You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: memdocs/intune/developer/app-sdk-android-appendix.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -32,7 +32,7 @@ ms.custom: intune-classic
32
32
33
33
# Microsoft Intune App SDK for Android developer guide
34
34
35
-
The Microsoft Intune App SDK for Android lets you incorporate Intune app protection policies (also known as **APP*- or MAM policies) into your native Java/Kotlin Android app. An Intune-managed application is one that is integrated with the Intune App SDK. Intune administrators can easily deploy app protection policies to your Intune-managed app when Intune actively manages the app.
35
+
The Microsoft Intune App SDK for Android lets you incorporate Intune app protection policies (also known as **APP** or MAM policies) into your native Java/Kotlin Android app. An Intune-managed application is one that is integrated with the Intune App SDK. Intune administrators can easily deploy app protection policies to your Intune-managed app when Intune actively manages the app.
36
36
37
37
## Stage Goals
38
38
The guide contains greater detail about the Intune App SDK's architecture, information about uncommon integration steps, and other helpful content.
Copy file name to clipboardExpand all lines: memdocs/intune/developer/app-sdk-android-phase1.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -32,9 +32,9 @@ ms.custom: intune-classic
32
32
33
33
# Intune App SDK for Android - Plan the integration
34
34
35
-
The Microsoft Intune App SDK for Android lets you incorporate Intune app protection policies (also known as **APP*- or MAM policies) into your native Java/Kotlin Android app. An Intune-managed application is one that is integrated with the Intune App SDK. Intune administrators can easily deploy app protection policies to your Intune-managed app when Intune actively manages the app.
35
+
The Microsoft Intune App SDK for Android lets you incorporate Intune app protection policies (also known as **APP** or MAM policies) into your native Java/Kotlin Android app. An Intune-managed application is one that is integrated with the Intune App SDK. Intune administrators can easily deploy app protection policies to your Intune-managed app when Intune actively manages the app.
36
36
37
-
# Stage 1: Plan the Integration
37
+
##Stage 1: Plan the Integration
38
38
39
39
This guide is for Android developers who are looking to add support for Microsoft Intune's App Protection Policies inside their existing Android app.
40
40
@@ -80,7 +80,7 @@ Your app can skip integrating MSAL **only if all of the following are true**:
80
80
- Your application doesn't need to support non-Intune accounts.
81
81
- Your application doesn't grant access to any resources protected by Conditional Access.
82
82
83
-
If your app satisfies **all of the above conditions*- and doesn't integrate MSAL, it can still be protected by App Protection Policy, albeit with no option for unmanaged usage. See [Default Enrollment] for details.
83
+
If your app satisfies **all of the above conditions** and doesn't integrate MSAL, it can still be protected by App Protection Policy, albeit with no option for unmanaged usage. See [Default Enrollment] for details.
84
84
85
85
See [Stage 2: The MSAL Prerequisite] for instructions on integrating MSAL and additional details on identity scenarios inside your application.
86
86
@@ -96,7 +96,7 @@ If so, your application is **single-identity**.
96
96
Does your application display multiple accounts' data on a shared screen?
97
97
Does your application store multiple accounts' data?
98
98
Does your application let users switch between different logged in accounts?
99
-
If so, your application is **multi-identity*- and you'll need to follow [Stage 5: Multi-Identity]. **This section is required for your app.**
99
+
If so, your application is **multi-identity** and you'll need to follow [Stage 5: Multi-Identity]. **This section is required for your app.**
100
100
101
101
Even if your application is multi-identity, follow this integration guide in order.
102
102
Initially integrating and testing as single-identity will help ensure proper integration and prevent bugs where corporate data ends up unprotected.
@@ -133,7 +133,7 @@ See [Policy for protecting backup data] in [Stage 7: App Participation Features]
133
133
feature that can be used to control access to AAD resources.
134
134
Intune administrators can define CA rules that allow resource access only from devices or apps that are managed by Intune.
