93f8fd714ad89067bf81d2ce8be3b2f2e816dee2 |
|
05-May-2016 |
Sudheer Shanka <sudheersai@google.com> |
Update RestrictedLockUtils to use UM.getUserRestrictionSource. Bug: 28269827 Change-Id: Ib4a1441b71986ca6637a9236136b60e18dbc1643
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
dc67971a996c447c71ceb9ad983c79c96f598bcc |
|
03-May-2016 |
Robin Lee <rgl@google.com> |
Add lockdownEnabled parameter to always-on VPN API Allows callers to opt-out of blockading network traffic during boot and on VPN app failure. Bug: 26694104 Change-Id: Ibfbd43ad09a25f2e38053fcd6306df3711f8bde2
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
38dcca51a739d3273b24e84ba5e89e505f45960c |
|
19-Apr-2016 |
Kenny Guy <kennyguy@google.com> |
Add test method to remove admins. Add test method to remove admins that declare FLAG_TEST_APP without informing them. The method will also remove the device and profile owner status of the admin. Bug: 28027468 Change-Id: Idb4d3299a9c6595c94bfb424546cd8a384131835
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
fd580f7d1a5a19b062bea49602f0f6136bce7e5e |
|
13-Apr-2016 |
Sudheer Shanka <sudheersai@google.com> |
Merge "Update {set,get}{Long,Short}SupportMessage APIs to use CharSequence." into nyc-dev
|
74cd73079c6901f7e081fcac744a2597ed96a991 |
|
12-Apr-2016 |
Michal Karpinski <mkarpinski@google.com> |
API polish in DPM for organization color and name methods - Returning and accepting CharSequence instead of String - Enforcing 100% opacity and adjusting javadocs for color format - Adding @ColorInt annotations Bug: 27531295 Change-Id: Id27d4fd5e7bb4d746cc61288457eb4eb86224505
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
3ccca91e6ee2106004c3762ee682deff7343c6d4 |
|
12-Apr-2016 |
Sudheer Shanka <sudheersai@google.com> |
Update {set,get}{Long,Short}SupportMessage APIs to use CharSequence. Bug: 27531295 Change-Id: Ib28c509a3112046c14d812265ce43bc5b5574f12
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
035e92447084b96ef2c9125e77105c237e20bad3 |
|
18-Mar-2016 |
Ricky Wai <rickywai@google.com> |
Fix work profile screen timeout policy Settings screen should apply both primary and managed maximum timeout policy, even separate profile challenge is enabled. Bug: 27493348 Change-Id: Ia1ec1cafc7665c54816833af64e0f446a77a55b2
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
089d840383c511ed170a284ba343bd9a00db790e |
|
05-Apr-2016 |
Tony Mak <tonymak@google.com> |
xxxTrustAgentConfiguration should be supported in the parent DPM instance 1. Fix trust agent config does not persist across reboot 2. xxxTrustAgentConfiguration now supported in parent DPM instance Bug: 27601827 Change-Id: I6ea4a089bf590d6c44be40318f3a69c35c54f796
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
f1fe782e912d3feed9cded8fb80b179c4ee5d09c |
|
31-Mar-2016 |
Robin Lee <rgl@google.com> |
Merge "API to approve CA certificates" into nyc-dev
|
2f7e1e487c8ef486a16ad2398ffee413b53da04e |
|
21-Mar-2016 |
Robin Lee <rgl@google.com> |
API to approve CA certificates Bug: 18224038 Change-Id: Id928872cd70dac5a5ecfdcd52150fe6dea544e3b
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
aa604694450539b4c99901b0714efaa79db3c87d |
|
31-Mar-2016 |
Andrei Stingaceanu <stg@google.com> |
Merge "AfW - suspend apps - API polish" into nyc-dev
|
d2a968f9c31ba1864bc514bb88a9a939508fe794 |
|
31-Mar-2016 |
Sudheer Shanka <sudheersai@google.com> |
Merge "Return null value if getActiveAdminUncheckedLocked returns null." into nyc-dev
|
549b9692808cbd7d64e732b199b453b2b372dd32 |
|
31-Mar-2016 |
Sudheer Shanka <sudheersai@google.com> |
Return null value if getActiveAdminUncheckedLocked returns null. - Split per user version of getUserRestrictions into a separate method in DPMS and make the per-user version return null if the admin parameter is not a valid one. - Update isAccessibilityServicePermittedByAdmin and isInputMethodPermittedByAdmin to return false if the admin parameter is not a valid one. Bug: 27909087 Change-Id: I6f4cae6552cbfe02dc4a92b04eeeddf0314e0974
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
5b7ca24f14ae4d1189ca7683fdad1ec0e62b88b8 |
|
30-Mar-2016 |
Rubin Xu <rubinxu@google.com> |
Merge "Add DevicePolicyManager API to install a client cert chain." into nyc-dev
|
b43659170824dd8d753d9249fe6ccfd37c6221ae |
|
23-Mar-2016 |
Rubin Xu <rubinxu@google.com> |
Add DevicePolicyManager API to install a client cert chain. When installing a keypair the caller will have the option to specify a certificate chain which will later be returned to whoever requests access to the keypair via KeyChain. Bug: 18239590 Change-Id: Id21ef026e31537db38d891cb9b712dd4fe7159c7
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
efc4a344a173ae20ec72b8c05c45b794687fda87 |
|
22-Mar-2016 |
Andrei Stingaceanu <stg@google.com> |
AfW - suspend apps - API polish * renamed getPackageSuspended => isPackageSuspended * does not return false for an error, instead throws NameNotFoundException if the package could not be found, or if there is an unknown RemoteException, wraps it in a RuntimeException and rethrows. Bug: 27532430 Bug: 22776761 Change-Id: Iee00600089b1c0556a3312b10456826464fa8f9f
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
16187903b40014e28b97e2bd1429543e2c27ffb9 |
|
21-Mar-2016 |
Andrei Stingaceanu <stg@google.com> |
AfW custom lock screen message - API polish DevicePolicyManager: * getDeviceOwnerLockScreenInfo now returns CharSequence as it returns a string for display to a user * setDeviceOwnerLockScreenInfo ** accepts CharSequence, not String as this is a string displayed to the user ** Returns void; throws an appropriate runtime exception on failure Bug: 27531295 Change-Id: I30528569cfa66ee76f857fbee1c3196f821718fd
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
cd14c0a9daa42a7ccacef345b3b2ef255790f993 |
|
16-Mar-2016 |
Victor Chang <vichang@google.com> |
Api change of DPM.setApplicationRestrictionsManagingPackage() Throws NameNotFoundException instead of IllegalArgumentException Can't throw NameNotFoundException directly from DPMS as aidl doesn't support checked exception Bug: 27532565 Change-Id: I202721f41057f92ad2dd851d4769ba4502a8f9b3
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
6235a94ffaed1d82cee2317481c18776f601da1b |
|
15-Mar-2016 |
Michal Karpinski <mkarpinski@google.com> |
Unifying method names and comments to security logging, not device logging Also move SecurityLog to android.app.admin package. Bug: 27531824 Bug: 27532560 Bug: 27532564 Bug: 27532425 Change-Id: I2677afdb5685bc5d21e52c41b381b57a41e364b6
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
d4c9e541ec7110d3c842d6f92c3ec6beb0b6d997 |
|
26-Feb-2016 |
Makoto Onuki <omakoto@google.com> |
Add ENCRYPTION_STATUS_ACTIVE_PER_USER to... getStorageEncryptionStatus() Use StorageManager APIs to get the encryption state instead of from the system properties directly. Bug 26547262 Change-Id: Ic27baa9489d43a93873f8bb0428084f8886aed67
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
3cb4da16dcf07474acefb709d10b22cdfdefd81b |
|
08-Mar-2016 |
Sudheer Shanka <sudheersai@google.com> |
Update DPM.getWifiMacAddress to take admin component as argument. Bug: 27532280 Change-Id: I3a5e9557c3c6ac43c458c911a5309bdb2655fb66
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
155a280e18200aeaa0e7d5e31d6b8b0115c58e42 |
|
24-Feb-2016 |
Robin Lee <rgl@google.com> |
Merge "DPM: installKeyPair variant: caller can self-grant" into nyc-dev
|
ce3399fbb46972d223b0cd154eaea3b68a16e051 |
|
24-Feb-2016 |
Robin Lee <rgl@google.com> |
DPM: installKeyPair variant: caller can self-grant If 'requestAccess' is true, the caller (either profile/device owner or a designated certificate installer) will be granted usage of the keypair on successful installation. This has no security implications for a profile/device owner which would already be able to self-grant. Delegated certificate installers did not have this ability before. This is only allowed at install-time- not afterward. Bug: 24746231 Change-Id: Ia0ec290bb0bcde1d8137c188e2667cb7718dbfd7
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
27ee33482a2fdecbbbedbd33a137ceae3e93fa2a |
|
08-Feb-2016 |
phweiss <phweiss@google.com> |
Remove deprecated APIs DPM.createUser, createAndInitializeUser They were deprecated in M and slated for removal in N. Bug: 26974903 Change-Id: I7ae4d60bcf226c1e1de42852b378ad1ff71a914b
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
eb84b1843a3f6805c6109c1d9d023550229a3fc5 |
|
26-Jan-2016 |
Andrei Stingaceanu <stg@google.com> |
Suspend packages - one call for multiple packages Refactor setPackageSuspended into setPackagesSuspended. The rationale is that the consumers of this API are likely to want to remove multiple packages at once. Rather than calling the API N times, call it just once. The good part is that we already have the broadcast intent for suspended packages take an array so only one broadcast. Less stress on the system. Another good part is that (right now) we only have one consumer of this API and it will be easy to make changes once this CL goes in. As a shell command, for consistency only allowed one package at a time. Bug: 22776761 Change-Id: Ic8b8cf64d0a288ea3a282bb7b72f9d663b3b0049
