- About this guide
- BlackBerry Dynamics background
- BlackBerry Dynamics API reference
- FIPS 140-2 compliance
- Easy Activation
- Securing cut-copy-paste on devices (Data Leakage Prevention, or DLP)
- Shared Services Framework
- Support for fingerprint authentication
- Support for certificates
- Support for the "Do not require password" setting
- Bypassing the App Lock screen
- BlackBerry Dynamics contributor code on GitHub
- Supported languages
- BlackBerry Dynamics software versions
- Requirements
- Compatibility with earlier releases
- Software requirements
- BlackBerry Dynamics entitlement ID and version
- Supported launchModes
- Compatibility with the BlackBerry Dynamics Launcher Library
- Supported CPU architectures
- Supported and unsupported Android and third-party features
- FIPS-linking on Android: automatic
- Restricted key prefix
- Steps to get started with the BlackBerry Dynamics SDK
- Installing the BlackBerry Dynamics SDK for Android
- Integrating the BlackBerry Dynamics SDK in .aar format
- Using the branding API to add a custom logo and colors
- Info: Add Samsung Pass to your BlackBerry Dynamics app
- Info: APIs for secure clipboard management
- Info: Preventing autobackup to Google Drive
- Info: APIs for network status
- BlackBerry Dynamics SDK for Android: Wearable Framework
- Implementing SafetyNet attestation for BlackBerry Dynamics apps
- Programming with the BlackBerry Dynamics SDK and BlackBerry Enterprise Mobility Server services
- Sample apps
- Testing and troubleshooting
- Implementing automated testing for BlackBerry Dynamics apps
- Automated testing with the BlackBerry Dynamics sample apps
- Preparing for automated testing
- Components of a sample automated testing configuration
- Execute all tests from the command line with Gradle
- Execute specific tests from the command line with Gradle
- Execute tests from the Android Studio IDE
- Add automated testing to your BlackBerry Dynamics Android app
- Disable compliance settings that check for a compromised OS
- Emulators and the rooted OS compliance policy
- Using enterprise simulation mode
- Logging and diagnostics
- Implementing automated testing for BlackBerry Dynamics apps
- Readying your app for deployment: server setup
- Details of support for client certificates
- BlackBerry Docs
- BlackBerry Dynamics SDK for Android 5.0
- BlackBerry Dynamics SDK for Android Development Guide
- Testing and troubleshooting
- Disable compliance settings that check for a compromised OS
Disable compliance settings that check for a compromised OS
Compliance profiles in
BlackBerry UEM
and compliance policies in standalone Good Control
provide the ability to detect when a device OS is rooted and to initiate an enforcement action. This feature extends to deployed BlackBerry
Dynamics
apps, compiled with SDK version 5.0 or later, where an active debugging tool is detected. If the detect rooted compliance setting is enabled, the BlackBerry Dynamics Runtime
stops a BlackBerry
Dynamics
app if it detects an active debugging tool.If you want to debug one of your
BlackBerry
Dynamics
apps in an environment where a compliance profile or policy is applied, the compliance setting to detect rooted devices must be disabled. Alternatively, you can use a non-debug build of your app to test it with the compliance setting enabled.The setting to detect rooted devices is disabled by default in
UEM
compliance profiles and enabled by default in standalone Good Control
compliance policies.