Citrix Endpoint Management

App access device policy

The app access device policy allows you to define a list of apps that must be installed, can be installed, or must not be installed. If the apps on a device contradict this policy, Endpoint Management marks the device as out of compliance. You can then create an automated action to react to that device compliance.

Important:

The app access device policy does not prevent a user from installing a forbidden app or uninstalling a required app.

You can only configure one type of access policy at a time. Each policy contains a list of required apps, suggested apps, or forbidden apps, but not a mix within the same app access policy. If you create a policy for each type of list, name each policy carefully, so you know which policy applies to which list of apps.

To add or configure this policy, go to Configure > Device Policies. For more information, see Device policies.

iOS and Android (legacy DA) settings

  • Access policy: Select the type of list to configure for this policy.
    • Required: The app must exist on the device. If the app doesn’t exist, the device is marked as out of compliance. Required is the default option.
    • Forbidden: The app must not exist on the device. If the app does exist, the device is marked as out of compliance.
  • To add one or more apps to the list:
    1. Click Add and then configure the following:
      • App name: Enter an app name.
      • App Identifier: Enter an optional app identifier.
    2. Click Save.
    3. Repeat these steps for each app you want to add.

Configure automated actions based on app access compliance

  1. Add an app access policy to require or forbid apps.
  2. Configure two automated actions based on whether the apps in question are required or forbidden:
    • Required
      • Mark a device as out of compliance if a required app doesn’t exist on the device.
      • Mark a device as compliant once that required app is installed.
    • Forbidden
      • Mark a device as out of compliance if a forbidden app exists on the device.
      • Mark a device as compliant once that forbidden app is no longer installed. For information on setting up automated actions, see Automated actions.
  3. Create a restriction policy with the settings you want to implement on out of compliance devices.
    1. As part of the restriction policy, add an advanced deployment rule with the options Limit by a Boolean device property, Out of Compliance, and True. See Restrictions device policy. Restriction policy advanced deployment rule for compliance actions
  4. Create a profile removal policy to remove the restriction policy once the device is back in compliance.
  5. Add an advanced deployment rule with the options Limit by a Boolean device property, Out of Compliance, and False. See Profile removal device policy.
App access device policy