Set up Intune enrollment for Android (AOSP) corporate-owned userless devices
Set up enrollment in Microsoft Intune for corporate-owned, userless devices built on the Android Open Source Project (AOSP) platform. Intune offers an Android (AOSP) device management solution for corporate-owned Android devices that are:
- Not integrated with Google Mobile Services.
- Intended to be shared by more than one user.
- Used to accomplish a specific set of tasks at work.
This article describes how to set up Android (AOSP) device management and enroll RealWear devices for use at work.
You should know
Devices enrolled into Intune with this management mode are automatically set up with Microsoft Authenticator and Company Portal. These devices are enrolled into Intune without a user account and aren't associated with a specific user.
Devices are configured in Microsoft Entra shared device mode during enrollment. Devices enable single sign-on (SSO) between users across participating apps. By installing Company Portal, users can also leverage SSO when signing out of apps that are integrated with the Intune SDK, even apps that don't yet participate with shared device mode.
Prerequisites
Note
Beginning October 1st, AOSP devices must have the Microsoft Intune app, version 24.7.0 or later to sync with the Microsoft Intune service.
To enroll and manage AOSP devices, you must have:
- An active Microsoft Intune tenant.
- A supported device.
You must also:
Set Microsoft Intune as the mobile device management (MDM) authority in your tenant. You only need to do this once, when you first set up Intune for mobile device management.
Assign valid licenses to all specialized device users. For more information, see Microsoft Intune licensing and Managing specialty devices with Microsoft Intune.
Create an enrollment profile
Create an enrollment profile to enable enrollment on devices.
Tip
Intune also generates a token in plain text form, but that one can't be used to enroll devices.
Sign in to the Microsoft Intune admin center.
Go to Devices > Enrollment.
Select the Android tab.
In the Android Open Source Project (AOSP) section, choose Corporate-owned, userless devices.
Select Create profile.
Enter the basics for your profile:
Name: Give the profile a name. Note the name down for later, because you'll need it when you set up the dynamic device group.
Description: Enter a description for the profile. This setting is optional, but recommended.
Token expiration date: Select the date the token expires, which can be up to 90 days in the future.
SSID: Identifies the network that the device will connect to.
Note
Wi-Fi details are required because the RealWear device does not have a button or option that lets it automatically connect to other devices.
Hidden Network: Choose whether this is a hidden network. By default, this setting is disabled.
Wi-Fi Type: Select the type of authentication needed for this network.
If you select WEP Pre-Shared Key or WPA Pre-Shared Key, also enter:
- Pre-shared key: The pre-shared key that's used to authenticate with the network.
Select Next.
Optionally, select scope tags.
Select Next.
Review the details of your profile and then select Create to save the profile.
Access enrollment token
After you create a profile, Intune generates a token that's needed for enrollment. To access the token:
- Go to Corporate-owned, userless devices.
- From the list, select your enrollment profile.
- Select Tokens.
Another way to find the token is:
- Go to Corporate-owned, userless devices.
- Locate your profile in the list, and then select the More (...) menu that's next to it.
- Select View enrollment token.
The token appears as a QR code. During device setup, when prompted to, scan the QR code to enroll the device in Intune.
You can also export the enrollment profile JSON file. To create a JSON file:
- Go to Corporate-owned, userless devices.
- From the list, select your enrollment profile.
- Select Token > Export.
Important
- The QR code will contain any credentials provided in the profile in plain text to allow the device to successfully authenticate with the network. This is required as the user will not be able to join a network from the device.
- Consider using a staging network with limited permissions for provisioning devices and completing the enrollment process. For example, you could use an internet-connected network with limited permissions and no corporate access to do the initial set up.
- Since you're managing the device via Intune, you should skip the RealWear first time setup. The Intune QR codes is the only thing you need to set up the device.
Replace token
Generate a new token to replace one that's nearing its expiration date. Replacing a token does not affect devices that are already enrolled.
- In the admin center, go to Devices > Enrollment.
- Select the Android tab.
- In the Android Open Source Project (AOSP) section, choose Corporate-owned, userless devices.
- Choose the profile that you want to work with.
- Select Token > Replace token.
- Enter the token's new expiration date. The token must be replaced at least every 90 days.
- Select OK.