135
135
136
-
Intune supports two types of CA: **device-based CA*- and **app-based CA**, also known as [App Protection CA].
136
+
Intune supports two types of CA: **device-based CA** and **app-based CA**, also known as [App Protection CA].
137
137
Device-based CA blocks access to protected resources until the entire device is managed by Intune.
138
138
App-based CA blocks access to protected resources until the specific app is managed by Intune App Protection Policies.
139
139
@@ -155,7 +155,7 @@ The Intune App SDK for Android relies on the presence of the [Company Portal] ap
155
155
> When the Company Portal app is not on the device, an SDK-integrated app behaves the same as a normal app that does not support Intune app protection policies.
156
156
> Even if the Company Portal app is on the device, an SDK-integrated app behaves the same as a normal when the end user is not targeted with app protection policy.
157
157
158
-
The user is ***not**- required to sign into or even launch the Company Portal app for App Protection Policy to function.
158
+
The user is ***not*** required to sign into or even launch the Company Portal app for App Protection Policy to function.
159
159
160
160
### Android versions
161
161
@@ -195,7 +195,7 @@ To create a new account:
195
195
Before you test app protection policy settings within your own application, it's helpful to familiarize yourself with how these settings behave inside other SDK-integrated applications.
196
196
197
197
> [!TIP]
198
-
> If your app isn't listed in the Microsoft Endpoint Manager portal, you can target it with a policy by selecting the **more apps*- option and providing the package name in the text box.
198
+
> If your app isn't listed in the Microsoft Endpoint Manager portal, you can target it with a policy by selecting the **more apps** option and providing the package name in the text box.
199
199
> You must target your app with app protection policy and deploy the policy to a user to successfully test your integration.
200
200
> Even if policy is targeted and deployed, your app will not properly enforce policies until it has successfully integrated the SDK.
Copy file name to clipboardExpand all lines: memdocs/intune/developer/app-sdk-android-phase2.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -32,12 +32,12 @@ ms.custom: intune-classic
32
32
33
33
# Intune App SDK for Android - Understand the MSAL Prerequisite
34
34
35
-
The Microsoft Intune App SDK for Android lets you incorporate Intune app protection policies (also known as **APP*- or MAM policies) into your native Java/Kotlin Android app. An Intune-managed application is one that is integrated with the Intune App SDK. Intune administrators can easily deploy app protection policies to your Intune-managed app when Intune actively manages the app.
35
+
The Microsoft Intune App SDK for Android lets you incorporate Intune app protection policies (also known as **APP** or MAM policies) into your native Java/Kotlin Android app. An Intune-managed application is one that is integrated with the Intune App SDK. Intune administrators can easily deploy app protection policies to your Intune-managed app when Intune actively manages the app.
36
36
37
37
> [!NOTE]
38
38
> This guide is divided into several distinct stages. Start by reviewing [Plan the Integration](..\developer\app-sdk-android-phase1.md).
39
39
40
-
# Stage 2: The MSAL Prerequisite
40
+
##Stage 2: The MSAL Prerequisite
41
41
42
42
## Stage Goals
43
43
@@ -66,7 +66,7 @@ To learn more about MSAL, see the [MSAL Wiki] and [list of MSAL libraries].
66
66
## Register your Application with AAD
67
67
68
68
Before integrating MSAL into your Android application, follow the instructions to [register your application with Azure Active Directory].
69
-
This will generate a **Client ID*- for your application.
69
+
This will generate a **Client ID** for your application.
70
70
71
71
Next, follow the instructions to [give your app access to the Intune app protection service].
