranteed to be widely supported. There will be OEMs that can confidently state they supported it from Day Zero, however few did.
Both Lollipop and Marshmallow are well past end of life. For current deployments, Android 14 should be considered the practical minimum - it is the oldest version still receiving security patches from Google, though some older versions are still actively patched by OEMs directly on certain devices. If you're planning a new deployment, target Android 15 or newer where possible to take advantage of the latest management APIs and security features, while ensuring prolonged security updates and support.
If the Google account used for your Android Enterprise bind is disabled or marked for deletion by Google, the consequences can be severe. Depending on the EMM and the state of the bind, devices may lose access to managed Google Play, app deployment may fail, and new enrolments could be blocked.
This situation most commonly affects organisations using a personal Gmail account (or a standard Google account under a non-Google email address) for their bind. Google may disable these accounts for perceived policy violations - sometimes without clear explanation - and the recovery process can be slow and uncertain.
Why this happens:
What to do if your bind account is disabled:
Contact me if you can't progress, I can see what I can do to help. Ensure you have:
How to prevent this: The recommended approach is to migrate to a managed Google domain (Google Workspace or Cloud Identity). Domain-verified accounts are managed by the organisation rather than subject to consumer account enforcement. This also unlocks the ability to bind with multiple EMMs under one domain.
For more on what the bind is and how it works, see What is the Android Enterprise bind?.
Device Admin (DA) has been deprecated since Android 10 (2019). From Android 15, DA APIs are no longer available for new device activations. Android Enterprise is the only supported path for managing Android devices. If your organisation is still using Device Admin, migration to Android Enterprise should be treated as urgent.
For an in-depth take on this, check out:
Device Admin was introduced with Android 2.2 as a means of granting admin permissions to applications. Any number of admins could sit on a device and have excessive, often unnecessary control. It was widely abused by PHAs (malware, etc) and was very limited in scope of capability, leaving each OEM to build upon it in a fragmented and difficult to support manner.
Android Enterprise takes a more structured approach to device administration by permitting only one owner on a device at a time with scope for task delegation to other apps as defined by the management server. This approach is fundamentally more secure and easier to support as the APIs are universal cross-OEM.
Add in features such as no Google account management, silent app distribution, managed system updates, simple provisioning and streamlined enrolment, and it’s clear why Android Enterprise replaced Device Admin entirely.
What is the bind?
If you're not entirely sure what the Android Enterprise bind is, check out this FAQ.
If you need to unbind from your existing EMM, whether to -
Or any other perfectly valid reason, the steps to follow are straightforward.
Be aware before you delete the bind, that it is not reversible. All devices will be unenrolled, all private applications will be inaccessible, and all data associated with the old enterprise will not be recoverable!
This is a permanent action.
Via your EMM
In the first instance, the simplest course of action is to unbind through your EMM. Here are some current links to this:
Feel free to submit a PR with additional EMM articles!
Some platforms don't support removing the bind through EMM administrative settings. Some platforms, like SOTI, only unbind and don't delete the enterprise ID. This is useful for future rebinding if platforms support it, but otherwise it's another step in the process an organisation is forced to take to fully delete the bind.
Via Google Play admin settings
If the EMM platform doesn't support deleting the bind, or if you no longer have access to the EMM to do so, you can head to Google Play Enterprise admin settings to do so:
Here's a handy GIF that runs through it:

As indicated, the enterprise cannot be deleted with multiple admins present, so if you need to delete it, remove existing admins first.
With the bind removed, you're now ready to re-use the account to create a new bind with your existing or alternative EMM provider.
Yes, but with important limitations.
Google supports migrating devices from a custom DPC (using the Play EMM API) to the Android Management API (AMAPI) without requiring a factory reset. This is done through the AMAPI SDK's DPC migration functionality.
Prerequisites:
Key limitations:
How it works:
Notable example: Microsoft Intune completed its migration of Android personally-owned work profiles to AMAPI, with corporate-owned migrations following.
For more context on how DPC migration works and what to expect, see AMAPI publicly adds support for DPC migration.
From Android 15 it is possible to configure and deploy eSIM profiles, both full and partial, to Android devices.
Where a partial eSIM profile is deployed, it needs only a pointer to the relevant SM-DP+ server to fetch the full configuration.
For company owned devices - fully managed and work profile - it is possible to deploy configurations and prevent their removal. For personally-owned work profiles, configurations can be pushed, but end-users have the ability to remove the eSIM themselves.
Android 16 enhancements:
userInitiatedAddEsimSettings policy on company-owned devices (Android 15+)Note that on Android 16+, when a work profile is removed from a personally-owned device, managed eSIM profiles are always wiped regardless of other policy settings.
Advanced Protection is a device-level security mode introduced with Android 16. It bundles a broad set of hardened security settings behind a single toggle in Settings > Security & Privacy, and is designed for users at higher risk of targeted attacks - journalists, executives, activists, and similar.
When enabled, Advanced Protection activates the following protections:
This is distinct from the existing Google Advanced Protection Program (APP), which is an account-level security programme requiring hardware security keys. The Android 16 Advanced Protection mode is a device-level feature that does not require APP enrolment, and is available to any user on a supported device.
As of early 2026, Advanced Protection cannot be enforced or configured centrally by IT administrators through AMAPI. There is no policy field in the Android Management API to toggle it on or off. It must be activated individually by the end user on each device.
Google does provide the AdvancedProtectionManager API, which allows applications to query whether Advanced Protection is enabled and register callbacks for state changes. This means an EMM or compliance app could detect whether a user has enabled it and take action accordingly - for example, flagging non-compliant devices or gating access to sensitive resources - but it cannot enforce activation.
Many of the individual protections that Advanced Protection bundles are already available as separate AMAPI policies. For example, admins can already block sideloading (installUnknownSourcesDisabled), enforce Play Protect, restrict USB access, and manage system updates independently. What Advanced Protection offers is a user-facing shortcut that activates all of these at once, plus protections like MTE and intrusion logging that are not individually exposed through management APIs.
If Google exposes Advanced Protection as a manageable policy through AMAPI in a future feature drop, administrators could set a single security baseline rather than configuring dozens of individual restrictions. This would be a meaningful simplification for high-security deployments. For now, organisations that want these protections enforced should continue configuring the individual policies available through their EMM.
Device Trust from Android Enterprise is a set of verified device signals that Google provides to registered security and identity partners. It is accessed through the AMAPI SDK (v1.3.0+) and offers over 20 signals covering device state, configuration, and compliance posture.
Key characteristics:
Device Trust is distinct from Play Integrity. Play Integrity is a general-purpose API available to any app developer for verifying device and app integrity. Device Trust is specifically designed for enterprise security and identity providers that need granular posture data to inform access decisions.
Google recommends running Play Integrity checks before relying on Device Trust signals. If a device fails Play Integrity, the signals reported through Device Trust should not be considered reliable, as the device itself cannot be trusted.
Current integration partners include CrowdStrike, Okta, Omnissa, Urmobo, and Zimperium, among others (including me!).
For a hands-on look at how Device Trust works, see Device Trust from Android Enterprise: What it is and how it works.
Android Enterprise is not officially supported in mainland China due to restrictions on Google services, which affects essential functionalities such as account management, app distribution, and in-built security services. In fact, there are multiple countries not officially supported.
For organisations operating in these countries, leveraging existing solutions that support AOSP or closed-network enrolment can be a viable alternative. Solutions like Workspace ONE UEM and Microsoft Intune offer support for these approaches. Notably a considerable amount of management capability will be lost without full Android Enterprise management, leaving only on-device API support (restrictions) or any value-adds the respective platforms offer atop this, such as APK deployment.
It is worth noting that Chinese OEMs such as Xiaomi, Oppo, and Vivo ship different ROM variants for domestic and global markets. Global ROM variants (sold outside of mainland China) typically include GMS and support Android Enterprise. Domestic ROM variants sold within China do not include GMS and therefore do not support Android Enterprise. If sourcing devices from these OEMs, confirm whether the device ships with a global or domestic ROM before planning an Android Enterprise deployment.
There is no single best EMM for every organisation. The right choice depends on existing infrastructure, budget, platform mix, and the deployment scenarios required. Here are the key considerations:
Google validates EMM solutions through the Android Enterprise Recommended programme. AER-validated EMMs have demonstrated support for a standard set of Android Enterprise features. Starting with an AER-validated EMM is sensible, though it is not a guarantee of quality or completeness - see What is Android Enterprise Recommended?.
Android Enterprise devices require access to several Google services in order to provision, receive policies, install applications, and maintain compliance. Organisations operating behind firewalls or with URL-filtering proxies need to ensure the following domains are accessible.
At minimum, devices need access to:
*.google.com - covers Google Play, managed Google Play, account services, and FCM (Firebase Cloud Messaging) for push notifications*.googleapis.com - API endpoints for device management and app distribution*.gstatic.com - static content delivery*.android.com - Android-specific servicesplay.google.com / play.google.com/work - managed Google Play accessaccounts.google.com - authenticationfcm.googleapis.com - push notifications for policy deliveryGoogle maintains the full and current list of required endpoints in the Android Enterprise network requirements support article.
In addition to the Google endpoints above, your EMM vendor will have their own set of required domains and ports. These vary by vendor and should be confirmed with your EMM documentation. Common examples include:
*.manage.microsoft.com, *.microsoftonline.com, and several others documented by Microsoft*.google.com with narrow allowlisting - some organisations attempt to allowlist only specific Google subdomains. This is fragile, as Google rotates and adds subdomains regularly. The broad *.google.com wildcard is strongly recommendedIf devices are failing to provision or check in, Google provides a connectivity diagnostics guide. Many EMM platforms also include device-level connectivity checks in their diagnostics tools.
MANAGED INFO HUB also has an Android Enterprise connectivity check baked in for app-derived testing of endpoint accessibility.
This question comes up often and isn’t always simple to answer.
Organisations ideally need to understand the use case for the devices to be selected. This could be normal knowledge worker devices for employees needing a corporate phone, something tough (doesn’t need to be rugged) to withstand harsher environments, or something bespoke such as a kiosk on a reception desk used for checking in or something with an integrated printer/scanner.
After this, consider the minimum Android version required for the features the organisation needs. For example, work profile pausing requires Android 14, Private Space requires Android 15, and the latest provisioning improvements require Android 16. More version-specific comparisons are available in considerations when migrating from device administrator to Android Enterprise.
Additionally, consider:
The Android Enterprise partner directory is a good starting point for identifying validated devices. If nothing suits requirements, get in touch and I’ll try to help out!
Identity Check is a security feature introduced with Android 16 that requires biometric authentication for sensitive actions, even if someone has the device PIN or password.
When Identity Check is enabled, actions such as changing passkeys, modifying security settings, or accessing sensitive app data require the device owner's fingerprint or face authentication. A PIN, pattern, or password alone is not sufficient for these actions.
How does this affect enterprise?
For managed devices, Identity Check adds a layer of protection against scenarios where a device PIN is compromised or shared. This is particularly relevant for:
Identity Check can be configured through AMAPI policy on fully managed and corporate-owned work profile devices. Administrators can enforce biometric requirements for sensitive actions without relying solely on the standard screen lock.
This feature is part of Android's broader move towards zero-trust security principles at the device level, complementing existing features like Device Trust signals and hardware-backed attestation.
Android Enterprise supports two management architectures, and they are fundamentally different in how the EMM controls the device.
A custom DPC (Device Policy Controller) is an EMM-developed application that runs on the device and directly calls Android's device management APIs. The EMM builds, maintains, and distributes this app - examples include Omnissa Workspace ONE Intelligent Hub, Ivanti's MDM agent, SOTI MobiControl, and IBM MaaS360.
With a custom DPC, the EMM's own app is the Device Owner or Profile Owner on the device. It receives policy from the EMM server and enforces it locally using DevicePolicyManager and related platform APIs. App distribution is managed through the Google Play EMM API.
This gives the EMM direct control over the enforcement layer, but also means they are responsible for keeping up with Android platform changes, handling compatibility across Android versions, and maintaining the DPC app itself.
With AMAPI, Google provides the on-device management client - Android Device Policy (ADP). The EMM does not build a DPC. Instead, the EMM declares a desired policy state via a REST API, and Google's ADP app on the device enforces it.
The EMM's role shifts from building device-level enforcement logic to managing policy configuration and backend integration. Google handles the on-device agent, platform compatibility, and feature rollout.
AMAPI-based EMMs include Google's own management tools, Microsoft Intune (for BYOD work profiles, with corporate-owned migrations underway), Hexnode, Mosyle, and others. Many traditional custom DPC vendors are also migrating to AMAPI over time.
| Custom DPC | AMAPI | |
|---|---|---|
| On-device agent | EMM-built DPC app | Google's Android Device Policy |
| Policy enforcement | DPC calls Android APIs directly | Google's ADP enforces declared policy |
| Feature availability | Depends on EMM's implementation | Google ships features to ADP directly |
| OEM features | Can call OEM SDK APIs (e.g. Knox SDK) directly | Must use OEMConfig for OEM features |
| App management API | Google Play EMM API | Android Management API |
| New registrations | Closed - Google no longer accepts new custom DPC registrations | Open - the recommended path for new EMM integrations |
Google is actively steering the ecosystem towards AMAPI. New custom DPC registrations are no longer accepted, and significant portions of the Play EMM API were deprecated in September 2021 with a final turn-off date of 30 September 2025.
Existing custom DPC EMMs continue to function and are supported, but organisations should be aware that the long-term direction is AMAPI. Many EMMs now offer both architectures during a transition period.
Devices can be migrated from a custom DPC to AMAPI without a factory reset, provided the EMM supports it.
Yes, fully.
Samsung has supported Android Enterprise since Android 5.0 (Lollipop), offering work profile, fully managed, dedicated, and COPE deployment scenarios through any compatible EMM.
From Android 8.0 and Knox 3.0, Samsung further integrated its Knox management platform with Android Enterprise. The Knox Workspace container, for example, uses the Android Enterprise Profile Owner APIs rather than a proprietary implementation. This means managing a Samsung device through Android Enterprise also gives access to the Knox layer underneath.
Samsung devices support all standard Android Enterprise provisioning methods, including zero-touch enrolment (added in late 2020) and Samsung's own Knox Mobile Enrolment (KME) service. Organisations can use either, though configuring both on the same device is not supported.
