This is already handled with existing permission management capabilities in EMMs, Click here for more details on the change.
Below you’ll find a number of frequently asked questions I receive related to Android Enterprise.
This is already handled with existing permission management capabilities in EMMs, Click here for more details on the change.
The account type chosen can have a significant impact on enrolment if not done so correctly.
User based accounts are tied to an EMM user and will be used across all devices enrolled by said user.
Device based accounts are created per-device irrespective of the user the device enrols under.
In either scenario, that standard limitation of 10 devices per Google account applies, therefore if using one EMM user account to enrol many devices – a common staging exercise – it is imperative device based accounts are selected.
How these account types are changed is EMM specific, so do reach out to your EMM vendor for instructions.
Adding accounts allows end-users to head into Settings - Accounts and add an account.
Configure credentials allows an end-user to configure account credentials in-app.
Both options have legitimate uses, for example the adding of accounts and configuring of credentials may be permitted in a COPE deployment as end-users would be allowed to add a Google account and download their own applications complete with personal accounts.
On the other hand, enabling add accounts in a fully managed or work profile deployment scenario would allow end-users to switch to their personal Google account within Google Play, providing full access to the Play Store from which they may install applications which encourage data leakage and raise DLP concerns (Dropbox sat alongside OneDrive, for example).
Restricting Android Device Policy to a single Google Workspace tenant is very straightforward. In your DPC extras, add the line:
{
"android.app.extra.PROVISIONING_ADMIN_EXTRAS_BUNDLE": {
"com.google.android.apps.work.clouddpc.EXTRA_FORCED_DOMAINS": "[\"domain.name\"]"
}
}
If your organisation leans on multiple domains across organisational groups, here's an example of allowlisting 3 domains within the ZT DPC extras for Google Workspace:
{
"android.app.extra.PROVISIONING_ADMIN_EXTRAS_BUNDLE": {
"com.google.android.apps.work.clouddpc.EXTRA_FORCED_DOMAINS": "[\"bayton.org\",\"jason.com\",\"impressivedomain.com\"]"
}
}
When a Google account entered during provisioning doesn't match one of these domains, a small red error will show beneath the text input as follows:
Please enter an email address for one of the following: bayton.org, jason.com, impressivedomain.com.
There is no path to convert a MADA device (GMS/Play Protect certified) to EDLA.
While Google offered a grace period during the introduction of the EDLA licence, this has long since closed. To convert a MADA device to EDLA, it must undergo new EDLA certification, and both SKUs (if >1000 are in market) must be supported for the licence period.
Officially no, these devices are not supported for Android Enterprise. These devices may also be referred to as AOSP, and an excellent example of an uncertified, AOSP device is the Kindle Fire.
Unofficially without GMS certification modern Android devices do allow for limited Android Enterprise management with an EMM that supports closed network or non-GMS management, or a custom DPC that directly interfaces the Device Policy Manager (DPM) APIs on the Android device. Your mileage may vary on what is possible, but assume that account and application based functionality that leans on Google Play services, Google Play, or any other aspect of the GMS suite of applications will not work.
Furthermore, standard provisioning methods will not work, as these are provided by Google's Set Up Wizard (SUW) flow. The only option, unless the AOSP device OEM implements a different solution, is to set an application as a Device Owner (DO) through ADB.
Throughout this site and across Google's official documentation and resources there are multiple references to the bind, or binding of a Google account to an organisation's EMM/MDM platform of choice in order to use Android Enterprise, but what is it?
Android Enterprise consists, very simplistically, of three aspects:
In order to leverage 2 and 3, an enterprise is required. This enterprise is created when an organisation goes through the process of linking a Google account - either via Google Workspace or with a standard consumer Google account (@gmail.com or under an existing email address) - to their EMM.
For the organisation it's a reasonably straightforward sign-in and setup flow (at least for those who don't use Workspace) that'll create an enterprise, which generates the appropriate authentication tokens and assign an enterprise ID to allow the EMM to then handle all account and application management going forward.
What sort of account and application management?
This is a very high-level explanation only, and doesn't cover off the intricacies of things like Play EMM API, AMAPI, differences between Google Workspace and Google accounts, and a multitude of other factors that determine the features and functionality associated with binding for device management.
Android Enterprise was introduced with Android 5.0 Lollipop under the moniker Android for Work.
With that said, very few OEMs originally supported Android Enterprise in the earliest days of its existence; Android Enterprise was not a component of the Android Compatibility Definition Document (CDD) nor did Google throw any significant weight behind it. It is commonly considered a mandatory requirement from Android Marshmallow (6.x) and above, with reasonably universal compatibility almost guaranteed from Android Nougat (7.x).
If considering support for older versions of Android today, AE compatibility should be only one small factor in the decision. Other considerations should include:
No.
While the new signup flow introduced in 2024 now guides administrators towards creating a managed Google Workspace environment, there is no cost to this, and domain validation is optional.
Furthermore, should an organisation choose to opt out of Google Workspace, they can continue creating a bind with a standard Gmail account, and the EMM will create unique and generic managed Google Play service accounts on each Android device that allow sign in to the Google Play Store for application management as it has always been.
The greatest benefit to using a free Google Workspace environment comes from identity, allowing managed devices to authenticate as users in the company domain in order to benefit from user assignment and user-based policies. Google have additionally expanded the signup process to work with Microsoft 365 accounts to tie in automatic external identity management within Google Workspace, removing an additional SSO integration requirement.
I’ve encountered several examples of things not working quite right with AER devices, particularly when diving into the granularity of a specific function with a specific EMM.
The first point of contact for any device based issue would be the EMM vendor. While it may not be an issue which can be replicated on a different model or OEM, the EMM vendor will still investigate it, particularly if it can be replicated on one or more devices of the same model.
Before contacting the EMM, the organisation should ensure the issue can be replicated on more than one device. If so, attempt to collect logs from the EMM, the device (a bug report, though be aware this will collect personal account information also) and steps to replicate it along with all of the normal details – make, model, Android version, build number, etc. A video is always appreciated though do add the steps on paper also.
If the EMM can replicate it but cannot resolve it, they will have OEM contacts to reach out to progress it. If necessary, Google will be involved once all other avenues are exhausted, or it’s determined to be a platform issue.
I do a fair amount of device testing, so if you do come across something and your EMM is not providing the support needed, feel free to reach out and I’ll be happy to help.
Historically this has not been possible. An Android Enterprise ID (organisation ID) is associated with only one EMM at a time, and a Google account can only manage one bind at a time; under all normal circumstances attempting to bind with the same Google account on another EMM will return an error stating an Enterprise already exists.
From mid-2024 however, with the roll-out of Google's new customer signup process designed to bring the enterprise arms of Google Cloud, Google Chrome/ChromeOS, and Android under one domain-managed account, this is no longer a limitation.
With a new, enterprise domain-led bind approach, all organisations binding with their EMMs will be able to create an organisation account associated with a zero-cost managed Google Enterprise domain (think Google Workspace, or perhaps more apt, a Google Cloud Identity tenant). With this approach, once the domain is verified as owned by the organisation, multiple EMMs (or multiple accounts under one EMM) can create as many organisation IDs as desired, and all will be managed under one Google Enterprise console.
For organisations with existing binds to EMMs using a consumer Google/Gmail account, the existing, legacy behaviour still currently applies:
Attempting to bind with the same Google account on another EMM will return an error stating an Enterprise already exists.
It is possible to unbind from one EMM and then bind with another, however this will delete the existing Enterprise and create a brand new one, losing all approved applications, etc.
The only exception to the above is in high availability and/or disaster recovery scenarios where an instance of an EMM may be replicated, but no two EMMs should be generating managed Google Play accounts from the same Google account simultaneously.
Google are expected to support migrations to Google Workspace domains for existing organisations in the future.
Not all Android devices come with GMS, or Google Mobile Services, certification.
What is GMS?
GMS certified devices, or more recently rebranded by Google as Play Protect certified devices, are Android devices that have undergone the 60+ hour testing and approval process with Google or a 3PL lab on Google's behalf. This testing, which consists of various security & compatibility validations, ensure the Android device under test behaves, looks, and feels consistent with the rest of the Android ecosystem. It ensures an OEM doesn't preload harmful (as in malware, but also as in privacy) applications, it ensures the OEM builds are up-to-date on vulnerability management and have patched all known CVEs over 60 days old, and it ensures apps install properly, work consistently, and all ecosystem-wide behaviours and implementations meet Google's strict requirements.
Most of the requirements for an Android device heading to GMS certification can be found through the CDD, or Compatibility Definition Document. This is a public document that outlines every requirement for Android under MUST, SHOULD, and MAY.
If you come across references to CTS, VTS, BTS, STS, GTS, or less generally grouped as "XTS", these are the individual tests that make up the validation & certification process for GMS.
Before putting an Android device through these tests, the OEM must sign an agreement with Google; the GMS - Google Mobile Services - agreement is an additional contract that defines requirements for bundling Google applications on the Android device. Requirements include mandatory and optional Google apps (Google core and Google optional, respectively), home screen layouts, app icon positioning and much more. These requirements are further broken up into regional and use case agreements, such as MADA for most of the world, eMADA for Europe, EDLA for enterprise or non-standard form factors, and others. Each agreement also comes with requirements for longevity, transparency (i.e. period of support for software on a device lifecycle published publicly, etc).
Understandably a lot of this is NDA, so it's not easy to be overly transparent about Google's requirements and processes for certification.
How do I validate a device is GMS certified?
This is surprisingly not that easy to discern for the general public, as Google doesn't explicitly maintain a list of certified devices under the heading of certified devices.
Instead, there are three indirect means of validating devices are certified:
If the OEM/ODM is listed in link 1, there's a reasonable assumption the hardware they provide has certification, since Google leans on OEMs to certify the hardware they make once they're granted an agreement.
But if the device is listed in link 2, you know for sure it's certified. These lists aren't updated daily, so the absence of a device doesn't immediately indicate a device isn't certified.
The caveat for 3 is a device may be whitelisted with Google before getting formal approval, so may not have passed GMS testing just yet. This can be cross-checked with the above links to form a reliable opinion.
Customer signup bind management
When a bind is associated to the customer signup flow introduced in 2024, it is permanently associated with the Google Workspace environment/domain used during the bind setup process.
While bind migration between Google Workspace environments is not currently documented by Google, it is no longer associated to a single Google account, and any user with the appropriate permissions within the Google Workspace tenant is able to manage the bind.
Information on user role management in Google Workspace can be found here, while managing users can be found here.
Legacy bind management
Yes, it is more recently possible to configure the accounts responsible for managing the Android Enterprise organisation (enterprise) ID
Add an account

Adjust permissions

NB: Owners can add and remove other accounts, while Admins are limited to only managing the enterprise. This follows the same permissions model as other enterprise solutions Google offers, such as zero-touch.
Remove an account

Notes
The same recommendations continue to apply when adding new accounts - if you're making a new Google account to add in, please use the "current email address" option and associate the Google account with a work email address. This makes account recovery much simpler, and avoids questions around why emm.account.3@gmail.com exists in future.

In other words, don't do what I did when I bound my EMM to emmsetup@gmail.com back in 2017 (see above).
Note also that Google Workspace accounts are not supported for administering enterprises with the legacy bind management flow. If a Google Workspace user is invited, they will receive an invite only to be informed "G Suite users are not supported":

Perhaps this will be addressed in future, or at the very least engineering will update the message to reflect the Google Workspace branding.
One final point to mention, a Google account can only administer one enterprise. If an invited account is already administering another enterprise, they will see an error:

Yes, on userdebug and engineering builds.
By design, production Play Protect Certified Android builds ship with /system mounted read-only and protected by dm-verity. This ensures the partition can’t be tampered with, maintaining the integrity of the OS. On non-production builds, however, you can temporarily disable verity and remount /system as read-write in order to make changes.
Steps
adb root
adb disable-verity
adb reboot
/system:adb root
adb remount
adb shell
mount -o rw,remount /system
At this point /system is writable and you can make modifications.
adb root
adb enable-verity
adb reboot
Considerations
/system can break the OS or prevent booting, so proceed with caution.This approach is intended for development and testing. For production devices, modifying /system is not supported.
If you see errors similar to:
..or any message similar to the above, this will be due to Google's choice to prevent anyone from using the Android Management API without business justification & approval.
Older projects, those created in early 2025 or prior, may only see this in relation to an unverified project exceeding 500 devices. In all cases the approach to unlock AMAPI for your organisation is to read, accept, and submit a quota increase form via the Permissible Usage page under AMAPI Guides:
https://developers.google.com/android/management/permissible-usage#quotas_and_restrictions
This process can take multiple weeks, so patience is required. It is imperative not to progress with development or engagements prior to approval being given.
