barscaret-downcaret-leftcaret-rightcaret-upcheckchevron-leftchevron-rightfile-pdfinfosign-in-altsignin text-widthtimesyoutube

Android > Device Data & Configuration

Restricting the Use of Personal Google Accounts on Android Devices

Updated on September 30th, 2020

This article explains how you can block the use of personal Google accounts on managed devices, or allow the use of personal Google accounts, but just block their access to the public Google Play store.

When this is needed?

Typical use case is that your organization has defined an enterprise app store to managed Android devices using managed Google Play. The managed Google Play store is basically a more controlled version of to the public (consumer) Google Play store, letting your IT admins to decide which apps are available for device users in the store.

Although the managed Google Play store is present, device users can, by default, also access the public Google Play store using a personal Google account – which may be considered to negate the benefits of having the enterprise app store.

In order to address this loophole, you can deny the use of personal Google accounts on Android devices entirely, or allow their use but just block access to the consumer version of Play Store. The latter option is viable if you, for example, want to allow the users to configure their personal Gmail account to the device.

Requirements

  • Enterprise subscription of Miradore
  • Applicable to Android devices which have either Android Enterprise Work Managed Device (Full enrollment) or Work Profile mode (Light enrollment) of management enabled through Miradore
  • Miradore Client version 2.7.9 or newer

Steps to restrict the use of personal Google accounts

  1. In Miradore, navigate to Management > Configuration profiles and use the blue Add button to create a new configuration profile. Select Android platform.

    step1.png

  2. Choose Restrictions and go the the Account Management tab. There you can configure what the device user(s) are allowed or forbidden to do on the device.

    Account modification: Set this to “Denied” if you want to prevent the device user(s) from making any changes to the accounts configured for the device. This is the strictest restriction.

    Deny account management types: With this setting, you can prevent the device user(s) from managing certain types of accounts on the device. For example. “com.google” would block device user(s) from adding a personal Google account to the device.

    Play store for unmanaged accounts: Set this to “Denied” if you want to prevent device users from accessing the consumer version of Google Play store using their personal Google Accounts. In this case, they can only access the managed Google Play store. This restrictions allows the device users  to add their personal Google account to the device if they want to use other Google services with the personal account. Example configuration in the picture below.

    step2.png

  3. Click Next and give a name and description for the profile. After that, you can distribute the restriction to desired devices using the Deploy > Deploy configuration profile option from the page toolbar.

    step3.png

Good to know: You can check the device management mode and client version from the Client version and Management type columns of the Devices page.

Device owner = Work Managed Device

Profile owner = Work profile

Previous Article:
«

Next Article:
»

Get started with Miradore

Start securing your devices and data today with Miradore. Create a site in just a few minutes and start adding devices immediately. You can get started for free and try out the full features with our 14-day Enterprise trial.

No credit card needed.

SIGN UP FOR MIRADORESEE PLANS AND PRICING