KPE extends Android Enterprise with Samsung-specific capabilities - granular hardware controls, advanced networking, kiosk customisation, firmware management, and more. KPE Premium licences are provided at no cost, but they must be activated for KSP policies to take effect.
KPE features are accessed through the Knox Service Plugin (KSP), Samsung's OEMConfig implementation. KSP works with any EMM that supports managed app configurations.
From Android 15, several Knox SDK APIs are restricted to apps running as Device Owner or Profile Owner only. From Android 16, all Knox SDK APIs require the Android Enterprise management framework. Legacy Device Administrator deployments on Samsung devices will lose Knox functionality entirely on Android 16 and later.
Yes. From early 2026, AMAPI supports Access Point Name (APN) management through the apnPolicy setting within DeviceConnectivityManagement. This comes after years of support for custom DPC vendors.
Administrators can define APN configurations that are pushed to company-owned devices. These policy-enforced APNs override any user-configured APNs on the device, ensuring consistent cellular connectivity settings across the fleet.
This is particularly relevant for:
apnPolicy settingBefore this AMAPI addition, APN management was typically achieved through:
The AMAPI approach standardises this across all Android Enterprise-compatible devices running supported Android versions.
From January 2026, AMAPI defaults the enterpriseDisplayNameVisibility setting to ENTERPRISE_DISPLAY_NAME_VISIBLE. This means the enterprise name configured during the Android Enterprise bind setup is now displayed on company-owned devices by default - typically on the lock screen or in device settings.
Previously, the enterprise name was not actively configured, so could result in differing experiences across vendors. The default behaviour change means organisations that never set this policy field are now seeing the enterprise name appear without having made any policy changes.
Through your EMM's AMAPI policy configuration, set enterpriseDisplayNameVisibility to one of:
ENTERPRISE_DISPLAY_NAME_VISIBLE - the enterprise name is shown on the device (now the default)ENTERPRISE_DISPLAY_NAME_NOT_VISIBLE - the enterprise name is hiddenIf the enterprise name shown is incorrect or undesirable, the display name itself is configured at the enterprise level during bind setup and can be updated through the AMAPI enterprises.patch method. This will require a support ticket to your EMM vendor.
This applies to company-owned devices (fully managed and COPE) managed through AMAPI-based EMMs. Personally-owned work profile devices are not affected.
When evaluating Android devices for enterprise deployment, two certification types determine the management capabilities available: GMS (through the MADA agreement) and EDLA.
GMS certification is the standard certification for consumer smartphones and tablets. Devices certified under the MADA (Mobile Application Distribution Agreement) include the full suite of Google apps and services - Play Store, Chrome, Gmail, Maps, and critically for enterprise, Google Play Protect and Android Enterprise support.
GMS-certified devices are listed on the Android website and typically support all Android Enterprise deployment scenarios: fully managed, work profile, COPE, and dedicated device (kiosk). Android Go, Android TV, WearOS, etc aren't obviously included in this, though Android XR should fall under much of the same mandate when it's ready.
EDLA certification is designed for dedicated and enterprise-focused devices that may not suit the typical consumer GMS use case. This includes kiosks, digital signage, ruggedised handhelds, point-of-sale terminals, and other single-purpose devices.
No. As of early 2024, Google Play System Updates (Mainline modules) are no longer controlled by Android Enterprise system update policies.
Previously, the system update policy applied to both OTA system updates and Google Play System Updates. This is no longer the case - Mainline updates now download automatically in the background and install on the next device reboot, regardless of any configured system update policy, freeze period, or maintenance window.
This means:
Administrators can still use compliance policies to check that devices have current Mainline modules installed, but cannot directly control the timing of their installation.
OTA system updates (full Android version upgrades and monthly security patches) continue to respect system update policies as before.
For more details, see Google Play System Updates and Android Enterprise.
By default, all new Google Cloud projects using the Android Management API are allocated a "default" quota of 0 devices per project. This is separate from the API request rate limits covered elsewhere.
What the device quota means
The device quota limits how many devices can be enrolled across all enterprises created under a single Google Cloud project. For most organisations using a commercial EMM, this is managed by the EMM vendor and is not something individual customers need to worry about - the EMM's project quota covers their entire customer base.
When this matters
The quota becomes relevant if you are:
Requesting an increase
To obtain an initial quota, you must apply through Google's partner validation process. This involves demonstrating that your solution meets Google's requirements for an EMM partner. The process is documented in the AMAPI permissible usage page.
Note that quota increases are not automatic and require review. Community reports indicate response times of 7 or more business days, with some requests taking multiple weeks. Plan well ahead if you anticipate scaling beyond the default limit - do not wait until devices are failing to enrol before requesting an increase. Initiating the quota request early in the development or procurement phase avoids enrolment failures during growth.
A managed Google domain is an organisation-owned domain (e.g. company.com) registered with Google and managed through the Google Admin console. It replaces the older managed Google Play Accounts enterprise model, where a personal Gmail address was used to create and administer the Android Enterprise bind.
When Android Enterprise originally launched, organisations could bind using any Gmail account. This was simple but introduced risks:
A managed Google domain addresses all of these. Administration moves to corporate-owned credentials with proper identity governance, and the enterprise can bind multiple EMMs simultaneously - useful for organisations operating across regions or divisions.
Google now directs all new Android Enterprise customers to use a managed Google domain. Existing organisations on the older model are encouraged to upgrade, and Google's 2026 planning guidance lists this as a foundational step.
The upgrade is:
Google provides a guided migration path. Your EMM vendor may also offer specific guidance for the process.
Follow Google's official upgrade guide: Upgrade to managed Google domain
After upgrading, manage your enterprise through the Google Admin console rather than play.google.com/work.
There is no self-service option to rename the managed Google Play organisation name. For managed Google domain enterprises, the organisation name is inherited from the Google Workspace or Cloud Identity domain configuration and must be changed through the Admin console under Account settings. Choose the name carefully before initiating the bind or upgrade.
In early 2026, Google introduced a Model Context Protocol (MCP) server for the Android Management API. This allows AI assistants - including Claude, Gemini, and ChatGPT - to query enterprise device management data through natural language.
What it does
The MCP server exposes a set of tools that AI applications can call to retrieve information from an AMAPI-managed enterprise. These include:
This means an administrator could ask an AI assistant questions like "which devices in my fleet are running an outdated security patch?" or "show me the policy applied to this device group" and receive structured answers pulled directly from the AMAPI backend.
Is it read-only?
The initial release focuses on read-only operations. The tools retrieve and display data but do not modify policies, enrol devices, or push changes. This is a deliberate design choice to allow organisations to experiment with AI-assisted management without risk of unintended configuration changes.
Prerequisites
To use the AMAPI MCP server, you need:
roles/mcp.toolUser) and Android Management User (roles/androidmanagement.user)The server endpoint is https://androidmanagement.googleapis.com/mcp.
Learn more
You can find a full guide with an example product, here.
Why this matters
For larger enterprises, querying device fleet status, auditing policy compliance, and investigating device issues currently requires navigating EMM consoles or writing API calls manually. The MCP integration enables conversational access to this data, which can speed up troubleshooting and compliance reporting.
This is an AMAPI-level feature, not an EMM feature. Organisations using a commercial EMM (Intune, Workspace ONE, etc.) interact with this through their EMM's console, not directly. The MCP server is most relevant to organisations building custom management solutions on AMAPI or those wanting to supplement their EMM's reporting with AI-driven queries.
Android 15 introduced several enterprise-relevant features and behaviour changes that impact device management.
For a full list of enterprise changes, refer to What's new for Android in the enterprise on the Android Developers site, and check out Android 15: What's new for enterprise? for a detailed breakdown.
Conditional access allows organisations to gate access to corporate resources based on whether a device meets defined security and compliance requirements. The concept applies across EMM platforms, though the implementation and terminology varies.
How it works
The EMM evaluates the device against a compliance policy - checking signals such as OS version, security patch level, encryption status, root detection, and Play Protect status. The result (compliant or non-compliant) is shared with the identity provider (such as Microsoft Entra ID, Okta, or Google Workspace), which then permits or blocks access to corporate applications and data accordingly.
Common compliance signals for Android Enterprise
Deployment model considerations
Device Trust
For organisations wanting compliance signals without full EMM enrollment, Device Trust from Android Enterprise provides over 20 device signals accessible via the AMAPI SDK. This enables zero-trust architectures where access decisions are made based on device posture without requiring a work profile or full management.
Best practices
There is no self-service option to rename a managed Google Play organisation after it has been created.
The organisation name set during the Android Enterprise bind is visible in several places:
enterpriseDisplayNameVisibility is enabled (the AMAPI default since January 2026)If the wrong name was entered during bind setup, or the company has rebranded, there is no edit button in any console to change it.
For AMAPI-managed enterprises:
The enterprise display name shown on devices can be updated through the AMAPI enterprises.patch method by setting the enterpriseDisplayName field. This typically requires a support ticket to your EMM vendor, as most EMM consoles do not expose this setting directly.
Note that this changes the display name on devices only - it does not change the underlying organisation name in managed Google Play or the Google Admin console.
It also only applies to new enrolments, so this is a limited option.
For the underlying organisation name:
Choose the organisation name carefully during bind setup. If using a managed Google domain, ensure the domain's organisation name is correct before initiating the Android Enterprise bind, as the name is inherited from the domain configuration.
Android One is effectively dormant. No new devices have launched since a Japan-exclusive Kyocera handset in early 2023, and no OEMs are (from what I've seen) actively developing Android One handsets. This FAQ is retained for historical context. See What is Android One? for the full background.
Android One and Android Enterprise Recommended were two different programmes with some overlap in their focus on security and consistency.
Android Enterprise Recommended is an active validation programme ensuring devices meet Google's minimum enterprise requirements - including hardware specifications appropriate for enterprise use. OEMs must publicly disclose the end date for security update support per device. OEMs maintain their own UIs, bundled apps, and value-adds. Note that Google dropped the mandatory 90-day security update and minimum OS upgrade requirements from the programme several years ago.
Android One went further on the software side. Devices in the programme used a system image developed with Google, offering a near-stock experience with minimal bloat. Security updates were required every 30 days, and devices supported two major OS upgrades - commitments that were stronger than AER at the time.
When combined, the two programmes offered a strong proposition: a clean, fast device with enterprise validation and aggressive update commitments.
In practice, the distinction is now historical. The Android ecosystem has matured significantly since Android One's peak. Leading OEMs like Samsung and Google now ship up to seven years of updates on flagships, with several years of support increasingly common on mid-range devices, making the update advantage Android One once held far less relevant. AER remains the active programme organisations should focus on for device selection, alongside checking the specific OEM's published update commitments for each device model.
AER is Google’s validation programme for devices, EMMs, and MSPs.
Each will have a list of requirements to meet in order to validate, and will re-validate on an annual basis. AER for Carriers was announced in 2018 but was subsequently shelved by Google.
Validated vendors re-validate on an annual basis.
AER is a minimum bar, not a seal of quality. A device being AER-validated means it met the requirements at the time of validation. It does not guarantee:
Organisations should still evaluate devices against their own requirements, ideally through hands-on testing, rather than relying solely on AER status for procurement decisions.
More details: What is Android Enterprise Recommended?
A major Android OS update (such as Android 15 to 16) delivered via OTA is not a factory reset - device management state, profiles, apps, and data all persist through the upgrade. There is no re-enrolment required.
Major version updates can introduce behavioural changes that affect managed devices, even without a re-enrolment:
Google Play System Updates (Mainline modules) are no longer controlled by system update policies. They install automatically regardless of configured freeze periods or maintenance windows. Only traditional OTA updates (OS version upgrades and monthly security patches) respect system update policies. See Are GPSU managed by system update policies?
System update policies apply only to fully managed and dedicated devices. For work profile (BYOD) deployments, the device owner is the end user, and the organisation has no control over when OS updates are installed.
If your organisation uses Google Workspace (or Cloud Identity) and wants to manage Android devices through a third-party EMM, the Workspace side of the setup is straightforward. There are three things to do, and an optional fourth.
Google Workspace includes its own device management - Google Endpoint Management (GEM). This must be turned off for any organisational units that will be managed by the third-party EMM. Not set to Basic - turned off. Basic still applies GEM policies and collects device inventory, which can cause unexpected issues.
Admin Console > Devices > Mobile & endpoints > Settings > Universal > General > Mobile management
Select the target OU, choose Turn off mobile management, and save.
If advanced management remains enabled for the OU, adding a Google Workspace account to a device already managed by a third-party EMM will trigger Google's own work profile setup flow - the user is prompted to install Android Device Policy and set up a work profile. On a device that already has a work profile from the third-party EMM, this cannot complete and leads to errors. If users are seeing unexpected prompts to set up a work profile when signing in with their Workspace account, GEM is almost certainly still enabled for their OU.
The EMM handles this through the standard Android Enterprise signup flow. During setup within the EMM console, the admin is redirected to Google to authenticate with a super administrator account. This creates the enterprise binding - an enterprise ID tied to the managed Google domain. There's no token to copy or code to enter; the EMM orchestrates the process.
Since mid-2024, a single managed Google domain can support multiple EMM bindings, each with its own enterprise ID. This is useful during migrations or where different parts of the organisation use different EMMs.
Once the binding exists, it appears in the Admin Console under:
Admin Console > Devices > Mobile & endpoints > Settings > Third-party integrations > Android EMM
Select the OU and assign the EMM provider. Different OUs can use different EMMs.
In the same section, there is an Authenticate Using Google toggle per EMM provider. When enabled, end users enrolling devices through that EMM are required to sign in with their Google Workspace account during enrolment. This is optional and depends on EMM support.
That's it. The third-party EMM takes over Android Enterprise management for the assigned OUs, and GEM stays out of the way.
If you're migrating from one third-party EMM to another, see the EMM migration guide. Be aware that removing an EMM binding affects the entire domain, not just individual OUs, and may result in managed devices being wiped. Coordinate with your current EMM provider before making changes.
Yes. Google has published Android Enterprise for Android XR documentation, confirming management support for XR headsets and wired glasses.
Management is possible on fully managed devices only. There is no work profile - COPE or BYOD - support. EMMs may use AMAPI or a custom DPC.
The XR validation requirements are adapted from the standard mobile set:
For a detailed analysis including the full feature comparison with mobile validation, see Android Enterprise lands on Android XR.
