Skip to main content

Kiosk Policy

Set kiosk app restrictions on GMA, KMA, and IMA devices to control app use and limit system features.

Updated yesterday

1. Purpose and Objectives

The Kiosk Policy module is designed to create and distribute application restriction strategies that help enterprises lock down devices to designated business apps, preventing unauthorized usage or app installation. Admins can configure different types of kiosk strategies based on device types (GMA / KMA / IMA), defining single- or multi-app modes, system function restrictions, and permission control mechanisms. This simplifies user operations, reduces maintenance costs, and enhances device compliance and security.

The platform supports two types of Kiosk policy configurations:

  • GMA Kiosk Policy: For GMA devices only. Supports configuration of Google Play public and private apps.

  • KMA Kiosk Policy: For KMA / IMA devices. Supports configuration of enterprise public, private, or web apps.

All strategies support options for default launch apps, dynamic permission controls, navigation bar restrictions, and access control for system settings. Deployment mechanisms include device range selection and scheduled release. Policies can be modified, disabled, or deleted at any time, supporting flexible lifecycle management.

Important Notes:

  • Each device type supports only its corresponding kiosk policy type; cross-type policies are not supported.

  • All apps included in a strategy must be in Published status.

  • Strategies support phased deployment methods such as canary or percentage-based rollout, suitable for large-scale or staged deployments.

  • Policy configurations are tightly bound to the target device type and do not support cross-device-type strategies.

Primary Operations:

Operation

Description

Create GMA Kiosk Policy

For GMA devices only. Configure Google Play public/private apps. Supports single/multi-app mode and system restrictions.

Create KMA Kiosk Policy

For KMA/IMA devices. Configure enterprise private, public, or web apps. Supports default launch, navigation restrictions, and permission control.

Secondary Operations:

Operation

Description

Submit

Submit a draft policy for approval, entering the "Pending Review" state (if approval workflow is enabled).

Approve

Admin reviews pending policies and approves or rejects them to determine policy activation.

View Details

View version history, configuration content, associated devices/groups, and logs for all policy types and states.

Edit

Create a new version of a published policy with updated configuration and scope. Archived versions are retained for audit purposes.

Push Policy

Manually deliver policy configurations to associated devices to enforce or reapply policies.

Enable/Disable

Toggle whether the policy is applied to devices. Disabling removes the policy from devices; enabling re-applies it.

Revert

Restore an archived policy to draft state for reuse or modification.

Delete

Permanently delete an archived policy. This action is irreversible.

Typical Use Cases:

  • Lock store-front devices to a single POS or ordering app to prevent misuse or entertainment app installations.

  • Enable navigation and permission restrictions for logistics and courier terminals, allowing only camera and scanner access.

  • Control system settings and notification access on government or medical institution devices for regulatory compliance.

  • Roll out kiosk strategies to new devices using phased or percentage-based deployments for testing and validation.

  • Partners can centrally push kiosk policies to demo units to ensure consistent demo content and device security.

2. Primary Operations

2.1 Create GMA Kiosk Policy

Description

The GMA Kiosk Policy is used to configure Google Play (public/private) apps to run in kiosk mode on GMA-type devices. Admins can define a list of allowed apps and set restrictions for device behavior, then distribute the policy to target devices to enforce secure and controlled usage.

GMA Kiosk policies only support Google Play public and Google Play private apps in "Published" status. They are suitable for single- or multi-app configurations in closed environments (e.g., POS or information terminals). Once configured, the policy will be pushed to designated devices based on the selected rollout plan and will take effect automatically.

KiwiCloud adopts a module-level merge with latest override strategy stacking mechanism to ensure policy consistency and flexibility. If the approval workflow is enabled, the policy must be approved before it takes effect.

Notes

  • Applicable to GMA devices only, not for KMA/IMA devices.

  • Supports only Google Play public and private apps, not enterprise private apps.

  • Each app can only be effective in one GMA Kiosk policy. The system follows a "module merge, latest override" logic.

