Use custom settings for Android Enterprise devices in Microsoft Intune
Using Microsoft Intune, you can add or create custom settings for your Android Enterprise personally owned devices with a work profile using a custom profile. Custom profiles are a feature in Intune. They're designed to add device settings and features that aren't built in to Intune.
This feature applies to:
- Android Enterprise personally owned devices with a work profile (BYOD)
Android Enterprise custom profiles use Open Mobile Alliance Uniform Resource Identifier (OMA-URI) settings to control features on Android Enterprise devices. These settings are typically used by mobile device manufacturers to control these features.
Intune supports the following limited number of Android Enterprise custom profiles:
./Vendor/MSFT/WiFi/Profile/SSID/Settings
: Create a Wi-Fi profile with a pre-shared key has some examples../Vendor/MSFT/VPN/Profile/Name/PackageList
: Create a per-app VPN profile has some examples../Vendor/MSFT/WorkProfile/DisallowCrossProfileCopyPaste
: See the example in this article. This setting is also available in the user interface. For more information, see Android Enterprise device settings to allow or restrict features.
If you need to add more settings, then use OEMConfig for Android Enterprise.
This article shows you how to create a custom profile for Android Enterprise devices. It also provides an example of a custom profile that blocks copy-and-paste.
Create the profile
Sign in to the Microsoft Intune admin center.
Select Devices > Manage devices > Configuration > Create > New policy.
Enter the following settings:
- Platform: Select Android Enterprise.
- Profile type: Select Personally-owned work profile > Custom.
Select Create.
In Basics, enter the following properties:
- Name: Enter a descriptive name for the profile. Name your profiles so you can easily identify them later. For example, a good profile name is Android Enterprise custom profile.
- Description: Enter a description for the profile. This setting is optional, but recommended.
Select Next.
In Configuration settings > OMA-URI Settings, select Add. Enter the following settings:
Name: Enter a unique name for the OMA-URI setting so you can easily find it.
Description: Enter a description that gives an overview of the setting, and any other important details.
OMA-URI: Enter the OMA-URI you want to use as a setting.
Data type: Select the data type for this OMA-URI setting. Your options:
- String
- String (XML file)
- Date and time
- Integer
- Floating point
- Boolean
- Base64 (file)
Value: Enter the data value you want to associate with the OMA-URI you entered. The value depends on the data type you selected. For example, if you select Date and time, select the value from a date picker.
After you add some settings, you can select Export. Export creates a list of all the values you added in a comma-separated values (.csv) file.
Select Save to save your changes. Continue to add more settings as needed.
Select Next.
In Scope tags (optional) > Select scope tags, choose your scope tags to assign to the profile. For more information, see Use RBAC and scope tags for distributed IT.
Select Next.
In Assignments, select the groups that will receive this profile. For more information on assigning profiles, see Assign user and device profiles.
Select Next.
In Review + create, when you're done, choose Create. The profile is created, and shown in the list.
You can also monitor its status.
Example
In this example, you create a custom profile that restricts copy and paste actions between work and personal apps on Android Enterprise devices.
Sign in to the Microsoft Intune admin center.
Select Devices > Manage devices > Configuration > Create > New policy.
Enter the following settings:
- Platform: Select Android Enterprise.
- Profile type: Select Personally-owned work profile > Custom.
In Basics, enter the following properties:
- Name: Enter a descriptive name for the profile. Name your profiles so you can easily identify them later. For example, enter AE block copy paste custom profile.
- Description: Enter a description for the profile. This setting is optional, but recommended.
Select Next.
In Configuration settings > OMA-URI Settings, select Add. Enter the following settings:
- Name: Enter something like
Block copy and paste
. - Description: Enter something like
Blocks copy/paste between work and personal apps
. - OMA-URI: Enter
./Vendor/MSFT/WorkProfile/DisallowCrossProfileCopyPaste
. - Data type: Select Boolean so the value for this OMA-URI is True or False.
- Value: Select True.
Your settings look similar to the following image:
- Name: Enter something like
Select Save to save your changes. Continue to add more settings as needed. After you add some settings, you can select Export. Export creates a list of all the values you added in a comma-separated values (.csv) file.
After you enter the settings, your environment looks similar to the following image:
Select Next.
In Scope tags (optional) > Select scope tags, choose your scope tags to assign to the profile. For more information, see Use RBAC and scope tags for distributed IT.
Select Next.
In Assignments, select the groups that will receive this profile. For more information on assigning profiles, see Assign user and device profiles.
Select Next.
In Review + create, when you're done, choose Create. The profile is created and is shown in the list.
When you assign this profile to Android Enterprise devices you manage, copy and paste are blocked between apps in the work and personal profiles.
You can also monitor its status.