Yes. On devices and networks that support 5G network slicing, AMAPI can route traffic for specific applications through dedicated enterprise slices rather than the default carrier data path.
A 5G network slice is a logically separate path through the carrier network with its own quality of service, latency, and bandwidth characteristics. An enterprise can subscribe to one or more slices from a participating carrier and configure managed devices to use them.
In AMAPI, this is controlled through two policy fields:
preferentialNetworkService at the policy level enables preferential network service on the devicepreferentialNetworkServiceSettings defines up to five preferential network configurations, each identified as PREFERENTIAL_NETWORK_ID_ONE through PREFERENTIAL_NETWORK_ID_FIVEpreferentialNetworkId on each application policy assigns that application to one of the configured slices. A defaultPreferentialNetworkId can also be set at the policy level for any application that does not specify onePREFERENTIAL_NETWORK_ID_n values and actual carrier slicesAndroid 16 introduces several enterprise-relevant features and policy enhancements. It also marks the shift to a semi-annual release cadence, with a major platform update in Q2 and a smaller feature update in Q4 each year.
Network management
Provisioning and setup
App management
Device information
Security
Large screen behaviour changes
android:screenOrientation, android:resizeableActivity="false", and aspect ratio declarations are ignored on these displaysFor a full list of enterprise changes, refer to What's new for Android in the enterprise on the Android Developers site.
Samsung Knox extends Android Enterprise with additional device management capabilities through the Knox Service Plugin (KSP), an OEMConfig-based application. Understanding how these layers interact is important for avoiding policy conflicts.
Android Enterprise provides a standard set of management APIs that work across all certified Android devices. Samsung Knox adds Samsung-specific APIs on top, accessible through KSP.
When managing Samsung devices, an EMM typically applies:
KSP is deployed as a managed application with managed configurations. The EMM pushes a configuration profile to KSP, which then applies the Samsung-specific policies locally on the device.
Some policies exist in both Android Enterprise and KSP. If the same policy is set in both, the device may not apply them predictably. Common overlap areas include:
Best practice: set each policy in only one place. If a capability is available through both standard Android Enterprise and KSP, choose one and be consistent across your policy set.
KSP supports all Android Enterprise management modes: fully managed, dedicated, personally-owned work profile, and COPE (work profile on company-owned device). All modes require Android 9.0 with Knox 3.2.1 or later. Note that the COPE implementation changed significantly in Android 11 - for Android 9-10 this was "work profile on fully managed device", while Android 11 and later uses "work profile on company-owned device".
If KSP policies are not applying as expected:
verboseMode in the KSP managed configuration to see which policies are deployedFor more on OEMConfig generally, see What is OEMConfig?.
The account type chosen for an Android Enterprise deployment determines how managed Google Play accounts are created, how many devices a single account can serve, and - on Play EMM API-backed platforms - whether an incorrect choice could cap enrolment at ten devices.
This distinction applies to managed Google Play accounts - the Google-account flavour created automatically as part of Android Enterprise enrolment. Google Workspace deployments can avoid the switch entirely by authenticating users with their Workspace identity, but if "authenticate with Google" is disabled, the same managed Google Play account model (and the same device/user choice) applies.
User-based accounts are tied to an EMM user identity. The same managed Google Play account is reused across every device that user enrols, so app entitlements, history, and approvals follow the user from device to device.
Device-based accounts are created per device. Each device gets its own unique, throwaway managed Google Play account with no concept of a human owner. Two devices enrolled "by the same user" receive two completely separate Google accounts.
In practice, most modern deployments default to device-based accounts unless there is a specific reason to preserve per-user Play state.
AMAPI abstracts this decision away from administrators. Managed Google Play accounts are created and destroyed as part of the device provisioning lifecycle, and the user field on the enrolment token is deprecated and ignored - EMMs no longer control account grouping at the API level.
In practice, AMAPI-based EMMs create a fresh per-device account for fully managed and dedicated deployments, and create a single account tied to the named user for BYOD work profile enrolments. The behaviour is determined by the enrolment flow the EMM exposes (corporate-owned vs personally-owned), not by an administrator-facing toggle. Check your EMM's documentation if you need to confirm what it does for a given enrolment type.
Custom DPC / Play EMM API platforms - think older Ivanti EPMM, AirWatch/Omnissa Workspace ONE, MaaS360, and similar - handle this explicitly. The EMM calls Users.insert (or generateAuthenticationToken flows) with an accountIdentifier it chooses, and whether that identifier represents a human user or an ephemeral device account is the EMM's implementation choice. This is where the setting is usually exposed to administrators as a literal "device-based vs user-based" toggle.
When the bind is established with a Google Workspace domain and authenticate with Google is turned on, devices are associated with Workspace user accounts directly. If authenticate with Google is disabled, it follows the path of the approaches listed above.
The 10-device cap also applies here. So be mindful that users may over time need to remove old devices from their Google accounts.
Google has transitioned the root certificate used in Android hardware key attestation chains. This affects any organisation or service that validates attestation certificates from Android devices.
Timeline:
Who is affected?
Any system that validates Android key attestation certificates needs to update its trust store to include the new root. This includes:
What should I do?
The new root certificate is published in Google's key attestation documentation.
Any attestation verification system that did not add the new root before April 10, 2026 will now reject certificates from RKP-enabled devices, which includes most modern Android devices. Both the old and new root certificates are published at https://android.googleapis.com/attestation/root. Older devices with factory-provisioned keys that do not support key rotation will continue using the previous root indefinitely, so trust stores must retain both roots.
Yes, however this process needs to be supported by the EMM. Few EMMs support this today, so it’s important to ask your vendor (or prospective vendor) if this is something you’d like to do.
The process itself will vary, but it may range from a checkbox in a profile to assigning a specific configuration, or simply a change at the folder/org/group level settings the devices sit within.
Once the process begins, affected devices will be prompted by the DPC to begin work profile setup. In this process the DPC will migrate from the parent profile (device) to a work profile. Understandably many legacy profiles/configs/policies will cease to function and so equivalent Android Enterprise policies should be in place.
Android 8-10 – Yes. This is because the DPC sits both in and outside of the work profile normally, and the DPC will collect an app inventory surrounding it. Organisations can opt to disable this within the EMM under a privacy policy, and EMMs may even disable it by default, however do consider there is a privacy consideration when installing personal applications.
Android 11+ – No, this is because in Android 11, work profiles on fully managed devices was deprecated in favour or work profiles on company owned devices. This new deployment scenario aligns the privacy aspect with that of a work profile deployment, because it sort-of is one.
When a device is deployed as a company owned work profile (COPE) or personally owned work profile (BYOD) device, a secondary profile is created on the device known as a work profile. This is where all corporate apps and data reside on the device, and is fully isolated and separately encrypted on the device.
Unless explicitly set, the work profile doesn't have any additional authentication required, allowing an end-user to open work applications on the device as desired.
A work challenge is what Google call the password applied to the work profile that shares most of the same policies associated with a device password policy. It can be applied in the following ways:
Here's an example of a work challenge policy requiring a unique password on a device:

Note the scope above is set to Profile (as in, the work profile). This sets a work profile-specific password policy that has no impact on the parent policy directly.
I say directly, because unless a policy is set mandating a separate work and personal password as pictured above, the end user is able to adopt the work profile password as the device password also, through the device setting Use one lock.
By mandating separate profile passwords, this avoids that.
No.
It is not possible to deploy applications into the parent profile in a personally-owned work profile deployment. This is covered, as well as other aspects of this use case, with considerations when deploying MTD with Android Enterprise.
Yes.
As of 2020, Intune supports work profiles on fully managed devices from Android 8.0. This is because Google’s Android Management API introduced support for the deployment scenario (albeit silently, intentionally avoiding stating as such in its wider Android 11 COPE announcement).
There are a few options available:
Reboot the device and re-enrol as sometimes all it takes is a reboot, and the EMM will prompt its deletion as it provisions the profile once again.
Manually delete the work profile by heading to Settings > Accounts. The work profile will be listed and should be removable here.
Connect the device to ADB if the profile still won’t delete. This requires enabling ADB debugging on the device via Developer options and a working ADB setup on a computer. A Google search will assist in getting this setup if necessary. Once the computer can detect the device over ADB, run the following:
adb shell pm list users
This should return a list of active users where user 0 is the parent (device/default) user, and any other number (10, 12, 200 etc) should be the work profile.
Heads up
OEMs such as Samsung use additional users for solutions like Secure Folder. Here's an example:
Users:
UserInfo{0:Owner:4c13} running
UserInfo{12:Work profile:1030} running
UserInfo{150:Secure Folder:10061030} running
Since the account list is normally annotated with the user type, it shouldn't be difficult to differentiate which user does what, but keep this in mind on older Android versions or those from OEMs that modify how this behaves.
To remove the work profile run:
adb shell pm remove-user 12
Making sure of course the number reflects the returned value in the previous command.
This should remove the work profile.
When a work profile is removed - whether by the admin, the user, or an automated compliance action - everything inside the work profile is deleted. Everything outside it is left untouched.
On Android 11+ COPE devices, removing the work profile works the same as BYOD - work data is deleted, personal data survives, and the device transitions to an unmanaged personal device.
On Android 8-10 COPE (legacy WPoFMD), the behaviour was different. Removing the device owner triggered a factory reset, wiping everything. Removing only the work profile while the device owner remained intact left the device in a partially managed state, which most EMMs handled by forcing a full wipe.
On fully managed devices (no work profile), a wipe command or unenrolment triggers a full factory reset. All data on the device is erased. There is no personal/work separation to preserve.
See also: What can my organisation see on my managed device?
The work profile runs a separate instance of Google Play Services, maintains its own app data, and syncs independently from the personal side of the device. This effectively doubles some of the background processes that would otherwise run once, and can result in noticeable battery impact.
Common contributors to work profile battery drain include:
For end users:
For administrators:
There is no way to eliminate the overhead of running a work profile entirely, as the separation is fundamental to how the profile provides data isolation. However, the impact should be manageable on modern devices with reasonable app deployment and sync configurations.
Delayed or missing notifications from work profile apps is a common complaint, particularly for messaging and email applications like Teams, Outlook, and Slack.
The most frequent cause is Android's battery optimisation. Adaptive Battery and Doze mode aggressively limit background activity for apps that are not being actively used, and work profile apps are not exempt from this by default. When a work app is hibernated by the system, it cannot process push notifications until the next maintenance window, which may be minutes or longer.
On the device:
Via EMM policy:
Other considerations:
Yes. Users can turn off the work profile through the quick settings tile or device settings. When the work profile is turned off:
When the profile is turned back on, apps restart and begin syncing. This can result in a flood of notifications arriving at once, particularly if the profile has been off for a while.
From Android 10, users can also schedule the work profile to turn off and on automatically through Digital Wellbeing. This allows setting a recurring schedule - for example, turning the work profile off at 6pm and back on at 8am on weekdays - to support work-life balance without needing to toggle it manually each time.
Administrators can limit how long a user may leave the work profile off through the workProfileMaxDaysWithNoWork policy in AMAPI (or the equivalent setting in the EMM console). If the profile remains off beyond this limit, the user is prompted to turn it back on. If they do not, the work profile data may be wiped depending on the compliance policy in place.
MAM (Mobile Application Management) and work profiles are both approaches to protecting corporate data on personal devices, but they work differently.
MAM (app protection policies)
MAM applies data loss prevention policies at the application level without requiring device enrolment. The EMM manages individual apps rather than the device. This is sometimes called "MAM without enrolment" or "MAM-only". With MAM:
Work profiles (Android Enterprise)
A work profile creates an operating system-level container that separates work apps and data from personal apps and data. With work profiles:
Which should I use?
Work profiles provide stronger isolation and broader app support. MAM is lighter-touch and may be preferred when enrolment is not desired or when only a small number of specific apps need protection. Some organisations use both: work profiles for users who need full corporate app access, and MAM-only for users who need access to just one or two apps (such as email).
The choice is often EMM-specific. Not all EMMs support MAM without enrolment on Android, and the available policy controls vary.
No.
User applications and app data residing outside of the work profile are not visible to the DPC within a work profile. System applications are, however once again the data associated with the apps is separately stored, meaning personal account details associated with Gmail would not show up alongside a corporate exchange account within the EMM.
On devices running Android 10 and earlier, there were isolated instances where during enrolment the DPC could briefly collect a list of personal applications installed before migrating into the work profile. This behaviour was addressed and is no longer possible from Android 11 onwards.
As of Android 11 this answer also applies to COPE, work profiles on company owned devices.
This is one of the most common questions from employees whose organisation has deployed a work profile on their personal device.
What your employer can see:
What your employer cannot see:
The work profile creates a separate, isolated container on the device. Work apps appear with a small briefcase badge to distinguish them from personal apps. Your organisation's management policies apply only within this container.
Your employer can remove the work profile remotely, which deletes all work data from the device. This does not affect personal data, apps, or accounts outside the work profile.
For more on how the work profile works, see What is Android Enterprise and why is it used?.
No. There is no supported method to migrate a device from fully managed (Device Owner) to COPE - work profile on company-owned device (Profile Owner) - without a factory reset.
This is an Android platform constraint, not an EMM limitation. The management mode is set during initial device provisioning and cannot be changed in-place. There is no API in DevicePolicyManager or AMAPI to convert a Device Owner into a Profile Owner, or to add a work profile to an already-provisioned fully managed device while simultaneously changing the management architecture.
Fully managed and COPE are fundamentally different architectures:
Converting between these modes would require restructuring the device's user and profile architecture at the OS level - creating a personal profile, migrating user data, and downgrading the DPC from Device Owner to Profile Owner. Android does not support this.
The AMAPI DPC migration feature only supports migrating from a custom DPC to Android Device Policy within the same management mode. It cannot change the mode itself. A fully managed device migrated via DPC migration remains fully managed.
The only path from fully managed to COPE is a factory reset and re-enrolment:
afw# are not available for COPE on Android 11+.For organisations managing large fleets, plan this as a phased rollout. Zero-touch and Samsung KME can streamline reprovisioning significantly by ensuring devices automatically enrol into the correct COPE configuration on first boot after reset.
Prior to Android 11, COPE was implemented as a "fully managed device with a work profile" (sometimes called WPoFMD). The device was provisioned as fully managed first, and a work profile was added on top. The EMM held full Device Owner control over the entire device.
