- What is the BlackBerry Dynamics SDK?
- Requirements and support for platform-specific features
- Steps to get started with the BlackBerry Dynamics SDK
- Integrating optional features
- Creating wearable apps for Wear OS devices
- Implementing SafetyNet attestation for BlackBerry Dynamics apps
- Sample apps
- Testing and troubleshooting
- Implementing automated testing for BlackBerry Dynamics apps
- Automated testing with the BlackBerry Dynamics sample apps
- Preparing for automated testing
- Components of a sample automated testing configuration
- Execute all tests from the command line with Gradle
- Execute specific tests from the command line with Gradle
- Execute tests from the Android Studio IDE
- Add automated testing to your BlackBerry Dynamics Android app
- Disable compliance settings so you can debug your app
- Emulators and the rooted OS compliance setting
- Using enterprise simulation mode
- Troubleshooting common issues
- Logging and diagnostics
- Implementing automated testing for BlackBerry Dynamics apps
- Deploying your BlackBerry Dynamics app
- Deploying certificates to BlackBerry Dynamics apps
- BlackBerry Docs
- BlackBerry Dynamics SDK for Android 6.0
- BlackBerry Dynamics SDK for Android Development Guide
- Testing and troubleshooting
- Disable compliance settings so you can debug your app
Disable compliance settings so you can debug your app
Compliance profiles in
BlackBerry UEM
and compliance policies in standalone Good Control
provide the ability to detect when a device OS is rooted and to initiate an enforcement action. This feature extends to deployed BlackBerry
Dynamics
apps, compiled with SDK version 5.0 or later, where an active debugging tool is detected. If the detect rooted compliance setting is enabled, the BlackBerry Dynamics Runtime
stops a BlackBerry
Dynamics
app if it detects an active debugging tool.If you want to debug one of your
BlackBerry
Dynamics
apps in an environment where a compliance profile or policy is applied, the compliance setting to detect rooted devices must be disabled. Alternatively, you can use a non-debug build of your app to test it with the compliance setting enabled.The setting to detect rooted devices is disabled by default in
UEM
compliance profiles and enabled by default in standalone Good Control
compliance policies.