Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
This describes how IT administrators can prepare and complete a migration from Android Device Administrator to the new mobile device enrollment (MDM) method called Android Open Source Project (AOSP) Device Management for Teams Android Devices. This new MDM enrollment method replaces the legacy Device Administrator enrollment method and serves as the basis for new features and functionality. For this migration to be successful, IT administrators have specific actions they must take and all of which are covered in this article.
This article covers:
- Setting up new AOSP Device Management enrollment profiles
- Creating new Intune compliance policies
- Things to consider before deploying migration firmware
- Deploying the new AOSP Device Management firmware
Note
These steps are specific to Teams Android devices (Teams Rooms on Android, Teams phone, & Teams Panels). If you have non-Teams devices, refer to the Intune guidance for setting up profiles: Set up Android (AOSP) device management in Intune for corporate-owned user-associated devices - Microsoft Intune | Microsoft Learn
Prerequisites
To migrate from Android Device Administrator to Android AOSP Device Management, you need:
- Intune licenses assigned to your Teams Android devices.
- Teams Android Devices deployed which are enrolled using Device Administrator.
- Teams Android Devices that are supported with AOSP Device Management. Confirm with this article for the full list of unsupported devices: Moving Teams Android Devices to AOSP Device Management
- Intune & Teams Device administrative permission.
Important
Organizations using Teams Rooms Basic licenses or that disable the Intune license on accounts don't enroll their devices in Intune. In that case, there's no need to set up an enrollment profile. Just upgrade devices to the AOSP Device Management capable firmware at release to stay current on firmware.
Step 1 - Set up a new AOSP device management enrollment profile
In order for Teams Android Devices to enroll in AOSP Device Management successfully, an enrollment profile must be created.
Setup AOSP management enrollment profiles
Sign in to the Intune Management Console using an account with Intune administrator permissions: https://intune.microsoft.com/.
Select Devices > Enrollment > then Android.
Under Android Open Source Project (AOSP) > Enrollment Profiles, select Corporate-owned, user-associated devices.
Select Create policy.
Use the following settings for the profile configuration:
- Name: Give the profile a name like 'AOSP – Teams Devices'.
- Description: Put in a description so others in the organization know what this enrollment profile is used for.
- Token expiration date: This defaults to 65 years into the future and is best left at 65 years to avoid expiration.
- Wi-Fi: Select Not configured.
- For Microsoft Teams devices: Select Enabled.
Note
There is a limit of one enrollment profile per tenant which can have the For Microsoft Teams devices toggle set as Enabled. An expired enrollment token prevents devices from completing a successful sign-in and blocks new devices from enrolling.
- Select Next.
- Review the profile and then select Create.
The enrollment profile is now ready to enroll devices.
Step 2 - Set up AOSP Device Management Compliance Policies (if necessary)
If your organization uses Conditional Access with Intune Compliance as a requirement for successful sign in, you need to create a compliance policy and assign it to ensure devices are marked compliant post migration. If you don't create a compliance policy while requiring compliance as an authentication factor, the device will sign out after migration.
Create a AOSP Device Management Compliance Policy
- Sign in to the Intune Management Console with an account with Intune administrator permissions: https://intune.microsoft.com/.
- Select Devices > Compliance, then Create policy.
- Under Platform > Android (AOSP), then select Create.
- Provide a name and description for the policy.
- Select Next.
- Under Device Health set 'Rooted Devices' to Block.
- Under Device Properties set the 'Minimum OS version' and 'Maximum OS version' to match devices in your organization.
- Under System Security set 'Require encryption of data storage on device' to Yes.
- Select Next, then select Next.
- Assign this profile to all devices in the organization or a group of devices.
- Select Next, then select Create.
Note
The above compliance policy is just an example of conditions you can set, the full list of supported compliance conditions is available in Supported Conditional Access and Intune device compliance policies
In step 10, selecting "All Devices" only assigns this compliance policy to all devices in your organization enrolled using AOSP DM. In most scenarios, this is acceptable as Teams Android devices are the first large group of devices using AOSP DM. If you have other AOSP DM enrolled devices, ensure you don't have conflicting compliance policies or assign your policies to groups of devices instead.
Step 3 - Considerations before deploying AOSP DM capable migration firmware
- There's no end user noticeable change on a device after this migration is completed.
- Firmware capable of completing this migration is being released over several months, review to our Tech Community article for firmware availability and more information on this migration: Moving Teams Android Devices to AOSP Device Management
- This migration is intended to be completed without any user intervention. However, if your organization conditional access policies require user-interactive multi-factor authentication, after the migration, your device will be signed out and the user needs to sign in their device.
- If any of your Teams devices are signed in using an account configured as a Device Enrollment Manager (DEM) account, you must remove the account as a DEM account before completing this migration: Device Enrollment Manager.
- Device Code Flow (DCF) (also known as microsoft.com/devicelogin) no longer supports user-interactive MFA. If user-interactive MFA is enforced with conditional access policies, users will need to log in on their device directly not via the web to ensure the MFA prompt appears.
Step 4 - Complete the migration by deploying AOSP Device Management capable device firmware
As supporting firmware is released, IT admins can install the firmware on their devices via Teams admin center. This firmware update completes the migration.
Important
Devices must be running the latest non-AOSP DM firmware and Teams application before AOSP DM capable firmware shows in the Teams admin center as an update. If a AOSP DM capable firmware has been released but you see a different firmware or app update available in the Teams admin center, you must complete the update(s) before the AOSP DM firmware update are available to install.
How to update a device
- Sign in to Microsoft Teams admin center with an account with Teams device administrator permissions: https://admin.teams.microsoft.com/.
- Select Teams then Devices.
- Select the desired device type.
- Select the display name of the device you wish to update.
- Select Update software.
- Open Manual updates.
- Select the new firmware update labeled with AOSP, then you can choose to update immediately or during a maintenance window.
- Select Update.
- Allow time for your device to update.
Once the device updates, it should automatically sign back in to Teams and function as normal.
How to confirm the migration was successful
- Log in to Microsoft Teams admin center with an account with Teams device administrator permissions: https://admin.teams.microsoft.com/.
- Select Teams, then select Devices.
- Select the desired device type.
- Select the display name of the device you wish to update.
- Select History.
- Look for a recent Software update action and confirm the status is Successful.
- When it's successful, select the Health tab.
A 'Microsoft Intune App' and 'Authenticator App' should be listed under software type which confirms that the device is now running an AOSP Device Management capable firmware.