Android 11 replaced this with a new architecture where the EMM acts as Profile Owner only, with a defined subset of device-level policies. This change improved user privacy but also means there is no continuity between the old and new COPE models. Devices running the old WPoFMD model on Android 9-10 cannot be migrated to the modern COPE model without a factory reset.
For more on the Android 11 COPE changes, see Android 11 COPE changes.
Work profile enrolment can fail for several common reasons. Here are the most frequent causes and how to address them:
Insufficient storage
The work profile requires a minimal amount of free storage to create. If the device is low on storage, the work profile creation will fail silently or with a generic error. Free up space before attempting enrolment again.
Outdated management application
Most EMMs require a current version of their management application (such as the Microsoft Company Portal, or the relevant EMM agent) to complete enrolment. If the management app is outdated, update it from Google Play before retrying.
Existing work profile already present
A device can only have one work profile at a time. If a previous enrolment attempt partially completed, a residual work profile may exist. Navigate to Settings > Accounts (or Settings > General management > Work profile) and remove the existing work profile before re-enrolling. See how to remove a residual work profile for more guidance.
Google Play Services issues
Ensure Google Play Services is up to date. An outdated or corrupted Play Services installation can prevent the work profile from being provisioned. Clear the cache and data for Google Play Services, then update it.
Device not supported
Some older or uncertified devices may not support the work profile. Ensure the device is GMS certified and running a supported version of Android.
Network connectivity
The device needs a stable internet connection throughout enrolment. The process involves downloading the management app into the work profile, syncing policies, and installing assigned applications. Intermittent connectivity can cause failures at any stage.
Account restrictions
If the organisation uses a managed Google domain, ensure the user's Google account is not restricted from enroling. Check for domain-level restrictions in the Google Admin console that may prevent work profile creation.
If none of these resolve the issue, check the EMM admin console for device-specific enrolment logs and error codes.
The short answer is no - not on any modern COPE deployment. The longer answer depends on which era of COPE is in question.
On Android 8-10, COPE was implemented as a work profile inflated on top of a fully managed device. Because the EMM held device owner privileges, it had the same level of control as a fully managed deployment - including the ability to deploy applications to the parent (personal) profile.
In practice, this was limited. Some custom DPC EMMs - notably VMware Workspace ONE UEM - supported uploading APKs to the console for parent profile deployment. However, no EMMs supported pushing Google Play applications to both profiles simultaneously. It was a niche capability used primarily for deploying in-house apps or security tools (like MTD agents) to the personal side.
Google fundamentally redesigned COPE in Android 11. The device is no longer fully managed with a work profile on top. Instead, it uses an enhanced work profile model where the EMM is a profile owner, not a device owner. This was an explicit trade-off: more user privacy at the cost of IT control.
Deploying or force-installing applications to the parent profile is not possible on Android 11+, regardless of whether the EMM uses AMAPI or a custom DPC. The OS-level change applies to all management architectures.
Through personal usage policies, COPE deployments on Android 11+ can control which apps are available in the personal Play Store:
personalPlayStoreMode: WHITELIST) - restricts the personal Play Store to only apps explicitly approved by the administrator. Everything else is blocked and automatically uninstalled if already present.personalPlayStoreMode: BLACKLIST) - allows full Play Store access, blocking only specific apps listed by the administrator.These policies control availability, not installation. The organisation cannot force-install apps to the personal side or silently deploy managed configurations to personal apps, but they absolutely can dictate what is and isn't permitted on the personal profile. It is management - just not the same granular, per-app management available within the work profile.
Personal usage policies do not give the organisation visibility into which apps are installed on the personal profile, what data they contain, or how they are used. The organisation controls the catalogue, but the user's actual app usage remains private. This is by design. For more on privacy in work profile deployments, see what is a work profile?
Organisations that genuinely need to deploy and manage apps across the entire device should use a fully managed (work-only) deployment instead of COPE. This gives device owner-level control but removes the personal profile entirely. There is no middle ground on Android 11+ - it is either full control with no personal space, or a work profile with privacy boundaries.
For more on the COPE changes, see Android 11 COPE changes.
Android 11 fundamentally changed how COPE works. Prior to Android 11, COPE was implemented as a work profile on a fully managed device (WPoFMD) - the device was fully managed with corporate visibility and control, and a work profile was layered on top for app separation.
From Android 11, Google replaced this with work profiles on company-owned devices (WPoCOD). COPE devices are no longer fully managed at their core. Instead, they are essentially enhanced work profile devices with a flag marking them as company-owned, which unlocks a handful of additional device-wide policies that standard BYOD work profiles don't have.
This was a significant reduction in corporate control. Organisations lost visibility of personal apps, network logs, and usage statistics. Device-wide VPN, parent profile app management, APN configuration, and certificate management on the personal side all went away.
For the full breakdown of what changed, including migration paths for existing deployments: Android 11 COPE changes.
Since Android 11, the COPE model has remained architecturally the same - it is still a work profile on a company-owned device. Google has incrementally added back some capabilities in later releases:
If your organisation needs strong device-wide control and visibility, fully managed (COBO) remains the better choice. COPE is best suited to deployments where the organisation accepts limited personal-side visibility in exchange for offering employees genuine personal use on a company device.
By default, the work profile is isolated from the personal profile. Applications, data, and accounts in one profile cannot access those in the other. This is the foundational privacy and security guarantee of the work profile model.
However, administrators can selectively relax this boundary using cross-profile policies. The level of control depends on whether the device is personally-owned (BYOD) or company-owned (COPE).
What can be configured
BYOD vs COPE differences
On personally-owned work profiles, the default cross-profile restrictions are more permissive toward the user - for example, sharing from personal to work is allowed by default. On company-owned (COPE) devices, administrators have broader control and can lock down both directions.
Best practices
For more on work profile architecture, see What is an Android work profile?.
WearOS does not currently support Android Enterprise work profiles or managed accounts. There is no work profile equivalent on WearOS, and no mechanism to add managed accounts, install work apps, or sync work profile data to the watch.
Notifications - work profile notifications bridge to the watch by default. The WearOS companion app (Pixel Watch, Galaxy Wearable, etc.) uses NotificationListenerService to mirror phone notifications to the watch, and as a system app it can read cross-profile notifications. This works the same way as Android Auto's work profile notification support.
However, an organisation's MDM policy can restrict this using setPermittedCrossProfileNotificationListeners, and some EMMs block cross-profile notification listeners by default. If work notifications are not appearing on the watch, check with your IT team whether the watch companion app has been allowlisted.
WearOS has no concept of a work profile, managed account, or enterprise management. This means:
Some users configure their corporate account directly in the personal profile (outside the work profile) to enable watch sync, but this bypasses management policies applied within the work profile and is not recommended for organisations with data protection requirements.
Google has not announced WearOS support for work profiles. This is a known gap in the ecosystem and has been raised in the Android Enterprise Customer Community. Given the growing adoption of wearables in enterprise environments, it remains a commonly requested feature.
A major Android OS update (such as Android 15 to 16) delivered via OTA is not a factory reset - device management state, profiles, apps, and data all persist through the upgrade. There is no re-enrolment required.
Major version updates can introduce behavioural changes that affect managed devices, even without a re-enrolment:
Google Play System Updates (Mainline modules) are no longer controlled by system update policies. They install automatically regardless of configured freeze periods or maintenance windows. Only traditional OTA updates (OS version upgrades and monthly security patches) respect system update policies. See Are GPSU managed by system update policies?
System update policies apply only to fully managed and dedicated devices. For work profile (BYOD) deployments, the device owner is the end user, and the organisation has no control over when OS updates are installed.
Microsoft has migrated its Intune personally-owned work profile implementation from a custom Device Policy Controller (the Company Portal app) to Google's Android Management API (AMAPI). This migration began in early 2026 and is now largely complete, with remaining devices being auto-migrated.
AMAPI is Google's modern management API and receives new features and platform capabilities before custom DPC integrations. By moving to AMAPI, Intune gains:
Microsoft will automatically migrate remaining devices from the custom DPC implementation to AMAPI. Administrators should:
No. Intune's corporate-owned work profile (COPE), fully managed, and dedicated device management modes already use AMAPI. This migration only affects the personally-owned work profile scenario.
Sources:
System app behaviour on COPE devices changed fundamentally with Android 11. Understanding how it works across both eras is important for getting the personal profile experience right.
On Android 8-10, COPE was implemented as a work profile inflated on top of a fully managed device. The EMM held device owner privileges, meaning the entire device - personal side included - was under management.
During provisioning, the DPC extra android.app.extra.PROVISIONING_LEAVE_ALL_SYSTEM_APPS_ENABLED controls whether non-vital system apps are kept or disabled on the parent profile. This is supported through QR code, NFC, and zero-touch provisioning (but not DPC identifier).
My recommendation for COPE in this era was to set this to true - enable all system apps. The organisation is providing a device intended for personal use, so the closer to stock it feels, the more familiar the user will be with it. Gallery, calculator, health apps, camera, and other OEM app suites being present on the personal side should be harmless outside of the secure work profile.
If specific system apps need removing - bloatware, for instance - most EMMs support ad-hoc system app management post-provisioning. There is no reason to strip everything and selectively re-enable when the opposite approach is simpler and more user-friendly.
For more on how system apps are determined during provisioning, see what are vital apps?.
Google redesigned COPE in Android 11. The device is no longer fully managed with a work profile on top. Instead, it uses an enhanced work profile where the personal side is treated much like a consumer device. The EMM is a profile owner, not a device owner.
This means:
In practice, this is the right outcome for most COPE deployments. Users get a personal profile that looks and feels like their own device, and the organisation controls what can be additionally installed from Google Play without dictating the core device experience.
The work profile still follows the vital apps model. Which system apps appear in the work profile is determined by the OEM’s vital apps XML configuration, not by the admin. Admins can deploy additional apps to the work profile through managed Google Play, but cannot directly control which system apps are present in it. See what are vital apps? for details on how this works and why it varies between OEMs.
For the full picture on what changed with COPE in Android 11, see Android 11 COPE changes.
Unless an enterprise policy prohibits device-wide application installation from unknown sources, yes.
Follow this FAQ.
No.
If you'd like to see this change, raise it in the Android Enterprise Customer Community, or through your existing EMM support channels as a feature request.
More information can be found here.
The Private Space is a separated, isolated profile on the Android device, similar to the work profile. If a VPN configuration is created on one profile (be that personal/parent, work, or Private Space), it won't apply for the applications running in another profile. To have Private Space apps running in a VPN, configure a VPN application within the Private Space.
Application management within the Private Space is limited to only company-owned work profile devices. Personally owned devices - or BYOD - cannot manage the Personal Space in any way. Fully managed devices do not support Private Space.
For company-owned work profile devices enrolled into AMAPI, the personal usage policies of personal Play Store mode and personal applications apply both to the parent (personal) profile, and the Private Space.
If your EMM uses a custom DPC with Play EMM API, this feature will be available in future. Until then it is not possible to restrict applications within the Private Space.
via, updated by Google on 2024-11-12 to clarify custom DPC status.
If your organisation already leverages policies to allow or block applications in the parent profile on a COPE device, these will carry over automatically to the Personal Space.
Note: It is not possible to set different personal Play Store modes, or configure separate allow/blocklist policies between the parent profile and the Personal Space.
No.
Applications and data stored within the Private Space are not visible to enterprise administrators, this follows the existing premise set with the parent profile in a work profile (company/personally-owned) deployment. If this is an organisational concern, application policies can be set for company-owned work profile deployments.
This may sound contradictory to Are Private Space applications truly hidden?, however this is because the EMM agent runs within the work profile, which is intentionally restricted from visibility of apps outside of it.
Applications within the Private Space may be detected through the use of ADB, or on-device package viewers. While application data is fully secure and isolated from visibility, the presence of the applications themselves cannot today be entirely hidden from view for anyone determined enough to go looking for them.
Note: From Android 16, on-device package managers can no longer detect applications outside of their own user. This reduces (but doesn't remove) the risk of application use being discovered.
EMMs leveraging the Android Management API (AMAPI) are subject to the default policy requirements Google sets. In February 2024 Google adjusted the default, unset behaviour for UsbDataAccess from ALLOW_USB_DATA_TRANSFER to DISALLOW_USB_DATA_TRANSFER. If your policies did not previously explicitly allow USB data transfer, this function will be blocked on your managed devices.
To reverse this, please set USB data transfer explicitly to allow, and redeploy your policies.
If you find networks with captive portals configured simply never launch the portal for authentication when a device is in a Kiosk environment, this is because it must be configured to do so.
Captive portals are typically handled through a dedicated application preloaded on all Android devices, and access can be granted by adding the respective package name to the EMM policy as an allowed application.
The common package name for this is:
com.google.android.captiveportallogin
android Tip For specific OEM implementations, search captive portal in the Android system apps database.
What this does is add the package name to the LockTask allowlist, enabling the app to open without triggering a security exception.
Yes. From February 2026, the Android Management API supports configuring Private DNS on company-owned devices running Android 10 and above.
The new privateDnsSettings policy field supports three modes:
This is available for fully managed devices and work profiles on company-owned devices. It does not apply to personally-owned work profile deployments.
Before this addition, administrators had no standardised way to enforce Private DNS configuration through AMAPI, and often relied on OEM-specific OEMConfig policies or VPN-based DNS solutions. This brings Private DNS management in line with what custom DPCs could already achieve through the platform DevicePolicyManager APIs.
No, not on a device that has already been set up with user accounts.
Setting a device as fully managed (Device Owner mode) is only possible during the initial device setup, before any accounts are added. This is by design - Android enforces this restriction to prevent a management agent from silently taking control of a device that a user has already configured.
There are limited exceptions:
ADB command (dpm set-device-owner): This can set Device Owner on a device that has been set up but has no Google accounts or secondary users present. However, this is a development and testing tool, not a production deployment method. It also requires USB debugging to be enabled and is not practical at scale. It cannot be used with AMAPI.
DPC migration: If a device is already managed by one DPC, it may be possible to migrate to another DPC or to AMAPI without a factory reset, depending on vendor support. See Can I migrate devices from a custom DPC to AMAPI? for details.
For production deployments, the supported methods all begin from a factory reset state: QR code, zero-touch, KME, NFC, DPC identifier, or managed Google account provisioning. See How can I provision a fully managed device? for the full list.