Also note, approval for a quota does not mean product verification. Quotas still remain after approval is given. Verification is undertaken through the Android Enterprise Partner Portal.
There are many reasons an application may not be able to install on a device, from compatibility to environmental issues, but this document focuses on policy-induced issues.
Devices managed using Android Enterprise may restrict the ability to install or uninstall applications.
What causes this restriction?
An administrator has enabled one or both of the following restrictions:
When enabled, Android blocks these actions at the system level. This applies to all installation methods, including Google Play, APK files, and third-party app stores. This also includes any EMM-derived app installs or removals.
What will I see as an end user?
The experience varies slightly by Android version and device manufacturer, but commonly includes:
This can appear as a fault, but it is expected behaviour when the policy is active.
Why would an organisation enable this?
These restrictions are what could be considered the nuclear option, and override all other known application restriction policies. It means no matter what policies could be applied, the device will not deviate from the state it was in when the policies were set.
Can I bypass this restriction?
No.
How do I install or remove an app I need?
You’ll need to contact your organisation’s IT administrator or support team. They can:
Is this a bug?
No.
If app installation or removal is blocked, the device is functioning exactly as configured. If the restriction is no longer required, the policy must be updated by the administrator.
Unfortunately this policy is set all too often as a default with the expectation EMM-derived application changes will override this policy. This is not the case.
If in doubt about app install/uninstall issues, validate these restrictions have not been set.
While it’s indeed true Android Enterprise was introduced as Android for Work with Lollipop (and supported even earlier with the app (but we don’t talk about that), Android Enterprise was an opt-in feature with little uptake and a lot of teething issues. From Android Marshmallow (6.0) it became a mandatory requirement.
In other words, Marshmallow is chosen as a reasonably reliable reference point for when Android Enterprise was guaranteed to be widely supported. There will be OEMs that can confidently state they supported it from Day Zero, however few did.
Both Lollipop and Marshmallow are well past end of life. For current deployments, Android 14 should be considered the practical minimum - it is the oldest version still receiving security patches from Google, though some older versions are still actively patched by OEMs directly on certain devices. If you're planning a new deployment, target Android 15 or newer where possible to take advantage of the latest management APIs and security features, while ensuring prolonged security updates and support.
Android Enterprise support is coming to Android XR devices, though availability is currently limited.
The Samsung Galaxy XR, the first major Android XR headset, launched in late 2025 built on the Android XR platform. At launch, Android Enterprise device management features were not available. Google has confirmed these will be activated through a future software update.
Samsung Knox management is available for the Galaxy XR, meaning some enterprise management capabilities (remote setup, encryption, monitoring) can be used through Knox-compatible EMMs. Full Android Enterprise API support - including work profiles, managed Google Play, and AMAPI policy enforcement - is pending.
Other manufacturers including Lenovo are developing Android XR devices for enterprise use. These are expected to support Android Enterprise management once the platform features are activated.
If your organisation is evaluating XR headsets for enterprise deployment:
Sources:
Note: The Android One programme appears to be no longer active. Google has not announced new Android One devices since approximately 2022, and the programme is no longer marketed or accepting new validations. The information below is retained for historical context.
Android One and Android Enterprise Recommended were two different programmes offering a bit of overlap in security and consistency.
Android Enterprise Recommended ensures devices validated meet the minimum requirements and recommendations of a consistent UX for management, 90 day security updates for 3 years and at least one letter upgrade (O to P, P to Q.. ). OEMs maintain their value-adds, bundled apps, custom UIs and more.
Android One took this a step further; any device in the Android One programme used a system image developed with Google. Like the Nexus days of old, the UI was vanilla Android and the Android One team had to approve any additional applications bundled with the device.
Updates had to be released every 30 days and the devices had to support two letter upgrades (O to Q, P to R, etc).
When combined with AER, Android One offered additional benefits validated to work in the enterprise.
For current device procurement decisions, Android Enterprise Recommended is the relevant programme to evaluate.
If the Google account used for your Android Enterprise bind is disabled or marked for deletion by Google, the consequences can be severe. Depending on the EMM and the state of the bind, devices may lose access to managed Google Play, app deployment may fail, and new enrolments could be blocked.
This situation most commonly affects organisations using a personal Gmail account (or a standard Google account under a non-Google email address) for their bind. Google may disable these accounts for perceived policy violations - sometimes without clear explanation - and the recovery process can be slow and uncertain.
Why this happens:
What to do if your bind account is disabled:
Contact me if you can't progress, I can see what I can do to help. Ensure you have:
How to prevent this: The recommended approach is to migrate to a managed Google domain (Google Workspace or Cloud Identity). Domain-verified accounts are managed by the organisation rather than subject to consumer account enforcement. This also unlocks the ability to bind with multiple EMMs under one domain.
For more on what the bind is and how it works, see What is the Android Enterprise bind?.
Device Admin (DA) has been deprecated since Android 10 (2019). From Android 15, DA APIs are no longer available for new device activations. Android Enterprise is the only supported path for managing Android devices. If your organisation is still using Device Admin, migration to Android Enterprise should be treated as urgent.
For an in-depth take on this, check out:
Device Admin was introduced with Android 2.2 as a means of granting admin permissions to applications. Any number of admins could sit on a device and have excessive, often unnecessary control. It was widely abused by PHAs (malware, etc) and was very limited in scope of capability, leaving each OEM to build upon it in a fragmented and difficult to support manner.
Android Enterprise takes a more structured approach to device administration by permitting only one owner on a device at a time with scope for task delegation to other apps as defined by the management server. This approach is fundamentally more secure and easier to support as the APIs are universal cross-OEM.
Add in features such as no Google account management, silent app distribution, managed system updates, simple provisioning and streamlined enrolment, and it’s clear why Android Enterprise replaced Device Admin entirely.
What is the bind?
If you're not entirely sure what the Android Enterprise bind is, check out this FAQ.
If you need to unbind from your existing EMM, whether to -
Or any other perfectly valid reason, the steps to follow are straightforward.
Be aware before you delete the bind, that it is not reversible. All devices will be unenrolled, all private applications will be inaccessible, and all data associated with the old enterprise will not be recoverable!
This is a permanent action.
Via your EMM
In the first instance, the simplest course of action is to unbind through your EMM. Here are some current links to this:
Feel free to submit a PR with additional EMM articles!
Some platforms don't support removing the bind through EMM administrative settings. Some platforms, like SOTI, only unbind and don't delete the enterprise ID. This is useful for future rebinding if platforms support it, but otherwise it's another step in the process an organisation is forced to take to fully delete the bind.
Via Google Play admin settings
If the EMM platform doesn't support deleting the bind, or if you no longer have access to the EMM to do so, you can head to Google Play Enterprise admin settings to do so:
Here's a handy GIF that runs through it:

As indicated, the enterprise cannot be deleted with multiple admins present, so if you need to delete it, remove existing admins first.
With the bind removed, you're now ready to re-use the account to create a new bind with your existing or alternative EMM provider.
Yes, but with important limitations.
Google supports migrating devices from a custom DPC (using the Play EMM API) to the Android Management API (AMAPI) without requiring a factory reset. This is done through the AMAPI SDK's DPC migration functionality.
Prerequisites:
Key limitations:
How it works:
Notable example: Microsoft Intune completed its migration of Android personally-owned work profiles to AMAPI, with corporate-owned migrations following.
For more context on how DPC migration works and what to expect, see AMAPI publicly adds support for DPC migration.
From Android 15 it is possible to configure and deploy eSIM profiles, both full and partial, to Android devices.
Where a partial eSIM profile is deployed, it needs only a pointer to the relevant SM-DP+ server to fetch the full configuration.
For company owned devices - fully managed and work profile - it is possible to deploy configurations and prevent their removal. For personally-owned work profiles, configurations can be pushed, but end-users have the ability to remove the eSIM themselves.
Android 16 enhancements:
userInitiatedAddEsimSettings policy on company-owned devices (Android 15+)Note that on Android 16+, when a work profile is removed from a personally-owned device, managed eSIM profiles are always wiped regardless of other policy settings.
Samsung Knox extends Android Enterprise with additional device management capabilities through the Knox Service Plugin (KSP), an OEMConfig-based application. Understanding how these layers interact is important for avoiding policy conflicts.
Android Enterprise provides a standard set of management APIs that work across all certified Android devices. Samsung Knox adds Samsung-specific APIs on top, accessible through KSP.
When managing Samsung devices, an EMM typically applies:
KSP is deployed as a managed application with managed configurations. The EMM pushes a configuration profile to KSP, which then applies the Samsung-specific policies locally on the device.
Some policies exist in both Android Enterprise and KSP. If the same policy is set in both, the device may not apply them predictably. Common overlap areas include:
Best practice: set each policy in only one place. If a capability is available through both standard Android Enterprise and KSP, choose one and be consistent across your policy set.
KSP works with fully managed, dedicated, and personally-owned work profile devices. It does not apply to the COPE (work profile on company-owned device) management mode. If KSP policies are applied to a fully managed device and the device is later switched to COPE, previously applied KSP policies may persist unexpectedly.
If KSP policies are not applying as expected:
verboseMode in the KSP managed configuration to see which policies are deployedFor more on OEMConfig generally, see What is OEMConfig?.
Sources:
Advanced Protection is a device-level security mode introduced with Android 16. It bundles a broad set of hardened security settings behind a single toggle in Settings > Security & Privacy, and is designed for users at higher risk of targeted attacks - journalists, executives, activists, and similar.
When enabled, Advanced Protection activates the following protections:
This is distinct from the existing Google Advanced Protection Program (APP), which is an account-level security programme requiring hardware security keys. The Android 16 Advanced Protection mode is a device-level feature that does not require APP enrolment, and is available to any user on a supported device.
As of early 2026, Advanced Protection cannot be enforced or configured centrally by IT administrators through AMAPI. There is no policy field in the Android Management API to toggle it on or off. It must be activated individually by the end user on each device.
Google does provide the AdvancedProtectionManager API, which allows applications to query whether Advanced Protection is enabled and register callbacks for state changes. This means an EMM or compliance app could detect whether a user has enabled it and take action accordingly - for example, flagging non-compliant devices or gating access to sensitive resources - but it cannot enforce activation.
Many of the individual protections that Advanced Protection bundles are already available as separate AMAPI policies. For example, admins can already block sideloading (installUnknownSourcesDisabled), enforce Play Protect, restrict USB access, and manage system updates independently. What Advanced Protection offers is a user-facing shortcut that activates all of these at once, plus protections like MTE and intrusion logging that are not individually exposed through management APIs.
If Google exposes Advanced Protection as a manageable policy through AMAPI in a future feature drop, administrators could set a single security baseline rather than configuring dozens of individual restrictions. This would be a meaningful simplification for high-security deployments. For now, organisations that want these protections enforced should continue configuring the individual policies available through their EMM.
AER is Google’s validation programme for devices, EMMs, Carriers and MSPs. It sets a baseline of enterprise requirements that participating vendors must meet and maintain.
Each category has its own list of requirements:
Validated vendors re-validate on an annual basis.
AER is a minimum bar, not a seal of quality. A device being AER-validated means it met the requirements at the time of validation. It does not guarantee:
Organisations should still evaluate devices against their own requirements, ideally through hands-on testing, rather than relying solely on AER status for procurement decisions.
More details: What is Android Enterprise Recommended?
Device Trust from Android Enterprise is a set of verified device signals that Google provides to registered security and identity partners. It is accessed through the AMAPI SDK (v1.3.0+) and offers over 20 signals covering device state, configuration, and compliance posture.
Key characteristics:
Device Trust is distinct from Play Integrity. Play Integrity is a general-purpose API available to any app developer for verifying device and app integrity. Device Trust is specifically designed for enterprise security and identity providers that need granular posture data to inform access decisions.
Google recommends running Play Integrity checks before relying on Device Trust signals. If a device fails Play Integrity, the signals reported through Device Trust should not be considered reliable, as the device itself cannot be trusted.
Current integration partners include CrowdStrike, Okta, Omnissa, Urmobo, and Zimperium, among others (including me!).
For a hands-on look at how Device Trust works, see Device Trust from Android Enterprise: What it is and how it works.
Android Enterprise is not officially supported in mainland China due to restrictions on Google services, which affects essential functionalities such as account management, app distribution, and in-built security services. In fact, there are multiple countries not officially supported.