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
8f7698aaf630787693ec7edb4779a27fdd2b888b |
|
11-Feb-2016 |
Nicolas Prevot <nprevot@google.com> |
Allow privileged apps to set the organization color. BUG:26923835 Change-Id: I97b0cbbc0d4fb9e9ca0e3d335a9d15eb5a1f9602
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
ed5c8f0216bf97e896936e2a2e24fc3fb18303a1 |
|
09-Feb-2016 |
Michal Karpinski <mkarpinski@google.com> |
Log strength of auth method used into security log As approved by Android Security team, added logging of strength of auth method as well as logging of fingerprint keyguard actions. Bug: 26841997 Change-Id: Ic8e3f125f775a7585fe56003f4c6442390edea61
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
a2ae2238e506d5b092015440792d5a885b7a7b1d |
|
29-Jan-2016 |
Suprabh Shukla <suprabh@google.com> |
Added an api to uninstall a packge with active DAs The api deactivates all the active admins in the package, then force stops the package and starts the uninstall intent for the package. This is intended to provide an easy way for a user to delete a misbehaving Device Admin Bug: b/22359208 cherrypick of Ic7ddd89ef6db53e7e76f805808d9e806100374db Change-Id: I0d677839120c46f22231a7d6f9cf6630cb020227
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
569258689a0d28f25cbdf7189038833d45a63a80 |
|
28-Jan-2016 |
Sudheer Shanka <sudheersai@google.com> |
Made changes to fix some policy transparency options. Add isInputMethodPermittedByAdmin and isAccessibilityServicePermittedByAdmin APIs in DevicePolicyManager. And update utility methods in RestrictedLockUtils to use the correct userId when checking if disabled by admin. Bug: 26897250 Bug: 26767564 Bug: 26966213 Change-Id: I0b74b3e57904a82f8ce72d856769d35b5e8403e5
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
c3cd05f8a45ab789aae1cb553df86f94667d595a |
|
11-Jan-2016 |
Rubin Xu <rubinxu@google.com> |
Add DevicePolicyManager APIs for process logging. Add Device Owner APIs for controlling and retrieving the logs. Retrieving the logs should be rate limited unless we are at the risk of losing logs due to constrained buffer space. Bug: 22860162 Change-Id: I80658f5a14e86d7cfd42402fbc5e98dc11698c0e
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
3e8a7090642d58dcd435121650a243dca262c96a |
|
25-Jan-2016 |
Benjamin Franz <bfranz@google.com> |
Add policy to set the organization name We allow the profile owner of a managed profile to set the name of the managed organization. This name is used as the default header message shown in the confirm credentials screen a.k.a. work challenge. Bug: 26638631 Change-Id: I03c5acc9fffe06cdb9d0d60dd1580b20e21783b1
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
bc0ce990435fe02a356b3e43272f692709f633ed |
|
28-Jan-2016 |
Michal Karpinski <mkarpinski@google.com> |
Merge "Logging of keyguard actions into security log"
|
31502d3d95610930b56bb7931dbd57a997f9ce8f |
|
25-Jan-2016 |
Michal Karpinski <mkarpinski@google.com> |
Logging of keyguard actions into security log Bug: 22860162 Change-Id: I7dbe68fff7d9d45b6c417d960cf025c8d0694917
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
f348e8e22bed4b56fdb0c02702d12b36467dedd7 |
|
07-Jan-2016 |
Lenka Trochtova <ltrochtova@google.com> |
Add policy for enforcing that all users are ephemeral. BUG: 24883058 Change-Id: I8e53ca677c935a6c828dd6ece00b345d0eff182a
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
d7693917a7c7348cb12692116d2693314c29e809 |
|
22-Jan-2016 |
Clara Bayarri <clarabayarri@google.com> |
Check if the profile password would comply as the device lock Bug: 26801330 Change-Id: Ide31464dd0292ca97b03abe08cdde5b41d517b66
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
697815eddb0139e6d4284b72f9393cf46c6e544b |
|
26-Jan-2016 |
Victor Chang <vichang@google.com> |
Merge "Launch managed quick contacts without contact id"
|
44a18081546345a0655748717862a89ae6dd7948 |
|
26-Jan-2016 |
Alan Treadway <alantreadway@google.com> |
Merge "Add explicit and persistent user provisioning state."
|
a92e1216ca3af5d03e17734b6b990be5116d07a9 |
|
25-Jan-2016 |
phweiss <phweiss@google.com> |
Make API createAndManageUser public Remove @hide, and add parameter for specifying profile owner. The PO has to live in the same package as the device owner. Bug: 25288732 Bug: 25860170 Change-Id: I40e8984a71ee9d1ff74e57d4e79e298deef9bc35
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
97bdacc6d124f08a3f1c362fc35a5eed16af9880 |
|
21-Jan-2016 |
Victor Chang <vichang@google.com> |
Launch managed quick contacts without contact id set contact id to enterprise base contact id if it's enterprise uri BUG=26176780 Change-Id: Ie1160bef22d44c90eb4015783fafdafd160bcdd8
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
5f09616e6bb793e789167e3281478b13413d0932 |
|
25-Jan-2016 |
Philipp Weiß <phweiss@google.com> |
Merge "Add new API function createAndManageUser"
|
afad8783699b1ba6f3c7ee5961d6ddc2bd771dc1 |
|
19-Jan-2016 |
Alan Treadway <alantreadway@google.com> |
Add explicit and persistent user provisioning state. Add explicit modelling of provisioning state so that integration of management provisioning flows with packages such as setup-wizard are cleaner, and can be more direct. Previously we relied upon USER_SETUP_COMPLETE secure setting and HOME intents to signal intent, but this is not very clear and can be fragile. Bug: 25858670 Change-Id: Idc56a040f710c3aee281db420f21717da3960722
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
343fb33a9be819bbf33eae2c3f93bc44b3477ecd |
|
25-Jan-2016 |
phweiss <phweiss@google.com> |
Add new API function createAndManageUser This is a reduced version of the (deprecated) function createAndInitializeUser, that allows the device owner to create a new user and pass a bundle with information for initialization. The new version of the function has the same functionality, but the profile owner of the new user is always the device owner. A flag can be specified to skip the setup wizard for the new user. The new user is not started in the background, as opposed to how createAndInitializeUser did it. Instead, the bundle with initialization information is stored and will be broadcast when the user is started for the first time. Bug: 25288732, 25860170 Change-Id: I4e1aea6d2b7821b412c131e88454dff5934192aa
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
fe434a15d6bde9299b51dc284b336944e5cf8a1c |
|
25-Jan-2016 |
Esteban Talavera <etalavera@google.com> |
Merge "Add additional APIs supported work on the parent DPM instance"
|
4c052f237a108457fca3d3864c5654ebd4505111 |
|
25-Jan-2016 |
Bartosz Fabianowski <bartfab@google.com> |
Implement user affiliation A user/profile is considered affiliated if it is managed by the same entity as the device. This is determined by having the device owner and profile owners specify a set of opaque affiliation ids each. If the sets intersect, they must have come from the same source, which means that the device owner and profile owner are controlled by the same entity. BUG=25599229 Change-Id: I393fe0de70272307ed3c811aaba4b48a5109c562
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
623999185029a2c5baf29efe4ebdcbcdebcca294 |
|
11-Jan-2016 |
Esteban Talavera <etalavera@google.com> |
Add additional APIs supported work on the parent DPM instance Bug: 22543972 Change-Id: I05061e34d120c64d5c49ca6b7b4014d7dadb68f4
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
59720bb2a67dae70cd2e46a9f611d66e4a3f7221 |
|
18-Jan-2016 |
Benjamin Franz <bfranz@google.com> |
Add profile policy to set work challenge background color Adding a policy for profile owners to set the background color of the confirm credential screen for the managed profile. Bug: 26638631 Change-Id: Iea36b94c5a42b6ae12cc36921ec5f840306e81a1
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
a8c8851caa0d1d44eccfcae2e01a2b6e7235d290 |
|
18-Jan-2016 |
Michal Karpinski <mkarpinski@google.com> |
Merge "DPM changes to support remote bugreports"
|
b68d2d5b68dc58fb7b75ce94af74de58a1b9d3f9 |
|
14-Jan-2016 |
Robin Lee <rgl@google.com> |
Merge "Always-on app VPNs"
|
3fc437e89b018f258a3dee1a83014555aa156dc4 |
|
15-Dec-2015 |
Michal Karpinski <mkarpinski@google.com> |
DPM changes to support remote bugreports Bug: 22860136 Change-Id: If984318e421f511d9b0fc7138aacd36d5334698f
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
a1771110d67fa7361f92d92f2e91019882ce3305 |
|
18-Dec-2015 |
Clara Bayarri <clarabayarri@google.com> |
Create Work Challenge per-user condition Change the current static condition to a per-user condition so we can check and enable/disable the work challenge properly. Also add an isAllowed API, as the Work Challenge can only be used when the user's DPC targets N or above to maintain backwards compatibility. Change-Id: I0cb8b475838816801868ffb24726407aa257b4de
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
244ce8ef5f201cf403bab43df8281671a9e94512 |
|
05-Jan-2016 |
Robin Lee <rgl@google.com> |
Always-on app VPNs Bug: 22547950 Change-Id: I46b204170bfac58d944f39b22f815b080de71a58