No. Picture-in-Picture (PiP) mode does not function when a device is in lock task (kiosk) mode.
When an application calls enterPictureInPictureMode() on a device with lock task active, the request is silently ignored. This is by design - lock task mode restricts the device to a controlled set of applications and prevents system UI elements that could allow users to navigate away from the kiosk experience.
Common enterprise use cases affected include:
There is no official workaround within the standard lock task API. Some options organisations have explored:
This is an active area of community feedback. Google has not indicated whether PiP support in lock task mode is planned.
There are several options for provisioning into any fully managed deployment scenario (COBO, COPE, COSU):
More details:
Lost Mode is an Android Enterprise management feature that allows administrators to remotely lock and locate a company-owned device that has been lost or stolen.
When activated by an administrator:
Lost Mode is available on:
It is an AMAPI-only feature. EMMs using a custom DPC do not have access to Lost Mode unless they have implemented their own equivalent.
Lost Mode can activate location reporting regardless of the device's existing location settings on fully managed devices. On COPE devices, location accuracy depends on the device's configuration and whether location services were enabled prior to activation.
Lost Mode is activated through your EMM console. The specific steps vary by vendor - check your EMM's documentation for instructions. The feature must be supported by your EMM's AMAPI implementation.
Sources:
Not normally by default, though do validate with your EMM vendor. If confirmed disabled however FRP kicks in after a reset, log a ticket with EMM support.
If so desired, allowlisted Enterprise Factory Reset Protection is available and offers a simple, albeit caveated means of ensuring devices can’t simply be wiped and re-setup without Android Enterprise provisioning taking place. For zero-touch devices there’s no need to leverage it.
From Android 15, FRP behaviour has changed. OEM unlocking no longer bypasses FRP after a hard reset, and Enterprise FRP is always enforced on managed devices regardless of OEM unlock status. This makes configuring EFRP more important than before, particularly for fully managed devices without zero-touch, as recovery from an unexpected reset without EFRP configured is considerably harder.
In most cases, no - not without a factory reset.
Android Enterprise fully managed devices are bound to a single EMM enterprise. Moving a device from one EMM to another typically requires a factory reset and re-provisioning under the new EMM, unless both the inbound and outbound EMM supports DPC migration via their custom DPCs.
More recently, DPC migration via the Android Management API (AMAPI) has become possible. This allows devices managed by a custom DPC (using the Play EMM API) to migrate to AMAPI (Android Device Policy) without a factory reset. However, this is a one-way migration from custom DPC to AMAPI within the same enterprise - it cannot be used to migrate between two different EMM platforms.
For organisations planning an EMM change, the practical approach is to phase the migration by factory resetting devices in batches and re-provisioning them under the new EMM. Zero-touch enrolment simplifies this significantly, as the device configuration can be updated in the zero-touch portal to point to the new EMM before the reset.
Factory Reset Protection (FRP) and Enterprise Factory Reset Protection (EFRP) serve similar anti-theft purposes but work differently.
Standard FRP is tied to the Google account signed into the device. If the device is factory reset (via recovery, not through Settings), the device will require the previously signed-in Google account credentials before it can be set up again. This is a consumer anti-theft feature present on all GMS-certified Android devices.
On fully managed devices, FRP typically activates - if enabled via policy - based on whichever Google account was present on the device - this could be the managed Google Play account provisioned by the EMM. If that account is deleted or no longer accessible (common after EMM unenrolment), recovering the device can be difficult.
Enterprise FRP is a policy-driven feature that allows administrators to specify one or more Google account email addresses that can unlock the device after a factory reset. This is configured through the EMM as part of the device policy.
Key differences:
From Android 15, FRP behaviour has changed significantly:
This makes configuring EFRP more important than ever for organisations managing fully managed devices, as recovery from an unexpected reset without EFRP configured becomes considerably harder.
For more detail, see Feature spotlight: Factory Reset Protection.
It depends on the management configuration.
On a fully managed device, Android Auto requires the following to function:
The most common cause of Android Auto not working on fully managed devices is an overly restrictive app policy. If the organisation uses an app allowlist (only approved apps can run), Android Auto and its required companion services must be explicitly included.
For COPE (work profile on company-owned) devices, Android Auto runs in the personal profile by default and is generally unaffected by work profile policies.
If Android Auto fails to connect, check the EMM console for USB, Bluetooth, or app restriction policies that may be interfering.
The content protection policy is an AMAPI feature available on Android 15+ that enables enhanced scanning of apps for deceptive or potentially harmful behaviour on the device.
When enabled, the device leverages Google Play Protect's on-device scanning capabilities to detect apps that may attempt social engineering tactics, such as impersonating system dialogs or overlaying content to trick users into providing credentials or granting permissions.
This is particularly relevant for organisations deploying devices to frontline or less technically experienced workers, where the risk of social engineering through deceptive apps is higher.
The content protection policy complements but does not replace standard Play Protect scanning. It is focused on real-time behavioural analysis of app UI patterns rather than static malware detection.
This policy applies to fully managed and dedicated devices. For work profile deployments, the work profile already benefits from Play Protect scanning within its scope.
Normally this would suggest either the respective Android Enterprise configurations aren’t assigned to the device, or there’s an issue with the binding between the EMM and Google.
Ensure the user of the device is in the correct Active Directory group (if relevant) or EMM group to receive the correct profiles, otherwise check the binding.
Occasionally and with some EMMs this may also happen if more than one device is enrolled with the same Device Identifier, e.g.: Serial Number or IMEI. Validate all Device Identifiers are unique (at least within an OEM/model) as it's not uncommon to see duplicates in the wild.
Other considerations:
No. On a fully managed device, both an enterprise wipe/retire and a full wipe result in a factory reset. The entire device is under management with no separation between corporate and personal data, so there is nothing to selectively remove.
Android Enterprise requires a DPC actively enrolled as Device Owner to provide management policies. Removing the DPC means removing everything, and the device resets to factory settings.
EMMs use different labels for the same underlying action. "Retire", "enterprise wipe", "selective wipe", "delete device", and "unenrol" may all trigger a factory reset on a fully managed device. Always verify what the action does in your specific EMM before running it on a production device.
The behaviour is different for other deployment scenarios:
RELINQUISH_OWNERSHIP command to convert the device to an unmanaged personal device.Not through the device UI, no. On a fully managed device, end users are always blocked from adding or removing OS-level users regardless of policy configuration.
Whether the EMM can do it programmatically depends on the management architecture in use.
AMAPI does not support secondary user management at all. While the policy schema includes addUserDisabled and removeUserDisabled fields, the documentation explicitly states that for devices where managementMode is DEVICE_OWNER, the user is never allowed to add or remove users. There is no API for the EMM to create, remove, or switch between OS-level users either.
A custom DPC operating as Device Owner has significantly more capability here. Android's DevicePolicyManager exposes several user management APIs:
createAndManageUser() - create secondary users programmatically (Android 7.0+)removeUser() - remove secondary users (Android 5.0+)switchUser() - switch the active user on the device (Android 7.0+)startUserInBackground() / stopUser() - manage user sessions without switching (Android 9.0+)This is one of the remaining capability gaps between AMAPI and custom DPC. If your organisation relies on multi-user device scenarios, check whether your EMM exposes these APIs.
A common use case for secondary users is shared devices - kiosks, shift terminals, or front-of-house equipment. Custom DPCs can create ephemeral users (using the MAKE_USER_EPHEMERAL flag on createAndManageUser()), where all user data and apps are automatically deleted when the user session ends, the device switches users, or the device reboots. This requires Android 9.0+ and is documented in detail in Google's dedicated devices guide.
Not all Android devices support multiple OS-level users, even if the Android version does. This is a hardware and OEM decision. Before planning a multi-user deployment, verify that the target devices support secondary users - the DevicePolicyManager API will return specific error codes if the device has reached its user limit or does not support the feature.
Not by default. The standard Android backup service is disabled on fully managed devices, and historically there has been no way to change this.
However, Android now offers a backupSettings policy that allows administrators to control whether backup is permitted on fully managed devices, and can then be used with the Android Switch application. This is supported by custom DPC implementations and is expected to arrive in AMAPI in a future release. If your EMM supports this policy, it can be enabled to allow device backup to the Google account associated with the device. Check your EMM documentation for availability, as not all platforms expose this setting.
Regardless of backup policy, as a best practice the organisation should offer end-users a cloud service - OneDrive, Google Drive, Dropbox, etc - to which company data is automatically synced, rather than relying solely on device-level backup.
No. As of early 2024, Google Play System Updates (Mainline modules) are no longer controlled by Android Enterprise system update policies.
Previously, the system update policy applied to both OTA system updates and Google Play System Updates. This is no longer the case - Mainline updates now download automatically in the background and install on the next device reboot, regardless of any configured system update policy, freeze period, or maintenance window.
This means:
Administrators can still use compliance policies to check that devices have current Mainline modules installed, but cannot directly control the timing of their installation.
OTA system updates (full Android version upgrades and monthly security patches) continue to respect system update policies as before.
For more details, see Google Play System Updates and Android Enterprise.
Android 15 enforces edge-to-edge rendering for all apps targeting API 35 (Android 15). This means the app's content extends behind the system status bar and navigation bar by default, rather than being constrained within the safe area.
For consumer apps, this creates a more immersive experience. For enterprise kiosk and dedicated device deployments, it can cause problems:
What should I do?
WindowInsets API for this purposeThis is not specific to lock task mode - any app targeting API 35 will be affected. However, the impact is most noticeable on dedicated devices where the app is the sole user-facing interface.
For a detailed breakdown of every provisioning method, see Android Enterprise provisioning methods. This FAQ focuses on which method to choose and why.
Zero-touch enrolment (or Samsung KME for Samsung fleets) is the recommended approach wherever possible. The key advantages are:
Zero-touch is not necessarily the fastest method - a QR code or DPC identifier can get a device enrolled in about the same time - but speed is only one consideration. The operational benefits of persistence and zero-touch setup far outweigh a few seconds of difference.
Zero-touch works on all GMS-certified devices running Android 9.0 or later, but devices must be purchased from a zero-touch approved reseller for the reseller to register them against your zero-touch organisation. Samsung KME does not require a specific reseller - devices can be registered by IMEI or serial number directly, or through Samsung’s Knox Deployment Program.
If zero-touch or KME is not available, QR code provisioning is the next best option. QR codes are persistent, can be hosted anywhere (intranet, printed, emailed), do not require a dedicated provisioning device, and support DPC extras for pre-configuration. QR codes are supported on Android 7.0 and later.
DPC identifier (afw#setup for AMAPI, or afw#<vendor> for custom DPCs) is a reasonable fallback when QR code scanning is not practical. It requires the user to type an identifier into the email field during setup, which introduces room for error, but it works on Android 6.0 and later.
NFC tag provisioning is still supported but increasingly niche. NFC Beam (device-to-device) was removed in Android 14, so only pre-programmed NFC tags work on modern devices. NFC also cannot provision COPE devices on Android 11 or later. Unless there is a specific reason to use NFC - such as provisioning in an environment where network access is restricted during setup - other methods are generally preferable.
Work profile provisioning on personally-owned devices is simpler, as the device is already set up. The most common approaches are:
Lock task mode (kiosk mode) restricts the device to a set of allowlisted applications. Only apps on the lock task allowlist can be launched - if an allowed app attempts to open another app that is not on the allowlist, it will be blocked. However, allowed apps may still be able to trigger system activities or intents (such as Settings sub-pages) that don't behave as standalone apps, and this is where escape risks arise. Proper hardening requires careful configuration.
Audit allowed applications
Review each application on the lock task allowlist for potential escape vectors. For example, a browser may navigate to intent:// URIs that trigger system activities, and some apps may deep-link into Settings sub-pages. Remove any application from the allowlist that is not strictly necessary.
Restrict system UI features
Use policy to disable system UI features that could allow escape:
Most EMMs expose these as dedicated kiosk policy settings, so do check the vendor documentation.
Block system applications
Unless specifically needed, do not include system applications (Settings, File Manager, Downloads) in the kiosk allowlist. If an application requires access to a specific system setting (such as Wi-Fi), use AMAPI's managed Settings activities - these expose only the specific setting required (e.g. Wi-Fi or Bluetooth) without granting access to the full Settings app. For a more flexible, enterprise-customisable alternative, MANAGED SETTINGS provides granular control over which settings intents are accessible to end users via managed configuration.
Use a dedicated enterprise kiosk launcher
Consider deploying a purpose-built kiosk launcher that only surfaces the intended applications and does not allow access to app drawers, widgets, or search bars. MANAGED INFO offers a launcher mode that can replace the default Android launcher with a fully customisable, enterprise-managed home screen, for example.
Test thoroughly
Before deploying at scale, test the kiosk configuration by attempting to escape it. Try long-pressing buttons, using voice assistants, triggering crash dialogs, and testing all allowed applications for links or intents that could open unintended activities. OEM-specific behaviours (Samsung, Zebra, Honeywell) may introduce additional escape vectors not present on stock Android.
For captive portal access in kiosk mode, see How can I access a Wi-Fi captive portal when devices are in kiosk?.
Samsung Smart Switch automatically disables itself when a device enters Device Owner (fully managed) mode. This is intentional behaviour by Samsung, designed to prevent unmanaged data transfer on corporate devices.
When a device is enrolled as fully managed, the EMM takes control of data flow and app installation. Smart Switch operates outside of this managed channel, so Samsung blocks it by default to avoid data leakage or uncontrolled restoration of personal data onto a corporate device.
This catches out many organisations that want to use Smart Switch to migrate data from an old corporate device to a new one during device refreshes.
Yes. Smart Switch supports managed configuration. Administrators can deploy Smart Switch as a managed application through their EMM and set the allow_run managed configuration key to true. This overrides the default block and allows Smart Switch to function on the fully managed device.
The exact steps vary by EMM:
allow_run to trueOnce configured, Smart Switch will function as normal during the data migration window. Administrators can remove the configuration or uninstall the app after migration is complete.
No. Smart Switch functions normally on personally-owned work profile and COPE devices, as the parent profile is not under Device Owner control.
A major Android OS update (such as Android 15 to 16) delivered via OTA is not a factory reset - device management state, profiles, apps, and data all persist through the upgrade. There is no re-enrolment required.
