Android Fully Managed Devices
  • 14 Nov 2023
  • 1 Minute to read
  • Dark
    Light
  • PDF

Android Fully Managed Devices

  • Dark
    Light
  • PDF

Article Summary

Third Party Management Required

Jamf does not provide mobile device managment (MDM) capabilities for Android devices. Another Android Enterprise-compatible MDM vendor may be used to manage Android devices in a way that is compatible with the Trusted Access solution.

Fully managed devices, also known as "full management for work-only company-owned devices", allows an organization to view and manage all aspects of the device including data, app and policies. There is no separation of personal or work profiles instead the entire device will consist of a single work profile.

image.png

Deploying Fully Managed Android Devices

iOS and iPadOS Corporate Owned, Google provides a Zero-touch Enrollment capability to enroll a company-purchased Android device into MDM right out of the box.

While documentation for Work Profile for Mixed Use Company Owned Devices is out of the scope of this document, you can refer to documentation for Microsoft Endpoint Manager as a starting point:

Deploying Jamf Trust

The Jamf Trust app is required to enable various security services on Android devices, including Jamf Private Access.

Jamf Connect ZTNA is used in the Jamf Trusted Access solution to enable access for trusted devices to company resources while providing active mobile threat defense capabilites. The following steps outline the high-level steps required to streamline deployment of the Jamf Trust app via your Android Enterprise-compatible MDM:

  1. Follow the steps in Enabling Access for Trusted Devices to configure Private Access in RADAR.
  2. Configure the Jamf Trust app via Managed Google Play, specifying the Activation Profile defined above in the app config.
Per-App VPN on Corporate Liable Devices

While you may use Per-App VPN on corporate managed devices, we recommend using the default device-wide VPN configuration for fully-managed Android devices.

  1. Define a new Android configuration profile in your MDM that Enables Zero Touch Activation of Jamf Trust and assign this profile to your target devices.
    • Only threat defense capabilities with be enabled via zero touch. The user will need to open the Jamf Trust app and authenticate with their identity provider credentials to activate Private Access.

Was this article helpful?

Changing your password will log you out immediately. Use the new password to log back in.
First name must have atleast 2 characters. Numbers and special characters are not allowed.
Last name must have atleast 1 characters. Numbers and special characters are not allowed.
Enter a valid email
Enter a valid password
Your profile has been successfully updated.