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
c754dffe1980cb6c3be96fb258b046dfcdf82353 |
|
12-Jan-2016 |
Victor Chang <vichang@google.com> |
Merge "Create a new device policy for controlling work contacts search"
|
1060c61866d57bd82cc474447205471c15e0d901 |
|
04-Jan-2016 |
Victor Chang <vichang@google.com> |
Create a new device policy for controlling work contacts search BUG=25981902 Change-Id: I5cea59d7d09bf54051ae0e56e824e4d3a08a49e7
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
3e826effedc89e326114a7abcbdd4ac7b3e125c0 |
|
14-Dec-2015 |
Clara Bayarri <clarabayarri@google.com> |
Create parent APIs in DevicePolicyManager This change creates the infrastructure for a parent DPM and implements the actual parent APIs for - set/getPasswordQuality - isActivePasswordSufficient This is part of the Separate Work Challenge Change-Id: I0477051b3162cbb26aac79467da08932f22fd1b7
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
06de4e77c20be239384262b1508f0cf53bedb145 |
|
22-Dec-2015 |
Kenny Guy <kennyguy@google.com> |
Add support message for device admins Allow admins to set a long and short support message for settings to display. Bug: 25659579 Change-Id: Ib645490785642e49c69d8dbc65455eb3398547ee
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
f3378a29e9c270f1cbfebb126de6f14355ccba08 |
|
17-Dec-2015 |
Esteban Talavera <etalavera@google.com> |
Merge "Device or profile owner can let another app manage app restrictions"
|
699d537d1b7410268c639653e66746398101ff81 |
|
17-Dec-2015 |
Mahaver Chopra <mahaver@google.com> |
Merge "Adding DPM.reboot"
|
bf60f728cc7ed326fb8978afd9f589a685bb87b7 |
|
10-Dec-2015 |
Esteban Talavera <etalavera@google.com> |
Device or profile owner can let another app manage app restrictions The device or profile owner can allow another package to set app restrictions for any app in that user Similar to the way it can give permission to access CA certificate related APIs from M. Bug: 22541936 Change-Id: I0c1b0804ad300dfa4fbdc1c7721c5d8653d77861
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
1e2839188fb49575b86646d3aadb355c81ef9cc5 |
|
26-Nov-2015 |
Andrei Stingaceanu <stg@google.com> |
Wire call to suspend a package Adds APIs in DevicePolicyManager and PackageManager for allowing a device admin to suspend a package. PackageManagerService sets or unsets a new PackageUserState 'suspended' setting. Terminal command to suspend/unsuspend has been added via PackageManagerShellCommand (as root). Next steps: * use the new 'suspended' setting for denying access to start app (probably in ActivityStackSupervisor) * broadcast a PACKAGE_(UN)SUSPENDED intent for launchers to pick up * remove app from recents (go further and kill it if it is running) * erase existing notifications for this app Bug: 22776576 Change-Id: I718b3498f6a53cc0c6fdfb6d15031e53ddca4353
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
1ce53bc571563d8bf448a81a38da342ed5413ee4 |
|
14-Dec-2015 |
Mahaver Chopra <mahaver@google.com> |
Adding DPM.reboot Adding new policy in DPM to trigger reboot on the device. Requirement: Device owner can reboot the device if it is stuck or is not useable due to some unresponsive UI. Bug: 25304994 Change-Id: I7a6d5c8ad611de9c1cf6619378e492a306b41626
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
fbc65644b9bda216699f5f1f883d6dfa2668e545 |
|
03-Aug-2015 |
Robin Lee <rgl@google.com> |
DevicePolicy API to remove an installed KeyPair The keypair is specified by alias and removed via a call to the KeyChainService, which will have installed the pair in the first place. Bug: 22541933 Change-Id: I37317e7c22e89816156e6e9a7abf4c5a59e8440a
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
a31ebbc439364a4993e79fd385cf6373408a42fe |
|
24-Nov-2015 |
Makoto Onuki <omakoto@google.com> |
Add DO API to get wifi mac address Bug 25496044 Change-Id: Ib1f0ce4ca10951edcfaa0aa79ae5c2d142a74599
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
c8a5a555f1482d0f45b538eb898d6ee7e26552a6 |
|
19-Nov-2015 |
Makoto Onuki <omakoto@google.com> |
DPM.isDeviceOwnerApp() and getDeviceOwner() now check calling user - Previously on MNC, they would return the same result regardless who the calling user is. - Now they properly take DO user-id into account. Meaning, they'll always return false and null respectively, if the calling user doesn't run device owner. - Note isDeviceOwnerApp() is a public API and getDeviceOwner() is a system API. Meaning we're changing the behavior or non-private APIs. - Also cleaned up hidden APIs, and gave them explicit suffixes to avoid confusion. Bundled code should prefer them for clarity. Now we have: * APIs that work cross-users: They all require MANAGE_USERS. boolean isDeviceOwnerAppOnAnyUser(String packageName) ComponentName getDeviceOwnerComponentOnAnyUser() int getDeviceOwnerUserId() boolean isDeviceOwnedByDeviceOwner() String getDeviceOwnerNameOnAnyUser() * APIs that work within user. No permissions are required. boolean isDeviceOwnerAppOnCallingUser(String packageName) ComponentName getDeviceOwnerComponentOnCallingUser() Bug 24676413 Change-Id: I751a907c7aaf7b019335d67065d183236effaa80
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
15a46b07c5734b14df60ea28ab7a7cd26df2fc17 |
|
11-Nov-2015 |
Mahaver Chopra <mahaver@google.com> |
Add method isManagedProfile and isSystemOnlyUser Adding method isManagedProfile() and isSystemOnlyUser() for DPC to know if running in a managed profile or system only user Bug: 24464823 Change-Id: I79974fdfd60d2bfe52dee3b4c95becf47a5bf0b1
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
883f12ac5ac818e678af46b64a3f6e97b51caabe |
|
23-Nov-2015 |
Alan Treadway <alantreadway@google.com> |
Merge "Revert "Disable multiple user for corp-liable mode""
|
86e5d6b868aec6fa4d3070f36d458798968c85f9 |
|
23-Nov-2015 |
Alan Treadway <alantreadway@google.com> |
Revert "Disable multiple user for corp-liable mode" This reverts commit 1dc510eb5bc7f279002a3479f24761f08cc390f7. Change-Id: I12ea8275369cbdc4e95b21c7f5d51b4f0e5da7b2
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
9aa233899f7cf5c1cdf4181412a9e197d83ab1a3 |
|
23-Nov-2015 |
Ricky Wai <rickywai@google.com> |
Merge "Add work contacts directory support in Quick Contacts API"
|
494b95d30266335044a854845219b6e34cf43edb |
|
20-Nov-2015 |
Ricky Wai <rickywai@google.com> |
Add work contacts directory support in Quick Contacts API Bug: 25764505 Change-Id: I61f9d13ea03352e3df1686ee4b3bcc43e9a9a760
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
71c84e515e73f6a3cb30d68fc81f88e1bd02b5e3 |
|
23-Nov-2015 |
Mahaver Chopra <mahaver@google.com> |
Merge "Disable multiple user for corp-liable mode"
|
09b108e2bb6b585947249eda92c047d0b582e8a0 |
|
21-Nov-2015 |
Fyodor Kupolov <fkupolov@google.com> |
Merge "Added keep-uninstalled-packages DO policy"
|
cb6fd80721253ffa9dcab5cf8c2f4e9b9cd17ccc |
|
05-Nov-2015 |
Fyodor Kupolov <fkupolov@google.com> |
Added keep-uninstalled-packages DO policy This policy allows DO to specify a list of apps to cache even without being installed on any user. Bug: 23938464 Change-Id: I2eeab7f148409739fc23a5c44e955ad12b63fd04
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
1dc510eb5bc7f279002a3479f24761f08cc390f7 |
|
19-Nov-2015 |
Mahaver Chopra <mahaver@google.com> |
Disable multiple user for corp-liable mode Bug: 25443050 Change-Id: Iad34e7ad0d3679626880f905f9bab9b6c2a192ed
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
1c277a5d8f79ebf8beeb80f67b67512d9217d953 |
|
11-Nov-2015 |
Sudheer Shanka <sudheersai@google.com> |
Add per-user version of DevicePolicyManager.getUserRestrictions. Bug: 25663001 Change-Id: Ic5b34fee7b57670c338f11263330a1c702002edc
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
70f929eedec10b154170ad66c9d53f18bfc4f613 |
|
11-Nov-2015 |
Makoto Onuki <omakoto@google.com> |
Disallow DA to reset password, also fix all DO checks Now pure DA (not PO, not DO) aren't allowed to change the password if one is already set. Also update "isDeviceOwner" check and make sure we always take user-id into account. If one really wishes to check the package name only, then use getgetDeviceOwner() instead. Also change the enforceNotManagedProfile() check to what's more generic in the FBE world. Bug 25645900 Bug 25547523 Bug 25643916 Change-Id: I588ecf9452fe3acc1fb0b4ca0457ad662382fcd2
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
bfd2290824069b6eaeae4fdfd9a52c60bd73689e |
|
12-Nov-2015 |
Andrei Stingaceanu <stg@google.com> |
Merge "Introduce APIs in DPM for setting/getting the device owner info"
|
6644cd9630be363a25af5e1327f41e16ca868556 |
|
10-Nov-2015 |
Andrei Stingaceanu <stg@google.com> |
Introduce APIs in DPM for setting/getting the device owner info This information, if set, will be shown in the lock screen instead of the user owner information and the settings tile will be made readonly (implementation in following CLs). Bug: 22547309 Change-Id: Ic826d8049bc67f5e8fcfa6a91aa2017247c93b11
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
d59262667cbcdfedd9b03dccaa26a9a000486350 |
|
09-Nov-2015 |
Nicolas Prévot <nprevot@google.com> |
Merge "Add method to tell the dpc if provisioning is allowed."
