System requirements

This article includes the system requirements for the MDX Toolkit and the MAM SDK. For more information about the MAM SDK APIs, see the developer documentation for Mobile Application Integration.

MDX Toolkit and MDX App SDK (iOS and Android)

  • Java Development Kit (JDK) 1.7 or 1.8.

    You can download the JDK 1.8 from Java SE Development Kit Downloads on the Oracle web site. For installation instructions, see the JDK 8 and JRE 8 Installation Guide on the Oracle web site. Be sure to install the full JDK; set JDK 1.8 as the default.

  • macOS 10.10

    The installer for the MDX Toolkit and MDX App SDK must run on macOS. The installer includes macOS tools that wrap both iOS and Android apps, as well as a Java command-line tool that wraps Android apps.

  • For the MDX App SDK: iOS 11 or later with Xcode 9, with bitcode generation disabled. (We recommend that you use the most recent version of Xcode that is available from Apple.)

    Bitcode generation is on by default. You must disable it to use Xcode 9 with the MDX App SDK.

Other requirements for wrapping iOS mobile apps

  • To obtain access to the app wrapping prerequisites for iOS, you must register for an Apple distribution account. There are three types of iOS developer accounts: Enterprise, Individual, and University. Citrix strongly recommends iOS Developer Enterprise accounts.
    • iOS Developer Enterprise accounts: The only type of Apple Developer account that allows you to provision, deploy, and test unlimited apps to unlimited devices, with or without app wrapping. Be sure to distribute your Developer Certificate to your developers so they can sign apps.
    • iOS Developer Individual accounts: Limited to 100 registered devices per year and do not qualify for app wrapping and enterprise distribution with Citrix Endpoint Management.
    • iOS Developer University accounts: Limited to 200 registered devices per year and do not qualify for app wrapping and enterprise distribution with Endpoint Management.

Note:

Download the Xcode command-line tools from the Xcode Apple Developer web site. macOS 10.10 does not install the tools automatically. To install the tools, follow these steps:

  1. In Applications > Utilities, click Terminal to use the Mac command-line interface.

  2. Type the following command:

    xcode-select --install
    <!--NeedCopy-->
    

    Be sure to include two hyphens before the word install in the command.

  3. After the Xcode command-line tools install, run Xcode to install any pre-requisites.

Other requirements for wrapping Android mobile apps

  • Android Software Development Kit (SDK), API Level 21 (minimum supported version).

    • Download the Android SDK from the SDK download page on the Google developer website.

    • Install the latest Android SDK Tools, Android SDK Platform-tools, and Android SDK Build-tools.

      For details, see Installing the Android SDK on the Google developer website.

    • Edit the android_settings.txt file located in the MDX Toolkit installation folder. Set the PATH variable to include the Android SDK Build Tools to be used during wrapping. Add the path to the platform-tools and tools subdirectories of the Android SDK. See the following example:

      PATH = /Users/Sample/Downloads/android-sdk-macosx/platform-tools:/Users/Sample/Downloads/android-sdk-macosx/build-tools/28.0.2:/Users/Sample/Downloads/android-sdk-macosx/tools

  • Valid keystore (containing digitally signed certificates used to sign your Android apps)

    You create a keystore one time and retain this file for current and future wrapping. If you do not use the same keystore when wrapping the new version of an app you previously deployed, upgrades of that app won’t work. Instead, users need to manually remove the older version before installing the new version.

    A keystore can contain multiple private keys; in most cases, the keystore will only have one key.

    For details about certificates, see Signing Your Applications on the Android Developers website.

    You must sign your apps with a key that meets the following guidelines:

    • 2048-bit key size
    • DSA key algorithm (-keyalg)
    • SHA1 with DSA signing algorithm (-sigalg)
System requirements