summaryrefslogtreecommitdiff
path: root/core/java/android
diff options
context:
space:
mode:
authorTreeHugger Robot <treehugger-gerrit@google.com>2020-02-05 11:52:38 +0000
committerAndroid (Google) Code Review <android-gerrit@google.com>2020-02-05 11:52:38 +0000
commitb85646d57be10ed2b7c9eb7f71050091cbbd906c (patch)
treef029105802be58539d0951c406e4411872e799b3 /core/java/android
parent1b883e211807289c6c31a2443682f02030cc6ab6 (diff)
parenta5b15b25319e93e0dcb269ac28062d84332ff544 (diff)
Merge "Wipe device when COPE PO max password attemps exceeded"
Diffstat (limited to 'core/java/android')
-rw-r--r--core/java/android/app/admin/DevicePolicyManager.java15
1 files changed, 11 insertions, 4 deletions
diff --git a/core/java/android/app/admin/DevicePolicyManager.java b/core/java/android/app/admin/DevicePolicyManager.java
index d54fdbf8b81b..759979100483 100644
--- a/core/java/android/app/admin/DevicePolicyManager.java
+++ b/core/java/android/app/admin/DevicePolicyManager.java
@@ -3730,6 +3730,11 @@ public class DevicePolicyManager {
* requires that you request both {@link DeviceAdminInfo#USES_POLICY_WATCH_LOGIN} and
* {@link DeviceAdminInfo#USES_POLICY_WIPE_DATA}}.
* <p>
+ * When this policy is set by a device owner, profile owner of an organization-owned device or
+ * an admin on the primary user, the device will be factory reset after too many incorrect
+ * password attempts. When set by a profile owner or an admin on a secondary user or a managed
+ * profile, only the corresponding user or profile will be wiped.
+ * <p>
* To implement any other policy (e.g. wiping data for a particular application only, erasing or
* revoking credentials, or reporting the failure to a server), you should implement
* {@link DeviceAdminReceiver#onPasswordFailed(Context, android.content.Intent)} instead. Do not
@@ -3798,10 +3803,12 @@ public class DevicePolicyManager {
}
/**
- * Returns the profile with the smallest maximum failed passwords for wipe,
- * for the given user. So for primary user, it might return the primary or
- * a managed profile. For a secondary user, it would be the same as the
- * user passed in.
+ * Returns the user that will be wiped first when too many failed attempts are made to unlock
+ * user {@code userHandle}. That user is either the same as {@code userHandle} or belongs to the
+ * same profile group. When there is no such policy, returns {@code UserHandle.USER_NULL}.
+ * E.g. managed profile user may be wiped as a result of failed primary profile password
+ * attempts when using unified challenge. Primary user may be wiped as a result of failed
+ * password attempts on the managed profile on an organization-owned device.
* @hide Used only by Keyguard
*/
@RequiresFeature(PackageManager.FEATURE_SECURE_LOCK_SCREEN)