72
72
@@ -117,12 +117,12 @@ These settings include:
117
117
| Setting | Description | Required for MSAL? | Required by Intune? |
118
118
| - | - | - | - |
119
119
|`ClientID`| The AAD ClientID (also known as the "Application ID") for your app. <br> There's no default `ClientID`. Use the `ClientID` from [Register your Application with AAD] for your app. | Yes | No |
120
-
|`Authority`| The AAD authority to issue a token. <br> By default, this value is the AAD public environment. If overridden, the AAD authority entered will issue the token for your application, which allows authentication to non-default environments, such as Sovereign clouds. | No | If your application requires a non-default authority, yes. **Most apps should not set the Authority parameter.*-|
121
-
|`SkipBroker`| Boolean value for altering the default MSAL SSO behavior. <br> By default, this value is "false". | No | If your app doesn't support brokered authentication/device-wide SSO, yes and set `SkipBroker` to "true". **Most apps should not set the SkipBroker parameter.*-|
122
-
|`NonBrokerRedirectURI`|[AAD redirect URI] to use in broker-less cases. By default, this value isn't present. | No | If the `SkipBroker` setting is set to "true" and your app requires a redirect URI, yes. **Most apps should not set the NonBrokerRedirectURI parameter.*-|
120
+
|`Authority`| The AAD authority to issue a token. <br> By default, this value is the AAD public environment. If overridden, the AAD authority entered will issue the token for your application, which allows authentication to non-default environments, such as Sovereign clouds. | No | If your application requires a non-default authority, yes. **Most apps should not set the Authority parameter.**|
121
+
|`SkipBroker`| Boolean value for altering the default MSAL SSO behavior. <br> By default, this value is "false". | No | If your app doesn't support brokered authentication/device-wide SSO, yes and set `SkipBroker` to "true". **Most apps should not set the SkipBroker parameter.**|
122
+
|`NonBrokerRedirectURI`|[AAD redirect URI] to use in broker-less cases. By default, this value isn't present. | No | If the `SkipBroker` setting is set to "true" and your app requires a redirect URI, yes. **Most apps should not set the NonBrokerRedirectURI parameter.**|
123
123
124
124
> [!CAUTION]
125
-
> Applications that do not integrate MSAL **must not*- include any of these 4 properties in the manifest.
125
+
> Applications that do not integrate MSAL **must not** include any of these 4 properties in the manifest.
126
126
127
127
For more detail on non-Intune-specific MSAL configuration options, see [Android Microsoft Authentication Library configuration file].
Copy file name to clipboardExpand all lines: memdocs/intune/developer/app-sdk-android-phase3.md
+13-13Lines changed: 13 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -32,12 +32,12 @@ ms.custom: intune-classic
32
32
33
33
# Intune App SDK for Android - Get started with MAM
34
34
35
-
The Microsoft Intune App SDK for Android lets you incorporate Intune app protection policies (also known as **APP*- or MAM policies) into your native Java/Kotlin Android app. An Intune-managed application is one that is integrated with the Intune App SDK. Intune administrators can easily deploy app protection policies to your Intune-managed app when Intune actively manages the app.
35
+
The Microsoft Intune App SDK for Android lets you incorporate Intune app protection policies (also known as **APP** or MAM policies) into your native Java/Kotlin Android app. An Intune-managed application is one that is integrated with the Intune App SDK. Intune administrators can easily deploy app protection policies to your Intune-managed app when Intune actively manages the app.
36
36
37
37
> [!NOTE]
38
38
> This guide is divided into several distinct stages. Start by reviewing [Plan the Integration](..\developer\app-sdk-android-phase1.md).
39
39
40
-
# Stage 3: Getting Started with MAM
40
+
##Stage 3: Getting Started with MAM
41
41
42
42
## Stage Goals
43
43
@@ -78,14 +78,14 @@ The Intune App SDK consists of the following files:
78
78
## Referencing Intune App libraries
79
79
80
80
The Intune App SDK is a standard Android library with no external dependencies.
81
-
**Microsoft.Intune.MAM.SDK.aar*- contains both the interfaces necessary for enabling app protection policies and the code necessary to interoperate with the Microsoft Intune Company Portal app.
81
+
**Microsoft.Intune.MAM.SDK.aar** contains both the interfaces necessary for enabling app protection policies and the code necessary to interoperate with the Microsoft Intune Company Portal app.