  • All apps must be in Published status before they can be added.

  • Modules not configured in a policy will be excluded from deployment and stacking.

  • Policies are effective immediately upon release. It’s recommended to pilot-test in small batches.

  • If approval is enabled, policies enter "Pending Review" status and must be approved before activation.

  • Policies cannot be directly edited. Use the “Edit” function to create a new version.

  • The selected device scope and release time affect delivery timing. Plan according to device onboarding batches.

Steps

1. Access the Policy Management Page

  • Go to the App Policy module and click Create Policy.

  • Select GMA Kiosk Policy as the policy type.

2. Select Apps

  • In the App Selection screen, choose published apps from Google Play (public/private).

  • Only apps in Published status can be selected.

image-20250802162339965

3. Configure Device Restrictions

Device restriction settings are divided into two tabs: App Config tab and Device Restrictions tab, which together define device behavior and access permissions.

3.1 App Config Tab

image-20250802162553594

This tab includes the following modules:

  • App Configuration For apps supporting Android Enterprise Managed Configurations, you can set parameters (e.g., Slack workspace, email domain). These settings are delivered with the policy and applied automatically.

  • App Permissions Define how the system handles permission prompts:

    • Deny

    • Prompt

    • Grant

    Permissions include access to contacts, location, network status, camera, etc.

  • Accessibility Service Settings Optionally pre-authorize accessibility services for selected apps. Useful for automation and UI control apps. If not configured, users will be prompted to enable it manually.

3.2 Device Restrictions Tab

This tab defines system-level restrictions under the kiosk strategy, including:

  • Power Button: Allow or block use of the power button (shutdown, restart).

  • System Error Dialogs: Control whether system error prompts appear.

  • System Navigation: Define the appearance of the bottom navigation bar.

  • System Info & Notifications: Configure access to status bar and notifications.

  • Device Settings: Restrict or allow access to system settings.

Choose restrictions according to operational needs to ensure the device only runs authorized apps with proper isolation.

image-20250802162655090

4. Configure Distribution Scope

4.1 Distribution Plan

  • Immediately: Push the policy right after creation.

  • Scheduled: Choose a future time to release the policy.

4.2 Device Scope

  • All Devices: Apply to all GMA devices under the enterprise.

  • Phased Release: Manually select device groups or devices.

  • Percentage-Based Rollout: Randomly push to a defined percentage of devices.

image-20250802162733199

5. Submit the Policy

  • After configuration, click Submit.

  • If approval is not enabled, the policy will enter “Published” state and be delivered.

  • If approval is enabled, it enters “Pending Review” and requires admin approval to take effect.

image-20250802162807844

2.2 Create KMA Kiosk Policy

Description

The KMA Kiosk Policy is used to deploy enterprise private, public, or web applications on KMA/IMA devices and enforce single- or multi-app kiosk mode. This policy allows configuration of auto-launch, dynamic permissions, kiosk exit password, and system restrictions to ensure a secure, locked-down operating environment. It is commonly used in POS, demo, and self-service terminal scenarios.

The platform supports modular policy configuration. Each functional module (e.g., auto-launch, dynamic permissions) can be enabled or disabled as needed. Enabled modules participate in policy stacking on devices, while disabled modules do not. Policies can be distributed by device, device group, or in percentage-based rollouts, with support for immediate or scheduled delivery.

Notes

  • KMA Kiosk policies are only applicable to KMA / IMA devices, not GMA devices.

  • Supported app types include Enterprise Private Apps, Enterprise Public Apps, and Enterprise Web Apps only.

  • App version options:

    • Latest Version: The system will keep the installed app updated to the latest version;

    • Specified Version: The system will upgrade the app only if the current version is lower.

  • All related apps must be in Published status.

  • Disabled modules will not participate in device-side policy stacking or configuration.

  • Kiosk exit password can be set to allow operators to exit Kiosk mode when needed.

  • Upon submission, the policy enters Pending Review status and requires admin approval to take effect.