|
3a3092fab0ccb631bc70de64f3bbe5c076a1f94b |
|
30-Oct-2015 |
Makoto Onuki <omakoto@google.com> |
Add DPM.getUserRestrictions() This returns per-DO/PO restrictions. Bug 23902097 Change-Id: I225c1b01444fe2f60e5a6674d327182cc9bb15dc
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
07387fedfafa72bcb68defd801eef82f1f494d7c |
|
30-Oct-2015 |
Nicolas Prevot <nprevot@google.com> |
Add method to tell the dpc if provisioning is allowed. The DPC can use it to tell if provisioning a managed profile or for device owner would work or not. BUG:25338478 Change-Id: I09ea6a9f23a8e88e4ed37c048170b2a68213086e
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
a52562ca9a4144cf30e6d5c6ffe856cc8e284464 |
|
02-Oct-2015 |
Makoto Onuki <omakoto@google.com> |
setDeviceOwner() now requires a full component name. Bug 20149907 Change-Id: I24e66159d1d966925aa3a494b1e2839b07cdafa2
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
e7ee54ee7f4985bc743053d38d21f33c70220f05 |
|
21-Sep-2015 |
Craig Lafayette <craiglafa@google.com> |
Remove device initializer agent Bug: 23216982 Change-Id: I867c0b5f4165983d1ed2623a655f6a2a5e3770bb
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
58b684f1cdc52467b71c42cfae18433a19ce7d0b |
|
04-Sep-2015 |
Makoto Onuki <omakoto@google.com> |
[split system] Tentatively support running DO on meat user - setDeviceOwner() now takes a user ID. (We can infer it from Binder, but we still need it for the dpm command.) - Change broadcast target UID for DO to the DO user - Start the DO user on boot complete. TODO Investigate whether this is actually the good timing. TODO Prevent the DO user from being killed Bug 23827706 Change-Id: I227dbd444f1f4e94d98c317489d151554fe79d91
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
77b2d49abb38fafb91fb99ce603a92f189553cd7 |
|
11-Jun-2015 |
Craig Lafayette <craiglafa@google.com> |
Merge "Remove device initializer status messages" into mnc-dev
|
83881bdbdee14cc9726c89019490a0514686f314 |
|
10-Jun-2015 |
Robin Lee <rgl@google.com> |
Policy: make bulk CA uninstalls happen in service Fewer round trips, only one point of contact for bugs to creep in. Bug: 21650477 Change-Id: I1764faa753bd674ecb0d13149d778d99bd2ff4c4
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
cedd53adc3875fe1b4275afa35ec5c3ede7b6c39 |
|
09-Jun-2015 |
Julia Reynolds <juliacr@google.com> |
Remove the ability to set a preferred setup activity. Bug: 21557327 Change-Id: I8c1809d25c5f5fcd186dfc0636d8ac47ed5fc903
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
240e64828f68064b2a1074a1dda1fc41fe19d711 |
|
02-Jun-2015 |
Craig Lafayette <craiglafa@google.com> |
Remove device initializer status messages - Remove ManagedProvision Bluetooth extras from DevicePolicyManager - Remove ManagedProvisioning device initializer status action and extras from DevicePolicyManager. - Remove DIA status update protected-broadcast and permission - Remove DPM.sendDeviceInitializerStatus method Bug: 21559093 Change-Id: Ibb651ebb2772ace6a16a5830f82f75465150e6e3
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
184b3753de54241c67799089f5bc59a1ede4438a |
|
22-May-2015 |
Amith Yamasani <yamasani@google.com> |
Add getPermissionGrantState method in device policy This is to have a way to query what permission state was set by the profile owner. Bug: 21356830 Change-Id: Ie396e946b4285267c1d95f82b9d9765b43697d3c
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
d8ecc5aee49874ac1f100f69be94906a3e99b951 |
|
20-May-2015 |
Svet Ganov <svetoslavganov@google.com> |
Allow DO/PO to go back to normal permission state. We have APIs for a DO/PO to fix a permission in a granted or denied state in which the user cannot manage this permission through the UI. However, there is no way to go back to the default state in which the user gets to choose the permission grant state. Change-Id: I2562a1d8b1385cd740b44812844ef14c895c2902
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
39087b1cec6a54e96ab9eafe8317952720790533 |
|
05-May-2015 |
Robin Lee <rgl@google.com> |
Replace String host:port/url args with Uri arg Uri provides a stronger guarantee of well-formedness and lets apps do nice extra things like specifying scheme etc. without twisting any expectations. Bug: 20820034 Change-Id: Ia6bbedb74765444920b667d643fb7e1eb6a7292b
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
396d944001f0b897b1689baa0bd7d3e04046b3ca |
|
13-May-2015 |
Julia Reynolds <juliacr@google.com> |
Merge "Remove initiator name param." into mnc-dev
|
731051e36bb2d420a29cd889a38e02c88c930aad |
|
11-May-2015 |
Julia Reynolds <juliacr@google.com> |
Remove initiator name param. This won't be shown in the UI; it's not needed. Bug: 20820224 Change-Id: I51ecd0a9151a49e26faf52e792a0b316a8facc8e
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
d86d58cd010b087d6d481062f84c894e0ced7bbc |
|
05-May-2015 |
Rubin Xu <rubinxu@google.com> |
Tweak SystemUpdatePolicy according to API review. Make SystemUpdatePolicy Parcelable; hide public constructor and expose static builder methods. Bug: 20820025 Change-Id: I594ba3c7e5514551134ba6c866b24498b66506bf
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
bece80645e2b2d84ea65aabfa7fc01d5ad633708 |
|
06-May-2015 |
Benjamin Franz <bfranz@google.com> |
Rename functions that disable status bar and keyguard Rename the DevicePolicyManager functions setKeyguardEnabledState and setStatusBarEnabledState to setKeyguardDisabled and setStatusBarDisabled respectively. Bug: 20820039 Change-Id: I06f6a19ac55b24e66e9f2cb340ead5d940cb2235
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
d49489b3af01c13d3b13af1cd04d53787185cc0a |
|
28-Apr-2015 |
Amith Yamasani <yamasani@google.com> |
Permissions control via profile/device owner admin Profile owners and Device owners can set policies for runtime permissions. Blanket grant/deny policy can be set for a user. They can also explicitly grant/revoke permissions for specific apps which cannot be overridden by the user and will not be prompted. [More implementation required in PackageManagerService and PackageInstaller] Bug: 20666663 Change-Id: I2c25c18c2a195db9023a17716d5896970848bb45
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
13c58bacc8f1ff35bb24ba19069bab8a41aabf68 |
|
20-Apr-2015 |
Julia Reynolds <juliacr@google.com> |
Allow device initializers to set a preferred setup activity. This activity will launch by default on device reboot or user switch during user initialization, even if there are higher priority 'home' activities. Bug: 20223050 Change-Id: I335aeb010a1ae5db07a4343d26e160c74bd299e1
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
dc105cc91c63c27479d73a21702cd4ba0304acc4 |
|
15-Apr-2015 |
Rubin Xu <rubinxu@google.com> |
Enable system service to notify device owners about pending update Create a DevicePolicyManager API which can be used by OTA subsystem to tell device owners about pending updates. Device owners will get a callback from its DeviceAdminReceiver when the update service sends out such notifications. Bug: 20213644 Change-Id: Ifcc755655e4f441980cf77d76175a046112ca9ae
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
4eb6a36922f5e98fe181c0326cc5721f0e7589ca |
|
02-Apr-2015 |
Andrei Kapishnikov <kapishnikov@google.com> |
Introduced DO_NOT_ASK_CREDENTIALS_ON_BOOT flag A new flag for DPM.resetPassword() method that specifies that the device should be decrypted without asking for the password or pattern. Bug 19250601 Related CL in Settings App: https://googleplex-android-review.git.corp.google.com/#/c/670206 Change-Id: I9ca3472dc18e66e618ff772dee16ca4a450e9997
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
5faad8e4cdf04211239f076b5d073e26d0ae3207 |
|
20-Apr-2015 |
Rubin Xu <rubinxu@google.com> |
Rename public OTA policy APIs in DevicePolicyManager Use the term "SystemUpdate" instead of "OTA", in public DevicePolicyManager APIs that handle OTA policies. Bug: 19650524 Change-Id: Iebdaea91337d617147cb411b6f47e0f3fae8671c
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
ea2ec97f37c649881f2be8a5cc40bf44080cc632 |
|
16-Mar-2015 |
Benjamin Franz <bfranz@google.com> |
Introduce device owner API to disable the status bar Let the device owner disable the status bar to achieve multi-app single purpose mode. When the status bar is disabled, quick settings, notifications and the assist gesture are blocked. Bug: 19533026 Change-Id: I72830798135136e5edc53e5e2221aebb9a7c7d57
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
e36087e5b6eeb92607f4ad5b3b1662bef9bafa4c |
|
07-Apr-2015 |
Benjamin Franz <bfranz@google.com> |
Introduce device owner API to disable the keyguard Let the device owner disable the keyguard to achieve undisturbed single use mode with multiple apps. Calling this API has no effect if a password has been set for the calling user. Bug: 19533026 Change-Id: I6b726b7f36efb669359e9da4b7e3db1f8031dad5
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
c9c9f7b40ec77217ce595fd152a505481326dc9a |
|