For organisations operating in these countries, leveraging existing solutions that support AOSP or closed-network enrolment can be a viable alternative. Solutions like Workspace ONE UEM and Microsoft Intune offer support for these approaches. Notably a considerable amount of management capability will be lost without full Android Enterprise management, leaving only on-device API support (restrictions) or any value-adds the respective platforms offer atop this, such as APK deployment.
It is worth noting that Chinese OEMs such as Xiaomi, Oppo, and Vivo ship different ROM variants for domestic and global markets. Global ROM variants (sold outside of mainland China) typically include GMS and support Android Enterprise. Domestic ROM variants sold within China do not include GMS and therefore do not support Android Enterprise. If sourcing devices from these OEMs, confirm whether the device ships with a global or domestic ROM before planning an Android Enterprise deployment.
There is no single best EMM for every organisation. The right choice depends on existing infrastructure, budget, platform mix, and the deployment scenarios required. Here are the key considerations:
Google validates EMM solutions through the Android Enterprise Recommended programme. AER-validated EMMs have demonstrated support for a standard set of Android Enterprise features. Starting with an AER-validated EMM is sensible, though it is not a guarantee of quality or completeness - see What is Android Enterprise Recommended?.
Android Enterprise devices require access to several Google services in order to provision, receive policies, install applications, and maintain compliance. Organisations operating behind firewalls or with URL-filtering proxies need to ensure the following domains are accessible.
At minimum, devices need access to:
*.google.com - covers Google Play, managed Google Play, account services, and FCM (Firebase Cloud Messaging) for push notifications*.googleapis.com - API endpoints for device management and app distribution*.gstatic.com - static content delivery*.android.com - Android-specific servicesplay.google.com / play.google.com/work - managed Google Play accessaccounts.google.com - authenticationfcm.googleapis.com - push notifications for policy deliveryGoogle maintains the full and current list of required endpoints in the Android Enterprise network requirements support article.
In addition to the Google endpoints above, your EMM vendor will have their own set of required domains and ports. These vary by vendor and should be confirmed with your EMM documentation. Common examples include:
*.manage.microsoft.com, *.microsoftonline.com, and several others documented by Microsoft*.google.com with narrow allowlisting - some organisations attempt to allowlist only specific Google subdomains. This is fragile, as Google rotates and adds subdomains regularly. The broad *.google.com wildcard is strongly recommendedIf devices are failing to provision or check in, Google provides a connectivity diagnostics guide. Many EMM platforms also include device-level connectivity checks in their diagnostics tools.
MANAGED INFO HUB also has an Android Enterprise connectivity check baked in for app-derived testing of endpoint accessibility.
This question comes up often and isn’t always simple to answer.
Organisations ideally need to understand the use case for the devices to be selected. This could be normal knowledge worker devices for employees needing a corporate phone, something tough (doesn’t need to be rugged) to withstand harsher environments, or something bespoke such as a kiosk on a reception desk used for checking in or something with an integrated printer/scanner.
After this, consider the minimum Android version required for the features the organisation needs. For example, work profile pausing requires Android 14, Private Space requires Android 15, and the latest provisioning improvements require Android 16. More version-specific comparisons are available in considerations when migrating from device administrator to Android Enterprise.
Additionally, consider:
The Android Enterprise partner directory is a good starting point for identifying validated devices. If nothing suits requirements, get in touch and I’ll try to help out!
Identity Check is a security feature introduced with Android 16 that requires biometric authentication for sensitive actions, even if someone has the device PIN or password.
When Identity Check is enabled, actions such as changing passkeys, modifying security settings, or accessing sensitive app data require the device owner's fingerprint or face authentication. A PIN, pattern, or password alone is not sufficient for these actions.
How does this affect enterprise?
For managed devices, Identity Check adds a layer of protection against scenarios where a device PIN is compromised or shared. This is particularly relevant for:
Identity Check can be configured through AMAPI policy on fully managed and corporate-owned work profile devices. Administrators can enforce biometric requirements for sensitive actions without relying solely on the standard screen lock.
This feature is part of Android's broader move towards zero-trust security principles at the device level, complementing existing features like Device Trust signals and hardware-backed attestation.
Android Enterprise supports two management architectures, and they are fundamentally different in how the EMM controls the device.
A custom DPC (Device Policy Controller) is an EMM-developed application that runs on the device and directly calls Android's device management APIs. The EMM builds, maintains, and distributes this app - examples include Omnissa Workspace ONE Intelligent Hub, Ivanti's MDM agent, SOTI MobiControl, and IBM MaaS360.
With a custom DPC, the EMM's own app is the Device Owner or Profile Owner on the device. It receives policy from the EMM server and enforces it locally using DevicePolicyManager and related platform APIs. App distribution is managed through the Google Play EMM API.
This gives the EMM direct control over the enforcement layer, but also means they are responsible for keeping up with Android platform changes, handling compatibility across Android versions, and maintaining the DPC app itself.
With AMAPI, Google provides the on-device management client - Android Device Policy (ADP). The EMM does not build a DPC. Instead, the EMM declares a desired policy state via a REST API, and Google's ADP app on the device enforces it.
The EMM's role shifts from building device-level enforcement logic to managing policy configuration and backend integration. Google handles the on-device agent, platform compatibility, and feature rollout.
AMAPI-based EMMs include Google's own management tools, Microsoft Intune (for BYOD work profiles, with corporate-owned migrations underway), Hexnode, Mosyle, and others. Many traditional custom DPC vendors are also migrating to AMAPI over time.
| Custom DPC | AMAPI | |
|---|---|---|
| On-device agent | EMM-built DPC app | Google's Android Device Policy |
| Policy enforcement | DPC calls Android APIs directly | Google's ADP enforces declared policy |
| Feature availability | Depends on EMM's implementation | Google ships features to ADP directly |
| OEM features | Can call OEM SDK APIs (e.g. Knox SDK) directly | Must use OEMConfig for OEM features |
| App management API | Google Play EMM API | Android Management API |
| New registrations | Closed - Google no longer accepts new custom DPC registrations | Open - the recommended path for new EMM integrations |
Google is actively steering the ecosystem towards AMAPI. New custom DPC registrations are no longer accepted, and significant portions of the Play EMM API were deprecated in September 2021 with a final turn-off date of 30 September 2025.
Existing custom DPC EMMs continue to function and are supported, but organisations should be aware that the long-term direction is AMAPI. Many EMMs now offer both architectures during a transition period.
Devices can be migrated from a custom DPC to AMAPI without a factory reset, provided the EMM supports it.
Yes, fully.
Samsung has supported Android Enterprise since Android 5.0 (Lollipop), offering work profile, fully managed, dedicated, and COPE deployment scenarios through any compatible EMM.
From Android 8.0 and Knox 3.0, Samsung further integrated its Knox management platform with Android Enterprise. The Knox Workspace container, for example, uses the Android Enterprise Profile Owner APIs rather than a proprietary implementation. This means managing a Samsung device through Android Enterprise also gives access to the Knox layer underneath.
Samsung devices support all standard Android Enterprise provisioning methods, including zero-touch enrolment (added in late 2020) and Samsung's own Knox Mobile Enrolment (KME) service. Organisations can use either, though configuring both on the same device is not supported.
KPE extends Android Enterprise with Samsung-specific capabilities - granular hardware controls, advanced networking, kiosk customisation, firmware management, and more. KPE Premium licences are provided at no cost, but they must be activated for KSP policies to take effect.
KPE features are accessed through the Knox Service Plugin (KSP), Samsung's OEMConfig implementation. KSP works with any EMM that supports managed app configurations.
From Android 15, several Knox SDK APIs are restricted to apps running as Device Owner or Profile Owner only. From Android 16, all Knox SDK APIs require the Android Enterprise management framework. Legacy Device Administrator deployments on Samsung devices will lose Knox functionality entirely on Android 16 and later.
Yes. From early 2026, AMAPI supports Access Point Name (APN) management through the apnPolicy setting within DeviceConnectivityManagement. This comes after years of support for custom DPC vendors.
Administrators can define APN configurations that are pushed to company-owned devices. These policy-enforced APNs override any user-configured APNs on the device, ensuring consistent cellular connectivity settings across the fleet.
This is particularly relevant for:
apnPolicy settingBefore this AMAPI addition, APN management was typically achieved through:
The AMAPI approach standardises this across all Android Enterprise-compatible devices running supported Android versions.
From January 2026, AMAPI defaults the enterpriseDisplayNameVisibility setting to ENTERPRISE_DISPLAY_NAME_VISIBLE. This means the enterprise name configured during the Android Enterprise bind setup is now displayed on company-owned devices by default - typically on the lock screen or in device settings.
Previously, the enterprise name was not actively configured, so could result in differing experiences across vendors. The default behaviour change means organisations that never set this policy field are now seeing the enterprise name appear without having made any policy changes.
Through your EMM's AMAPI policy configuration, set enterpriseDisplayNameVisibility to one of:
ENTERPRISE_DISPLAY_NAME_VISIBLE - the enterprise name is shown on the device (now the default)ENTERPRISE_DISPLAY_NAME_NOT_VISIBLE - the enterprise name is hiddenIf the enterprise name shown is incorrect or undesirable, the display name itself is configured at the enterprise level during bind setup and can be updated through the AMAPI enterprises.patch method. This will require a support ticket to your EMM vendor.
This applies to company-owned devices (fully managed and COPE) managed through AMAPI-based EMMs. Personally-owned work profile devices are not affected.
When evaluating Android devices for enterprise deployment, two certification types determine the management capabilities available: GMS (through the MADA agreement) and EDLA.
GMS certification is the standard certification for consumer smartphones and tablets. Devices certified under the MADA (Mobile Application Distribution Agreement) include the full suite of Google apps and services - Play Store, Chrome, Gmail, Maps, and critically for enterprise, Google Play Protect and Android Enterprise support.
GMS-certified devices are listed on the Android website and typically support all Android Enterprise deployment scenarios: fully managed, work profile, COPE, and dedicated device (kiosk). Android Go, Android TV, WearOS, etc aren't obviously included in this, though Android XR should fall under much of the same mandate when it's ready.
EDLA certification is designed for dedicated and enterprise-focused devices that may not suit the typical consumer GMS use case. This includes kiosks, digital signage, ruggedised handhelds, point-of-sale terminals, and other single-purpose devices.
No. As of early 2024, Google Play System Updates (Mainline modules) are no longer controlled by Android Enterprise system update policies.
Previously, the system update policy applied to both OTA system updates and Google Play System Updates. This is no longer the case - Mainline updates now download automatically in the background and install on the next device reboot, regardless of any configured system update policy, freeze period, or maintenance window.
This means:
Administrators can still use compliance policies to check that devices have current Mainline modules installed, but cannot directly control the timing of their installation.
OTA system updates (full Android version upgrades and monthly security patches) continue to respect system update policies as before.
For more details, see Google Play System Updates and Android Enterprise.
By default, all new Google Cloud projects using the Android Management API are allocated a "default" quota of 0 devices per project. This is separate from the API request rate limits covered elsewhere.
What the device quota means
The device quota limits how many devices can be enrolled across all enterprises created under a single Google Cloud project. For most organisations using a commercial EMM, this is managed by the EMM vendor and is not something individual customers need to worry about - the EMM's project quota covers their entire customer base.
When this matters
The quota becomes relevant if you are:
Requesting an increase
To obtain an initial quota, you must apply through Google's partner validation process. This involves demonstrating that your solution meets Google's requirements for an EMM partner. The process is documented in the AMAPI permissible usage page.
Note that quota increases are not automatic and require review. Community reports indicate response times of 7 or more business days, with some requests taking multiple weeks. Plan well ahead if you anticipate scaling beyond the default limit - do not wait until devices are failing to enrol before requesting an increase. Initiating the quota request early in the development or procurement phase avoids enrolment failures during growth.
Android 16 introduces several enterprise-relevant features and policy enhancements. It also marks the shift to a semi-annual release cadence, with a major platform update in Q2 and a smaller feature update in Q4 each year.
Network management
Provisioning and setup
App management
Device information
Security
For a full list of enterprise changes, refer to What's new for Android in the enterprise on the Android Developers site.
A managed Google domain is an organisation-owned domain (e.g. company.com) registered with Google and managed through the Google Admin console. It replaces the older managed Google Play Accounts enterprise model, where a personal Gmail address was used to create and administer the Android Enterprise bind.
When Android Enterprise originally launched, organisations could bind using any Gmail account. This was simple but introduced risks:
A managed Google domain addresses all of these. Administration moves to corporate-owned credentials with proper identity governance, and the enterprise can bind multiple EMMs simultaneously - useful for organisations operating across regions or divisions.