  • If the Policy Approval Workflow is disabled, the policy takes effect immediately upon submission.

Steps

1. Configure Basic Policy Information

  • Click Create Policy, and select KMA Kiosk Policy.

  • Enter the policy name (required).

  • Enable Compliance Check (recommended).

  • Select the deployment mode: Single App or Multi-App.

  • Select the apps and choose either Latest Version or Specified Version.

2. Configure App Behavior

2.1 App Configuration Tab

  • Set the Kiosk Exit Password (for cases like network disconnection or maintenance).

Tap the screen 8 times with two fingers within 5 seconds to open the exit interface and enter the password to exit Kiosk mode.

  • Configure the Auto Launch App (the app starts automatically on boot).

  • Configure Dynamic Permissions:

image-20250802163034484

image-20250802163045985

2.2 Device Restrictions Tab

Configure restrictions on system behavior, including:

  • Power Button Control: Whether to allow power button usage (e.g., shutdown, reboot).

  • System Error Dialogs: Display or suppress system error dialogs.

  • System Navigation: Control the bottom navigation bar display.

  • System Info & Notifications: Manage status bar and notification visibility.

  • Device Settings: Restrict access to system settings.

Choose the appropriate restrictions according to your use case to ensure the device only runs authorized applications and maintains the necessary security boundaries.

image-20250802163105884

3. Configure Policy Distribution Scope

3.1 Distribution Plan

  • Choose when to distribute the policy:

    • Immediately: Deliver the policy immediately after saving.

    • Scheduled Time: Set a specific time for deployment.

3.2 Device Scope

  • Select the devices the policy will apply to:

    • All Devices: All KMA/IMA devices under the enterprise.

    • Phased Release: Select specific devices or device groups.

    • Percentage-Based Release: Choose a percentage, and the system will randomly select devices.

image-20250802163131437

4. Submit the Policy

  • Click Submit to save the policy. The policy status will become Pending Review.

  • If approval is enabled, the policy must be approved by an admin before deployment.

  • If approval is disabled, the policy will take effect immediately after submission.

image-20250802163204697

3. Secondary Actions

3.1 Submit

Description

This operation is used to submit a Kiosk policy in draft status to the platform’s approval workflow. After submission, the policy status will change to "Pending Review" and must be approved by an administrator before it can be officially released to devices.

It applies to both KMA and GMA Kiosk policies when creating a new policy or submitting a modified version. If the approval workflow is disabled, the policy will skip the “Pending Review” step and immediately change to the “Published” status, ready for deployment.

Notes

  • Policies in draft status can be freely edited and saved. Once submitted, they can no longer be edited.

  • If the approval workflow is enabled (System Settings > Others > Approval Workflow Toggle), the policy must be approved before it becomes active.

  • If the approval workflow is disabled, the policy will immediately change to “Published” status upon submission.

  • The submission action does not include a second confirmation step — please ensure all policy details are correct before proceeding.

  • The submitted policy version will become the active version. The previous version will be archived as history.

Steps

  1. Access Draft Policies

    • In the "Kiosk Policy" module, filter for policies with the “Draft” status.

  2. Initiate Submission

    • Click the Actions button on the target policy, then select Submit.

  3. Complete Submission

    • The policy status will change to “Pending Review”;

    • If approval is disabled, the policy will automatically move to “Published” status and proceed to device deployment;

    • You can view the policy status and approval progress in the policy list.

3.2 Approve

Description

This action is used to review and approve a submitted Kiosk policy, determining whether it is allowed to proceed to the “Published” status and be deployed to target devices. Once approved, the policy configuration will take effect based on the defined release schedule and device scope. If rejected, the policy will revert to “Draft” status and require editing and resubmission.

This workflow applies when the organization has enabled the Kiosk Policy Approval Process, allowing manual control over policy publishing to enhance operational security and accuracy.