14-Apr-2015 |
Rubin Xu <rubinxu@google.com> |
Merge "Add setOtaPolicy/getOtaPolicy API in DPMS"
|
0c606812c5102fd19eda4b3e1ffbc9e61fec6430 |
|
14-Apr-2015 |
Ricky Wai <rickywai@google.com> |
Merge "Add Bluetooth Contacts Sharing policy in DevicePolicyManager"
|
778ba135380cda90c4c9317c34e875c00e2743a3 |
|
31-Mar-2015 |
Ricky Wai <rickywai@google.com> |
Add Bluetooth Contacts Sharing policy in DevicePolicyManager Bug: 19990979 Change-Id: Ide9adf66eec5721e50573c03956a1b63b7e8b18b
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
8027a4ffc285ba39df3a262abfff1cfdd6dd31db |
|
10-Mar-2015 |
Rubin Xu <rubinxu@google.com> |
Add setOtaPolicy/getOtaPolicy API in DPMS Allow device owners to set OTA policy for automatically accept/postpone incoming OTA system updates. This class only provides the setting and getting of OTA policy, the actual OTA subsystem should handle and respect the policy stored here. Bug: 19650524 Change-Id: I9b64949fab42097429b7da649039c13f42c10fd1
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
dbe31a6616f2e8cb8436ea235149d076302fb793 |
|
02-Apr-2015 |
Craig Lafayette <craiglafa@google.com> |
Send device initializer status. - Create method in DevicePolicyManager to send device provisioning status to ManagedProvisioning. - Define status updates used by ManagedProvisioning. Bug: 20001077 Change-Id: Ia98fc765d1ebb2ba9680636ca15c2c870d160261
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
eaafdf72a410b445cee9fea274a57f31aec2509f |
|
02-Apr-2015 |
Julia Reynolds <juliacr@google.com> |
Store the device initializer componentname in addition to package. This removes ambiguity about which component in the initializer package handles device initialization when setting up secondary users. Bug: 19992262 Change-Id: I2e48168907725a56cd05d0b51c9f28b34fa28d1a
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
1040da1d4eb99fd2588e4c4d5b08b2e3fc0c7777 |
|
19-Mar-2015 |
Makoto Onuki <omakoto@google.com> |
Enterprise quick contact 1/2 Now openQuickContact goes thorough DPM. When a lookup URI is build with a lookup key returned by the enterprise lookup APIs for a corp contact, the lookup key will have a special prefix. In that case we go through DPM and have it launch QC on the managed profile, if the policy allows. For now we use the same DPM policy as enterprise-caller-id to disable this. Design doc: go/cp2-mnc-enterprise-dd Bug 19546108 Change-Id: I831a8190ae902ae3b1248cce6df02e3a48f602d2
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
4fd8d4ab2aafe8ed73080408223e8b20a953cfc4 |
|
30-Mar-2015 |
Makoto Onuki <omakoto@google.com> |
Revert "Enterprise quick contact 1/2" This reverts commit 75a0882b946df6de4775c9e54ca023ff54f3f678. Change-Id: Ibe332885824b228bf1b1147d141c9395554ff67f
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
75a0882b946df6de4775c9e54ca023ff54f3f678 |
|
19-Mar-2015 |
Makoto Onuki <omakoto@google.com> |
Enterprise quick contact 1/2 Now openQuickContact goes thorough DPM. When a lookup URI is build with a lookup key returned by the enterprise lookup APIs for a corp contact, the lookup key will have a special prefix. In that case we go through DPM and have it launch QC on the managed profile, if the policy allows. For now we use the same DPM policy as enterprise-caller-id to disable this. Design doc: go/cp2-mnc-enterprise-dd Bug 19546108 Change-Id: I4840e7fad8a6a60249df07d993d26d03619650d4
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
ec32b56cc22658ecb549390fe0096fc6d7b5ac2a |
|
03-Mar-2015 |
Rubin Xu <rubinxu@google.com> |
Add DelegatedCertInstaller API in DPMS Allow device/profile owner to delegate certificate APIs to third-party certificate installer apps. Bug: 19551274 Change-Id: Iaf9abb5ecb1dc0975fa98ea14408fe392d52fbf4
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
2482100fed93eac82f7d4b759bd1ec418b55be58 |
|
06-Mar-2015 |
Julia Reynolds <juliacr@google.com> |
Merge "Allow device and profile owners to set a user icon."
|
1c3754a35c434e4102c7ac3dceb887fa137b153b |
|
05-Mar-2015 |
Julia Reynolds <juliacr@google.com> |
Add security check for clearDeviceInitializer in the service. Bug: 19230954 Change-Id: I5c648492bef0d2b579b6f59b91afc890e3092d36
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
fca04ca0965d5e04dacc025b77f2b4881ee1afd8 |
|
17-Feb-2015 |
Julia Reynolds <juliacr@google.com> |
Allow device and profile owners to set a user icon. Change-Id: I7c2bafb85cff3fa063af7a2f27b76c69172f0525
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
20118f18c11c01c7743b5646cc1a0039c2e90037 |
|
11-Feb-2015 |
Julia Reynolds <juliacr@google.com> |
Allow the device initializer to perform user setup tasks. A device initializer is an application that is allowed to run during user provisioning on device owner devices. During device provisioning (or, user provisioning of the first user of the device), a device initializer is granted device owner permissions. During secondary user provisioning, a device initializer is granted profile owner permissions. Once provisioning is complete for a user, all elevated permissions are removed from the device initializer and the device admin component of the app is disabled. Bug: 19230954 Change-Id: Ib6725fb3b09bb21e4198a5dc0b445ccebb40b27e
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
abf3570f382b94d16cc8a06c4b7c434d7a7052aa |
|
17-Feb-2015 |
Robin Lee <rgl@google.com> |
DevicePolicy: Make uid parameter an int This should not have been a long to begin with. Change-Id: Icbf6e2e97cb6301b968b3eb8b3f9a46331f7983e
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
3798ed5e0b56ab03e7022a9922b50a4a25474033 |
|
03-Feb-2015 |
Robin Lee <rgl@google.com> |
Device Policy API to choose a private key silently Support for certificate chooser (keychain) to first query a profile owner (if one exists) for a silent credentials grant which will be passed back to the caller as an alias. Bug: 15065444 Change-Id: I0729b435c218b7991e6cb5faedefb7900577afcc
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
bdc58c66af3440f963731cdcdf820d7108d9f98a |
|
29-Jan-2015 |
Fyodor Kupolov <fkupolov@google.com> |
Removed userHandle from setXXX methods User handle is now extracted from UID of the calling process. Previously setXXX methods may not work properly, if userHandle parameter was different from a user of the calling process. In practice, this wouldn't have happened because setters were always called with a userHandle of the caller process. Bug:17202572 Change-Id: I1c08c54c975a04b8c54719a1e280ad3cfaff2e67
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
96fb932666539e2b3be26ef91eb248a9ace5678e |
|
02-Dec-2014 |
Fyodor Kupolov <fkupolov@google.com> |
Added isRemovingAdmin method Added isRemovingAdmin method, so that clients can query if device admin is currently being removed. Bug: 17609838 Change-Id: I82547a9eeb228fcf8ac2a6e639ca1a75fa41d161
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
3a3d212a51974ccec6100c1e117225291edc83cc |
|
29-Oct-2014 |
Amith Yamasani <yamasani@google.com> |
Different messages when wiping user and not device There are 3 types of users 1. Primary - device will be wiped 2. Managed profile - profile will be removed 3. Secondary user - user will be removed Show different messages for almost wipe and wipe in each of these 3 cases. Bug: 16843155 Change-Id: Icecfe520622773da9e45465bf2217e8ed38b266e
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
e303bf443532c2ad756260133f00747bcff11e69 |
|
27-Aug-2014 |
Jim Miller <jaggies@google.com> |
Update TrustAgentService API after review This change incorporates API council feedback and enables the TrustAgent whitelisting API. It also contains a minor cleanup of DPM's use of UserHandle to eliminate unnecessary object creation. Fixes bug 17008504 Change-Id: I63cc50169fde54b34406845818bcaf6aadc1a3db
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
26408ccd8e852d947e58021792bfc3b315e5948d |
|
08-Sep-2014 |
Bernhard Bauer <bauerb@google.com> |
Add DevicePolicyManager PrivateKey mgmt Additional device policy API to install keypairs to the keychain silently. Bug: 15065444 Change-Id: Idc25774c9ab1a61080290bebd6f5c4f24e6ee2e0
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
808f6ef2ac2127ea0ea14e71c9599355b631a617 |
|
28-Aug-2014 |
Esteban Talavera <etalavera@google.com> |
Pass ComponentName to probing certificate methods Pass ComponentName and check whether that admin is a profile owner on DPM get/has certificate methods (requested on the API review). As per Change I55eec17e01489ab323f8a0e68b11592605a7b740, not keeping track of which admins installed which certificates for now: "Having per-admin CA certificates would be a fair bit of work. The only MDMs we're opening this up to for now are Device and Profile Owners which 100% manage the profile so will be the only admin. It seems like if we keep track of "who installed which certs" it'll be a little pointless because the answer will always be "the ProfileOwner" for every single one." Bug: 17005622 Change-Id: I45e9dac5236ab4ed235a341c208ac3cb6aba17da