Google now directs all new Android Enterprise customers to use a managed Google domain. Existing organisations on the older model are encouraged to upgrade, and Google's 2026 planning guidance lists this as a foundational step.
The upgrade is:
Google provides a guided migration path. Your EMM vendor may also offer specific guidance for the process.
Follow Google's official upgrade guide: Upgrade to managed Google domain
After upgrading, manage your enterprise through the Google Admin console rather than play.google.com/work.
There is no self-service option to rename the managed Google Play organisation name. For managed Google domain enterprises, the organisation name is inherited from the Google Workspace or Cloud Identity domain configuration and must be changed through the Admin console under Account settings. Choose the name carefully before initiating the bind or upgrade.
Yes, however this process needs to be supported by the EMM. Few EMMs support this today, so it’s important to ask your vendor (or prospective vendor) if this is something you’d like to do.
The process itself will vary, but it may range from a checkbox in a profile to assigning a specific configuration, or simply a change at the folder/org/group level settings the devices sit within.
Once the process begins, affected devices will be prompted by the DPC to begin work profile setup. In this process the DPC will migrate from the parent profile (device) to a work profile. Understandably many legacy profiles/configs/policies will cease to function and so equivalent Android Enterprise policies should be in place.
Android 8-10 – My normal advice, where supported through DPC extras (so NFC, QR, zero-touch, but not DPC identifier), is to enable system applications on COPE devices.
Organisations are providing a device provisioned for personal use, and as such the closer to stock it feels, the more familiar users will be with using it.
Most EMMs support the ad-hoc management of system applications, so there’s no reason bloatware can’t still be disabled, but things like system gallery, calculator, health apps and other OEM app suites being enabled should be harmless outside of the secure work profile.
Android 11+ – While there is still application management to a degree, the act of enabling or disabling system applications during provisioning is no longer supported.
Android 8-10 – Yes. This is because the DPC sits both in and outside of the work profile normally, and the DPC will collect an app inventory surrounding it. Organisations can opt to disable this within the EMM under a privacy policy, and EMMs may even disable it by default, however do consider there is a privacy consideration when installing personal applications.
Android 11+ – No, this is because in Android 11, work profiles on fully managed devices was deprecated in favour or work profiles on company owned devices. This new deployment scenario aligns the privacy aspect with that of a work profile deployment, because it sort-of is one.
When a device is deployed as a company owned work profile (COPE) or personally owned work profile (BYOD) device, a secondary profile is created on the device known as a work profile. This is where all corporate apps and data reside on the device, and is fully isolated and separately encrypted on the device.
Unless explicitly set, the work profile doesn't have any additional authentication required, allowing an end-user to open work applications on the device as desired.
A work challenge is what Google call the password applied to the work profile that shares most of the same policies associated with a device password policy. It can be applied in the following ways:
Here's an example of a work challenge policy requiring a unique password on a device:

Note the scope above is set to Profile (as in, the work profile). This sets a work profile-specific password policy that has no impact on the parent policy directly.
I say directly, because unless a policy is set mandating a separate work and personal password as pictured above, the end user is able to adopt the work profile password as the device password also, through the device setting Use one lock.
By mandating separate profile passwords, this avoids that.
No.
It is not possible to deploy applications into the parent profile in a personally-owned work profile deployment. This is covered, as well as other aspects of this use case, with considerations when deploying MTD with Android Enterprise.
Yes.
As of 2020, Intune supports work profiles on fully managed devices from Android 8.0. This is because Google’s Android Management API introduced support for the deployment scenario (albeit silently, intentionally avoiding stating as such in its wider Android 11 COPE announcement).
There are a few options available:
Reboot the device and re-enrol as sometimes all it takes is a reboot, and the EMM will prompt its deletion as it provisions the profile once again.
Manually delete the work profile by heading to Settings > Accounts. The work profile will be listed and should be removable here.
Connect the device to ADB if the profile still won’t delete. This requires enabling ADB debugging on the device via Developer options and a working ADB setup on a computer. A Google search will assist in getting this setup if necessary. Once the computer can detect the device over ADB, run the following:
adb shell pm list users
This should return a list of active users where user 0 is the parent (device/default) user, and any other number (10, 12, 200 etc) should be the work profile.
Heads up
OEMs such as Samsung use additional users for solutions like Secure Folder. Here's an example:
Users:
UserInfo{0:Owner:4c13} running
UserInfo{12:Work profile:1030} running
UserInfo{150:Secure Folder:10061030} running
Since the account list is normally annotated with the user type, it shouldn't be difficult to differentiate which user does what, but keep this in mind on older Android versions or those from OEMs that modify how this behaves.
To remove the work profile run:
adb shell pm remove-user 12
Making sure of course the number reflects the returned value in the previous command.
This should remove the work profile.
Microsoft is migrating its Intune personally-owned work profile implementation from a custom Device Policy Controller (the Company Portal app) to Google's Android Management API (AMAPI). This change began rolling out in early 2026.
AMAPI is Google's modern management API and receives new features and platform capabilities before custom DPC integrations. By moving to AMAPI, Intune gains:
Microsoft will automatically migrate remaining devices from the custom DPC implementation to AMAPI. Administrators should:
No. Intune's corporate-owned work profile (COPE), fully managed, and dedicated device management modes already use AMAPI. This migration only affects the personally-owned work profile scenario.
Sources:
When a work profile is removed - whether by the admin, the user, or an automated compliance action - everything inside the work profile is deleted. Everything outside it is left untouched.
On Android 11+ COPE devices, removing the work profile works the same as BYOD - work data is deleted, personal data survives, and the device transitions to an unmanaged personal device.
On Android 8-10 COPE (legacy WPoFMD), the behaviour was different. Removing the device owner triggered a factory reset, wiping everything. Removing only the work profile while the device owner remained intact left the device in a partially managed state, which most EMMs handled by forcing a full wipe.
On fully managed devices (no work profile), a wipe command or unenrolment triggers a full factory reset. All data on the device is erased. There is no personal/work separation to preserve.
See also: What can my organisation see on my managed device?
The work profile runs a separate instance of Google Play Services, maintains its own app data, and syncs independently from the personal side of the device. This effectively doubles some of the background processes that would otherwise run once, and can result in noticeable battery impact.
Common contributors to work profile battery drain include:
For end users:
For administrators:
There is no way to eliminate the overhead of running a work profile entirely, as the separation is fundamental to how the profile provides data isolation. However, the impact should be manageable on modern devices with reasonable app deployment and sync configurations.
Delayed or missing notifications from work profile apps is a common complaint, particularly for messaging and email applications like Teams, Outlook, and Slack.
The most frequent cause is Android's battery optimisation. Adaptive Battery and Doze mode aggressively limit background activity for apps that are not being actively used, and work profile apps are not exempt from this by default. When a work app is hibernated by the system, it cannot process push notifications until the next maintenance window, which may be minutes or longer.
On the device:
Via EMM policy:
Other considerations:
Yes. Users can turn off the work profile through the quick settings tile or device settings. When the work profile is turned off:
When the profile is turned back on, apps restart and begin syncing. This can result in a flood of notifications arriving at once, particularly if the profile has been off for a while.
From Android 10, users can also schedule the work profile to turn off and on automatically through Digital Wellbeing. This allows setting a recurring schedule - for example, turning the work profile off at 6pm and back on at 8am on weekdays - to support work-life balance without needing to toggle it manually each time.
Administrators can limit how long a user may leave the work profile off through the workProfileMaxDaysWithNoWork policy in AMAPI (or the equivalent setting in the EMM console). If the profile remains off beyond this limit, the user is prompted to turn it back on. If they do not, the work profile data may be wiped depending on the compliance policy in place.
MAM (Mobile Application Management) and work profiles are both approaches to protecting corporate data on personal devices, but they work differently.
MAM (app protection policies)
MAM applies data loss prevention policies at the application level without requiring device enrolment. The EMM manages individual apps rather than the device. This is sometimes called "MAM without enrolment" or "MAM-only". With MAM:
Work profiles (Android Enterprise)
A work profile creates an operating system-level container that separates work apps and data from personal apps and data. With work profiles:
Which should I use?
Work profiles provide stronger isolation and broader app support. MAM is lighter-touch and may be preferred when enrolment is not desired or when only a small number of specific apps need protection. Some organisations use both: work profiles for users who need full corporate app access, and MAM-only for users who need access to just one or two apps (such as email).
The choice is often EMM-specific. Not all EMMs support MAM without enrolment on Android, and the available policy controls vary.
No.
User applications and app data residing outside of the work profile are not visible to the DPC within a work profile. System applications are, however once again the data associated with the apps is separately stored, meaning personal account details associated with Gmail would not show up alongside a corporate exchange account within the EMM.
On devices running Android 10 and earlier, there were isolated instances where during enrolment the DPC could briefly collect a list of personal applications installed before migrating into the work profile. This behaviour was addressed and is no longer possible from Android 11 onwards.
As of Android 11 this answer also applies to COPE, work profiles on company owned devices.
This is one of the most common questions from employees whose organisation has deployed a work profile on their personal device.
What your employer can see:
What your employer cannot see:
The work profile creates a separate, isolated container on the device. Work apps appear with a small briefcase badge to distinguish them from personal apps. Your organisation's management policies apply only within this container.
Your employer can remove the work profile remotely, which deletes all work data from the device. This does not affect personal data, apps, or accounts outside the work profile.
For more on how the work profile works, see What is Android Enterprise and why is it used?.
No. There is no supported method to migrate a device from fully managed (Device Owner) to COPE - work profile on company-owned device (Profile Owner) - without a factory reset.
This is an Android platform constraint, not an EMM limitation. The management mode is set during initial device provisioning and cannot be changed in-place. There is no API in DevicePolicyManager or AMAPI to convert a Device Owner into a Profile Owner, or to add a work profile to an already-provisioned fully managed device while simultaneously changing the management architecture.
Fully managed and COPE are fundamentally different architectures:
Converting between these modes would require restructuring the device's user and profile architecture at the OS level - creating a personal profile, migrating user data, and downgrading the DPC from Device Owner to Profile Owner. Android does not support this.
The AMAPI DPC migration feature only supports migrating from a custom DPC to Android Device Policy within the same management mode. It cannot change the mode itself. A fully managed device migrated via DPC migration remains fully managed.
The only path from fully managed to COPE is a factory reset and re-enrolment:
afw# are not available for COPE on Android 11+.For organisations managing large fleets, plan this as a phased rollout. Zero-touch and Samsung KME can streamline reprovisioning significantly by ensuring devices automatically enrol into the correct COPE configuration on first boot after reset.
Prior to Android 11, COPE was implemented as a "fully managed device with a work profile" (sometimes called WPoFMD). The device was provisioned as fully managed first, and a work profile was added on top. The EMM held full Device Owner control over the entire device.
Android 11 replaced this with a new architecture where the EMM acts as Profile Owner only, with a defined subset of device-level policies. This change improved user privacy but also means there is no continuity between the old and new COPE models. Devices running the old WPoFMD model on Android 9-10 cannot be migrated to the modern COPE model without a factory reset.
For more on the Android 11 COPE changes, see Android 11 COPE changes.
Work profile enrolment can fail for several common reasons. Here are the most frequent causes and how to address them:
Insufficient storage
The work profile requires a minimal amount of free storage to create. If the device is low on storage, the work profile creation will fail silently or with a generic error. Free up space before attempting enrolment again.
Outdated management application
Most EMMs require a current version of their management application (such as the Microsoft Company Portal, or the relevant EMM agent) to complete enrolment. If the management app is outdated, update it from Google Play before retrying.
Existing work profile already present
A device can only have one work profile at a time. If a previous enrolment attempt partially completed, a residual work profile may exist. Navigate to Settings > Accounts (or Settings > General management > Work profile) and remove the existing work profile before re-enrolling. See how to remove a residual work profile for more guidance.
Google Play Services issues
Ensure Google Play Services is up to date. An outdated or corrupted Play Services installation can prevent the work profile from being provisioned. Clear the cache and data for Google Play Services, then update it.
Device not supported
Some older or uncertified devices may not support the work profile. Ensure the device is GMS certified and running a supported version of Android.
Network connectivity
The device needs a stable internet connection throughout enrolment. The process involves downloading the management app into the work profile, syncing policies, and installing assigned applications. Intermittent connectivity can cause failures at any stage.
Account restrictions
If the organisation uses a managed Google domain, ensure the user's Google account is not restricted from enroling. Check for domain-level restrictions in the Google Admin console that may prevent work profile creation.
If none of these resolve the issue, check the EMM admin console for device-specific enrolment logs and error codes.
