Configure Company-Owned Android Tablets in Intune (Multi-App Kiosk Mode)

Created by Rohit Yadav, Modified on Tue, 16 Sep at 3:22 PM by Rohit Yadav

Configure Corporate-owned Android Tablets — Intune (Multi-App Kiosk + Entra Shared Mode)

Step-by-step guide for deploying shared, userless tablets with Microsoft Intune

Entra shared mode • Kiosk
Last edited: September 16, 2025
❓ Overview

This guide walks you through configuring corporate-owned Android tablets in Microsoft Intune using Multi-App Kiosk Mode with Microsoft Entra shared device mode.

  • ✔ Secure tablets
  • ✔ Lock them down for business use only
  • ✔ Enable shared, userless operation
? 1. License Requirements

Minimum license:

  • Microsoft 365 F1 (or higher: Business Premium, E3, E5)

F1 is designed for frontline/shared device scenarios and supports Intune kiosk configurations.

⚙️ 2. Prerequisites
  • ✅ Microsoft Intune tenant set up & MDM authority assigned
  • ✅ Admin access in Intune Admin Center & Microsoft Entra ID
  • ✅ APK file for your custom business app (LOB/private app)
  • ✅ Device reset and ready for enrollment
? 3. Publish & Assign Required Apps

3.1 Add Microsoft Apps

  1. Sign in to Intune Admin Center → https://intune.microsoft.comApps → All apps → Add
  2. Select Managed Google Play app→ Approve these apps:
    • Microsoft Intune
    • Microsoft Authenticator
    • Managed Home Screen
    • Microsoft Launcher
    • Intune Company Portal
    • Microsoft Outlook

3.2 Add a Private Custom App

  1. In Managed Google Play, go to Private apps → +
  2. Provide App Title and upload APK
  3. Important:
    • Package name must be globally unique
    • APK must not be debuggable
  4. Click Create, then Sync in Intune

3.3 Assign Apps

Assign all apps as Required to the Kiosk Device Security Group (created in step 4).

? 4. Create Security Group for Kiosk Devices
  1. Go to Entra ID → Groups → New group
  2. Configure:
    • Group type: Security
    • Membership: Assigned
    • Name: Android COBO Kiosk Devices
  3. Save the group

This group will be used for app assignment, configuration profiles, and enrollment profiles.

? 5. Create Enrollment Profile
  1. Go to Intune Admin Center → Devices → Android → Android enrollment
  2. Select Corporate-owned dedicated devices → Microsoft Entra shared mode
  3. Configure:
    • Profile Name: Company Owned Tab
    • Token type: Corporate-owned dedicated device with Microsoft Entra shared mode
    • Token expiration: 12–24 months
    • Device group: Android COBO Kiosk Devices
  4. Save & download the QR code
⚙️ 6. Create Device Restriction Policy (Multi-App Kiosk)
  1. Go to Intune Admin Center → Devices → Configuration profiles → Create profile
  2. Platform: Android Enterprise | Profile type: Device restrictions
  3. Configure restrictions:
    • Block: Screen capture, Camera, Bluetooth, USB transfer, Hotspot
    • Enable: Network escape hatch (recommended so admins can access network settings when required)
    • Password policy: Required, expires in 120 days, wipe after 10 failed attempts
  4. Kiosk Mode Settings:
    • Type: Multi-app
    • Allowed apps:
      • Microsoft Intune → com.microsoft.intune
      • Authenticator → com.azure.authenticator
      • Managed Home Screen → com.microsoft.launcher.enterprise
      • Microsoft Launcher → com.microsoft.launcher
      • Company Portal → com.microsoft.windowsintune.companyportal
      • Outlook → com.microsoft.office.outlook
      • Custom App → <package.name>
    • Lock home screen: Enabled
    • Orientation: Auto-rotate
  5. Assign to Android COBO Kiosk Devices group
? 7. Enrollment & Deployment
  • Reset tablet → Scan QR code → Auto-enroll
  • Device joins Android COBO Kiosk Devices group
  • Intune pushes:
    • Required apps
    • Device restrictions
    • Managed Home Screen
Tip (scale deployments): For bulk rollout, use Android Zero-Touch Enrollment (ZTE) or Knox Mobile Enrollment (KME) to pre-provision devices so they auto-enroll out of the box. QR enrollment is fine for small batches or test devices.
✅ 8. End-User Experience
  • Tablets boot into Managed Home Screen
  • Only whitelisted apps visible
  • Play Store, hotspot, USB, external storage, camera blocked
  • Apps auto-update over Wi-Fi
  • Security enforced:
    • Password every 24 hrs (or as configured)
    • Wipe after 10 failed attempts
? Troubleshooting & Common Issues

If something does not apply or an error occurs, try these checks first:

Device stuck at enrollment
• Verify QR code/token is not expired. Recreate enrollment token if needed. Ensure network connectivity during enrollment.
Apps not installing or appearing
• Confirm the app is approved in Managed Google Play, synced with Intune, and assigned as Required to the device group. Check device logs in Intune for install failure codes.
Managed Home Screen not launching
• Ensure kiosk profile is assigned and applied. Confirm "Lock home screen" is enabled and no conflicting profile is targeting the device.
Users can't sign in to apps
• For shared/userless mode ensure apps that require sign-in support accountless/shared workflows or configure single-app workflows. For app sign-in errors, check conditional access policies and network access.
Device not showing in the group
• Confirm enrollment profile targeted the same Entra group or device was added automatically — if membership is manual, add device to the group or change membership rule.
? Security & Compliance Notes
  • Devices are centrally manageable via Intune and typically require factory reset to remove from management (depending on manufacturer/OS).
  • Conditional Access policies can still be applied to apps (e.g., Outlook) if users sign in — test before deployment.
  • Consider adding DLP or App Protection Policies for email and document apps if sensitive data is accessed.
? Summary
  • ✔ Secure: Data protected, no external sharing
  • ✔ Locked down: Multi-app kiosk mode
  • ✔ Userless: Shared device with Entra shared mode
  • ✔ Centrally managed: Apps & policies via Intune
Quick Links & Resources

Administrative pages and useful reminders:

Checklist (before deployment)
  • Enrollment token created & QR downloaded
  • Apps approved in Managed Google Play & assigned
  • Device group created and targeted
  • Device restrictions and kiosk profile assigned
Admin note: For bulk provisioning request Zero-Touch or KME from your device reseller/manufacturer and upload the provisioning token in Intune.

Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article