Android Fully Managed Devices

Prev Next

Fully managed devices, also known as "full management for work-only company-owned devices", allows an organization to view and manage all aspects of the device including data, app and policies. There is no separation of personal or work profiles instead the entire device will consist of a single work profile.

image.png

Deploying Fully Managed Android Devices

iOS and iPadOS Corporate Owned, Google provides a Zero-touch Enrollment capability to enroll a company-purchased Android device into MDM right out of the box.

Using Jamf Manager for Android

Jamf offers Manager for Android, a lightweight Android management tool, that is included with Jamf for Mobile. Manager for Android is designed to quickly and easily enroll Android devices into management so that Jamf Trust may be reliably deployed to unlock Trusted Access outcomes.

Security and access policies for Apple and Android devices alike are then managed in the Jamf Security Cloud console.

Manager for Android is accessed via the Jamf Security Cloud console and is available for all customers that have purchased Jamf for Mobile licensing.

Steps

  1. Verify pre-requisites for your environment are met.
  2. Set up Manager for Android in your Jamf environment.
  3. Configure apps, policies, and configurations based upon your device management strategy, security, and privacy requirements.
  4. Configure Jamf Security Cloud with an activation profile to enable Trusted Access outcomes, and enroll devices.
  5. Configure extended integration settings between Jamf Security Cloud and Manager for Android as required.

Using a Third Party Android UEM

While documentation for Fully Owned Devices is out of the scope of this document, you can refer to documentation for Microsoft Endpoint Manager as a starting point:

Deploying Jamf Trust

The Jamf Trust app is required to enable various security services on Android devices, including Jamf Private Access.

Note for Android for Manager Deployments

Most of these steps are automatically completed when following the steps above in Deploying Using Manager for Android.

However, it is useful to review the concepts below as they apply to Manager for Android deployments as well.

Jamf Connect ZTNA is used in the Jamf Trusted Access solution to enable access for trusted devices to company resources while providing active mobile threat defense capabilites. The following steps outline the high-level steps required to streamline deployment of the Jamf Trust app via your Android Enterprise-compatible MDM:

  1. Follow the steps in Enabling Access for Trusted Devices to configure Private Access in RADAR.
  2. Configure the Jamf Trust app via Managed Google Play, specifying the Activation Profile defined above in the app config.
Per-App VPN on Corporate Liable Devices

While you may use Per-App VPN on corporate managed devices, we recommend using the default device-wide VPN configuration for fully-managed Android devices.

  1. Define a new Android configuration profile in your MDM that Enables Zero Touch Activation of Jamf Trust and assign this profile to your target devices.
    • Only threat defense capabilities with be enabled via zero touch. The user will need to open the Jamf Trust app and authenticate with their identity provider credentials to activate Private Access.