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
729b2a6c2f330c10674bb3fc0c4f2eb57e3d0a43 |
|
27-Aug-2014 |
Esteban Talavera <etalavera@google.com> |
Renamed getUninstallBlocked to isUninstallBlocked As per API review. Bug: 17297103 Change-Id: Icb4ceded317b0df4deb0f5221512541a632e150b
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
0ced6272911f440843e9ff8e89b9fafdb49b243b |
|
26-Aug-2014 |
Sander Alewijnse <salewijnse@google.com> |
Provide lockdown of date/time device owners. Fixed two minor issues with the screencapture as well. Updated documentation and added enforceCrossUserPermission. Bug:16948504 Change-Id: I9a645dcf480a4a044879ba481bce964d06fe5153
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
d5c5c13c8505a27290a2540ff1f64c8753431cb1 |
|
20-Aug-2014 |
Esteban Talavera <etalavera@google.com> |
Rename get/setBlockUninstall() to get/setUninstallBlocked() As requested in the API review Bug: 17005622 Change-Id: I1332ad11e588ab3fa409f2a28222608936cb383e
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
8c5c37364776266d9d91bb35094a9755707833f7 |
|
21-Aug-2014 |
Esteban Talavera <etalavera@google.com> |
Merge "Remove setApplicationsHidden" into lmp-dev
|
115cd65d2a3417b506563e6b2d60c269d69efaef |
|
21-Aug-2014 |
Esteban Talavera <etalavera@google.com> |
Remove setApplicationsHidden As requested in the API review. This version (the one that takes an Intent) was used only in the DeviceAdminSample and some CTS tests. Bug: 17005622 Change-Id: I9984b22836417ad4d025302f61bd91704e9345a4
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
fa80a4faa3ab32f61742b684e832126dae8468e7 |
|
20-Aug-2014 |
Kenny Guy <kennyguy@google.com> |
Add apis for whitelisting IMEs and accessibility services. Adds apis for device / profile owners to white list the accessibility and input methods a user can enable. Bug: 14469005 Change-Id: I921888660d29a5370395db87adf75d4d106660c9
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
48aacba761527a529c2b668c8151c7f98ff70524 |
|
13-Aug-2014 |
Jason Monk <jmonk@google.com> |
Fixes to lock task API from API review Adding ComponentNames and some splitting/renaming of broadcasts. Bug: 17005622 Change-Id: I9ece3553310fb20b0c3c3e4032b408e86384363a
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
976e8bd2017d0263216c62111454438cc0f130e3 |
|
17-Jul-2014 |
Svetoslav <svetoslavganov@google.com> |
Allow adding widgets from user profiles. The goal of this change is to enable support for appwidget from user profiles to the user main profile. A user profile is a user which is associated as a child of the main user profile. For example, a user may have a personal (parent) and corporate (child) profile. The device policy should be able to control whether adding a widget from a child profile and given packages is allowed. This change assumes that all packages from managed profiles are white listed. Another change will add the device policy changes. Change-Id: I267260b55d74c48b112a29979a9f59eef7a8194e
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
bf3a9465483976dcd5692b619b47132c2b95f73e |
|
28-Jul-2014 |
Amith Yamasani <yamasani@google.com> |
Set profile owner via an intent priv apps can request to become a profile owner after setup has completed. This will pop up a consent dialog (in Settings). Also, clean up profile owner concept to be a component name. Change-Id: I5e8532866e8018f61836c4e84fbbadb6150218ae
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
604e7558ef32098644b2f9456d7743a07ae789dc |
|
19-Jul-2014 |
Jim Miller <jaggies@google.com> |
Add new DevicePolicyManager API to allow fine-grained TrustAgent management This adds a new feature that allows a device admin to specify a whitelist of features that are allowed for the given admin. Change-Id: I83f853318efbcf72308532d0a997374f73fa9c10
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
d2a1eec400128f39e1b223a720a88dbd395f3e6e |
|
09-Jul-2014 |
Sander Alewijnse <salewijnse@google.com> |
Add Device Policy API to disable screen capture. WindowManager will set secure flag on SurfaceControl for all windows of a flagged user to prevent screen capture. API is consistent with the camera disable API. Change-Id: Ib180f67f1ad827b6f4aca2af615274256cce58f4
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
e5bcff624fb58b6f95be8ddff7f5b6b3bf5d19c7 |
|
20-Jul-2014 |
Amith Yamasani <yamasani@google.com> |
Rename setApplicationBlocked to setApplicationHidden This corrects the expected behavior of the app state. Hidden apps can be installed by the store to be brought out of hidden state. Bug: 16191518 Change-Id: Id128ce971ceee99ba1dea14ba07ce03bd8d77335
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
c8fa3ae2ce238843496d7aa3f1c4042bb9bb98b4 |
|
17-Jul-2014 |
Adam Connors <adamconnors@google.com> |
Merge "Create DPM APIs for cross profile callerId" into lmp-dev
|
210fe21e95cfff98734f5b849b205cdcb0706948 |
|
17-Jul-2014 |
Adam Connors <adamconnors@google.com> |
Create DPM APIs for cross profile callerId Contact information in the managed profile is shown in the incoming call UI unless blocked using this API. TODO: Actually plumb this into the caller-id logic. Bug: 16301261 Change-Id: If03adc907d9558baa0a45a1833b857206b7bf96a
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
999d394adee533c55fce38bd632ffd4f1af91362 |
|
03-Jul-2014 |
Alexandra Gherghina <alexgherghina@google.com> |
Ads per-user APIs to manage accounts through the AccountManager Bug: 16056552 Bug: 14642886 Change-Id: I17ff6c2515285e63c84cecf2f861d10666c393c5
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
655be2a98ea6285fc33aec4b223e90c2620927f1 |
|
14-Jul-2014 |
Adam Connors <adamconnors@google.com> |
Revert "Remove enableSystemApp methods." We need to go back to uninstalling system apps so we can re-install non-default system applications through Play. This reverts commit e3dbcd138c07f2d32ac84229d0a49052cc18d424. Change-Id: I0a7af094614c4a10800971c82e10571f7312e079
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
582d9111d76632027fed7af10d05d4b44df16c0c |
|
10-Jul-2014 |
Jason Monk <jmonk@google.com> |
Add API for device owner to switch users Once verified that caller is device owner just calls through to the activity manager and acts like that call. Change-Id: I34023313cd6742b73d2105655ec6b631879aa37a
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
c13053bf1c05b980421611487ce67677c08db299 |
|
29-May-2014 |
Kenny Guy <kennyguy@google.com> |
Add package state to block uninstall. Add package state to allow profile or device owners to block uninstall of packages. Add API to DevicePolicyManager to set/get the state. Bug: 14127299 Change-Id: I03528819850b42df7bafa7747bb9e4558d20c4e6
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
1333ea1ed7a95eb9e1be43c20a0c48e901654cac |
|
23-Jun-2014 |
Jessica Hummel <jhummel@google.com> |
Provide api to set the managed profile name. Instead of sending the profile name in the provisioning intent the mdm should set the profile name after provisioning has completed. This allows us to simplify the provisioning flow and the mdm can change the name of the profile later on if required. Change-Id: I821ef2300eae74e89872152ae1c89ac3ecbb82e7
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
aab72f3b0ab740e12b4a2576a99852081529feb5 |
|
19-Jun-2014 |
Robin Lee <rgl@google.com> |
Merge "Revert "Revert "Publish DevicePolicyManager CA certificate APIs"""
|
306fe08ce2b06671336e67a87afaa0851f0105eb |
|
19-Jun-2014 |
Robin Lee <rgl@google.com> |
Revert "Revert "Publish DevicePolicyManager CA certificate APIs"" This reverts commit 792b270dbdc980cfe04e8d461bf00a1f45b5e936. Change-Id: I18c7e0eca39868230cd8e4f4bbeb3c44ff9e8b78
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
2b5e917026fe4e6dec8712ee24bdffee8d62ab33 |
|
18-Jun-2014 |
Robin Lee <rgl@google.com> |
Revert "Publish DevicePolicyManager CA certificate APIs" This reverts commit 5260bf69946563dc47c17e7441b352adfce384c5. Change-Id: I5e44fdac8a7375576b25171f58e31a1fa0e3c569
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
fbe6be4f653d73d5c51ee0a2fb40d2a34c2366fd |
|
18-Jun-2014 |
Jason Monk <jmonk@google.com> |
Merge "Notify any profile/device owners of lock task"
|
35c62a4668a85aa4318c9ec564f2e06e8a2d2a30 |
|
17-Jun-2014 |
Jason Monk <jmonk@google.com> |
Notify any profile/device owners of lock task Add a method for DeviceAdminReceivers of profile/device owners to be notified that lock task mode has entered or exited for an app they have whitelisted. Change-Id: Id124287d41564bbfccdacccf1977b7acb3ddec3f
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
d7b8621bde44857ebb07130693a00f5f777887d4 |
|
16-Jun-2014 |
Jason Monk <jmonk@google.com> |
Change lock-task DPM authorization to packages Switch the DPM lock-task authorization to be controlled by a package rather than a component. Change-Id: Ife9bed068f31ff2449b4451ab69d3586a3f09d89