The short answer is no - not on any modern COPE deployment. The longer answer depends on which era of COPE is in question.
On Android 8-10, COPE was implemented as a work profile inflated on top of a fully managed device. Because the EMM held device owner privileges, it had the same level of control as a fully managed deployment - including the ability to deploy applications to the parent (personal) profile.
In practice, this was limited. Some custom DPC EMMs - notably VMware Workspace ONE UEM - supported uploading APKs to the console for parent profile deployment. However, no EMMs supported pushing Google Play applications to both profiles simultaneously. It was a niche capability used primarily for deploying in-house apps or security tools (like MTD agents) to the personal side.
Google fundamentally redesigned COPE in Android 11. The device is no longer fully managed with a work profile on top. Instead, it uses an enhanced work profile model where the EMM is a profile owner, not a device owner. This was an explicit trade-off: more user privacy at the cost of IT control.
Deploying or force-installing applications to the parent profile is not possible on Android 11+, regardless of whether the EMM uses AMAPI or a custom DPC. The OS-level change applies to all management architectures.
Through personal usage policies, COPE deployments on Android 11+ can control which apps are available in the personal Play Store:
personalPlayStoreMode: WHITELIST) - restricts the personal Play Store to only apps explicitly approved by the administrator. Everything else is blocked and automatically uninstalled if already present.personalPlayStoreMode: BLACKLIST) - allows full Play Store access, blocking only specific apps listed by the administrator.These policies control availability, not installation. The organisation cannot force-install apps to the personal side or silently deploy managed configurations to personal apps, but they absolutely can dictate what is and isn't permitted on the personal profile. It is management - just not the same granular, per-app management available within the work profile.
Personal usage policies do not give the organisation visibility into which apps are installed on the personal profile, what data they contain, or how they are used. The organisation controls the catalogue, but the user's actual app usage remains private. This is by design. For more on privacy in work profile deployments, see what is a work profile?
Organisations that genuinely need to deploy and manage apps across the entire device should use a fully managed (work-only) deployment instead of COPE. This gives device owner-level control but removes the personal profile entirely. There is no middle ground on Android 11+ - it is either full control with no personal space, or a work profile with privacy boundaries.
For more on the COPE changes, see Android 11 COPE changes.
Android 11 fundamentally changed how COPE works. Prior to Android 11, COPE was implemented as a work profile on a fully managed device (WPoFMD) - the device was fully managed with corporate visibility and control, and a work profile was layered on top for app separation.
From Android 11, Google replaced this with work profiles on company-owned devices (WPoCOD). COPE devices are no longer fully managed at their core. Instead, they are essentially enhanced work profile devices with a flag marking them as company-owned, which unlocks a handful of additional device-wide policies that standard BYOD work profiles don't have.
This was a significant reduction in corporate control. Organisations lost visibility of personal apps, network logs, and usage statistics. Device-wide VPN, parent profile app management, APN configuration, and certificate management on the personal side all went away.
For the full breakdown of what changed, including migration paths for existing deployments: Android 11 COPE changes.
Since Android 11, the COPE model has remained architecturally the same - it is still a work profile on a company-owned device. Google has incrementally added back some capabilities in later releases:
If your organisation needs strong device-wide control and visibility, fully managed (COBO) remains the better choice. COPE is best suited to deployments where the organisation accepts limited personal-side visibility in exchange for offering employees genuine personal use on a company device.
Unless an enterprise policy prohibits device-wide application installation from unknown sources, yes.
Follow this FAQ.
No.
If you'd like to see this change, raise it in the Android Enterprise Customer Community, or through your existing EMM support channels as a feature request.
More information can be found here.
The Private Space is a separated, isolated profile on the Android device, similar to the work profile. If a VPN configuration is created on one profile (be that personal/parent, work, or Private Space), it won't apply for the applications running in another profile. To have Private Space apps running in a VPN, configure a VPN application within the Private Space.
Application management within the Private Space is limited to only company-owned work profile devices. Personally owned devices - or BYOD - cannot manage the Personal Space in any way. Fully managed devices do not support Private Space.
For company-owned work profile devices enrolled into AMAPI, the personal usage policies of personal Play Store mode and personal applications apply both to the parent (personal) profile, and the Private Space.
If your EMM uses a custom DPC with Play EMM API, this feature will be available in future. Until then it is not possible to restrict applications within the Private Space.
via, updated by Google on 2024-11-12 to clarify custom DPC status.
If your organisation already leverages policies to allow or block applications in the parent profile on a COPE device, these will carry over automatically to the Personal Space.
Note: It is not possible to set different personal Play Store modes, or configure separate allow/blocklist policies between the parent profile and the Personal Space.
No.
Applications and data stored within the Private Space are not visible to enterprise administrators, this follows the existing premise set with the parent profile in a work profile (company/personally-owned) deployment. If this is an organisational concern, application policies can be set for company-owned work profile deployments.
This may sound contradictory to Are Private Space applications truly hidden?, however this is because the EMM agent runs within the work profile, which is intentionally restricted from visibility of apps outside of it.
Applications within the Private Space may be detected through the use of ADB, or on-device package viewers. While application data is fully secure and isolated from visibility, the presence of the applications themselves cannot today be entirely hidden from view for anyone determined enough to go looking for them.
Note: From Android 16, on-device package managers can no longer detect applications outside of their own user. This reduces (but doesn't remove) the risk of application use being discovered.
Wherever possible, zero-touch offers the best experience both for organisations and users. For organisations, it provides not only the decreased overhead of not having to explain how to manually start provisioning a device (and the support required when users still don’t get it), but also the confidence of knowing should a device be factory reset accidentally or with intent, the device will jump back into zero-touch provisioning as soon as it’s connected to a network. This extends to Samsung’s KME equally for the same reasons. That doesn’t mean zero-touch is the fastest and most efficient provisioning method, in fact it’s probably comparable in speed to DPC identifier, however speed is but one consideration.
If zero-touch isn’t available, my personal preference is QR code provisioning as QR codes are persistent (normally), can be hosted anywhere or freely shared between employees, don’t need a dedicated provisioning device, and support DPC extras.
EMMs leveraging the Android Management API (AMAPI) are subject to the default policy requirements Google sets. In February 2024 Google adjusted the default, unset behaviour for UsbDataAccess from ALLOW_USB_DATA_TRANSFER to DISALLOW_USB_DATA_TRANSFER. If your policies did not previously explicitly allow USB data transfer, this function will be blocked on your managed devices.
To reverse this, please set USB data transfer explicitly to allow, and redeploy your policies.
If you find networks with captive portals configured simply never launch the portal for authentication when a device is in a Kiosk environment, this is because it must be configured to do so.
Captive portals are typically handled through a dedicated application preloaded on all Android devices, and access can be granted by adding the respective package name to the EMM policy as an allowed application.
The common package name for this is:
com.google.android.captiveportallogin
android Tip For specific OEM implementations, search captive portal in the Android system apps database.
What this does is add the package name to the LockTask allowlist, enabling the app to open without triggering a security exception.
Yes. From February 2026, the Android Management API supports configuring Private DNS on company-owned devices running Android 10 and above.
The new privateDnsSettings policy field supports three modes:
This is available for fully managed devices and work profiles on company-owned devices. It does not apply to personally-owned work profile deployments.
Before this addition, administrators had no standardised way to enforce Private DNS configuration through AMAPI, and often relied on OEM-specific OEMConfig policies or VPN-based DNS solutions. This brings Private DNS management in line with what custom DPCs could already achieve through the platform DevicePolicyManager APIs.
No, not on a device that has already been set up with user accounts.
Setting a device as fully managed (Device Owner mode) is only possible during the initial device setup, before any accounts are added. This is by design - Android enforces this restriction to prevent a management agent from silently taking control of a device that a user has already configured.
There are limited exceptions:
ADB command (dpm set-device-owner): This can set Device Owner on a device that has been set up but has no Google accounts or secondary users present. However, this is a development and testing tool, not a production deployment method. It also requires USB debugging to be enabled and is not practical at scale. It cannot be used with AMAPI.
DPC migration: If a device is already managed by one DPC, it may be possible to migrate to another DPC or to AMAPI without a factory reset, depending on vendor support. See Can I migrate devices from a custom DPC to AMAPI? for details.
For production deployments, the supported methods all begin from a factory reset state: QR code, zero-touch, KME, NFC, DPC identifier, or managed Google account provisioning. See How can I provision a fully managed device? for the full list.
No. Picture-in-Picture (PiP) mode does not function when a device is in lock task (kiosk) mode.
When an application calls enterPictureInPictureMode() on a device with lock task active, the request is silently ignored. This is by design - lock task mode restricts the device to a controlled set of applications and prevents system UI elements that could allow users to navigate away from the kiosk experience.
Common enterprise use cases affected include:
There is no official workaround within the standard lock task API. Some options organisations have explored:
This is an active area of community feedback. Google has not indicated whether PiP support in lock task mode is planned.
There are several options for provisioning into any fully managed deployment scenario (COBO, COPE, COSU):
More details:
Lost Mode is an Android Enterprise management feature that allows administrators to remotely lock and locate a company-owned device that has been lost or stolen.
When activated by an administrator:
Lost Mode is available on:
It is an AMAPI-only feature. EMMs using a custom DPC do not have access to Lost Mode unless they have implemented their own equivalent.
Lost Mode can activate location reporting regardless of the device's existing location settings on fully managed devices. On COPE devices, location accuracy depends on the device's configuration and whether location services were enabled prior to activation.
Lost Mode is activated through your EMM console. The specific steps vary by vendor - check your EMM's documentation for instructions. The feature must be supported by your EMM's AMAPI implementation.
Sources:
Not normally by default, though do validate with your EMM vendor. If confirmed disabled however FRP kicks in after a reset, log a ticket with EMM support.
If so desired, allowlisted Enterprise Factory Reset Protection is available and offers a simple, albeit caveated means of ensuring devices can’t simply be wiped and re-setup without Android Enterprise provisioning taking place. For zero-touch devices there’s no need to leverage it.
From Android 15, FRP behaviour has changed. OEM unlocking no longer bypasses FRP after a hard reset, and Enterprise FRP is always enforced on managed devices regardless of OEM unlock status. This makes configuring EFRP more important than before, particularly for fully managed devices without zero-touch, as recovery from an unexpected reset without EFRP configured is considerably harder.
In most cases, no - not without a factory reset.
Android Enterprise fully managed devices are bound to a single EMM enterprise. Moving a device from one EMM to another typically requires a factory reset and re-provisioning under the new EMM, unless both the inbound and outbound EMM supports DPC migration via their custom DPCs.
More recently, DPC migration via the Android Management API (AMAPI) has become possible. This allows devices managed by a custom DPC (using the Play EMM API) to migrate to AMAPI (Android Device Policy) without a factory reset. However, this is a one-way migration from custom DPC to AMAPI within the same enterprise - it cannot be used to migrate between two different EMM platforms.
For organisations planning an EMM change, the practical approach is to phase the migration by factory resetting devices in batches and re-provisioning them under the new EMM. Zero-touch enrolment simplifies this significantly, as the device configuration can be updated in the zero-touch portal to point to the new EMM before the reset.
Factory Reset Protection (FRP) and Enterprise Factory Reset Protection (EFRP) serve similar anti-theft purposes but work differently.
Standard FRP is tied to the Google account signed into the device. If the device is factory reset (via recovery, not through Settings), the device will require the previously signed-in Google account credentials before it can be set up again. This is a consumer anti-theft feature present on all GMS-certified Android devices.
On fully managed devices, FRP typically activates - if enabled via policy - based on whichever Google account was present on the device - this could be the managed Google Play account provisioned by the EMM. If that account is deleted or no longer accessible (common after EMM unenrolment), recovering the device can be difficult.
Enterprise FRP is a policy-driven feature that allows administrators to specify one or more Google account email addresses that can unlock the device after a factory reset. This is configured through the EMM as part of the device policy.
Key differences:
From Android 15, FRP behaviour has changed significantly:
This makes configuring EFRP more important than ever for organisations managing fully managed devices, as recovery from an unexpected reset without EFRP configured becomes considerably harder.
For more detail, see Feature spotlight: Factory Reset Protection.
It depends on the management configuration.
On a fully managed device, Android Auto requires the following to function:
The most common cause of Android Auto not working on fully managed devices is an overly restrictive app policy. If the organisation uses an app allowlist (only approved apps can run), Android Auto and its required companion services must be explicitly included.
For COPE (work profile on company-owned) devices, Android Auto runs in the personal profile by default and is generally unaffected by work profile policies.
If Android Auto fails to connect, check the EMM console for USB, Bluetooth, or app restriction policies that may be interfering.
