Mobile device management
BeyondTrust supports management of Android devices with mobile device management (MDM). The MDM configuration profile may be configured so that the URL of a support site is pre-populated in the Site Address field. The profile may also be configured to prevent this field from being edited.
The method by which you configure your profile will vary depending on your MDM product. Consult your MDM documentation for exact steps.
Below are the configurable keys that for the Android Customer Client and Android Jump Client you will need to add to your MDM payload:
Android customer client
Key | Type/Description |
---|---|
ApplianceURL | String: The BeyondTrust support site address. For example, support.example.com. |
URLLocked | Boolean: If true, then editing the site address within the customer client is disabled. |
Android Jump Client
Key | Type/Description |
---|---|
CompanyAPIName | String: The API name of the company or organization. The API name can be found in the Site Status section at /login/status. |
MassDeploymentKey | String: The ID of your Android Jump Client configuration. The Mass Deployment Key value can be found when deploying a Jump Client via /login and selecting the Android platform. The value appears in the MDM section. |
Intune
These instructions are based on the Microsoft documentation for using Intune to manage Android devices.
Follow the steps below to create an app configuration policy.
- Sign in to the Microsoft Intune admin center.
- Navigate to Apps > App configuration policies > Add > Managed devices.
- On the Basics page, set the following details:
- Name: The name of the profile that appears in the portal.
- Description: The description of the profile that appears in the portal.
- Device enrollment type: The type of device. Leave at the default setting, Managed devices.
- Select Android Enterprise as the Platform.
- Click Select app next to Targeted app. The Associated app pane is displayed.
- On the Associated app pane, choose the BeyondTrust Support or Support+ app to associate with the configuration policy and click OK.
- Click Next to display the Settings page.
- Click Add to display the Add permissions pane.
- Click the permissions that you want to override. The following permissions are requested by the app and we recommend using the Auto grant behavior:
- READ_PHONE_STATE
- READ_CONTACTS
- GET_ACCOUNTS
- CAMERA
- WRITE_EXTERNAL_STORAGE
- READ_EXTERNAL_STORAGE
- The default support portal behavior can also be configured with the Configuration settings format dropdown if desired. Select Use configuration designer.
- Click Add. Add and assign values to each configuration setting according to their descriptions.
- Click Next to display the Assignments page.
- In the dropdown box next to Assign to, select either Add groups, Add all users, or Add all devices to assign the app configuration policy. Once you've selected an assignment group, you can select a filter to refine the assignment scope when deploying app configuration policies for managed devices.
- Click Next to display the Review + create page.
- Click Create to add the app configuration policy to Intune.
Note
For more information, see Add app configuration policies for managed Android Enterprise devices.
Intune for Zebra
Full screen sharing and input injection for Zebra devices require access to specialized services on the devices. This access is granted by staging a configuration profile called a MX Profile. The MX Profile is generated by StageNow Support and distributed to a device through an Intune profile. This MX Profile is generated by development and must be provided to a customer so they can create a profile within Intune to push the configuration to their devices.
The BeyondTrust MX Profiles are below. There is one for the enterprise Support Plus release and another for the Play Store Support release.
BeyondTrust Plus.xml
<wap-provisioningdoc>
<characteristic version="9.3" type="AccessMgr">
<parm name="ServiceAccessAction" value="1" />
<parm name="ServiceIdentifier" value="com.zebra.remotedisplayservice" />
</characteristic>
<characteristic version="9.3" type="AccessMgr">
<parm name="ServiceAccessAction" value="4" />
<parm name="ServiceIdentifier" value="com.zebra.remotedisplayservice" />
<parm name="CallerPackageName" value="com.beyondtrust.sra.scc.plus" />