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
837304f6f6ae37dc475fa6e0e620f1c2321f2e11 |
|
11-Jun-2014 |
Robin Lee <rgl@google.com> |
Publish DevicePolicyManager CA certificate APIs Exposes these methods: - hasCaCertInstalled - hasAnyCaCertsInstalled - installCaCert - uninstallCaCert Allows device and profile owners to perform some certificate management including querying for and enabling/disabling specific CA certificates. Change-Id: I4aa8a1a8601b234e30acde99dfa382e04cb62495
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
03978a40b3a4c268329ae733eff8dfffd92f6e09 |
|
10-Jun-2014 |
Jason Monk <jmonk@google.com> |
Allow device owner to configure secondary users Currently the device owner can create secondary users, but unless it is a system app it will not be installed and will not be able to pass data easily from the code that creates the user and any code running on that user. This allows the device owner to install itself while creating a user and start up a service to configure that user. createUser takes an bundle so that the device owner can pass across any initial setup data it needs to, this bundle will be sent to the admin receiver in onEnable. Change-Id: Ic1f8565dd2a7bd85363527cf68b0ecd4dc9c3636
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
4a21b25fad62e4f19d13ba814263841c931f56ef |
|
04-Jun-2014 |
Julia Reynolds <juliacr@google.com> |
Allow profile and device owners to change and get the master volume mute state. Also protect muting master volume with op code OP_AUDIO_MASTER_VOLUME. Bug: 13585918 Change-Id: I91fe7ee60cd291cca15966b3127c0bb8a4828f6a
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
b0dced8173a9a930bc0ea2a7a669a907aaffd735 |
|
06-Jun-2014 |
Jason Monk <jmonk@google.com> |
Add an API to clear the device owner. Only the device owner will be able to clear itself. Change-Id: Ie3231467d92e8c5d22ec51256177793f34110432
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
03bc9918345a977e9c45796bf3bb5bf9a3b87d25 |
|
13-May-2014 |
Jason Monk <jmonk@google.com> |
Add device-owner based setting of global proxy. Re-hide the setGlobalProxy on the ConnectivityManager as it requires CONNECTIVITY_INTERNAL. Instead add a function to the DevicePolicyManager to set the global proxy, that can only be called by the device owner. Change-Id: I9ffb2cc4f30a6dc9b868d86f056e1fbd512d8dfc
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
1b8737ee18f5d80adda41eafca6143a046a47a13 |
|
04-Jun-2014 |
Sander Alewijnse <salewijnse@google.com> |
Merge "Remove enableSystemApp() and enableSystemAppWithInten()."
|
f20d640fa2b155a971ddfe0965fc803a73b5e53c |
|
25-May-2014 |
Amith Yamasani <yamasani@google.com> |
Restrictions Manager Mechanism to register a provider for requesting an administrator to respond to permission requests. Request format and response format constants. Description of manifest template for static restrictions. Int type introduced in RestrictionEntry. Needs more javadoc and better description of manifest templates, including specifying the XML attributes. Change-Id: I5a654d364e98379fc60f73db2e06bf9a8310263d
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
866896df168d1382732c97e49617ab2f2995d376 |
|
27-May-2014 |
Sander Alewijnse <salewijnse@google.com> |
Remove enableSystemApp() and enableSystemAppWithInten(). Use setApplicationBlocked() and setApplicationsBlocked() instead. Change-Id: I3d323d704db0a45e936f63675821707b4fddc48b
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
8194899071e0a84c95ef10614bd1b9485b48f589 |
|
16-May-2014 |
Nicolas Prevot <nprevot@google.com> |
Rename code related to cross-profile intents. For example, replace ForwardingIntentFilter by CrossProfileIntentFilter Bug: 15023443 Change-Id: Iee8cdf578817ef9956bcdece803a49b0d07b67f7
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
1e958398232cb11935f5341d71df52c5455c620f |
|
16-May-2014 |
Julia Reynolds <juliacr@google.com> |
Create deviceowner gated APIs for creating and removing users in devicepolicymanager. This will allow DMAgent to manage users for EDU's cart model user case. Bug: 15015887 Change-Id: I1eadf1701cb75fc4b50eb1a0df1525eff818286e
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
37f4e44ae614987c5ed953a1829c7181bb775e1f |
|
21-May-2014 |
Julia Reynolds <juliacr@google.com> |
Merge "Add Device/Profile Owner gated apis for setting/getting blocked packages."
|
966881e8951f9bb297689745dcaecfdc13432656 |
|
14-May-2014 |
Julia Reynolds <juliacr@google.com> |
Add Device/Profile Owner gated apis for setting/getting blocked packages. DMAgent currently needs to live in /system/priv-app in order to (among other things) set and get blocked packages. These APIs will get us closer to being able to move DMAgent out of priv-app. Bug: 14945334 Change-Id: I108e2013c67409dca554acf78e3a710745900706
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
da551653219092306fc7e1ce5743ab40683cee6f |
|
14-May-2014 |
Julia Reynolds <juliacr@google.com> |
Allow device/profile owners to update settings. Device owners can update Settings.Secure and Settings.Global settings. Profile owners can update Settings.Secure settings. DMAgent currently needs to live in /system/priv-app in order to (among other things) update global and secure settings. This change will get us closer to being able to move DMAgent out of priv-app. Bug: 14965414 Change-Id: If2cc3a56de91bffde33b838ab8ecea2c32412803
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
511e0d8323d2d2ed341ba40b15bc646e134ac03b |
|
24-Mar-2014 |
justinzhang <justinzhang@google.com> |
DevicePolicyManager Authentication for Lock Task Here we let DevicePolicyManager keep a list of tasks that are allowed to start the lock task mode. This list can only be set by a device owner app. The ActivityManager will call DevicePolicyManager to check whether a given task can start the lock task mode or not. Change-Id: I650fdae43fc35bf9fd63452283f4e2bbadd11551 Bug: 14611303
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
5c02db60be02cc0c4798ea6d9c2b0e6cf972c158 |
|
07-May-2014 |
Sander Alewijnse <salewijnse@google.com> |
Add API to disable account management for certain types of accounts. The account types with disabled account management are stored in a blacklist in the active admin object, editable by profile owners. Change-Id: I57dc5f709ad79674fa28dd006969283585daea24
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
010cfd458121034075c7439020ffef4eedbcc0fc |
|
16-Apr-2014 |
Adam Connors <adamconnors@google.com> |
Add enableSystemApp methods to DevicePolicyManager These methods allow profile or device owners to enable systems apps pre-installed in the primary user in the managed profile. Apps can be specified by either package name or intent. Bug: 13587051 Change-Id: Ifcbc68c139308506b6c18cf3c0ea62b8026ff75f
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
c79586ede6dcd6a167bc8360f058cb5cc655b33d |
|
06-May-2014 |
Nicolas Prevot <nprevot@google.com> |
Cleaning code related to the forwarding intent filters. Checking for INTERACT_ACROSS_USERS_FULL Adding equivalent methods in the PackageManager Change-Id: Iaa1328fa666613a78e67ca669ea045144275e895
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
3c4d9c56db5b24699956de0a5a841196185363cc |
|
01-May-2014 |
Alexandra Gherghina <alexgherghina@google.com> |
Merge "Adds an enabled state in UserInfo instead of DevicePolicyManager"
|
df35d570ed25257c6782e632ab1bae5e1603855a |
|
09-Apr-2014 |
Alexandra Gherghina <alexgherghina@google.com> |
Adds an enabled state in UserInfo instead of DevicePolicyManager Bug: 14377459 Change-Id: Ib4ec43d87da96c3dddaf9b7ae1796f261863a182
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
10fa67c77e11699391e27975fc2d276a0b8c7cbb |
|
24-Mar-2014 |
Nicolas Prevot <nprevot@google.com> |
Introduce forwarding intents across profiles. The package manager service maintains, for some user ids, a list of forwarding intent filters. A forwarding intent filter is an intent filter with a destination (a user id). If an intent matches the forwarding intent filter, then activities in the destination can also respond to the intent. When the package manager service is asked for components that resolve an intent: If the intent matches the forwarding intent filter, and at least one activity in the destination user can respond to the intent: The package manager service also returns the IntentForwarderActivity. This activity will forward the intent to the destination. Change-Id: Id8957de3e4a4fdbc1e0dea073eadb45e04ef985a
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
be46532c9fbebf3ab6498c1b78013a33f620cd31 |
|
24-Apr-2014 |
Amith Yamasani <yamasani@google.com> |
Allow profile owners to set user restrictions Pass the setting along to UserManager. Fixes a security exception when fetching the profile's enabled state. Change-Id: If71698cf32c52cce1158cf2027443a339bc58488
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
