From 50f86c65206072be0ca924f03b8d460365199bcd Mon Sep 17 00:00:00 2001 From: Scott Main Date: Fri, 8 Oct 2010 16:06:40 -0700 Subject: docs: a few style adjustments to admin doc Change-Id: I1ea2416f1f26835b1111aad65cc519dd8d56e099 --- docs/html/guide/topics/admin/device-admin.jd | 124 +++++++++++++++++---------- 1 file changed, 81 insertions(+), 43 deletions(-) diff --git a/docs/html/guide/topics/admin/device-admin.jd b/docs/html/guide/topics/admin/device-admin.jd index 4d9a14f..fda716a 100644 --- a/docs/html/guide/topics/admin/device-admin.jd +++ b/docs/html/guide/topics/admin/device-admin.jd @@ -1,24 +1,33 @@ -page.title=Android Device Administration API +page.title=Device Administration @jd:body +

In this document

  1. Device Administration API Overview
      +
    1. How does it work?
    2. Policies
  2. -
  3. How Does It Work?
  4. Sample Application
  5. Developing a Device Administration Application
      -
    1. Creating the Manifest
    2. -
    3. Implementing the Code -
    4. +
    5. Creating the manifest
    6. +
    7. Implementing the code
    +
  6. + +
+ +

Key classes

+
    +
  1. {@link android.app.admin.DeviceAdminReceiver}
  2. +
  3. {@link android.app.admin.DevicePolicyManager}
  4. +
  5. {@link android.app.admin.DeviceAdminInfo}
-
+

Android 2.2 introduces support for enterprise applications by offering the @@ -37,7 +46,10 @@ their email and calendar data.

solutions for Android-powered devices. It discusses the various features provided by the Device Administration API to provide stronger security for employee devices that are powered by Android.

+ +

Device Administration API Overview

+

Here are examples of the types of applications that might use the Device Administration API:

-

How Does it Work?

+

How does it work?

You use the Device Administration API to write device admin applications that users install on their devices. The device admin application enforces the desired policies. Here's how it works:

If users do not enable the device admin app, it remains on the device, but in an inactive state. Users will not be subject to its policies, and they will conversely not get any of the application's benefits—for example, they may not be able to sync data.

@@ -88,12 +100,14 @@ application.

To uninstall an existing device admin application, users need to first unregister the application as an administrator.

-

Policies

+ +

Policies

+

In an enterprise setting, it's often the case that employee devices must adhere to a strict set of policies that govern the use of the device. The Device Administration API supports the policies listed in Table 1. Note that the Device Administration API currently only supports passwords for screen -lock:

+lock:

Table 1. Policies supported by the Device Administration API.

@@ -109,7 +123,7 @@ lock:

- + @@ -128,7 +142,9 @@ pressed a button before the device locks the screen. When this happens, users need to enter their PIN or passwords again before they can use their devices and access data. The value can be between 1 and 60 minutes.
Set the required number of characters for the password. For example, you can require PIN or passwords to have at least six characters.
Alphanumeric password requiredAlphanumeric password required Requires that passwords have a combination of letters and numbers. They may include symbolic characters.
-

Other Features

+ +

Other features

+

In addition to supporting the policies listed in the above table, the Device Administration API lets you do the following: