How To Uninstall Intune Company Portal Android App?
Through device configuration profiles , Intune can manage settings within the OS, push apps , ensure device compliance is met, remote wipe all data or just business data, etc. The device is typically enrolled by downloading the Company Portal app and the user self-enrolls.
For more information see Deployment Models. However, I need to stress, majority of scenarios can be accomplished through just normal MDM enrollment. Review your business requirements to determine which path to go down. Before we begin I recommend you review this documentation so you have a good understanding of what this entails. Simply follow the 5 steps in the wizard to setup the certificate. This is a special certificate that Apple will generate for you.
Simply download the Certificate Signing Request from the portal, upload it to the Apple tool and then download the certificate. Once the certificate has been uploaded, you are ready to start managing Apple devices!
Note, the other methods we called out using Apple Device Enrollment Program and Apple Configurator can also be setup on this screen — but for purposes of this blog we will not go into those. From the Home Screen, launch the App Store app: 2. Download the Company Portal app from the App Store: 3. Launch the Company Portal app: 4.
Sign in with your Azure AD credentials 5. Once signed in, you will be presented with the steps required to complete enrollment, tap Begin. At the Device management and your privacy screen, carefully review what the employer can see and not see on a device, and tap Continue 7. Tap Continue on the Setup Contoso Access screen: 8. Tap Allow on the dialog box This website is trying to download a configuration profile.
Do you want to allow this? Tap Close on the dialog box Profile Downloaded: Review the profile in Settings app if you want to install it. Note: This downloaded the MDM profile from Intune and we will not install that profile on the device. Tap Continue Now on the Download management profile screen On the Setup Contoso access screen, tab Continue On the home screen, tap Settings Within Settings tap General Tap Profile.
SOLVED: How to Uninstall InTune From an Android Device When Uninstall Is Greyed Out
After a few seconds the approved apps are available in Intune. To assign the approved app, click the app Click the Assignments tab Click Add group Select Required as Assignment type On the Include tab search for the security group you want to assign the policy to and select the group Click OK twice — click Save Repeat these steps for all Android applications you want to deploy to your managed devices.
For this test using the QR code scanner, you need an Android device with Android 7 or higher. The enrollment is started by tapping on the screen seven times. Some of the screens below might look different the you will see, or you will see some extra screens. That depends on the Android OS version and supplier. This will start the device enrollment. The setup of the work device is started.
Sign in with your corporate credentials. When device encryption is set as a requirement, the second step is to enable secure start-up. Settings is opened again where you can enable Secure startup. Those apps are installed by default, without the need to assign them manually. Click Next when the apps are installed. The next step is to register your device. It is done by signing in to the Microsoft Intune app. Click DONE. The setup and registration is finished. You are now logged on to the Android device.
We can see all the applications assigned as required are installed, or will be installed shortly. Installation of those applications is done without the need of a personal Google Play account. When we open the Microsoft Intune app all the user owned devices are shown.
Applying Intune policies is handled by the Device Policy app which is installed by default, but not shown between the apps. When you open the app you can perform a manual sync and see an overview of some of the applied settings and installed apps.
If we open the settings, we can see Factory reset is not available as set in the Device Restrictions policy. Have a look at my article about Samsung KME.
Apparently, multiple users of the Intune Portal app are unable to sign in to the app, with the constant prompt to install the app again and again proving to be a major nuisance. In essence, affected users say they are stuck in a loop of signing in and installing the app, but even so, nothing is working for them.
This app is awful. Any time I want to look at my emails it tells me to sign in and install the app again. Once installed, it goes through the whole process again. However, none of the other apps work. Once that process is completed the Waiting for sign in tab can be used to view any devices which can been provisioned into the tenant but not yet signed into Teams.
How to Setup Android Work Profile on Android Devices
Note that both options for adding MAC addresses can be used to add a single device or multiple devices so there is no requirement to create and import a CSV file attempting to add multiple devices. Largely depending on the number of devices to be added only one of the following two steps should be performed.
When all desired devices have been entered then select Apply. To instead import the device information from a file select the Upload MAC addresses option and then click on the download the template link. Save the file in CSV format, saving as a new file if desired e. Regardless of which processes above was used both should produce the same results by adding the supplied device information in the Waiting on activation view. Provision Device Up to this point the current state of the devices does not matter, so they could all be sitting in boxes waiting to be shipped or deployed.
Or they could be powered up and online, waiting at the initial sign in screen. If any of these devices are currently signed into the tenant or being used with any other Microsoft tenant then they must be factory reset prior to using this process. From this point forward though the proverbial clock is ticking as once a verification code has been generated for a device it must be used within 24 hours, otherwise the administrator will need to generate a new verification code. For this scenario the Poly CCX has been powered on and is sitting at the initial Teams sign-in screen after a factory reset was performed on the phone.
Select the desired device e. Note the message at the top of the screen indicating that the generated code is only valid for 24 hours. Now that the device has been added to the Teams Admin Center and a fresh verification code has been generated the next series of steps will need to be performed directly on the device which should be powered on and waiting at the initial Teams sign-in screen as shown below.
It does not matter if a device login code is currently being shown on the device or if the Refresh code button is being shown instead. That is the alpha-numeric device login code which is used later for user authentication during the actual sign-in process. It should not be confused with the numeric verification code used for provisioning the device that was manually generated in the previous step. Tap the gear icon in the upper right corner to bring up the Settings menu and then select Provision phone.
Enter the verification code that was previously generated in the TAC for this device e. The device will take several seconds to process the request, as indicated by the pulsing purple line at the bottom of the screen. Once complete the following screen should appear. The device will then return to the initial Teams sign-in screen just as it was before, but with one important difference.
The Organization Name of the Microsoft tenant where the device was provisioned is now displayed on the device, indicating that it is now associated specifically with that tenant, although it is still not signed in.
In the Teams Admin Center this device should no longer be listed under the Waiting on activation list and would have been moved to the Waiting to sign in list, reporting a Device user status of Signed Out. Sign In to Teams At this point there is no further interaction required with the device itself as the administrator will perform the actual sign-in process from a workstation.
Screenshots of the phone will still be included in the following steps for informational purposes, but no intervention is required on the device. Click on the Signed Out link next to the desired device and then wait while the Teams Admin Center attempts to connect to the device to retrieve a device login code and place it into a provisioning state. During this time the device will display the following screen to prevent anyone from attempting to use the device or sign it in manually.
Once complete the Sign in a user window will automatically refresh to show the login code retrieved from the device. Go to the Device Login portal as instructed and enter the provided device login code e. This alpha-numeric code is not case-sensitive. Given that the device being signed-in is likely going to be using a different account than that of the administrator then select the Use another account option when prompted to select an account.
Enter the credentials of the desired Teams account to be signed-into the selected device.
Provisioning Microsoft Teams Android Devices
In this example the CCX will be signed in using a Teams user account which has been configured for the Common Area Phone experience e. Those apps are installed by default, without the need to assign them manually. Click Next when the apps are installed.
The next step is to register your device. It is done by signing in to the Microsoft Intune app. Click DONE. The setup and registration is finished. You are now logged on to the Android device.
We can see all the applications assigned as required are installed, or will be installed shortly.