385124d8cee38dee00d4fac31e8fbe46fb30565b |
|
03-Apr-2014 |
Alexandra Gherghina <alexgherghina@google.com> |
Modify getUserProfiles to return only enabled profiles: Add a new enabled state for a managed profile. Expose that as a new API on DevicePolicyManager. Set the new state when enabling the profile. Return only enabled profiles from the user manager. Bug: 13755441 Bug: 13755091 Change-Id: I2907b182e19b3562592da688b3f68ef5f4088557
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
66e5d96cf9e689148b202787bdc269519c4b6f8f |
|
09-Apr-2014 |
Robin Lee <rgl@google.com> |
Allow ProfileOwner apps to manage app restrictions Simple wrapper around the UserManager.{get|set}ApplicationRestrictions APIs. Also added a new Intent to signal to running apps that the set of restrictions has changed since startup. Change-Id: Ifd108108a73f87325b499d9de2e1b2aacc59b264
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
512675b07d1643f018e84d66e4ee8b641d3e191c |
|
02-Apr-2014 |
Alexandra Gherghina <alexgherghina@google.com> |
Add new call to DevicePolicyManager to enable a profile. Bug: 13755091 Change-Id: Idb6975431f842ededf78966c578b0533e6f186af
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
f475ca33d9232785710aaa438f17915029dfa83b |
|
17-Feb-2014 |
Sander Alewijnse <salewijnse@google.com> |
Enables a profile owner or device owner to set and clear default intent handler activities. Those intent handlers are persistent preferences. They will remain the default intent handler even if the set of potential event handlers for the intent filter changes and if the intent preferences are reset. Change-Id: Id0cfae46f93c10d89e441f272096a205ec518dd0
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
776c555d954d9494069f786785877c08add27327 |
|
09-Jan-2014 |
Adam Connors <adamconnors@google.com> |
Extend DeviceOwner concept to accommodate ProfileOwners ProfileOwners, like DeviceOwners, are Device Admins that have additional priviledges. ProfileOwners however are scoped per user. Change-Id: I1e22c85878e0672121e6ebbe97fca38591f992b2
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
da51e68e582ffa017543982297c831680d201a91 |
|
09-Aug-2013 |
Maggie Benthall <mbenthall@google.com> |
Add methods for managing CAs to DevicePolicyManager(Service) Guard install/uninstall by enforcing that the caller have the new system-only permission MANAGE_CA_CERTIFICATES. Also include API methods for asking whether there are any User CA certs installed, or if one by a particular name is installed in the keystore. CA certs will be installed via KeyChain into the TrustedCertificateStore. Bug: 8232670 Change-Id: I17b47a452e72eb4fe556dc6db823a46c6e854be8
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
334c7e32d494baf3bf0ae371d6b5949c80368982 |
|
08-Aug-2013 |
Geoffrey Borggaard <geoffreyb@google.com> |
Add a name to the DeviceOwner We will need to display the name of the device owner (the human readable name of the institution) to the user. "This device is managed by google.com" Change-Id: Ic33b6530c19cb14a118245692697205de3911a58
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
71e6c697e54a43d357cc25d87a446d140f17396a |
|
25-Mar-2013 |
Amith Yamasani <yamasani@google.com> |
Device Owner, a special kind of device admin A Device Owner cannot be uninstalled and is available to all users. It must be registered before the device_provisioned flag is set. Device admins can be disabled until used, but visible to device policy manager, so that users wont be bothered with update requests. Opened up a few related APIs for use by a system-installed Device Owner. Change-Id: I847b5fe68c0f724863f778a67602b5bddc79d8e5
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
48b9b0d068844af9eb37c215484831c4d6b831b0 |
|
20-Sep-2012 |
Jim Miller <jaggies@google.com> |
Make DPM API for disabling keyguard widgets more generic This change renames the widget-specific API to be more generic to allow further disabling of keyguard-specific customizations in the future. Currently only allows disabling widgets and the secure camera but can now easily be extended to disable other features we add. Fixes bug: 7021368 Change-Id: I3934cc2e7c64e0c6d511efb86980fc38a849708d
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
599dd7ce9adf8ca067cefb0b191a5ac20ec35a79 |
|
15-Sep-2012 |
Amith Yamasani <yamasani@google.com> |
DevicePolicyManager per user Bug: 7136483 Store device policy information for each user and apply them when user switches. Global proxy can only be controlled by owner. Camera restriction applies to all users, if any one has an admin that disables it. Storage encryption can only be controlled by owner, although other users can query the state. Wipe data will only remove the user if non-zero, wipe the device, if zero. Change-Id: I359be46c1bc3828fd13d4be3228f11495081c8f2
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
b8ec470617590fa2025db869e8e80dcce8eaec23 |
|
01-Sep-2012 |
Jim Miller <jaggies@google.com> |
Update DevicePolicyManager with ability to disable keyguard widgets Change-Id: I5876e9e180b2a995aaa355fbbb2b67cebb86104d
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
2447edd85baac3225a12b868ef40f76cfdc6ec11 |
|
10-May-2011 |
Ben Komalo <benkomalo@google.com> |
New device policy to disable camera. This introduces a new policy that a DeviceAdmin can use to disable _all_ cameras on the device. A separate CL will be made on the media side to watch this policy bit and act accordingly. Bug: 4185303 Change-Id: I700cfc4a8317bb74087ccae39346d74467fc58b2
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
22dbfda976aab9ae897eed0625e2e64ead32bbc4 |
|
17-Jan-2011 |
Andy Stadler <stadler@google.com> |
Add internal plumbing to DPM for encryption * Add code to persist per-admin setting * Add hooks for OS-level tie-in (is supported, get / set status) * Add 3rd API call to get OS status (irrespective of admin settings) * Remove "REQUESTED" status, no longer relevant with 3rd API * Fixed bug that impacted global proxy settings * Update api/11.xml to match current.xml Bug: 3346770 Change-Id: I56bdf9a7894f6ca4842402c7b82ddb3caf4b37b9
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
7b0f8f08ac7b3ed5cf462b92283713b033d6a64a |
|
12-Jan-2011 |
Andy Stadler <stadler@google.com> |
API changes to support encryption in DPM * New uses-policies value * Definitions for storage domain and encryption status * API to get and set encryption status * Intent to launch encryption changes * Both new calls bottom out in the DPM service and are suitable for a device that does not support encryption. NOTE: Nobody should use ACTION_START_ENCRYPTION yet. It needs a receiver to be built in Settings (different CL). Change-Id: I2ae193bedbec59f6ba46c0ec7de12ecf321e5803
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
c25f70a440ef9468085b8d98c8416c7e8b116753 |
|
09-Dec-2010 |
Andy Stadler <stadler@google.com> |
API CHANGE - Add hasGrantedPolicy() API * Allows an app to detect that it needs to have additional policies granted * Add "refreshing" parameter to setActiveAdmin() to handle this case * Minor cleanups to eliminate warnings (mostly for unused things) Bug: 3253179 Change-Id: I4bf639bf560557130bf98e8cfb75f996fac416f1
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
a4e28d181942018ba8759989799a28fa88764ce3 |
|
09-Nov-2010 |
Jim Miller <jaggies@google.com> |
Add password expiration support to DevicePolicyManager. Change-Id: Ib2629ec547c123ac489d7f4cbd4e0a1d4aa07620
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
69238c6a37ae43c748ad9cd7613f2209149ee7da |
|
03-Aug-2010 |
Oscar Montemayor <oam@google.com> |
Device Policy Manager changes to enable Global Proxy. Change-Id: I8489df7d28e4c5312e10d5cecc8e2a182413a034
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
c857740f242169f2ca7fd42f0d1268661b399ad6 |
|
05-Jun-2010 |
Konstantin Lopyrev <klopyrev@google.com> |
Adding support for minimum number of non letter characters. Change-Id: If54cb7209d65eef826d474d7e0dbbef63d2f2b47
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
a15dcfaf2bc7cbd13b30db6766afe3bbaa01db97 |
|
25-May-2010 |
Konstantin Lopyrev <klopyrev@google.com> |
Fix 2677197: Adding minimum complex character support. Change-Id: I520bc5f9aa924bf9b5585b2235a91cc96cb99c25
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
3255823de062e981f7bfc7994919207988697e45 |
|
21-May-2010 |
Konstantin Lopyrev <klopyrev@google.com> |
Fix 2673731: Adding support for password history to Device Admin. Change-Id: If3240048813e32b2bae79fe5cb8a73aea20ec56c
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|
87bba1ee14279bb14a28d42e27c4ef66d9967bf8 |
|
27-Feb-2010 |
Dianne Hackborn <hackbod@google.com> |
Move DeviceAdmin APIs to android.app.admin. Also add ability for admins to hide themselves when not in use, a facility for admins to not allow other admins to reset their password, and debug dumping.
/frameworks/base/core/java/android/app/admin/IDevicePolicyManager.aidl
|