Skip to main content

Android KIOSK Policy

Updated over a week ago

The Android Kiosk Policy allows organizations to configure a locked-down, restricted-use environment on managed Android devices.
Kiosk mode can be used for single-app, multi-app, or custom-launcher kiosk experiences, ensuring users can only interact with approved apps and system features.

This policy is ideal for corporate-owned devices used for point-of-sale systems, logistics terminals, digital signage, workforce tools, and other dedicated-purpose deployments.

Minimum Requirements: Android 9+


What This Policy Does

With this policy you can:

  • Enable a Kiosk Custom Launcher

  • Restrict system navigation (Home, Back, Overview)

  • Control availability of Settings, Power button actions, Status bar, and System error warnings

  • Design a highly controlled kiosk environment for security, productivity, and compliance


Settings Overview

Below is a description of each configuration option available in the Android Kiosk Policy.


1. Enable Kiosk Custom Launcher

Description:
Enables the custom launcher for kiosk mode.
When set to true, the device will use a Swif.ai-managed launcher that enforces kiosk restrictions—ideal for single-app or multi-app lockdown.

When enabled:

  • Only allowed apps will be visible

  • System UI elements are restricted

  • Device navigation is controlled

  • Users cannot exit kiosk mode without admin override

Minimum Requirements: Android 9+


2. Kiosk Customization → Device Settings Access

Controls whether the user can access the Android Settings app while in kiosk mode.

Options vary by deployment configuration, but typical values include:

  • Allowed — Settings app can be opened

  • Blocked — Settings app is not accessible

  • Limited — Only certain settings may be available (OEM-dependent)

Use case: Prevent users from altering Wi-Fi, Bluetooth, security, or system configurations.


3. Kiosk Customization → Power Button Actions

Defines how the device behaves when a user presses or long-presses the power button in kiosk mode.

Common behavior settings include:

  • Disabling the shutdown menu

  • Preventing users from restarting the device

  • Allowing only a long-press power-off sequence (if required)

Purpose: Avoid unauthorized reboots, shutdowns, or attempts to exit kiosk mode.


4. Kiosk Customization → Status Bar

Controls visibility of the system status bar and notifications.

Options typically include:

  • Enabled — Status bar visible

  • Disabled — Status bar hidden and notifications blocked

Recommendation: Disable for a tamper-proof kiosk experience.


5. Kiosk Customization → System Error Warnings

Determines whether system error dialogs are shown in kiosk mode.

  • When disabled, system error dialogs (e.g., “App Not Responding”) are blocked

  • If a kiosk app becomes unresponsive, the system may automatically force-stop or restart the app instead

This ensures end users cannot interact with error pop-ups to escape kiosk restrictions.


6. Kiosk Customization → System Navigation

Controls which system navigation elements remain usable.

Examples include:

  • Full navigation — Home, Back, Overview enabled

  • Restricted navigation — Only Back enabled

  • Navigation disabled — No system navigation available

Important:

  • To disable the Home button, systemNavigation must be set to NAVIGATION_DISABLED.

  • The kiosk launcher must not be configured with NOTIFICATIONS_AND_SYSTEM_INFO_ENABLED simultaneously, depending on OEM restrictions.


Example Real-World Use Cases

Single-App Kiosk

A logistics handheld scanner running only one inventory app, with:

  • Navigation disabled

  • Status bar hidden

  • Settings blocked

Multi-App Kiosk

A retail device allowing only POS and inventory apps:

  • Custom launcher enabled

  • Controlled access to Settings

  • Limited navigation

Public Display Mode

A digital signage tablet:

  • Power button disabled

  • Error messages suppressed

  • Status bar disabled


Summary

The Android Kiosk Policy provides granular control to lock down Android devices and ensure they operate strictly within the intended business purpose.

With the ability to control launchers, system navigation, settings access, power actions, error handling, and UI visibility, organizations can deploy secure, stable, and tamper-proof kiosk devices at scale.

Did this answer your question?