Revoke token
Revoke a token to immediately expire it and make it unusable. For example, it's appropriate to revoke a token when:
- You accidentally share the token/QR code with an unauthorized party.
- You complete all enrollments and no longer need the token.
Revoking a token does not affect devices that are already enrolled.
- In the admin center, go to Devices > Enrollment.
- Select the Android tab.
- In the Android Open Source Project (AOSP) section, choose Corporate-owned, userless devices.
- Choose the profile that you want to work with.
- Select Token > Revoke token > Yes.
Create a device group
You can create assigned device groups or dynamic device groups in Intune. For more information about both groups, see Add groups to organize users and devices.
Dynamic device groups are configured to automatically add and remove devices based on a set of rules and parameters. For example, you can group devices by enrollment profile name.
Complete the following steps to create a dynamic Microsoft Entra device group for devices enrolled with an Android (AOSP) corporate-owned, userless enrollment profile.
In the admin center, go to Groups > All groups > New group.
In the Group blade, fill out the required fields as follows:
- Group type: Security
- Group name: Type an intuitive name (like Factory 1 devices)
- Membership type: Dynamic device
Choose Add dynamic query.
In the Dynamic membership rules blade, fill out the fields as follows:
- Add dynamic membership rule: Simple rule
- Add devices where: enrollmentProfileName
- In the middle box, choose Equals.
- In the last field, enter the enrollment profile name that you created earlier.
For more information about dynamic membership rules, see Dynamic membership rules for groups in Microsoft Entra ID.
Choose Add query > Create.
Enroll devices via QR code
After you set up and assign the Android (AOSP) enrollment profiles, you can enroll devices via QR code.
Turn on your new or factory-reset device.
When the device prompts you to, scan the token's QR code.
Tip
To access the token in Intune, select Devices > By platform > Android > Device onboarding > Enrollment > Corporate-owned, userless devices. Select your enrollment profile, and then select Tokens.
Follow the on-screen prompts to finish enrolling and registering the device. During setup, Intune automatically installs and opens the apps that are needed for enrollment. Those apps include:
- Microsoft Authenticator app
- Microsoft Intune app
- Intune Company Portal app
To use JSON to enroll devices, refer to instructions provided by the device manufacturer.
After enrollment
App updates
The Microsoft Intune app automatically installs available app updates for itself, Authenticator, and Company Portal. When an update becomes available, the Intune app closes and installs the update. The app must be closed completely to install the update.
Manage devices remotely
The following remote actions are available for Android (AOSP) devices:
- Wipe
- Delete
- Remote lock
- Reset passcode
- Restart
You can take action on one device at a time. For more information about where to find remote actions in Intune, see Remove devices by using wipe, retire, or manually unenrolling the device.
Note
After you wipe an Android (AOSP) device, the device remains in a Pending state until it's fully restored to its factory default settings. Then Intune removes it from the device list. When you delete a device, the device is removed from the device list immediately, with no pending status, and the factory reset happens the next time the device checks in.
Troubleshooting
View version of Microsoft Intune and Microsoft Authenticator apps
To find out which version of the Microsoft Intune app or Microsoft Authenticator app is installed on a device:
- Go to Devices and select the device name.
- Select Discovered apps.
- Find your app and then look in the Application Version column for the version number.
Troubleshooting + Support
Go to Troubleshooting + Support in the Microsoft Intune admin center to:
- See a list of Android (AOSP) devices enrolled by a user
- Enable troubleshooting of Android (AOSP) devices the same way you can troubleshoot other user devices.
Share app logs with Microsoft
If you experience problems with enrollment or the Microsoft Intune app, you can use the Intune app to upload and send app logs to Microsoft. After you submit the logs, you'll receive an incident ID to share with your Microsoft support person.
Known limitations
The following are known limitations when working with AOSP devices in Intune:
You cannot enforce certain password types via device compliance and device restrictions profiles. Password types include:
- Password required, no restriction
- Alphabetic
- Alphanumeric
- Alphanumeric with symbols
- Weak biometric
Device compliance reporting is not available for Android (AOSP).
Android (AOSP) management is not supported in environments using Intune operated by 21Vianet.
Next steps
Create an Android (AOSP) device configuration policy to restrict settings on devices.
For more information about how to get started with AOSP, see Android source requirements(opens Android source documentation).