The content protection policy is an AMAPI feature available on Android 15+ that enables enhanced scanning of apps for deceptive or potentially harmful behaviour on the device.
When enabled, the device leverages Google Play Protect's on-device scanning capabilities to detect apps that may attempt social engineering tactics, such as impersonating system dialogs or overlaying content to trick users into providing credentials or granting permissions.
This is particularly relevant for organisations deploying devices to frontline or less technically experienced workers, where the risk of social engineering through deceptive apps is higher.
The content protection policy complements but does not replace standard Play Protect scanning. It is focused on real-time behavioural analysis of app UI patterns rather than static malware detection.
This policy applies to fully managed and dedicated devices. For work profile deployments, the work profile already benefits from Play Protect scanning within its scope.
Normally this would suggest either the respective Android Enterprise configurations aren’t assigned to the device, or there’s an issue with the binding between the EMM and Google.
Ensure the user of the device is in the correct Active Directory group (if relevant) or EMM group to receive the correct profiles, otherwise check the binding.
Occasionally and with some EMMs this may also happen if more than one device is enrolled with the same Device Identifier, e.g.: Serial Number or IMEI. Validate all Device Identifiers are unique (at least within an OEM/model) as it's not uncommon to see duplicates in the wild.
Other considerations:
No. On a fully managed device, both an enterprise wipe/retire and a full wipe result in a factory reset. The entire device is under management with no separation between corporate and personal data, so there is nothing to selectively remove.
Android Enterprise requires a DPC actively enrolled as Device Owner to provide management policies. Removing the DPC means removing everything, and the device resets to factory settings.
EMMs use different labels for the same underlying action. "Retire", "enterprise wipe", "selective wipe", "delete device", and "unenrol" may all trigger a factory reset on a fully managed device. Always verify what the action does in your specific EMM before running it on a production device.
The behaviour is different for other deployment scenarios:
RELINQUISH_OWNERSHIP command to convert the device to an unmanaged personal device.Not through the device UI, no. On a fully managed device, end users are always blocked from adding or removing OS-level users regardless of policy configuration.
Whether the EMM can do it programmatically depends on the management architecture in use.
AMAPI does not support secondary user management at all. While the policy schema includes addUserDisabled and removeUserDisabled fields, the documentation explicitly states that for devices where managementMode is DEVICE_OWNER, the user is never allowed to add or remove users. There is no API for the EMM to create, remove, or switch between OS-level users either.
A custom DPC operating as Device Owner has significantly more capability here. Android's DevicePolicyManager exposes several user management APIs:
createAndManageUser() - create secondary users programmatically (Android 7.0+)removeUser() - remove secondary users (Android 5.0+)switchUser() - switch the active user on the device (Android 7.0+)startUserInBackground() / stopUser() - manage user sessions without switching (Android 9.0+)This is one of the remaining capability gaps between AMAPI and custom DPC. If your organisation relies on multi-user device scenarios, check whether your EMM exposes these APIs.
A common use case for secondary users is shared devices - kiosks, shift terminals, or front-of-house equipment. Custom DPCs can create ephemeral users (using the MAKE_USER_EPHEMERAL flag on createAndManageUser()), where all user data and apps are automatically deleted when the user session ends, the device switches users, or the device reboots. This requires Android 9.0+ and is documented in detail in Google's dedicated devices guide.
Not all Android devices support multiple OS-level users, even if the Android version does. This is a hardware and OEM decision. Before planning a multi-user deployment, verify that the target devices support secondary users - the DevicePolicyManager API will return specific error codes if the device has reached its user limit or does not support the feature.
Not by default. The standard Android backup service is disabled on fully managed devices, and historically there has been no way to change this.
However, Android now offers a backupSettings policy that allows administrators to control whether backup is permitted on fully managed devices, and can then be used with the Android Switch application. This is supported by custom DPC implementations and is expected to arrive in AMAPI in a future release. If your EMM supports this policy, it can be enabled to allow device backup to the Google account associated with the device. Check your EMM documentation for availability, as not all platforms expose this setting.
Regardless of backup policy, as a best practice the organisation should offer end-users a cloud service - OneDrive, Google Drive, Dropbox, etc - to which company data is automatically synced, rather than relying solely on device-level backup.
No. As of early 2024, Google Play System Updates (Mainline modules) are no longer controlled by Android Enterprise system update policies.
Previously, the system update policy applied to both OTA system updates and Google Play System Updates. This is no longer the case - Mainline updates now download automatically in the background and install on the next device reboot, regardless of any configured system update policy, freeze period, or maintenance window.
This means:
Administrators can still use compliance policies to check that devices have current Mainline modules installed, but cannot directly control the timing of their installation.
OTA system updates (full Android version upgrades and monthly security patches) continue to respect system update policies as before.
For more details, see Google Play System Updates and Android Enterprise.
A reseller has the ability to upload any devices through their reseller portal, however it is their obligation to ensure that the device identifiers (IMEI or serial) are correct and that the organisation in question owns the devices, not another organisation or an employee. If the organisation does own these devices, can prove this, and can supply accurate device identifiers, please discuss this with a preferred reseller for assistance. It is up to the reseller if they wish to upload devices already purchased since there are consequences for resellers who upload incorrect data to the zero-touch portal.
This will change in future.
As of late 2020, all Android Go devices support zero-touch through expanded zero-touch availability. Prior to this, Android Go supported zero-touch on an opt-in basis. Validate support ahead of bulk purchase.
No.
While zero-touch is mandatory for Android Enterprise Recommended, devices that don’t meet Google’s requirements for storage or spec can and still do support provisioning via zero-touch.
Yes, via the CSV template provided, or the customer API
Yes, either by requesting a new account from a new reseller, or adding a new reseller through the existing console.
No, it is a free service, from Google at least. Reseller partners can choose to charge for this service, or bundle it as part of other offerings if they choose to do so.
Should you be unhappy with a reseller charging for the service, have a look for another reseller who does not.
No, please use an EMM solution for day-to-day device management.
Nothing until the device is reset, at which point it will not be prompted to enrol into management.
It will be forced to enrol back into management automatically following the data erase, unless a config has not been applied, or has since been removed.
Yes, however this only affects new devices added and not those already on the console. For existing devices, leverage either CSV or API to make bulk changes.
The config won’t apply until after the device is reset. Anything after the “checking for updates” prompt is too late.
Nothing until after the device is reset. Zero-touch configurations only download during the setup wizard, and not after. This is also why once a device has been partially set up, it needs to be factory reset in order to pull down the zero-touch config once more.
As of late 2020, all GMS certified Android 9.0+ devices from all OEMs support zero-touch.
OEMs supporting zero-touch on 8.0/8.1 include:
Along with the change to globally support all Android 9.0+ GMS certified devices with the integration of zero-touch into GMS Core (Google Play Services), the previous Google-maintained list of zero-touch supported devices, including those running older Android versions, is no longer live.
A collection of DPC extras for various EMM/UEM vendors can be found here: Android Enterprise zero-touch DPC extras collection.
As EMM vendors begin supporting the zero-touch iFrame introduced in late 2020, manual editing of DPC extras should diminish as EMMs will handle it automatically.
Zero-touch resellers can be found globally. The complete list of resellers can be found here.
No, only authorised resellers. Customers are not able to add devices to the zero-touch portal at this time.
This will change in future.
Only console admins or owners from the customer portal, or the reseller. End-users cannot remove their device from zero-touch enrolment.
No, it does this extremely quickly.
The term “zero-touch” is aimed at admins and IT teams that no longer need to manually touch each device in order to undertake managed provisioning. This is in context of IT teams often pre-staging devices before shipping them to end users to avoid non-enrolment, which is no longer needed when devices are zero-touch registered.
It does not apply to the act of end-users running through the provisioning process, which has admittedly required more and more taps over the last few major Android versions due in part to the often unnecessary interruptions of unskippable privacy prompts.
The upload may complete successfully, but the device will not initiate the zero-touch enrolment flow once connected to a network. The device will need to be deregistered and re-registered with the correct manufacturer.
From 2020, the manufacturer field is no longer required for IMEI-based uploads and can be omitted, but it should still be used for Wi-Fi-only devices.
Yes.
Zero-touch is just a provisioning method which deploys an EMM agent to your device over the air (OTA), to enrol into a Fully Managed Device profile using Android Enterprise (not legacy Device Admin) APIs. Google do not provide a free EMM solution, though device management is available through Google Workspace (G Suite) with the appropriate licences.
This action results in the device being irreversibly removed from zero-touch management. Please contact the device reseller to add it back in. The IMEI or serial (Wi-Fi only devices) will be required.
Any currently-enrolled devices will not be impacted until they are factory reset.
There are reports from the Android Enterprise Customer Community and other forums of devices running Android 15 and later failing to trigger zero-touch or KME enrolment following a factory reset, instead defaulting to the personal setup wizard.
This behaviour appears to be related to timing changes in Android 15's setup flow. In some cases, the device completes the initial setup screens before the zero-touch or KME configuration is fetched and applied, resulting in the device landing on the home screen as an unmanaged personal device.
Network connectivity timing - the device needs an active internet connection very early in the setup flow for zero-touch or KME to activate. If the device connects to Wi-Fi after certain setup screens have already been passed, the provisioning trigger may be missed. Ensure devices have network access as early as possible during setup, ideally via a known Wi-Fi network or mobile data.
Profile assignment after reset - if the device's IMEI or serial number was recently re-assigned in the zero-touch or KME portal, there can be a propagation delay. Verify that the correct configuration or profile is assigned and has had time to propagate before resetting the device.
Dual-SIM devices - on dual-SIM devices, the reseller should register the primary (first) IMEI. Registering the secondary IMEI can cause zero-touch to fail silently. Alternatively, register by serial number.
Samsung-specific considerations - configuring both zero-touch and KME on the same Samsung device is not recommended, as the two enrolment methods can conflict. Choose one and remove the other from the respective portal.
GMS Core version - devices with significantly outdated GMS Core versions may not process zero-touch enrolment correctly. This is more common on devices that have been in storage for an extended period. If the device can access the Play Store briefly before reset, allow GMS Core to update first.
If the issue persists across multiple devices of the same model, it may be an OEM-specific bug. Raise it with the OEM and consider logging it in the Android Enterprise Customer Community.
Zero-touch supports provisioning into any corporate-owned deployment scenario:
The deployment scenario is not set in the zero-touch portal itself. It is determined by the EMM configuration assigned to the device.
For AMAPI-based EMMs, the enrolment token includes an allowPersonalUsage setting:
PERSONAL_USAGE_ALLOWED provisions a COPE device (work profile on company-owned device)PERSONAL_USAGE_DISALLOWED provisions a fully managed devicePERSONAL_USAGE_DISALLOWED_USERLESS provisions a fully managed device without a user sign-in step (commonly used for dedicated/kiosk devices)For custom DPC EMMs, the DPC extras payload provided in the zero-touch configuration determines the deployment scenario. The specific extras vary by vendor - check your EMM's documentation for the correct values.
In all cases, the zero-touch portal simply pulls the assigned configuration for the device during setup. The EMM handles the rest during provisioning and enrolment.
Zero-touch is for corporate-owned devices only. It requires devices to be purchased through an authorised zero-touch reseller and registered to a zero-touch customer account. Employee-owned devices are not eligible for zero-touch enrolment.
For more on zero-touch, see What is Android zero-touch enrolment?.
Zero-touch enrollment requires devices to be registered in the zero-touch portal by an authorised reseller. If your device supplier is not a zero-touch partner, you have a few options:
1. Purchase from a zero-touch partner reseller
The most straightforward approach. Google maintains a directory of authorised zero-touch resellers at androidenterprisepartners.withgoogle.com. Many major distributors and carriers are partners. Switching to a partner reseller for future purchases ensures devices arrive pre-registered.
2. Request your reseller joins the programme
Resellers can apply to become zero-touch partners through Google's partner programme. If your preferred supplier has sufficient volume and interest, this may be worthwhile, though the onboarding process takes time.
3. Use Samsung Knox Mobile Enrollment (KME) for Samsung devices
Samsung KME is Samsung's equivalent to zero-touch and does not require a specific reseller partnership, though it works better with one. Any Samsung device can be added to KME by the organisation directly using the device IMEI or serial number. This is often the practical alternative for organisations purchasing Samsung devices from non-partner suppliers.
4. Use QR code or sign-in URL provisioning as an alternative
If automated enrollment through zero-touch is not available, QR code or Google account provisioning provides a manual but reliable enrollment path. These methods do not require reseller involvement and can be configured entirely within the EMM.
