Set up Intune enrollment of Android Enterprise dedicated devices
Use the Android Enterprise dedicated devices solution with Microsoft Intune to set up corporate-owned, single-use kiosk-style devices for frontline workers. These devices are used for a single purpose, such as digital signage, ticket printing, or inventory management. As an administrator, you can lock down the usage of a device to a single app, or a limited set of apps, inclusive of web apps. Users are prevented from adding other apps or taking actions on the device unless explicitly approved by you.
Devices intended for dedicated use can be enrolled in Microsoft Intune in two ways:
As a standard Android Enterprise dedicated device. These devices are enrolled into Intune without a user account and aren't associated with a user. These devices aren't intended for personal apps, or apps such as Microsoft Outlook or Google Mail that require user-specific account data.
As a standard Android Enterprise dedicated device that's automatically set up with Microsoft Authenticator and configured for Microsoft Entra shared device mode during enrollment. These devices are enrolled in Intune without a user account and aren't associated with a user. These devices are intended for use with apps that integrate with Microsoft Entra shared device mode, and allow for single sign-in and sign-out between users across participating apps.
This article describes how to set up and configure Microsoft Intune to enroll dedicated devices. For more information about Android Enterprise management solutions, see Get started with Android Enterprise(opens Android Enterprise Help Center).
Device requirements
Devices must have:
- Android OS version 8.0 or later.
- A distribution of Android that has Google Mobile Services (GMS) connectivity. Devices must have GMS available and must be able to connect to GMS.
Set up Android Enterprise dedicated device management
To set up Android Enterprise dedicated device management, follow these steps:
- To prepare to manage mobile devices, you must set the mobile device management (MDM) authority to Microsoft Intune for instructions. You set this item only once, when you're first setting up Intune for mobile device management.
- Connect your Intune tenant account to your Managed Google Play account.
- Create an enrollment profile.
- Create a device group.
- Enroll the dedicated devices.
Create an enrollment profile
Note
After a token expires, the profile associated with it disappears from view under Android enrollment > Enrollment Profiles > Corporate-owned dedicated devices. To see all profiles associated with both active and inactive tokens, choose Filter. Then select the checkboxes for Active and Inactive policy states.
You must create an enrollment profile so that you can enroll your dedicated devices. When the profile is created, it provides you with an enrollment token in the form of a string and QR code.
- Sign in to the Microsoft Intune admin center.
- Go to Devices, and then under Device onboarding select Enrollment.
- Select the Android tab.
- In the Enrollment Profiles section, choose Corporate-owned dedicated devices.
- Select Create profile.
- Enter the basics for your profile:
- Name: Give your profile a name so you can easily identify it later.
- Description: Enter a description for the profile. This setting is optional, but recommended.
- Token type: Choose the type of token you want to use to enroll dedicated devices.
- Corporate-owned dedicated device (default): This token enrolls devices as a standard Android Enterprise dedicated device. These devices require no user credentials at any point. This is the default token type that dedicated devices will enroll with unless updated by Admin at time of token creation.
- Corporate-owned dedicated device with Microsoft Entra ID shared mode: This token enrolls devices as a standard Android Enterprise dedicated device and, during enrollment, deploys Microsoft's Authenticator app configured into Microsoft Entra shared device mode. With this option, users can achieve single sign-in and single sign-out across apps on the device that are integrated with the Microsoft Entra Microsoft Authentication Library and global sign-in/sign-out calls.
- Token expiration date: Enter the date you want the token to expire, up to 65 years in the future. The token expires on the selected date at 12:59:59 PM in the time zone it was created. Acceptable date format:
MM/DD/YYYY
orYYYY-MM-DD
- Select Next to continue to Scope tags.
- Optionally, apply one or more scope tags to limit profile visibility and management to certain admin users in Intune. For more information about how to use scope tags, see Use role-based access control (RBAC) and scope tags for distributed IT.
- Select Next to continue to Review + create.
- Review your choices, and then select Create to finish creating the profile.
Access enrollment token
Access the enrollment token in the admin center.
- Go to Devices > Enrollment.
- Select the Android tab.
- In the Enrollment Profiles section, choose Corporate-owned dedicated devices.
- From the list, select your enrollment profile.
- Select Token.
The token appears as a 20-digit string and a QR code. Use this token to enroll devices via the mechanisms described in Enroll dedicated, fully managed, or corporate-owned work profile devices. At the time of enrollment, the device user is prompted for the enrollment token. You can provide the string or QR, as long as it's supported by the Android OS and version of the enrolling device.
Replace, remove, or export token
Select a token to access these options:
- Replace token: Generate a new token that's nearing expiration.
- Revoke token: Immediately expire the token. Once revoked, the token is no longer usable. This option is useful if you:
- Accidentally share the token with an unauthorized party.
- Complete all enrollments and no longer need the token.
- Export token: Export the JSON content of the token. This option is useful for obtaining the JSON content that's needed to configure Google Zero Touch or Knox Mobile Enrollment.
When applied, these actions don't have any effect on devices that are already enrolled.
Create a device group
You can target apps and policies to either assigned or dynamic device groups. You can configure dynamic Microsoft Entra device groups to automatically populate devices that are enrolled with a particular enrollment profile by following these steps:
Sign in to the Microsoft Intune admin center and choose Groups > All groups > New group.
Complete all required fields as follows:
- Group type: Security
- Group name: Type an intuitive name, like Factory 1 devices
- Membership type: Dynamic Device
Choose Add dynamic query.
On the Dynamic membership rules page, complete all fields as follows:
- Property: enrollmentProfileName
- Operator: Equals
- Value: Enter the enrollment profile name that you created earlier.
For more information about dynamic membership rules, see Dynamic membership rules for groups in Microsoft Entra ID.
Choose Save to finalize the rule.
Enroll the dedicated devices
You can now enroll your dedicated devices.
Note
The Microsoft Intune app will be automatically installed during enrollment of a dedicated device. This app is required for enrollment and cannot be uninstalled. The Microsoft Authenticator app will be automatically installed during enrollment of a dedicated device when using the token type Corporate-owned dedicated device with Microsoft Entra ID shared mode. This app is required for this enrollment method and cannot be uninstalled.
Managing apps on Android Enterprise dedicated devices
Only apps that have assignment type set to Required can be installed on Android Enterprise dedicated devices. Apps are installed from the Managed Google Play store in the same manner as Android Enterprise personal and corporate owned work profile devices.
Apps are automatically updated on managed devices when the app developer publishes an update to Google Play.
To remove an app from Android Enterprise dedicated devices, you can do either of the following:
- Delete the required app deployment.
- Create an uninstall deployment for the app.