82
82
83
-
**Microsoft.Intune.MAM.SDK.aar*- must be specified as an Android library reference:
83
+
**Microsoft.Intune.MAM.SDK.aar** must be specified as an Android library reference:
84
84
85
85
1. Open your app project in Android Studio and go to **File > New > New module**.
86
86
2. Select **Import .JAR/.AAR Package**.
87
87
3. Select Microsoft.Intune.MAM.SDK.aar to create a module for the *.AAR- file type.
88
-
4. Right-click the module or modules containing your app code and go to **Module Settings*- > **Dependencies tab*- > **+ icon*- > **Module dependency**.
88
+
4. Right-click the module or modules containing your app code and go to **Module Settings** > **Dependencies tab** > **+ icon** > **Module dependency**.
89
89
5. Select the MAM SDK AAR module you just created and select **OK**. This will ensure that your module compiles with the MAM SDK when you build your project.
90
90
91
91
### ProGuard
@@ -102,7 +102,7 @@ The SDK provides build tools (a plugin for Gradle builds and a command-line tool
102
102
These tools transform the class files generated by Java compilation; they don't modify the original source code.
103
103
You're required to use either the Gradle plugin or command-line tool.
104
104
105
-
**The build tooling alone is not sufficient to fully integrate your application.*-
105
+
**The build tooling alone is not sufficient to fully integrate your application.**
106
106
The tools perform [class and method replacements] only.
107
107
They don't perform any more complex SDK integrations such as [Multi-Identity], [Registering for App Protection Policy], [Policy for limiting data transfer between apps and device or cloud storage locations], or [MSAL configuration], which must be completed before your app is fully Intune enabled.
108
108
Carefully review the rest of this documentation for integration points relevant to your app.
@@ -171,10 +171,10 @@ The Gradle plugin has a dependency on [Javassist], which must be made available
171
171
> [!NOTE]
172
172
> Javassist versions may not be backwards compatible.
173
173
> Generally, you should use the exact version expected by the MAM SDK:
174
-
>| MAM SDK Version | Javassist version |
175
-
>|-|-|
176
-
>| ≥ 7.0.0 | 3.27.0-GA |
177
-
>| < 7.0.0 | 3.22.0-GA |
174
+
>| MAM SDK Version | Javassist version |
175
+
>|-|-|
176
+
>| ≥ 7.0.0 | 3.27.0-GA |
177
+
>| < 7.0.0 | 3.22.0-GA |
178
178
179
179
Additionally, when consuming MAM SDK 8.0.0+, you must ensure the following is set in your Gradle configuration:
180
180
@@ -326,8 +326,8 @@ This would have the following effects:
326
326
327
327
- the `product-foo-project` directory is rewritten to `mam-build\product-foo-project`
328
328
-`bar.jar` is rewritten to `mam-build\libs\bar.jar`
329
-
-`zap.jar` is **not*- rewritten because it is only listed in `--classpath`
330
-
- The `com.contoso.SplashActivity` class is **not*- rewritten even if it is in `--input`
329
+
-`zap.jar` is **not** rewritten because it is only listed in `--classpath`
330
+
- The `com.contoso.SplashActivity` class is **not** rewritten even if it is in `--input`
331
331
332
332
> [!WARNING]
333
333
> The build tool does not currently support aar files.
@@ -336,7 +336,7 @@ This would have the following effects:
336
336
## Setting MAMApplication
337
337
If your app creates a subclass of `android.app.Application`, then the build plugin / command line tool will transform your application class.
338
338
339
-
If your app doesn't subclass `android.app.Application`, then you **must*- set `"com.microsoft.intune.mam.client.app.MAMApplication"` as the `"android:name"` attribute in your AndroidManifest.xml's `<application>` tag.
339
+
If your app doesn't subclass `android.app.Application`, then you **must** set `"com.microsoft.intune.mam.client.app.MAMApplication"` as the `"android:name"` attribute in your AndroidManifest.xml's `<application>` tag.
0 commit comments