What about adding previously purchased devices?
Devices already purchased from a non-partner reseller cannot be retroactively added to the zero-touch portal by the organisation. Only authorised resellers can register devices. See the related FAQ: Is it possible for an organisation to add previously-purchased devices to zero-touch?.
Nothing until the device is factory reset. Zero-touch configurations are only downloaded and applied during the setup wizard, so any change made in the zero-touch portal - whether it is editing DPC extras, switching EMM, or assigning an entirely different configuration - has no effect on a device that is already enrolled and in use.
When an administrator changes a zero-touch configuration in the zero-touch portal or via the customer API, the change is saved server-side. The enrolled device is not notified. The updated configuration is only fetched the next time the device goes through the setup wizard, which happens after a factory reset or on first boot of a new/reflashed device.
This applies equally regardless of what was changed:
The currently enrolled EMM continues to manage the device as normal until the device is reset.
| Action | Effect on enrolled device | Effect after factory reset |
|---|---|---|
| Config changed (different EMM/DPC extras) | None | New config applies, device enrols into the new EMM |
| Config removed (set to "None") | None | Device sets up without forced enrolment |
| Device unclaimed from portal | None | Device sets up as a consumer device with no management |
Unclaiming a device from the zero-touch portal is irreversible without reseller involvement. The reseller will need the IMEI (or serial number for Wi-Fi-only devices) to re-register it. See What happens if a device is unregistered from the zero-touch console? for more detail.
KME behaves similarly. Profile changes (including switching to a different EMM or updating enrolment settings) do not take effect on already-provisioned devices. The updated profile only applies after a factory reset. KME supports one profile per device, and assigning an updated profile completely replaces the previous settings - there is no merging.
The most common scenario is an EMM migration. When moving devices from one EMM to another, the typical workflow is:
This is one of the key advantages of zero-touch and KME for fleet management - there are no QR codes to redistribute, no new provisioning instructions, and no manual intervention beyond triggering the reset.
Other scenarios include:
If zero-touch is managed through the Google Workspace Admin console (rather than the standard zero-touch portal), applying a configuration to an already-in-use device can trigger a forced factory reset, with the user receiving a warning on the device one hour before the reset occurs. This forced-reset behaviour is specific to the Workspace Admin console flow and does not apply when using the standard zero-touch portal or the customer API.
No. Zero-touch enrolment is exclusively for company-owned devices purchased through an authorised zero-touch reseller.
The zero-touch process works like this: when an organisation buys devices from a participating reseller, the reseller registers those devices (by IMEI or serial number) in the organisation's zero-touch portal. This registration is what triggers automatic enrolment when the device is first powered on or factory reset.
Organisations cannot add devices to the zero-touch portal themselves - only resellers can claim devices into a customer account. There is no self-service mechanism to register arbitrary devices by IMEI. The customer API allows managing configurations on devices already assigned by resellers, but it cannot add new devices.
Zero-touch supports company-owned deployment modes only:
It does not support personally-owned work profile (BYOD) enrolment. While zero-touch can deploy a work profile, this is only the company-owned variant (COPE) - not the same as a personal device with a work profile.
For enrolling employee-owned devices with a work profile, there are several provisioning methods that do not require reseller involvement:
All of these work for personally-owned work profile deployments. For more detail, see the provisioning methods guide.
Samsung's Knox Mobile Enrolment follows a similar model - devices generally need to be purchased through a KME-participating reseller. However, KME supports work profile deployments for both company-owned and BYOD scenarios, and offers a QR code enrolment option for devices not registered by a reseller. See Does Samsung support zero-touch? for a full comparison.
If someone purchases a second-hand device that is still registered in another organisation's zero-touch portal, the device will display a "Your device at work" screen on first boot or after factory reset. The new owner cannot remove the registration themselves - they need to contact the previous organisation (whose details may be shown on screen) and ask them to unclaim the device from their zero-touch portal.
This is an increasingly common issue with the second-hand device market. Before purchasing used Android devices, it is worth verifying that the device has been deregistered from any zero-touch or KME portals. Unlike Factory Reset Protection, which is tied to a Google account and can be cleared with the correct credentials, zero-touch registration can only be removed by the organisation or reseller that registered it.
As of late 2020, yes. Samsung devices running Android 9.0 or later support Google zero-touch enrolment alongside Samsung's own Knox Mobile Enrolment (KME) service.
Both achieve the same outcome - a device that enrols into the organisation's EMM without manual intervention at first boot. The differences are in features and scope:
Zero-touch is OEM-agnostic and managed through the zero-touch portal. For organisations with mixed-OEM fleets, it provides a single provisioning workflow across Samsung, Pixel, and other supported devices.
KME is Samsung-specific and has been available longer for Android Enterprise provisioning (since Knox 2.8). It offers additional capabilities over zero-touch, including:
KME is free to use, though some optional advanced settings require a Knox Suite licence. Devices must be purchased through a KME-supported reseller to be registered in the KME portal.
For a Samsung-only fleet, KME is the more feature-rich option. For mixed-OEM fleets, zero-touch provides consistency. Both support fully managed, dedicated, and COPE deployments. Zero-touch provisions company-owned devices only - it does not support personally-owned (BYOD) work profile enrolment. KME supports work profile enrolment for both company-owned and BYOD scenarios.
Configuring both KME and zero-touch on the same Samsung device is not supported. It can cause configuration conflicts and out-of-sync states that are difficult to debug. Pick one method per device.
For more on Samsung's broader enterprise capabilities, see Does Samsung support Android Enterprise?.
This could be a few things:
DPC extras are a set of vendor-specific key-value pairs passed to the Device Policy Controller (DPC) during provisioning. They tell the DPC how to configure itself - things like which EMM server to connect to, what enrolment token to use, or which organisational unit the device belongs to.
These all fall under android.app.extra.PROVISIONING_ADMIN_EXTRAS_BUNDLE. It is a nested JSON object within the broader provisioning payload, and Android passes it through to the DPC application untouched. The operating system does not read or interpret the contents - they are entirely defined by the EMM vendor.
DPC extras are supported across all major fully managed provisioning methods:
dpcExtras fieldIt is worth understanding the difference, as both appear in the same JSON payload but serve completely different purposes.
Provisioning extras are standard Android properties consumed by the OS provisioning framework. These have the prefix android.app.extra.PROVISIONING_* and control device setup behaviour - things like Wi-Fi credentials, locale, timezone, whether to skip encryption, or whether to leave all system apps enabled. Android reads and acts on these during the provisioning flow.
DPC extras are the contents of PROVISIONING_ADMIN_EXTRAS_BUNDLE specifically. Android does not interpret them at all. It simply delivers the bundle to the DPC once provisioning completes. Their keys and values are defined entirely by the DPC vendor.
Both coexist at the top level of the provisioning JSON, with PROVISIONING_ADMIN_EXTRAS_BUNDLE as a nested object:
{
"android.app.extra.PROVISIONING_LEAVE_ALL_SYSTEM_APPS_ENABLED": true,
"android.app.extra.PROVISIONING_LOCALE": "en_GB",
"android.app.extra.PROVISIONING_ADMIN_EXTRAS_BUNDLE": {
"server": "your.emm.server.com",
"enrollment_token": "token_value"
}
}
In this example, PROVISIONING_LEAVE_ALL_SYSTEM_APPS_ENABLED and PROVISIONING_LOCALE are provisioning extras (handled by Android), while server and enrollment_token are DPC extras (passed to the EMM's DPC).
For AMAPI (Android Device Policy), the DPC extras bundle typically contains a single key: com.google.android.apps.work.clouddpc.EXTRA_ENROLLMENT_TOKEN. This is generated automatically when you create an enrolment token via AMAPI, so administrators rarely need to construct or edit DPC extras manually.
For custom DPC implementations (Workspace ONE Intelligent Hub, Ivanti Mobile@Work, SOTI MobiControl, and others), the bundle contains vendor-specific keys. These might include the EMM server URL, staging credentials, organisational unit, or feature flags. The keys and expected values are defined by each vendor, and getting them wrong will typically cause enrolment to fail.
A collection of DPC extras for various EMM vendors can be found in the DPC extras collection.
Avoid including usernames and passwords in DPC extras where possible. If a device is mistakenly registered (wrong IMEI, typo, second-hand purchase), the credentials in the zero-touch or QR configuration could allow an unintended device to enrol and access corporate resources. Use enrolment tokens and server-side authentication where supported instead.
While not DPC extras themselves, these standard provisioning extras frequently appear alongside DPC extras and are worth knowing:
PROVISIONING_LEAVE_ALL_SYSTEM_APPS_ENABLED - keeps all pre-installed system apps enabled rather than disabling non-critical ones (the default behaviour)PROVISIONING_LOCALE - sets the device locale (e.g. en_GB)PROVISIONING_TIME_ZONE - sets the timezone (e.g. Europe/London)PROVISIONING_SKIP_ENCRYPTION - skips device encryption during setup (not recommended)PROVISIONING_WIFI_SSID, PROVISIONING_WIFI_PASSWORD, PROVISIONING_WIFI_SECURITY_TYPE - pre-configures Wi-Fi for provisioningDPC extras use strict JSON. The last key-value pair within ADMIN_EXTRAS_BUNDLE must not have a trailing comma, or provisioning will fail with a parsing error. This is one of the most common mistakes when manually editing DPC extras.
For guidance on what to include for your specific EMM, see What should I put in DPC extras?
No.
App shortcuts supported with device admin are not available for Android Enterprise. Instead, it’s possible to deploy shortcuts for Android Enterprise devices as web applications through the Google Play iFrame.
Instead of a bookmark/shortcut that opens in the default browser, web apps are legitimate applications that open with Google Chrome.
More information: Create and manage web apps for Android Enterprise
When deploying the iFrame, a UEM vendor decides what they wish to support. On that basis, the iFrame may lack private app upload, web app creation or bundle support.
It’s possible for a UEM to implement multiple iFrames with these features separated out, so is worth checking this functionality isn’t placed elsewhere on the console.
Should additional features not be available anywhere, please get in touch with your UEM provider to discuss this.
Yes this is possible, however not concurrently. Android supports only profile-wide VPN (or always-on VPN) natively, and the per-app VPN functionality often alluded to when multiple VPNs are brought up would have to be supported in-app.
When one VPN is running profile-wide and another is initiated, it will disconnect the first. Should these VPNs have failure protection and automatic reconnect (or leverage always-on VPN for this) the two VPN solutions will repeatedly disconnect one another.
To permit or block a selection of URLs in Chrome managed config, you need to add the URLs to the relevant list. The format for this is as follows:
[scheme://][.]host[:port][/path][@query]
Setting multiple URLs in succession would look like this:
["http://www.example.com", "https://www.example.com", "http://*", "https://example.com?sda"]
More format examples can be found here, but in a nutshell:
* targets everything. This is useful for preventing access to everything via a blocklist, then explicitly allowlisting certain domains or URLs192.0.2.1 targets this specific IP.domain.com explicitly blocks the root domain, but not its subdomainsdomain.com blocks everything in that domainIt's important to note that some EMMs require brackets for this to work properly, which is why I used them in the multiple URLs example. Google's documentation doesn't mention this, but it's a crucial step.
Yes, it is possible to manually install an APK to the work profile or any other user present on the Android device via ADB.
Enterprise policies may prevent the installation of applications via ADB, please ensure your device is excluded from any such policy before continuing.
Be aware that since Android 14, it is no longer possible to install very old applications on a device. Via ADB you can overcome this, if necessary.
First, locate the user ID of the profile or user you wish to target:
adb shell pm list users
This will output a user list of all users on the device, for example:
UserInfo{0:Jason:4c13} running
UserInfo{10:Work Profile:1030} running
UserInfo{11:Private space:1090}
Besides the primary user, which is always userID 0, the above example also shows a Work Profile and a Private space (Private Space is Android 15+)
With the appropriate userID identified, install an APK as follows:
adb install --user 10 /path/to/yourfile.apk
Your application should install, and appear shortly within the appropriate profile.
Yes, as long as the work profile device is company owned. Personally-owned work profile devices offer no personal app management.
For company owned devices, personal usage policies allow organisations to:
allowlist, preventing access to the full app store and limiting available applications to only those configured by the administrator.blocklist, allowing full access to Google Play other than applications explicitly blocked by the administrator.In both cases, applications not permitted to be on the personal profile will be automatically removed.
These policies do not provide any access or visibility to the applications or data within the parent profile. Personal privacy is maintained, but it allows organisations to ensure company owned devices do not run applications unsuitable for an enterprise environment.
If you're looking to configure the bookmarks available in managed Chrome, you can use the below format. More examples can be found via Google's documentation.
