Infeasible
Status Update
Comments
ad...@google.com <ad...@google.com>
ad...@google.com <ad...@google.com> #2
Thank you for reporting this issue. For us to further investigate this issue, please provide the following additional information:
Please provide sample project or apk to reproduce the issue. Also mention the steps to be followed for reproducing the issue with the given sample project or apk.
Android bug report (to be captured after reproducing the issue)
For steps to capture a bug report, please refer:https://developer.android.com/studio/debug/bug-report#bugreportdevice
Alternate method
Navigate to “Developer options”, ensure “USB debugging” is enabled, then enable “Bug report shortcut”. Capture bug report by holding the power button and selecting the “Take bug report” option.
Note: Please upload the files to google drive and share the folder to android-bugreport@google.com, then share the link here.
Please provide sample project or apk to reproduce the issue. Also mention the steps to be followed for reproducing the issue with the given sample project or apk.
Android bug report (to be captured after reproducing the issue)
For steps to capture a bug report, please refer:
Alternate method
Navigate to “Developer options”, ensure “USB debugging” is enabled, then enable “Bug report shortcut”. Capture bug report by holding the power button and selecting the “Take bug report” option.
Note: Please upload the files to google drive and share the folder to android-bugreport@google.com, then share the link here.
ge...@gmail.com <ge...@gmail.com> #3
ge...@gmail.com <ge...@gmail.com> #4
I created a test account that you can use. These are the steps.
1. Please install Mobile@Work from Google Play.
2. To register please launch it and tap on "Or register with server URL"
3. Entereapp069.auto.mobileiron.com as server URL.
4. On next screen enter user name test and password Qwerty12
5. Go though provisioning, acquiring Device Admin, grant or deny location permission.
6. Certificate provisioning will start and you will see the issue.
1. Please install Mobile@Work from Google Play.
2. To register please launch it and tap on "Or register with server URL"
3. Enter
4. On next screen enter user name test and password Qwerty12
5. Go though provisioning, acquiring Device Admin, grant or deny location permission.
6. Certificate provisioning will start and you will see the issue.
ad...@google.com <ad...@google.com> #5
Sorry for late reply. If you are still facing this issue with latest Android 11 beta then please share video & bug report.
Links in comment #3 & credentials in comment #4 are not working.
Links in
er...@google.com <er...@google.com> #6
FYI, MDM apps should use DevicePolicyManager.installCaCertificate rather than prompt the user for installation.
ad...@google.com <ad...@google.com> #7
Please provide the information requested in comment #5
ad...@google.com <ad...@google.com> #8
We are closing this issue as we don't have enough actionable information. If you are still facing this problem, please open a new issue and add the relevant information along with reference to earlier issue.
pi...@gmail.com <pi...@gmail.com> #9
What is the suggested approach for normal non-MDM applications that want to prompt users to install a CA certificate?
I maintain an Android debugging tool for developers, which acts as a VPN and uses this API to prompt users to install the CA for HTTPS inspection. This is going to break that completely.
Is this change documented somewhere?
I maintain an Android debugging tool for developers, which acts as a VPN and uses this API to prompt users to install the CA for HTTPS inspection. This is going to break that completely.
Is this change documented somewhere?
er...@google.com <er...@google.com> #10
Non-MDM apps could, for example, take the following approach:
* Write the CA certificate to the Download media collection.
* Prompt the user to go to Settings to install the certificate from the Download media collection.
The functionality of installing a CA certificate manually by the user isn't going away. But to make sure the user gets adequate explanation on the implications, this is only possible via settings. See bug 139153251 .
* Write the CA certificate to the Download media collection.
* Prompt the user to go to Settings to install the certificate from the Download media collection.
The functionality of installing a CA certificate manually by the user isn't going away. But to make sure the user gets adequate explanation on the implications, this is only possible via settings. See
ad...@google.com <ad...@google.com>
ad...@google.com <ad...@google.com>
[Deleted User] <[Deleted User]> #11
البطاريه لاتشحن تظهر لي علامة حرارة الهاتف مرتفعه والجواب له اسبوع مقفل ولايقبل الشحن
sa...@gmail.com <sa...@gmail.com> #12
PD2201EF_EX_A_13.1.13.1.W30.V000L1
sa...@gmail.com <sa...@gmail.com> #13
PD2201EF_EX_A_13.1.13.1.W30.V000L1
my...@gmail.com <my...@gmail.com> #14
Is this getting fixed? Just curious, trying to stay loyal to Android :-)
be...@gmail.com <be...@gmail.com> #15
I can't select a certificate from my files
am...@google.com <am...@google.com> #16
Request you to raise a new bug if it exists in recent releases.
Thanks.
Thanks.
ga...@gmail.com <ga...@gmail.com> #17
CA certificates are used by websites, apps and VPNs for encryption. Only install CA certificates from organisations that you trust.
If you install a CA certificate, the certificate owner could access your data, such as passwords or credit card details, from websites that you visit or apps that you use even if your data is encrypted.
If you install a CA certificate, the certificate owner could access your data, such as passwords or credit card details, from websites that you visit or apps that you use even if your data is encrypted.
mr...@gmail.com <mr...@gmail.com> #18
Your data won't be private
CA certificates are used by websites, apps, and VPNs for encryption. Only install CA certificates from organizations you trust.
If you install a CA certificate, the certificate owner could access your data, such as passwords or credit card details, from websites you visit or apps you use even if your data is encrypted.
CA certificates are used by websites, apps, and VPNs for encryption. Only install CA certificates from organizations you trust.
If you install a CA certificate, the certificate owner could access your data, such as passwords or credit card details, from websites you visit or apps you use even if your data is encrypted.
Description
"Can't install CA certificates. CA certificates can put your privacy at risk and must be installed in Settings."
Please clarify. Was this functionality deprecated? How it should be worked around for existing MDM setups?