Notes

  • Approval is only applicable to policies in “Pending Review” status;

  • Once approved, the policy will immediately change to “Published” and be deployed according to the release schedule;

  • If rejected, the policy will revert to “Draft”, allowing further edits and resubmission;

  • If the approval workflow is disabled (System Settings > Others > Approval Workflow), policies will automatically skip this step and go directly to “Published” status upon submission;

  • Approval actions are irreversible — ensure the policy content, scope, and device impact are correct before proceeding;

  • All approval actions are logged in the policy’s operation history for audit purposes.

Steps

  1. Go to the Policy List

    • Navigate to the “Kiosk Policy” page and filter policies with the status “Pending Review”;

  2. Initiate Approval

    • Click the Approve button next to the target policy;

  3. Confirm the Approval Decision

    • In the confirmation popup, click either Approve or Reject:

      • Approve: The policy status changes to “Published” and will be deployed based on the schedule;

      • Reject: The policy returns to “Draft” status for further editing and resubmission;

  4. Complete Approval

    • The policy status will automatically update to reflect the result;

    • You can view the approval result and operation records in the “Policy Details” section.

3.3 Details

Description

This feature allows you to view detailed information about a specific Kiosk policy, including basic policy info, selected apps, configuration settings, release schedule, associated devices, and execution logs. It supports version history and tab-based browsing to help administrators review policy versions, monitor deployment status, and troubleshoot issues.

The details page displays both current and historical versions of all KMA / GMA Kiosk policies, with a modular breakdown of each configuration, serving as a key entry point for full policy lifecycle management.

Steps

  1. Access Policy Management

    • Navigate to the “Kiosk Policy” module;

    • Click the Details button next to the target policy to open the details page.

  2. View Policy Information

    The top section of the page displays key policy info:

    • Policy Name: The unique name identifying the policy;

    • Policy ID: A system-generated unique identifier;

    • Last Modified By / Time: Who last saved/submitted and when;

    • Last Deployment Time: The most recent time this policy version was pushed to devices;

    • Version History Switch: Allows viewing previous configuration versions;

    • Associated Groups: Number of device groups bound to the policy;

    • Associated Devices: Number of devices the policy has been deployed to.

  3. Browse Policy Content

    The details page includes several tabs to present the policy content in a structured way:

    • Selected Apps

      • Lists all apps included in the current policy;

      • Supports multi-app mode showing package names, app type (private/public/Web), and source;

      • Only published apps are displayed.

    • Policy Configuration

      Split into two subtabs: App Configuration and Device Restrictions.

      App Configuration:

      • Kiosk exit password settings;

      • Default launch apps (auto-launch on boot);

      • Dynamic permission toggle and assigned apps (with view details option);

      • Per-app settings for default launch, dynamic permission, and versioning;

      • Version control: latest version or specific version.

      Device Restrictions:

      • System behavior control options (power button, system navigation, notifications, error dialogs, settings access);

      • Each setting's status (enabled/disabled) is clearly shown;

      • Helps assess the strictness of kiosk environment settings.

    • Deployment Configuration

      • Shows the policy’s scheduled release time and deployment scope:

        • Release time: immediate or scheduled;

        • Deployment range: all devices / staged release / percentage-based release;

      • Lists targeted devices, filterable by name, model, or SN.

    • Operation Logs

      • Records key user actions on the policy, such as submit, approve, edit;

      • Shows operator, action type, timestamp, and execution result.

    • System Logs

      • Logs system-triggered events (e.g., policy edits, push events, version delivery);

      • Displays outcome, delay, and trigger time, useful for identifying system issues.

3.4 Edit

Description

This operation allows you to edit an existing KMA / GMA Kiosk policy, including changes to the policy name, selected apps, configuration settings, device restrictions, and release options. Each edit creates a new version, while the previous version is archived and becomes read-only.

After completing the edit, you may choose to Save the policy as a draft or Submit it for approval (if the approval flow is enabled). Once approved, the new version will replace the previous one and be pushed to the target devices, ensuring consistency and accuracy across deployments.