Major version updates can introduce behavioural changes that affect managed devices, even without a re-enrolment:
Google Play System Updates (Mainline modules) are no longer controlled by system update policies. They install automatically regardless of configured freeze periods or maintenance windows. Only traditional OTA updates (OS version upgrades and monthly security patches) respect system update policies. See Are GPSU managed by system update policies?
System update policies apply only to fully managed and dedicated devices. For work profile (BYOD) deployments, the device owner is the end user, and the organisation has no control over when OS updates are installed.
A reseller has the ability to upload any devices through their reseller portal, however it is their obligation to ensure that the device identifiers (IMEI or serial) are correct and that the organisation in question owns the devices, not another organisation or an employee. If the organisation does own these devices, can prove this, and can supply accurate device identifiers, please discuss this with a preferred reseller for assistance. It is up to the reseller if they wish to upload devices already purchased since there are consequences for resellers who upload incorrect data to the zero-touch portal.
This will change in future.
As of late 2020, all Android Go devices support zero-touch through expanded zero-touch availability. Prior to this, Android Go supported zero-touch on an opt-in basis. Validate support ahead of bulk purchase.
No.
While zero-touch is mandatory for Android Enterprise Recommended, devices that don’t meet Google’s requirements for storage or spec can and still do support provisioning via zero-touch.
Yes, either by requesting a new account from a new reseller, or adding a new reseller through the existing console.
No, it is a free service, from Google at least. Reseller partners can choose to charge for this service, or bundle it as part of other offerings if they choose to do so.
Should you be unhappy with a reseller charging for the service, have a look for another reseller who does not.
Nothing until the device is reset, at which point it will not be prompted to enrol into management.
It will be forced to enrol back into management automatically following the data erase, unless a config has not been applied, or has since been removed.
The config won’t apply until after the device is reset. Anything after the “checking for updates” prompt is too late.
Nothing until after the device is reset. Zero-touch configurations only download during the setup wizard, and not after. This is also why once a device has been partially set up, it needs to be factory reset in order to pull down the zero-touch config once more.
As of late 2020, all GMS certified Android 9.0+ devices from all OEMs support zero-touch.
OEMs supporting zero-touch on 8.0/8.1 include:
Along with the change to globally support all Android 9.0+ GMS certified devices with the integration of zero-touch into GMS Core (Google Play Services), the previous Google-maintained list of zero-touch supported devices, including those running older Android versions, is no longer live.
A collection of DPC extras for various EMM/UEM vendors can be found here: Android Enterprise zero-touch DPC extras collection.
As EMM vendors begin supporting the zero-touch iFrame introduced in late 2020, manual editing of DPC extras should diminish as EMMs will handle it automatically.
Zero-touch resellers can be found globally. The complete list of resellers can be found here.
No, only authorised resellers. Customers are not able to add devices to the zero-touch portal at this time.
This will change in future.
Only console admins or owners from the customer portal, or the reseller. End-users cannot remove their device from zero-touch enrolment.
No, it does this extremely quickly.
The term “zero-touch” is aimed at admins and IT teams that no longer need to manually touch each device in order to undertake managed provisioning. This is in context of IT teams often pre-staging devices before shipping them to end users to avoid non-enrolment, which is no longer needed when devices are zero-touch registered.
It does not apply to the act of end-users running through the provisioning process, which has admittedly required more and more taps over the last few major Android versions due in part to the often unnecessary interruptions of unskippable privacy prompts.
The upload may complete successfully, but the device will not initiate the zero-touch enrolment flow once connected to a network. The device will need to be deregistered and re-registered with the correct manufacturer.
From 2020, the manufacturer field is no longer required for IMEI-based uploads and can be omitted, but it should still be used for Wi-Fi-only devices.
Yes.
Zero-touch is just a provisioning method which deploys an EMM agent to your device over the air (OTA), to enrol into a Fully Managed Device profile using Android Enterprise (not legacy Device Admin) APIs. Google do not provide a free EMM solution, though device management is available through Google Workspace (G Suite) with the appropriate licences.
This action results in the device being irreversibly removed from zero-touch management. Please contact the device reseller to add it back in. The IMEI or serial (Wi-Fi only devices) will be required.
Any currently-enrolled devices will not be impacted until they are factory reset.
There are reports from the Android Enterprise Customer Community and other forums of devices running Android 15 and later failing to trigger zero-touch or KME enrolment following a factory reset, instead defaulting to the personal setup wizard.
This behaviour appears to be related to timing changes in Android 15's setup flow. In some cases, the device completes the initial setup screens before the zero-touch or KME configuration is fetched and applied, resulting in the device landing on the home screen as an unmanaged personal device.
Network connectivity timing - the device needs an active internet connection very early in the setup flow for zero-touch or KME to activate. If the device connects to Wi-Fi after certain setup screens have already been passed, the provisioning trigger may be missed. Ensure devices have network access as early as possible during setup, ideally via a known Wi-Fi network or mobile data.
Profile assignment after reset - if the device's IMEI or serial number was recently re-assigned in the zero-touch or KME portal, there can be a propagation delay. Verify that the correct configuration or profile is assigned and has had time to propagate before resetting the device.
Dual-SIM devices - on dual-SIM devices, the reseller should register the primary (first) IMEI. Registering the secondary IMEI can cause zero-touch to fail silently. Alternatively, register by serial number.
Samsung-specific considerations - configuring both zero-touch and KME on the same Samsung device is not recommended, as the two enrolment methods can conflict. Choose one and remove the other from the respective portal.
GMS Core version - devices with significantly outdated GMS Core versions may not process zero-touch enrolment correctly. This is more common on devices that have been in storage for an extended period. If the device can access the Play Store briefly before reset, allow GMS Core to update first.
If the issue persists across multiple devices of the same model, it may be an OEM-specific bug. Raise it with the OEM and consider logging it in the Android Enterprise Customer Community.
Zero-touch supports provisioning into any corporate-owned deployment scenario:
The deployment scenario is not set in the zero-touch portal itself. It is determined by the EMM configuration assigned to the device.
For AMAPI-based EMMs, the enrolment token includes an allowPersonalUsage setting:
PERSONAL_USAGE_ALLOWED provisions a COPE device (work profile on company-owned device)PERSONAL_USAGE_DISALLOWED provisions a fully managed devicePERSONAL_USAGE_DISALLOWED_USERLESS provisions a fully managed device without a user sign-in step (commonly used for dedicated/kiosk devices)For custom DPC EMMs, the DPC extras payload provided in the zero-touch configuration determines the deployment scenario. The specific extras vary by vendor - check your EMM's documentation for the correct values.
In all cases, the zero-touch portal simply pulls the assigned configuration for the device during setup. The EMM handles the rest during provisioning and enrolment.
Zero-touch is for corporate-owned devices only. It requires devices to be purchased through an authorised zero-touch reseller and registered to a zero-touch customer account. Employee-owned devices are not eligible for zero-touch enrolment.
For more on zero-touch, see What is Android zero-touch enrolment?.
Zero-touch enrollment requires devices to be registered in the zero-touch portal by an authorised reseller. If your device supplier is not a zero-touch partner, you have a few options:
1. Purchase from a zero-touch partner reseller
The most straightforward approach. Google maintains a directory of authorised zero-touch resellers at androidenterprisepartners.withgoogle.com. Many major distributors and carriers are partners. Switching to a partner reseller for future purchases ensures devices arrive pre-registered.
2. Request your reseller joins the programme
Resellers can apply to become zero-touch partners through Google's partner programme. If your preferred supplier has sufficient volume and interest, this may be worthwhile, though the onboarding process takes time.
3. Use Samsung Knox Mobile Enrollment (KME) for Samsung devices
Samsung KME is Samsung's equivalent to zero-touch and does not require a specific reseller partnership, though it works better with one. Any Samsung device can be added to KME by the organisation directly using the device IMEI or serial number. This is often the practical alternative for organisations purchasing Samsung devices from non-partner suppliers.
4. Use QR code or sign-in URL provisioning as an alternative
If automated enrollment through zero-touch is not available, QR code or Google account provisioning provides a manual but reliable enrollment path. These methods do not require reseller involvement and can be configured entirely within the EMM.
What about adding previously purchased devices?
Devices already purchased from a non-partner reseller cannot be retroactively added to the zero-touch portal by the organisation. Only authorised resellers can register devices. See the related FAQ: Is it possible for an organisation to add previously-purchased devices to zero-touch?.
Nothing until the device is factory reset. Zero-touch configurations are only downloaded and applied during the setup wizard, so any change made in the zero-touch portal - whether it is editing DPC extras, switching EMM, or assigning an entirely different configuration - has no effect on a device that is already enrolled and in use.
When an administrator changes a zero-touch configuration in the zero-touch portal or via the customer API, the change is saved server-side. The enrolled device is not notified. The updated configuration is only fetched the next time the device goes through the setup wizard, which happens after a factory reset or on first boot of a new/reflashed device.
This applies equally regardless of what was changed:
The currently enrolled EMM continues to manage the device as normal until the device is reset.
| Action | Effect on enrolled device | Effect after factory reset |
|---|---|---|
| Config changed (different EMM/DPC extras) | None | New config applies, device enrols into the new EMM |
| Config removed (set to "None") | None | Device sets up without forced enrolment |
| Device unclaimed from portal | None | Device sets up as a consumer device with no management |
Unclaiming a device from the zero-touch portal is irreversible without reseller involvement. The reseller will need the IMEI (or serial number for Wi-Fi-only devices) to re-register it. See What happens if a device is unregistered from the zero-touch console? for more detail.
KME behaves similarly. Profile changes (including switching to a different EMM or updating enrolment settings) do not take effect on already-provisioned devices. The updated profile only applies after a factory reset. KME supports one profile per device, and assigning an updated profile completely replaces the previous settings - there is no merging.
The most common scenario is an EMM migration. When moving devices from one EMM to another, the typical workflow is:
This is one of the key advantages of zero-touch and KME for fleet management - there are no QR codes to redistribute, no new provisioning instructions, and no manual intervention beyond triggering the reset.
Other scenarios include:
If zero-touch is managed through the Google Workspace Admin console (rather than the standard zero-touch portal), applying a configuration to an already-in-use device can trigger a forced factory reset, with the user receiving a warning on the device one hour before the reset occurs. This forced-reset behaviour is specific to the Workspace Admin console flow and does not apply when using the standard zero-touch portal or the customer API.
No. Zero-touch enrolment is exclusively for company-owned devices purchased through an authorised zero-touch reseller.
The zero-touch process works like this: when an organisation buys devices from a participating reseller, the reseller registers those devices (by IMEI or serial number) in the organisation's zero-touch portal. This registration is what triggers automatic enrolment when the device is first powered on or factory reset.
Organisations cannot add devices to the zero-touch portal themselves - only resellers can claim devices into a customer account. There is no self-service mechanism to register arbitrary devices by IMEI. The customer API allows managing configurations on devices already assigned by resellers, but it cannot add new devices.
Zero-touch supports company-owned deployment modes only:
It does not support personally-owned work profile (BYOD) enrolment. While zero-touch can deploy a work profile, this is only the company-owned variant (COPE) - not the same as a personal device with a work profile.
For enrolling employee-owned devices with a work profile, there are several provisioning methods that do not require reseller involvement:
All of these work for personally-owned work profile deployments. For more detail, see the provisioning methods guide.
Samsung's Knox Mobile Enrolment follows a similar model - devices generally need to be purchased through a KME-participating reseller. However, KME supports work profile deployments for both company-owned and BYOD scenarios, and offers a QR code enrolment option for devices not registered by a reseller. See Does Samsung support zero-touch? for a full comparison.
If someone purchases a second-hand device that is still registered in another organisation's zero-touch portal, the device will display a "Your device at work" screen on first boot or after factory reset. The new owner cannot remove the registration themselves - they need to contact the previous organisation (whose details may be shown on screen) and ask them to unclaim the device from their zero-touch portal.
This is an increasingly common issue with the second-hand device market. Before purchasing used Android devices, it is worth verifying that the device has been deregistered from any zero-touch or KME portals. Unlike Factory Reset Protection, which is tied to a Google account and can be cleared with the correct credentials, zero-touch registration can only be removed by the organisation or reseller that registered it.
As of late 2020, yes. Samsung devices running Android 9.0 or later support Google zero-touch enrolment alongside Samsung's own Knox Mobile Enrolment (KME) service.
Both achieve the same outcome - a device that enrols into the organisation's EMM without manual intervention at first boot. The differences are in features and scope:
Zero-touch is OEM-agnostic and managed through the zero-touch portal. For organisations with mixed-OEM fleets, it provides a single provisioning workflow across Samsung, Pixel, and other supported devices.
KME is Samsung-specific and has been available longer for Android Enterprise provisioning (since Knox 2.8). It offers additional capabilities over zero-touch, including:
KME is free to use, though some optional advanced settings require a Knox Suite licence. Devices must be purchased through a KME-supported reseller to be registered in the KME portal.
For a Samsung-only fleet, KME is the more feature-rich option. For mixed-OEM fleets, zero-touch provides consistency. Both support fully managed, dedicated, and COPE deployments. Zero-touch provisions company-owned devices only - it does not support personally-owned (BYOD) work profile enrolment. KME supports work profile enrolment for both company-owned and BYOD scenarios.
Configuring both KME and zero-touch on the same Samsung device is not supported. It can cause configuration conflicts and out-of-sync states that are difficult to debug. Pick one method per device.
For more on Samsung's broader enterprise capabilities, see Does Samsung support Android Enterprise?.
This could be a few things:
DPC extras are a set of vendor-specific key-value pairs passed to the Device Policy Controller (DPC) during provisioning. They tell the DPC how to configure itself - things like which EMM server to connect to, what enrolment token to use, or which organisational unit the device belongs to.
These all fall under android.app.extra.PROVISIONING_ADMIN_EXTRAS_BUNDLE. It is a nested JSON object within the broader provisioning payload, and Android passes it through to the DPC application untouched. The operating system does not read or interpret the contents - they are entirely defined by the EMM vendor.
DPC extras are supported across all major fully managed provisioning methods:
dpcExtras fieldIt is worth understanding the difference, as both appear in the same JSON payload but serve completely different purposes.
Provisioning extras are standard Android properties consumed by the OS provisioning framework. These have the prefix android.app.extra.PROVISIONING_* and control device setup behaviour - things like Wi-Fi credentials, locale, timezone, whether to skip encryption, or whether to leave all system apps enabled. Android reads and acts on these during the provisioning flow.