[
{
"toplevel_name": "Company bookmarks"
},
{
"name": "Homepage",
"url": "mydomain.com"
},
{
"children": [
{
"name": "HR",
"url": "mydomain.com/hr"
},
{
"name": "Submit a ticket",
"url": "mydomain.com/it-support"
}
],
"name": "Internal URLs"
},
{
"name": "Android resources",
"url": "bayton.org/android"
}
]
Be aware on managed Android devices, bookmarks can't be placed on the home screen. For that use case, you should consider web apps instead.
Other things to consider -
"children"), ensure you list the name (e.g.: "name":"Internal URLs")By default, the managed Google Play iFrame will automatically organise and display assigned applications in the Google Play app on mobile devices.
While this is simple, it lacks control.
For organisations interested in customising the Google Play experience for managed devices, Google offers app collections. App collections allow defining an explicit layout, such as below, with the applications curated by the organisation.

While it's great, it can also become a burden. Applications assigned won't automatically pop up in Google Play after app collections are created, for example, and keeping this up to date is a reason organisations try it out, and subsequently abandon the idea.
Unfortunately the managed Google Play iFrame doesn't support just turning it off. Instead, a support request will likely need to be raised with the EMM vendor.
If the EMM vendor uses the older Play EMM API with a custom DPC, they can leverage a simple API command: setStoreLayout. This can either be supported in-console, or as an action the support team can perform.
If, however, the EMM vendor uses AMAPI, they will have to reach out to Google to turn the feature off as AMAPI hasn't yet adopted the API to attain feature parity.
Once disabled, the Play Store on devices will return to standard behaviour.
If you're struggling with your EMM provider, feel free to reach out, and I may be able to escalate it through the appropriate channels.
Be prepared to provide:
Yes. The Android Management API now supports managing default application settings on managed devices.
Administrators can configure a prioritised list of apps for each default app type (such as browser, phone dialler, SMS, and others). The system evaluates the list in order and sets the first installed and qualified app as the default. If no app from the list is available, the existing default is retained.
Optionally, administrators can also prevent end users from changing the default app selection, ensuring the organisation's preferred apps remain in use.
This is particularly useful for:
Prior to this feature, default app management through AMAPI required workarounds such as OEMConfig policies or was not possible at all, leaving it to end-user choice.
Yes. As of 2025, the Android Management API supports direct APK installation to managed devices.
Historically, all application deployment through AMAPI required apps to be distributed via managed Google Play. This meant every app - including internal line-of-business apps - needed to be uploaded to managed Google Play as a private app before it could be deployed.
With direct APK support, EMMs built on AMAPI can now push APK files directly to devices. This is particularly useful for:
This does not replace managed Google Play as the primary distribution mechanism. Managed Google Play remains the recommended approach for most app deployment, as it handles versioning, updates, and licensing automatically. Direct APK installation is an additional option for scenarios where Play distribution is impractical.
For details on how this works, see AMAPI finally supports direct APK installation.
This is one of the most common managed Google Play issues reported by administrators.
The most likely cause is that your managed Google Play store is configured in Custom layout mode (also known as collections mode). When this mode is active, approved apps will not appear in the Play Store on managed devices until they are explicitly added to a collection.
Custom layout mode is typically enabled when an administrator edits collections within the managed Google Play iFrame in their EMM console. Once enabled, the store switches from showing all approved apps to showing only apps that have been placed in collections.
To resolve:
If you want all approved apps to be visible without collections:
Other possible causes:
No.
I’d recommend taking a look at Hypergate.
There is a project which was initiated (but not wholly supported) by Google to bring Kerberos support to Android through an application. Take a look at the respective GitHub repo to learn more, though note the project has seen no activity since 2019 and should be considered abandoned.
Related: Setup Kerberos Authentication on Ivanti EPMM (formerly MobileIron Core) for Android Enterprise
This is a known limitation of the Android Management API.
When deploying apps via closed testing tracks (also known as app tracks) through managed Google Play, the managed configuration schema (managed properties) is only pulled from the production version of the app. If the app has never been published to production, or if the production version has a different configuration schema than the track version, the EMM will either show no managed config options or show outdated ones.
This affects organisations that:
Workaround: Publish the app to production with the correct managed configuration schema, even if the production version is not the one actively deployed to devices. The production listing controls what managed config options are available in the EMM console, regardless of which track version is installed on devices.
For more detail on this limitation, see Managed configurations and app tracks.
Yes. As of September 2024, Google Play Protect no longer sends sideloaded applications for cloud scanning on enterprise-managed devices.
Previously, when an app was installed outside of Google Play or managed Google Play (including apps pushed by an EMM's own installer), Play Protect would prompt the user to send the app to Google for scanning. This was an additional layer of protection beyond on-device detection.
Google removed this behaviour on managed devices in response to enterprise feedback. Organisations raised concerns about private, internally developed applications being uploaded to Google's servers for analysis - a data handling concern for security-conscious environments.
Partially. On-device Play Protect detection continues to function. Known malicious applications will still be flagged and may be removed regardless of how they were installed. What has changed is that unknown apps (those not in Google's database) are no longer sent for cloud-based analysis on managed devices.
For most enterprise deployments where apps are distributed through managed Google Play or a trusted internal pipeline, this change has minimal practical impact. Organisations that rely heavily on sideloaded apps from less controlled sources should consider additional endpoint security measures.
No. On personal (unmanaged) devices, Play Protect continues to offer the cloud scanning prompt for sideloaded apps as before.
Sources:
For all EMMs that support it, the Google Play iFrame supports the simple, few-step process of uploading an APK for distribution to your Enterprise.
Unlike adding an APK directly into the UEM console, uploading to Google Play is safer, easier to manage and less likely to lead to issues compared with pushing APKs directly. Benefits include:
More information: Create and manage private apps for Android Enterprise
Where the Play iFrame isn’t supported, it’s possible to upload and distribute through the Google Play Console but keep in mind there’s a $25 fee to set up a developer account.
As of 2025, managed Google Play supports Android App Bundles (AAB) for private apps, offering smaller downloads and optimised delivery compared to APKs.
For organisations using AMAPI, direct APK installation is also now supported natively through the AMAPI SDK, providing an alternative for scenarios where Play distribution is not suitable - such as air-gapped environments or rapid iteration during development.
From September 2026, Google requires apps on certified Android devices in select regions to come from verified developers. This applies to privately distributed apps as well. Organisations should ensure their Google Play developer accounts are verified ahead of this deadline. See Google Play developer verification for details.
Note: Google Play will only permit one package name (com.app.name) for an application across the whole Google Play estate, meaning if you wish to upload an app privately today, and make it available publicly later, you must use unique package names for each upload.
The application roles feature allows an IT admin to grant special privileges to a managed application on an Android-powered device. By assigning a specific role, an app can be exempted from power and background restrictions, suspension, hibernation (on Android 14+) and have user controls (i.e. includes user actions like force-stopping and clearing app data) disabled (on Android 11+), allowing it to perform its critical function without interruption. Additionally, the app can be notified of its assigned roles, which allows it to bootstrap itself without user intervention.
The available roles are:
One application can have many roles, but a role can only be assigned to one app.
Application roles are configured within the applications section of an AMAPI policy and are supported on fully managed, dedicated, and work profile deployment scenarios, depending on the role.
For custom DPC implementations, roles are not applicable - they are an AMAPI-only feature.
Starting in September 2026, Google requires that apps installed on certified Android devices in select regions come from verified developers. This requirement rolls out to additional regions from 2027 onward.
For most enterprise deployments, the impact is minimal:
Where developer verification does matter for enterprise:
User-initiated sideloading - if users install apps outside of EMM-managed channels on certified devices (for example, downloading APKs from a website), those apps will require a verified developer in affected regions. From August 2026, sideloading apps from unverified developers requires an "Advanced Flow" that includes enabling developer mode, a mandatory 24-hour waiting period, a device restart, and biometric or PIN authentication before the install is permitted. Users can then choose a 7-day or indefinite sideloading window. ADB-based installation remains unaffected.
Third-party dependencies - if the organisation relies on public Google Play apps from smaller developers or niche vendors, those developers need to complete verification through the Google Play Console. Apps that lose the ability to be installed due to an unverified developer could disrupt workflows after the extension period ends.
Google also offers free limited distribution accounts for students and hobbyists, allowing app sharing with up to 20 devices without requiring government ID verification or the $25 registration fee.
More detail on this change and what organisations should do to prepare can be found in Google Play developer verification: what this means for consumers and enterprise.
Yes, in certain circumstances.
Google Play Protect runs on all GMS-certified Android devices, including those under enterprise management. If Play Protect identifies an app as potentially harmful, it can:
This applies regardless of how the app was installed - including apps pushed by the EMM or sideloaded as part of an enterprise workflow. On managed devices, this can disrupt critical business applications if Play Protect flags them incorrectly.
What can administrators do?
Play Protect's cloud scanning of sideloaded apps on managed devices was removed in September 2024, but on-device detection continues. See the related FAQ: Has Play Protect changed how it handles sideloaded apps on managed devices?.
It depends on the deployment scenario. On a fully managed device with no additional profiles, a single VPN policy creates a device-wide connection that routes all traffic. On any device with multiple profiles - work profile, COPE, or Private Space - VPN operates per-profile, and a single connection cannot cover the entire device.
Fully managed (no work profile)
A VPN configured by the device owner applies to all apps and traffic on the device. There is only one profile, so a single VPN connection covers everything.
COPE (company-owned, work profile)
On a COPE device, VPN must be configured separately for the device-level (personal side) and the work profile. These are independent VPN connections managed by different admin scopes - the device owner controls device-level VPN, and the profile owner controls the work profile VPN. A VPN set at the device level does not automatically cover work profile traffic, and vice versa.
If full coverage is required on a COPE device, the administrator must deploy VPN policies to both scopes.
BYOD (personally-owned work profile)
A VPN configured by the profile owner applies only to the work profile. The administrator has no control over VPN on the personal side - this is entirely under the user's control. Personal traffic is unaffected by the work VPN, and the user can independently configure their own personal VPN if they choose.
Private Space (Android 15+)
Private Space behaves like a separate profile. VPN configured on the personal/parent profile does not apply to Private Space apps, and vice versa. To route Private Space traffic through a VPN, a VPN app must be installed and configured within Private Space itself.
On COPE devices, administrators can block Private Space creation entirely if VPN coverage gaps are a concern.
Always-on VPN, available since Android 7.0, starts the VPN service automatically on device boot and keeps it running. The connection persists across reboots and app updates without user interaction.
When lockdownEnabled is true, all network traffic is blocked if the VPN is not connected. No traffic can leak to the open internet. When false, traffic flows unprotected between device boot and VPN connection establishment - this is by design but often misunderstood.
Some apps may need network access before the VPN is established (for example, during provisioning). From Android 10, specific apps can be exempted from lockdown so they fall back to normal networking when the VPN is unavailable.
From Android 11, users can no longer disable always-on VPN when it has been configured by an administrator. On company-owned devices, no user consent dialog is shown when enabling always-on VPN.
To prevent users from changing VPN settings entirely, set vpnConfigDisabled: true (AMAPI) or apply the DISALLOW_CONFIG_VPN user restriction (custom DPC).
Per-app VPN is a platform feature built into the Android VpnService API. It allows routing traffic from specific apps through the VPN while other apps use the normal network connection (or vice versa).
This is configured through the VPN app itself, not directly through EMM policy. The EMM sends managed configurations to the VPN app specifying which apps should be included or excluded, and the VPN app implements the filtering using VpnService.Builder.addAllowedApplication() or VpnService.Builder.addDisallowedApplication(). These two modes are mutually exclusive - you allowlist specific apps or blocklist them, not both.
If the VPN app does not support per-app VPN, the EMM cannot force it. Check with your VPN vendor for managed configuration support.
vpnConfigDisabled: Setting always-on VPN without also disabling user VPN configuration means users may be able to modify or disable the VPN on some devicesGoogle Play Protect now enforces an allowlist of approved Device Policy Controllers (DPCs) during provisioning. If your DPC isn’t on the list, Play Protect can flag it as “Harmful app blocked” even when it’s legitimate.
Before you appeal:
Then submit an appeal using Google’s DPC allowlist form (linked from the Play Protect warning/help article). Explain the business use case, the permissions you request, and how users are informed.
What to expect after submitting an appeal:
Read more in the full article: The DPC allowlist.
Need something else answered? Submit an issue, tweet @jasonbayton or tag me in a LinkedIn post. Questions may be republished on this document, or form the basis of a new document under /android.