Notes

  • The edit action generates a new version; the previous version will be archived and cannot be edited;

  • All fields are editable, including selected apps, Kiosk configurations, and release settings;

  • Before editing, confirm the current policy status and affected device scope to avoid misconfiguration;

  • If the policy is in the Archived status, it must be Reverted to draft before editing;

  • After editing, you must Submit the policy for changes to take effect, following the approval flow;

  • All changes will be logged in the operation history;

  • Once edited, the system will re-calculate and apply the updated policy stack to all associated devices;

  • The updated policy will not be pushed to devices until it enters the “Published” state.

Steps

  1. Access the Policy List

    • Go to the Policy Center module;

    • Locate the target policy and click Actions > Edit;

  2. Edit Policy Content

    • On the edit page, update the following sections as needed:

      • Basic Info: Policy name, compliance check toggle;

      • Selected Apps: Add/remove apps, modify version (latest/specific);

      • App Configuration: Set default launch app, exit Kiosk password, dynamic permission settings;

      • Device Restrictions: Configure system navigation, status bar, power key, etc.;

      • Release Configuration: Adjust schedule and target devices (all / staged / percentage-based);

  3. Save or Submit

    • Click Save to store the policy as a draft for future submission;

    • Or click Submit to change the policy status to “Pending Approval”;

    • If the approval flow is disabled, submission will immediately publish the policy.

  4. View Version History

    • Switch between version numbers in the policy details page to compare configurations;

    • All edits will be recorded in both the Operation Log and System Log.

3.5 Deploy Policy

Description

This operation allows you to immediately push a Published Kiosk policy to its associated devices or device groups, ensuring the policy takes effect promptly on the device side. It is useful for first-time deployment, fixing policy delivery failures, or triggering manual sync.

The platform recalculates the policy stack based on the policy configuration and device status, and then pushes updates according to the appropriate delivery mechanism:

  • GMA Policies: Delivered via Google AMAPI. Once pushed, Google services manage the actual policy distribution.

  • KMA Policies: Pushed directly by KiwiCloud services. Delivery only occurs if the configuration has changed, avoiding redundant updates.

Notes

  • GP (Google Play) policy delivery depends on Google Management Services. Ensure AMAPI permissions and bindings are properly configured;

  • KC (KiwiCloud) policy will not be pushed again if there are no changes;

  • All push actions will trigger full policy stack recalculation on the target devices;

  • This operation only affects the device-side application of the policy, not its content;

  • All push events will be logged in the Operation Log and System Log;

  • Offline devices (GMA, KMA) will receive the policy once online; for IMA devices, policy instructions are cached temporarily and may expire if the device does not come online in time.

Steps

  1. Go to the Policy Management Module

    • Open the Kiosk Policy module and filter for policies in the Published status;

  2. Trigger the Deployment

    • Click Actions > Deploy Policy on the target policy row;

  3. Confirm the Prompt

    • In the confirmation window, review the policy name and the message. Click Confirm to proceed;

  4. Complete the Deployment

    • The system will immediately perform policy calculation and deliver it to the bound devices;

    • You can view the delivery results and timestamps in the System Log.

3.6 Disable Policy

Description

This operation is used to change a Published Kiosk policy to Disabled status. Once disabled, the system will automatically remove the corresponding policy modules from the policy stack on all associated devices, rendering the policy ineffective on the device side. However, the policy’s binding with devices or groups will be retained for future reactivation or archival.

This is applicable in scenarios where the policy is no longer needed, is being replaced by a new version, or needs to be temporarily suspended.

Notes

  • Only policies in "Published" status can be disabled;

  • Disabling a policy does not delete it — you may still edit, enable, or archive it later;

  • Once disabled, the system will immediately re-calculate the policy stack on all associated devices;

  • If no other valid policy modules exist for a device, the platform will attempt to push a default policy;

  • The policy will no longer be effective on any device but will retain version history and bindings;

  • All disable actions are recorded in the Operation Log and System Log for traceability.