DPC extras are the contents of PROVISIONING_ADMIN_EXTRAS_BUNDLE specifically. Android does not interpret them at all. It simply delivers the bundle to the DPC once provisioning completes. Their keys and values are defined entirely by the DPC vendor.
Both coexist at the top level of the provisioning JSON, with PROVISIONING_ADMIN_EXTRAS_BUNDLE as a nested object:
{
"android.app.extra.PROVISIONING_LEAVE_ALL_SYSTEM_APPS_ENABLED": true,
"android.app.extra.PROVISIONING_LOCALE": "en_GB",
"android.app.extra.PROVISIONING_ADMIN_EXTRAS_BUNDLE": {
"server": "your.emm.server.com",
"enrollment_token": "token_value"
}
}
In this example, PROVISIONING_LEAVE_ALL_SYSTEM_APPS_ENABLED and PROVISIONING_LOCALE are provisioning extras (handled by Android), while server and enrollment_token are DPC extras (passed to the EMM's DPC).
For AMAPI (Android Device Policy), the DPC extras bundle typically contains a single key: com.google.android.apps.work.clouddpc.EXTRA_ENROLLMENT_TOKEN. This is generated automatically when you create an enrolment token via AMAPI, so administrators rarely need to construct or edit DPC extras manually.
For custom DPC implementations (Workspace ONE Intelligent Hub, Ivanti Mobile@Work, SOTI MobiControl, and others), the bundle contains vendor-specific keys. These might include the EMM server URL, staging credentials, organisational unit, or feature flags. The keys and expected values are defined by each vendor, and getting them wrong will typically cause enrolment to fail.
A collection of DPC extras for various EMM vendors can be found in the DPC extras collection.
Avoid including usernames and passwords in DPC extras where possible. If a device is mistakenly registered (wrong IMEI, typo, second-hand purchase), the credentials in the zero-touch or QR configuration could allow an unintended device to enrol and access corporate resources. Use enrolment tokens and server-side authentication where supported instead.
While not DPC extras themselves, these standard provisioning extras frequently appear alongside DPC extras and are worth knowing:
PROVISIONING_LEAVE_ALL_SYSTEM_APPS_ENABLED - keeps all pre-installed system apps enabled rather than disabling non-critical ones (the default behaviour)PROVISIONING_LOCALE - sets the device locale (e.g. en_GB)PROVISIONING_TIME_ZONE - sets the timezone (e.g. Europe/London)PROVISIONING_SKIP_ENCRYPTION - skips device encryption during setup (not recommended)PROVISIONING_WIFI_SSID, PROVISIONING_WIFI_PASSWORD, PROVISIONING_WIFI_SECURITY_TYPE - pre-configures Wi-Fi for provisioningDPC extras use strict JSON. The last key-value pair within ADMIN_EXTRAS_BUNDLE must not have a trailing comma, or provisioning will fail with a parsing error. This is one of the most common mistakes when manually editing DPC extras.
For guidance on what to include for your specific EMM, see What should I put in DPC extras?
No. The zero-touch portal is a provisioning tool, not a management console. It delivers the DPC config with its extras to the device during the setup wizard, then plays no further role until the device is factory reset. Ongoing device management - policies, app deployment, compliance, updates, lock/wipe, reporting - all sits with an EMM.
The portal (and its customer API) is scoped to pre-provisioning activities only:
Once a device completes the setup wizard and the DPC takes ownership, the zero-touch servers have no further communication with the device. There is no channel back to the portal to push configuration changes, apps, or commands. Devices do not "check in" to zero-touch.
Yes. A default configuration auto-assigns to any device newly added to your zero-touch account. Only one configuration can be the default at any time; creating or promoting a new default automatically clears the isDefault flag on the previous one.
Defaults do not reassign devices already present in the console. Anything already listed keeps whatever configuration (or no configuration) it had at the time the default was changed. To update existing devices, use the CSV import or the customer API to reassign them in bulk.
Defaults are most useful when:
They are less useful when:
Two supported bulk paths:
devices.applyConfiguration (or devices.removeConfiguration) to target devices programmatically. Suited for automation or integration with an EMM workflow.Reassigning a configuration - default or otherwise - has no immediate effect on a device that is already enrolled. The new configuration is only downloaded when the device next completes the setup wizard, i.e. after a factory reset. See What happens if a new config for a different EMM or server is applied to an enrolled device? for detail.
Yes, via the CSV template provided, or the customer API.
As of the 2026 portal update, the CSV format is now unified between upload and download - the exported file includes all device data fields plus the reseller name and ID, and can be modified and re-imported directly. This makes bulk updates considerably simpler than before.
This is a commonly reported issue, particularly with devices enrolled via zero-touch enrolment. Devices factory reset themselves shortly after setup, sometimes repeatedly.
The most frequent root cause is a device configured for zero-touch enrolment being provisioned through a different method - such as a QR code, NFC bump, or manual setup. When this happens, the device enrols successfully through the alternative method, but the zero-touch configuration still applies in the background. The mismatch between the two provisioning methods causes a conflict, and the device resets to attempt zero-touch provisioning as intended.
To resolve this:
KME and zero-touch conflict
On Samsung devices, Knox Mobile Enrolment (KME) and Google's zero-touch can conflict if both are configured for the same device. Check whether KME is also active and disable one or the other. See Does Samsung support zero-touch? for more on this interaction.
Incomplete provisioning
If the setup wizard does not complete fully - for example, due to network connectivity loss or Google Play Services failing to update - the device may reset as a recovery mechanism. Ensure devices have stable, unrestricted network connectivity throughout the entire setup process (see network requirements).
Outdated firmware
Devices that have been in storage may have pre-installed Google Play Services too old to complete zero-touch provisioning. The device attempts to update, fails, and resets. Where possible, ensure devices are running reasonably current firmware before initial setup.
For more on zero-touch enrolment, see What is Android zero-touch enrolment?.
No.
App shortcuts supported with device admin are not available for Android Enterprise. Instead, it’s possible to deploy shortcuts for Android Enterprise devices as web applications through the Google Play iFrame.
Instead of a bookmark/shortcut that opens in the default browser, web apps are legitimate applications that open with Google Chrome.
More information: Create and manage web apps for Android Enterprise
When deploying the iFrame, a UEM vendor decides what they wish to support. On that basis, the iFrame may lack private app upload, web app creation or bundle support.
It’s possible for a UEM to implement multiple iFrames with these features separated out, so is worth checking this functionality isn’t placed elsewhere on the console.
Should additional features not be available anywhere, please get in touch with your UEM provider to discuss this.
To permit or block a selection of URLs in Chrome managed config, you need to add the URLs to the relevant list. The format for this is as follows:
[scheme://][.]host[:port][/path][@query]
Setting multiple URLs in succession would look like this:
["http://www.example.com", "https://www.example.com", "http://*", "https://example.com?sda"]
More format examples can be found here, but in a nutshell:
* targets everything. This is useful for preventing access to everything via a blocklist, then explicitly allowlisting certain domains or URLs192.0.2.1 targets this specific IP.domain.com explicitly blocks the root domain, but not its subdomainsdomain.com blocks everything in that domainIt's important to note that some EMMs require brackets for this to work properly, which is why I used them in the multiple URLs example. Google's documentation doesn't mention this, but it's a crucial step.
Yes, it is possible to manually install an APK to the work profile or any other user present on the Android device via ADB.
Enterprise policies may prevent the installation of applications via ADB, please ensure your device is excluded from any such policy before continuing.
Be aware that since Android 14, it is no longer possible to install very old applications on a device. Via ADB you can overcome this, if necessary.
First, locate the user ID of the profile or user you wish to target:
adb shell pm list users
This will output a user list of all users on the device, for example:
UserInfo{0:Jason:4c13} running
UserInfo{10:Work Profile:1030} running
UserInfo{11:Private space:1090}
Besides the primary user, which is always userID 0, the above example also shows a Work Profile and a Private space (Private Space is Android 15+)
With the appropriate userID identified, install an APK as follows:
adb install --user 10 /path/to/yourfile.apk
Your application should install, and appear shortly within the appropriate profile.
If you're looking to configure the bookmarks available in managed Chrome, you can use the below format. More examples can be found via Google's documentation.
[
{
"toplevel_name": "Company bookmarks"
},
{
"name": "Homepage",
"url": "mydomain.com"
},
{
"children": [
{
"name": "HR",
"url": "mydomain.com/hr"
},
{
"name": "Submit a ticket",
"url": "mydomain.com/it-support"
}
],
"name": "Internal URLs"
},
{
"name": "Android resources",
"url": "bayton.org/android"
}
]
Be aware on managed Android devices, bookmarks can't be placed on the home screen. For that use case, you should consider web apps instead.
Other things to consider -
"children"), ensure you list the name (e.g.: "name":"Internal URLs")By default, the managed Google Play iFrame will automatically organise and display assigned applications in the Google Play app on mobile devices.
While this is simple, it lacks control.
For organisations interested in customising the Google Play experience for managed devices, Google offers app collections. App collections allow defining an explicit layout, such as below, with the applications curated by the organisation.

While it's great, it can also become a burden. Applications assigned won't automatically pop up in Google Play after app collections are created, for example, and keeping this up to date is a reason organisations try it out, and subsequently abandon the idea.
Unfortunately the managed Google Play iFrame doesn't support just turning it off. Instead, a support request will likely need to be raised with the EMM vendor.
If the EMM vendor uses the older Play EMM API with a custom DPC, they can leverage a simple API command: setStoreLayout. This can either be supported in-console, or as an action the support team can perform.
If, however, the EMM vendor uses AMAPI, they will have to reach out to Google to turn the feature off as AMAPI hasn't yet adopted the API to attain feature parity.
Once disabled, the Play Store on devices will return to standard behaviour.
If you're struggling with your EMM provider, feel free to reach out, and I may be able to escalate it through the appropriate channels.
Be prepared to provide:
Yes. The Android Management API now supports managing default application settings on managed devices.
Administrators can configure a prioritised list of apps for each default app type (such as browser, phone dialler, SMS, and others). The system evaluates the list in order and sets the first installed and qualified app as the default. If no app from the list is available, the existing default is retained.
Optionally, administrators can also prevent end users from changing the default app selection, ensuring the organisation's preferred apps remain in use.
This is particularly useful for:
Prior to this feature, default app management through AMAPI required workarounds such as OEMConfig policies or was not possible at all, leaving it to end-user choice.
Yes. As of 2025, the Android Management API supports direct APK installation to managed devices.
Historically, all application deployment through AMAPI required apps to be distributed via managed Google Play. This meant every app - including internal line-of-business apps - needed to be uploaded to managed Google Play as a private app before it could be deployed.
With direct APK support, EMMs built on AMAPI can now push APK files directly to devices. This is particularly useful for:
This does not replace managed Google Play as the primary distribution mechanism. Managed Google Play remains the recommended approach for most app deployment, as it handles versioning, updates, and licensing automatically. Direct APK installation is an additional option for scenarios where Play distribution is impractical.
For details on how this works, see AMAPI finally supports direct APK installation.
This is one of the most common managed Google Play issues reported by administrators.
The most likely cause is that your managed Google Play store is configured in Custom layout mode (also known as collections mode). When this mode is active, approved apps will not appear in the Play Store on managed devices until they are explicitly added to a collection.
Custom layout mode is typically enabled when an administrator edits collections within the managed Google Play iFrame in their EMM console. Once enabled, the store switches from showing all approved apps to showing only apps that have been placed in collections.
To resolve:
If you want all approved apps to be visible without collections:
Other possible causes:
No.
I’d recommend taking a look at Hypergate.
There is a project which was initiated (but not wholly supported) by Google to bring Kerberos support to Android through an application. Take a look at the respective GitHub repo to learn more, though note the project has seen no activity since 2019 and should be considered abandoned.
Related: Setup Kerberos Authentication on Ivanti EPMM (formerly MobileIron Core) for Android Enterprise
This is a known limitation of the Android Management API.
When deploying apps via closed testing tracks (also known as app tracks) through managed Google Play, the managed configuration schema (managed properties) is only pulled from the production version of the app. If the app has never been published to production, or if the production version has a different configuration schema than the track version, the EMM will either show no managed config options or show outdated ones.
This affects organisations that:
Workaround: Publish the app to production with the correct managed configuration schema, even if the production version is not the one actively deployed to devices. The production listing controls what managed config options are available in the EMM console, regardless of which track version is installed on devices.
For more detail on this limitation, see Managed configurations and app tracks.
Yes. As of September 2024, Google Play Protect no longer sends sideloaded applications for cloud scanning on enterprise-managed devices.
Previously, when an app was installed outside of Google Play or managed Google Play (including apps pushed by an EMM's own installer), Play Protect would prompt the user to send the app to Google for scanning. This was an additional layer of protection beyond on-device detection.
Google removed this behaviour on managed devices in response to enterprise feedback. Organisations raised concerns about private, internally developed applications being uploaded to Google's servers for analysis - a data handling concern for security-conscious environments.
Partially. On-device Play Protect detection continues to function. Known malicious applications will still be flagged and may be removed regardless of how they were installed. What has changed is that unknown apps (those not in Google's database) are no longer sent for cloud-based analysis on managed devices.
For most enterprise deployments where apps are distributed through managed Google Play or a trusted internal pipeline, this change has minimal practical impact. Organisations that rely heavily on sideloaded apps from less controlled sources should consider additional endpoint security measures.
No. On personal (unmanaged) devices, Play Protect continues to offer the cloud scanning prompt for sideloaded apps as before.
Sources:
For all EMMs that support it, the Google Play iFrame supports the simple, few-step process of uploading an APK for distribution to your Enterprise.
Unlike adding an APK directly into the UEM console, uploading to Google Play is safer, easier to manage and less likely to lead to issues compared with pushing APKs directly. Benefits include:
More information: Create and manage private apps for Android Enterprise
Where the Play iFrame isn’t supported, it’s possible to upload and distribute through the Google Play Console but keep in mind there’s a $25 fee to set up a developer account.
As of 2025, managed Google Play supports Android App Bundles (AAB) for private apps, offering smaller downloads and optimised delivery compared to APKs.