<parm name="CallerSignature" value="MIIFdDCCA1ygAwIBAgIEThu3yzANBgkqhkiG9w0BAQUFADB8MQswCQYDVQQGEwJVUzEUMBIGA1UECBMLTWlzc2lzc2lwcGkxEjAQBgNVBAcTCVJpZGdlbGFuZDEbMBkGA1UEChMSQm9tZ2FyIENvcnBvcmF0aW9uMRQwEgYDVQQLEwtEZXZlbG9wbWVudDEQMA4GA1UEAxMHQW5kcm9pZDAeFw0xMTA3MTIwMjU2MTFaFw00NDA1MTkwMjU2MTFaMHwxCzAJBgNVBAYTAlVTMRQwEgYDVQQIEwtNaXNzaXNzaXBwaTESMBAGA1UEBxMJUmlkZ2VsYW5kMRswGQYDVQQKExJCb21nYXIgQ29ycG9yYXRpb24xFDASBgNVBAsTC0RldmVsb3BtZW50MRAwDgYDVQQDEwdBbmRyb2lkMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAkqgwc8NDA6vQVk2e6BHkTNqfsZxRVpZezibfv8U+/hr/uNgFvKE5EQRmjzfcqHim7YRfHzhvSK9kqrYCcxiNzKzFF2d8zcRlPMfWWpErt/LcudP3NfnvtE0pCJRu29q4d2HTIx68M2e16hSXbBGeuUz7MUhzDcaTTVYX8zUOCjQcvms2juLWAuDzkVrfEaluFVGGQccyDMkU47YQwHJ4p86mkOzIDoSx7kDtijyNZ+AiW1P7UHOLbl4o07b96VRl3VnMCMYVfFd92cibV5KLAjSySPIzM1OBhbM35DtRBDAGGJddX5ipGScsALpn5JGlVq4yGjErV8JKBRdTT697qPk6deJDqf2gEBEUvLbNI8/wsLoo7sy2hJas2coset93qUCaH39I60X813sPALpmraxXla8TlKIbReLWZpFnNGvgYQx3cgleLndY2UDRt1O4Gm76rb1zpTFS94zW4yc6DvFIE7xcWNR6zLpaXOeKK+avuHGyK3kGtqCKI06x49JvlTm2lVV5zAZFjqWLEfA3HwUzUwks2wj5+xpxRV8XHm2XISTibnwctm7et9witziE2LDIzWE53ldjtFEOUD1qg6qk7VSk0fAM+ntxtOaEKvRq1VZPjyrnFEZsJ05p6IwhviaIucbPhQmdSDjuNMQB3BGY1U1usdDQ7Mvg1JSeO9UCAwEAATANBgkqhkiG9w0BAQUFAAOCAgEAarSiV8z12JkgoLt17CY1MvBkAQStB1Ww9MpYbEspDxS3AnS3AIyqbG2EA0e6NwFoZItTmZC+6Jv1jwuyKL1Mc4kVDdmlhQ1lKRqsxwSvJQJHtOX5md+TcND3nkwjNhnLTcbnoH07WlOcuU7BVULYbPvGqxypxYmm46HVoH8fzYxXJQvbQx8P/FaqMM2ZGzkXoYAUgo/RBptfJy6Kd+bWIPmFXssJIxsojHmueti7lrYt4kSDCYqgxMOXQQqG1fbvjrcc/n0zMY6nEL8DuJtpzPrdB10vzjCruRCDUjtJgmUPtmc9OS/9s7fEpHDmgvvnkpVoabQw3+MnhI5mCyJsngkni9N5fZpa7bjnepkarIqvT9v+V9NgelJE3bQ+W2X94Su6QvotAYuWSOe1NdkPXO6oErsA26wY+ogQEqwTZ+yMNgr9PhTruNI/88+Z+RDo6apt1nBXexTvcjPj1BJM3f2TE7jfUUfH4So4JNWSPLeqLMW3VSLRw2ZSLVXZvk9EJBSPwicNfHV80k2rf1QRfpUXnb3FE3v7mMoAJgTEIN9E3HuhcmOzR1kSv0ejwvvdMEnc5m9NWtzE5KR3xO3LYkpuY7uaNXdglEOYe/u5GWM5GvzsBj0cNI1X2nMju0dlqXpMdTKgMKA2Q7JiA7uQfX9HzuklwTvQnKX11Cs85NE=" />
</characteristic>
<characteristic version="9.3" type="AccessMgr">
<parm name="ServiceAccessAction" value="1" />
<parm name="ServiceIdentifier" value="com.zebra.eventinjectionservice" />
</characteristic>
<characteristic version="9.3" type="AccessMgr">
<parm name="ServiceAccessAction" value="4" />
<parm name="ServiceIdentifier" value="com.zebra.eventinjectionservice" />
<parm name="CallerPackageName" value="com.beyondtrust.sra.scc.plus" />
<parm name="CallerSignature" value="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" />
</characteristic>
</wap-provisioningdoc>
BeyondTrust.xml
<wap-provisioningdoc>
<characteristic version="9.3" type="AccessMgr">
<parm name="ServiceAccessAction" value="1" />
<parm name="ServiceIdentifier" value="com.zebra.remotedisplayservice" />
</characteristic>
<characteristic version="9.3" type="AccessMgr">
<parm name="ServiceAccessAction" value="4" />
<parm name="ServiceIdentifier" value="com.zebra.remotedisplayservice" />
<parm name="CallerPackageName" value="com.bomgar.thinclient.android" />
<parm name="CallerSignature" value="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" />
</characteristic>
<characteristic version="9.3" type="AccessMgr">
<parm name="ServiceAccessAction" value="1" />
<parm name="ServiceIdentifier" value="com.zebra.eventinjectionservice" />
</characteristic>
<characteristic version="9.3" type="AccessMgr">
<parm name="ServiceAccessAction" value="4" />
<parm name="ServiceIdentifier" value="com.zebra.eventinjectionservice" />
<parm name="CallerPackageName" value="com.bomgar.thinclient.android" />
<parm name="CallerSignature" value="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" />
</characteristic>
</wap-provisioningdoc>
Since the MX Profile is provided by BeyondTrust, the customer must follow the process below to create a device configuration profile and use Zebra mobility extensions in Microsoft Intune:
- Sign in to the Microsoft Intune admin center.
- Navigate to Devices > Configuration profiles > Create profile.
- Enter the following properties:
- Platform: Select Android device administrator.
- Profile: Select MX profile (Zebra only).
- Click Create.
- In Basics, enter the following properties:
- Name: Enter a descriptive name for the new profile.
- Description: Enter a description for the profile. This setting is optional, but recommended.
- Click Next.
- In Configuration settings > Choose a valid Zebra MX XML file, add the XML profile file provided by BeyondTrust. When done, click Next.
- In Assignments, select the groups to receive this profile.
- Select Next.
- In Review + create, click Create when finished.
- The profile is created and is displayed in the list.
To also apply a customer MX Profile, there are two options:
- Create two Intune profiles, one for the customer configuration and one for the BeyondTrust configuration, and then assign both to a device.
- Create a single Intune profile that contains a merged MX Profile.
To merge a profile, follow these steps:
- Open the customer profile XML file as the destination, and the BeyondTrust profile XML file as the source in test editor.
Example
A shorted version of the configuration structure for merging profiles:
<wap-provisioningdoc>
<characteristic ...
...
</characteristic>
<characteristic ...
...
</characteristic>
</wap-provisioningdoc>
- From the source file, copy the entire contents of the file except the opening and closing lines.
- In the destination file, locate the last instance of a closing and paste the contents copied from the source file on the next line. This results in a longer list of entries that retain the same format as the example above.
This resulting merged profile can be used to create Intune profiles to be pushed to devices.
Note
For more information, see the following Microsoft resources:
Updated 5 days ago