Steps

  1. Go to the Policy List

    • Open the Kiosk Policy module and filter for policies with a Published status;

    • Click Actions > Disable Policy on the target policy row;

  2. Confirm Disable Action

    • A confirmation dialog will display the policy name and a warning message;

    • Click Confirm to proceed with disabling the policy;

  3. System Execution

    • The policy status will change from Published to Disabled;

    • The system will remove the policy module from the policy stack of all associated devices;

    • The disable operation and results will be recorded in the Operation Log.

3.7 Enable Policy

Description

This operation is used to reactivate a Disabled Kiosk policy and restore its effectiveness on associated devices. Once enabled, the system will reintroduce the policy into the policy stack for all bound devices or device groups and immediately push the configuration to them.

This is suitable for scenarios where a policy was temporarily disabled and needs to be reactivated, or when a previously paused deployment is to be resumed. Upon enabling, the policy returns to the Published state and is synchronized to all associated devices according to its original configuration.

Notes

  • Only policies in "Disabled" status can be enabled;

  • No resubmission or approval is required; the policy will directly return to the Published state;

  • Enabling does not alter the policy content or version number;

  • Once enabled, the system will re-calculate the policy stack and re-distribute the configuration to all bound devices;

  • If a device is offline, the instructions will be cached and applied once it comes online;

  • All enable actions are recorded in both the Operation Log and System Log for auditing and traceability;

  • It is recommended to confirm the current device environment and policy configuration before enabling to avoid conflicts.

Steps

  1. Go to the Policy List Page

    • Open the Kiosk Policy module;

    • Filter for policies with the Disabled status and locate the target policy;

  2. Initiate the Enable Operation

    • Click Actions > Enable Policy in the right-hand column of the target policy;

  3. Confirm the Prompt

    • In the confirmation dialog, verify the policy name and prompt details;

    • Click Confirm, and the system will execute the enable operation;

  4. System Execution

    • The policy status will change to Published;

    • The system will re-integrate the policy into the stack of all associated devices;

    • Configurations such as applications, permissions, and restrictions will be re-synchronized as defined in the policy;

    • You can view logs of the enable operation and distribution status in the Logs section.

3.8 Archive

Description

This operation is used to mark a no-longer-used Kiosk policy as Archived, signaling the end of its lifecycle. Once archived, the policy is removed from the main policy list and can no longer be edited, enabled, or pushed. It is moved to the Archived tab for retention and auditing purposes.

Archived policies remain accessible from the “Archived” tab, where administrators can perform Restore or Delete operations for better lifecycle and version control.

Notes

  • Only policies in Disabled status can be archived;

  • Archived policies are excluded from policy stack calculations — they will not be pushed or applied to devices;

  • Upon archiving, all associations between the policy and its devices, groups, and apps will be removed;

  • Archived policies retain their original configuration and version history and can be restored for reuse if needed;

  • All archive actions are logged in both Operation Log and System Log for audit tracking.

Steps

  1. Go to the Policy List Page

    • Open the Kiosk Policy module;

    • Filter for policies in Pending Review or Disabled status and locate the target policy;

  2. Initiate the Archive Operation

    • Click the Actions button on the right side of the target policy, then select Archive from the dropdown menu;

  3. Confirm the Prompt

    • In the confirmation dialog, verify the policy name;

    • Click Confirm, and the system will immediately archive the policy;

  4. System Execution

    • The policy status will change to Archived;

    • The policy will no longer appear in the main policy list;

    • You can view the archived policy and its configuration from the Archived tab;

    • All archive operations will be recorded in the Operation Log.

image-20250802164224597

3.9 Revert

Description

This operation restores a previously Archived Kiosk policy back to Draft status, allowing it to be edited and republished. After restoration, the policy retains all original configuration and version history, but device or device group bindings will not be automatically reverted and must be reconfigured manually.