For organisations using AMAPI, direct APK installation is also now supported natively through the AMAPI SDK, providing an alternative for scenarios where Play distribution is not suitable - such as air-gapped environments or rapid iteration during development.
From September 2026, Google requires apps on certified Android devices in select regions to come from verified developers. This applies to privately distributed apps as well. Organisations should ensure their Google Play developer accounts are verified ahead of this deadline. See Google Play developer verification for details.
Note: Google Play will only permit one package name (com.app.name) for an application across the whole Google Play estate, meaning if you wish to upload an app privately today, and make it available publicly later, you must use unique package names for each upload.
The application roles feature allows an IT admin to grant special privileges to a managed application on an Android-powered device. By assigning a specific role, an app can be exempted from power and background restrictions, suspension, hibernation (on Android 14+) and have user controls (i.e. includes user actions like force-stopping and clearing app data) disabled (on Android 11+), allowing it to perform its critical function without interruption. Additionally, the app can be notified of its assigned roles, which allows it to bootstrap itself without user intervention.
The available roles are:
One application can have many roles, but a role can only be assigned to one app.
Application roles are configured within the applications section of an AMAPI policy and are supported on fully managed, dedicated, and work profile deployment scenarios, depending on the role.
For custom DPC implementations, roles are not applicable - they are an AMAPI-only feature.
Starting in September 2026, Google requires that apps installed on certified Android devices in select regions come from verified developers. This requirement rolls out to additional regions from 2027 onward.
For most enterprise deployments, the impact is minimal:
Where developer verification does matter for enterprise:
User-initiated sideloading - if users install apps outside of EMM-managed channels on certified devices (for example, downloading APKs from a website), those apps will require a verified developer in affected regions. From August 2026, sideloading apps from unverified developers requires an "Advanced Flow" that includes enabling developer mode, a mandatory 24-hour waiting period, a device restart, and biometric or PIN authentication before the install is permitted. Users can then choose a 7-day or indefinite sideloading window. ADB-based installation remains unaffected.
Third-party dependencies - if the organisation relies on public Google Play apps from smaller developers or niche vendors, those developers need to complete verification through the Google Play Console. Apps that lose the ability to be installed due to an unverified developer could disrupt workflows after the extension period ends.
Google also offers free limited distribution accounts for students and hobbyists, allowing app sharing with up to 20 devices without requiring government ID verification or the $25 registration fee.
More detail on this change and what organisations should do to prepare can be found in Google Play developer verification: what this means for consumers and enterprise.
It depends on the deployment scenario. On a fully managed device with no additional profiles, a single VPN policy creates a device-wide connection that routes all traffic. On any device with multiple profiles - work profile, COPE, or Private Space - VPN operates per-profile, and a single connection cannot cover the entire device.
Fully managed (no work profile)
A VPN configured by the device owner applies to all apps and traffic on the device. There is only one profile, so a single VPN connection covers everything.
COPE (company-owned, work profile)
On a COPE device, VPN must be configured separately for the device-level (personal side) and the work profile. These are independent VPN connections managed by different admin scopes - the device owner controls device-level VPN, and the profile owner controls the work profile VPN. A VPN set at the device level does not automatically cover work profile traffic, and vice versa.
If full coverage is required on a COPE device, the administrator must deploy VPN policies to both scopes.
BYOD (personally-owned work profile)
A VPN configured by the profile owner applies only to the work profile. The administrator has no control over VPN on the personal side - this is entirely under the user's control. Personal traffic is unaffected by the work VPN, and the user can independently configure their own personal VPN if they choose.
Private Space (Android 15+)
Private Space behaves like a separate profile. VPN configured on the personal/parent profile does not apply to Private Space apps, and vice versa. To route Private Space traffic through a VPN, a VPN app must be installed and configured within Private Space itself.
On COPE devices, administrators can block Private Space creation entirely if VPN coverage gaps are a concern.
Always-on VPN, available since Android 7.0, starts the VPN service automatically on device boot and keeps it running. The connection persists across reboots and app updates without user interaction.
When lockdownEnabled is true, all network traffic is blocked if the VPN is not connected. No traffic can leak to the open internet. When false, traffic flows unprotected between device boot and VPN connection establishment - this is by design but often misunderstood.
Some apps may need network access before the VPN is established (for example, during provisioning). From Android 10, specific apps can be exempted from lockdown so they fall back to normal networking when the VPN is unavailable.
From Android 11, users can no longer disable always-on VPN when it has been configured by an administrator. On company-owned devices, no user consent dialog is shown when enabling always-on VPN.
To prevent users from changing VPN settings entirely, set vpnConfigDisabled: true (AMAPI) or apply the DISALLOW_CONFIG_VPN user restriction (custom DPC).
Per-app VPN is a platform feature built into the Android VpnService API. It allows routing traffic from specific apps through the VPN while other apps use the normal network connection (or vice versa).
This is configured through the VPN app itself, not directly through EMM policy. The EMM sends managed configurations to the VPN app specifying which apps should be included or excluded, and the VPN app implements the filtering using VpnService.Builder.addAllowedApplication() or VpnService.Builder.addDisallowedApplication(). These two modes are mutually exclusive - you allowlist specific apps or blocklist them, not both.
If the VPN app does not support per-app VPN, the EMM cannot force it. Check with your VPN vendor for managed configuration support.
vpnConfigDisabled: Setting always-on VPN without also disabling user VPN configuration means users may be able to modify or disable the VPN on some devicesGoogle Play Protect now enforces an allowlist of approved Device Policy Controllers (DPCs) during provisioning. If your DPC isn’t on the list, Play Protect can flag it as “Harmful app blocked” even when it’s legitimate.
Before you appeal:
Then submit an appeal using Google’s DPC allowlist form (linked from the Play Protect warning/help article). Explain the business use case, the permissions you request, and how users are informed.
What to expect after submitting an appeal:
Read more in the full article: The DPC allowlist.
Yes, in certain circumstances.
Google Play Protect runs on all GMS-certified Android devices, including those under enterprise management. If Play Protect identifies an app as potentially harmful, it can:
This applies regardless of how the app was installed - including apps pushed by the EMM or sideloaded as part of an enterprise workflow. On managed devices, this can be particularly disruptive for:
What can administrators do?
Best practice: test all deployed applications against Play Protect in a staging environment before fleet-wide deployment. Monitor for Play Protect warnings in device reports and respond promptly to avoid workflow disruption.
Play Protect's cloud scanning of sideloaded apps on managed devices was removed in September 2024, but on-device detection continues. See the related FAQ: Has Play Protect changed how it handles sideloaded apps on managed devices?.
Apps showing as "pending" indefinitely after enrollment or policy assignment is one of the most commonly reported managed Google Play issues.
Network connectivity - the device needs a stable internet connection to download apps from Google Play. Verify the device can reach play.google.com and related Google services. See network requirements for Android Enterprise for the full list of endpoints.
Incorrect date and time - if the device clock is significantly out of sync, Play Store authentication may fail silently. Ensure the device is set to automatic date and time, or configure this via policy.
Insufficient storage - the device may not have enough free space to download and install the app. This is particularly common on dedicated devices with limited internal storage.
Sequential installation - managed Google Play processes app installs in small batches. If many apps are assigned at once, some will remain pending while others download and install. This is expected behaviour and will resolve over time.
Play Store cache - corrupted cache data can cause download failures. Clearing the Play Store app's cache and data (Settings > Apps > Google Play Store > Clear cache/Clear storage) often resolves the issue.
Google account sync - on work profile devices, the managed Google Play account may not have synced correctly. Opening the managed Play Store app and allowing it to complete initial setup can resolve the issue.
Stuck or pending system app - Many OEMs now have system applications hosted in Google Play for updates. These can start updating at the same time managed applications are expected to come down, slowing things down in ways that might not look immediately visible.
If apps remain stuck after the above steps, the issue may be related to the EMM's app deployment configuration, a Google Play services outage, or a device-specific bug. Raise a support case with your EMM vendor if the problem persists.
Enhanced fraud protection is a Google Play Protect feature that automatically blocks the installation of sideloaded apps requesting sensitive permissions commonly associated with financial fraud, such as reading SMS messages, accessing notifications, or using accessibility services.
As of early 2026, it is active in 185 markets across approximately 2.8 billion devices.
Yes, in specific circumstances. If an organisation distributes line-of-business apps by sideloading (installing APKs outside of managed Google Play or an EMM agent), and those apps request sensitive permissions, enhanced fraud protection may block the installation.
This is most likely to affect:
adb during development or staging that are then handed to end usersEnhanced fraud protection is distinct from the content protection policy, which focuses on detecting deceptive app UI patterns on Android 15+ fully managed devices.
No. There is no supported way to purchase paid apps through managed Google Play today.
Google previously offered the Bulk Purchase Program - Android's equivalent to Apple's VPP - which allowed organisations to buy paid app licences in bulk and distribute them through managed Google Play. BPP was only available in the United States and Canada, and has since been deprecated. Organisations that already hold purchased licences can continue to manage and assign them, but no new purchases can be made.
For managed Google Play Accounts enterprises - where user accounts are created and managed entirely by the EMM - there is no associated payment method, so purchases aren't possible at all.
For managed Google domain setups with user authentication (Google Workspace, Cloud Identity), users have full Google accounts and can add a personal or company payment method. In this scenario, individual users can purchase paid apps directly and expense them through normal organisational channels, bypassing the need for bulk licensing entirely.
Licenses are non-transferrable across Google accounts though, so this is a one-and-done license purchase if permitted.
This limitation applies specifically to managed Google Play. On unmanaged personal profiles - so BYOD, COPE, or indeed no management at all - users can still purchase apps through the standard Google Play Store using their personal Google account.
Yes, but only on company-owned work profile (COPE) devices. Personally-owned work profile devices (BYOD) offer no personal app management whatsoever - the EMM has zero visibility into or control over the personal profile on BYOD.
On company-owned devices running Android 11+, personal usage policies allow organisations to control which apps are available in the personal Play Store. There are two modes:
Blocklist mode - the default-like behaviour. Users have full access to Google Play, but specific apps listed by the administrator are blocked. Any blocked app already installed on the personal profile is automatically uninstalled.
Allowlist mode - the restrictive option. The personal Play Store shows only apps explicitly approved by the administrator. Everything else is unavailable, and any app not on the allowlist that is already installed will be automatically removed.
In AMAPI, this is configured through the personalUsagePolicies object within the policy resource:
"personalUsagePolicies": {
"personalPlayStoreMode": "BLOCKLIST",
"personalApplications": [
{
"packageName": "com.example.unwanted.app",
"installType": "BLOCKED"
}
]
}
For allowlist mode, set personalPlayStoreMode to ALLOWLIST and list permitted apps with installType: "AVAILABLE".
Custom DPC EMMs implement this differently depending on the vendor. Microsoft Intune exposes it as a "restricted apps list" under COPE device restriction profiles. Omnissa Workspace ONE, SOTI MobiControl, and others surface similar controls through their respective policy consoles, though the underlying enforcement is the same Android platform mechanism.
Beyond app availability, personalUsagePolicies supports several other controls on company-owned devices:
maxDaysWithWorkOff sets how long a user can keep the work profile paused (minimum 3 days)These policies do not provide any access or visibility to the applications or data within the personal profile. The organisation controls the catalogue of what can be installed, but cannot see which apps are actually installed, what data they contain, or how they are used. Personal privacy is maintained by design.
Personal usage policies also do not affect pre-installed system apps or OEM apps on the personal side. These are part of the device image and remain present regardless of allowlist or blocklist settings. For more on how system apps behave on COPE, see system app management on COPE devices.
The personal app allowlist and blocklist only govern the Play Store. If unknown sources is enabled on the personal profile, users can sideload apps that bypass these restrictions entirely. For most COPE deployments, blocking unknown sources on the personal profile is strongly recommended alongside any app restriction policy.
For more on what changed with COPE in Android 11 and why these policies exist, see Android 11 COPE changes and can organisations deploy apps to the parent profile?.
Not concurrently, no. Android only permits a single active VpnService per user, which means a single work profile, personal profile, or fully managed device can host exactly one system-level VPN connection at a time.
Android's VPN framework is built around the VpnService class. When a VPN app calls establish(), the system installs its virtual network interface as the default route for that user. Starting a second VpnService does not add a parallel tunnel - it replaces the first. The displaced service receives onRevoke(), its interface is torn down, and the new one takes over.
If both VPN apps are configured to reconnect automatically (or if one is set as always-on VPN), the result is an endless disconnect-reconnect loop as each app tries to reclaim the interface. This is the single biggest source of "my VPN keeps dropping" reports when two clients are installed side by side.
Most of the time, the underlying requirement isn't really two concurrent tunnels - it's selective routing, or separation between work and personal traffic. Android provides several mechanisms that cover the real use cases:
A single VPN client can route only specific apps through the tunnel while leaving others on the direct network, using VpnService.Builder.addAllowedApplication() or addDisallowedApplication(). These are mutually exclusive - allowlist or blocklist, never both.
Configuration is done through the VPN app's configurations, not directly through AMAPI or DPC policy. Check with your VPN vendor for managed config keys that accept allow/deny package lists.
This is the closest Android comes to "multiple VPN routing" within a single profile: one tunnel, different behaviour per app.
Some enterprise VPN clients implement split tunnelling at the network layer - certain destinations go through the tunnel, everything else goes direct. This is handled by the VPN app's own routing logic and has no Android-level equivalent; capability varies by vendor.
VpnService)An application can open its own TLS, QUIC, or proxy connection to a back-end without using VpnService at all. These connections are opaque to Android's VPN framework, so they do not conflict with a system VPN and can run alongside one. Browsers with built-in proxies, messaging apps with end-to-end transport, and some enterprise SDKs work this way. Only traffic generated by that app is affected.
The one-VPN-per-user rule is scoped to a single Android user. A device with a work profile, COPE personal side, or Private Space can run a different VPN in each scope concurrently because each is a distinct Android user. This is a real way to have "two VPNs running at once" - but it requires the traffic you want routed to originate from the corresponding profile.
See Is it possible to utilise a single VPN connection across the entire device? for how VPN scoping interacts with each deployment model.
VpnService concept. Chaining, if required, must be implemented inside a single VPN clientNeed something else answered? Submit an issue, tweet @jasonbayton or tag me in a LinkedIn post. Questions may be republished on this document, or form the basis of a new document under /android.