The restored policy re-enters the policy lifecycle in draft status and can be modified, submitted, and reviewed again as needed.

Notes

  • Only policies in Archived status support the restore operation;

  • After restoration, the policy enters Draft status and must be submitted again before publishing;

  • Restoration does not alter the policy content or version information;

  • All restore actions are recorded in the Operation Log for audit purposes;

  • Restoring a policy does not re-establish push relationships to devices — manual resubmission is required.

Steps

  1. Open the Archived Policy List

    • Go to the Kiosk Policy module;

    • Click the Archived tab to view all archived policies;

  2. Initiate the Revert Operation

    • In the row of the target policy, click Actions > Revert;

  3. System Execution

    • The policy status is updated to Draft and moved to the “All” policy list;

    • All configuration and version information remains unchanged;

    • You can now continue editing or submitting the policy.

  4. Recommended Next Steps

    • To reuse the policy, go to the Draft list to complete editing and submission;

    • If the Kiosk Policy Approval Process is enabled, the restored policy will enter the Pending Review state after submission;

    • Once approved, the policy can be republished and pushed to devices.

3.10 Delete

Description

This operation is used to permanently delete Kiosk policy records in "Archived" status. The system performs a logical deletion — once deleted, the policy will no longer appear on any page and cannot be recovered.

The delete action is only available for policies in the “Archived” status and must be performed when there are no active device bindings. It is suitable for cleaning up obsolete or historical policy data.

Notes

  • Only policies in "Archived" status support deletion;

  • Deletion is irreversible — proceed with caution;

  • Once deleted, the policy will no longer appear in any policy list, and all log records related to it will also be removed;

  • If the policy might be reused, consider using Restore before deletion;

  • Deleting a policy does not affect existing configurations on devices, but it removes the ability to track the policy in the platform;

  • All delete actions will be recorded in the Operation Log, including the operator and timestamp.

Steps

  1. Open the Archived Policy List

    • Go to the Kiosk Policy module;

    • Click the Archived tab and locate the target policy;

  2. Initiate the Delete Operation

    • Click Actions > Delete on the target policy row;

  3. Confirm Deletion Prompt

    • In the confirmation dialog, review the prompt content;

    • Click Confirm to permanently remove the policy record;

  4. System Execution

    • The policy will be permanently deleted from the platform database;

    • It cannot be recovered by any means;

    • Deletion behavior can be traced in the Operation Log (retention duration depends on system settings).

4. Configuration Items

Kiosk policy configuration items are categorized based on device type (GMA / KMA) and follow a modular structure. Each module can be individually enabled or disabled. Once enabled, a module will participate in policy stacking and device-side calculation; if disabled, it is excluded from enforcement.

Modules are merged by name, and settings in the same module are combined using an overwrite strategy. The latest policy version takes precedence.

4.1 GMA Kiosk Policy Configuration Items

Configuration Item

Options / Description

Non-compliance Handling

When enabled, if a device is detected to be non-compliant (e.g., system restrictions altered), the system will execute predefined actions such as "Disable Device" or "Factory Reset".

This logic is centrally managed via System Settings → Compliance Settings, and the policy only acts as a trigger—not a controller of enforcement behavior.

App Permissions

Controls how app permission requests (e.g., camera, location, file access) are handled. Options include Prompt User, Auto Grant, or Auto Deny.

Overrides user choices to ensure consistent permission management and prevent accidental or improper permission usage.

Accessibility Settings

For apps that rely on Android Accessibility Services, this setting specifies which services are allowed.

Once enabled, the strategy will automatically activate the services on the device to minimize user involvement. Useful for apps requiring assistive input or auto-click functionality.

App Configuration

For apps supporting Android Enterprise managed configurations, administrators can define parameters such as Slack workspace URL or default usernames.

These settings will be pushed with the policy and applied automatically during app installation, improving deployment consistency and efficiency.

Power Button Control

Controls whether the power button (e.g., shutdown, reboot) is allowed. Default is Disabled to prevent users from exiting the policy environment.

- Allow: Power button functions normally;

- Disable: User cannot shut down or reboot the device via the power button.

System Error Dialog Box

Controls the visibility of system error pop-ups:

- Show: System error dialogs are shown;

- Shield: Suppresses all system error dialogs to avoid disrupting business operations.

System Navigation

Configures the display of bottom navigation buttons:
- Show Home and Overview Buttons;
- Show only the Home Button;
- Disable: Hides the entire navigation bar, suitable for fully locked-down environments.

System Info & Notifications

Controls the behavior of the status bar and notifications:

- Enable: Users can view status bar and notifications;
- Disable: Hides all status bar content and notifications;
- Show System Info Only: Displays only time, battery, and basic info.

Device Settings

Controls access to system settings:
- Allow: User can access system settings;
- Disable: Blocks all access to system settings to enhance policy enforcement.

App Release Plan

Defines when the policy will be pushed:
- Immediately: Push the policy immediately after submission;
- Scheduled Time: Push the policy at a specified time.

Device Deployment Scope

Defines which devices will receive the policy. Three options:
- All Devices (All GMA devices under the enterprise);
- Start Time (Specify device groups or manually selected devices);
- Proportional (e.g., 10%, 50%; system will randomly select devices to apply the policy). Useful for gradual rollouts and pilot testing.

4.2 KMA Kiosk Policy Configuration Items

Configuration Item

Options / Description

Non-compliance Handling

Emergency actions executed when the device does not meet policy requirements (e.g., system restrictions modified). Defined in System Settings → Compliance Settings. Options include Disable Device or Factory Reset.

App Version Selection

- Latest Version: Device automatically updates to the latest version when a new release is published. Updates use Immediate Update + Forced Installation + Wi-Fi First by default.

- Specific Version: Updates only occur if the local version is lower than the specified one.

Default Startup

Automatically launches the specified app at boot. If the default app is not yet installed, the system will install and launch it automatically. If the app is inactive for a set duration, it will be relaunched. Only one app can be set as the default launcher.

Dynamic Permissions

Preconfigure specific system-level permissions to enhance app priority and background behavior. Includes options like: USB permission exemption, reboot suppression, silent install, accessibility auto-enable, LMK protection, floating window permission, etc.

Exit Kiosk Password

Set a password to exit Kiosk mode, useful in offline, maintenance, or troubleshooting scenarios.

Tap the screen with two fingers 8 times within 5 seconds to open the exit dialog, then enter the password.

Power Button Control

Controls whether the power button (e.g., shutdown, reboot) is allowed. Default is Disabled to prevent users from exiting the policy environment.

- Allow: Power button functions normally;

- Disable: User cannot shut down or reboot the device via the power button.

System Error Dialog Box

Controls the visibility of system error pop-ups:

- Show: System error dialogs are shown;

- Shield: Suppresses all system error dialogs to avoid disrupting business operations.

System Navigation

Configures the display of bottom navigation buttons:
- Show Home and Overview Buttons;
- Show only the Home Button;
- Disable: Hides the entire navigation bar, suitable for fully locked-down environments.

System Info & Notifications

Controls the behavior of the status bar and notifications:

- Enable: Users can view status bar and notifications;
- Disable: Hides all status bar content and notifications;
- Show System Info Only: Displays only time, battery, and basic info.

Device Settings

Controls access to system settings:
- Allow: User can access system settings;
- Disable: Blocks all access to system settings to enhance policy enforcement.

App Release Plan

Defines when the policy will be pushed:
- Immediately: Push the policy immediately after submission;
- Scheduled Time: Push the policy at a specified time.

Device Deployment Scope

Defines which devices will receive the policy. Three options:
- All Devices (All GMA devices under the enterprise);
- Start Time (Specify device groups or manually selected devices);
- Proportional (e.g., 10%, 50%; system will randomly select devices to apply the policy). Useful for gradual rollouts and pilot testing.

Did this answer your question?