diff options
| author | 2021-11-16 15:49:59 +0000 | |
|---|---|---|
| committer | 2021-11-23 15:06:10 +0000 | |
| commit | 26e6dd5a4af6ac1317406146b0edd5f62875e64b (patch) | |
| tree | a44b602407da01be62ffe531502f910718fcfd10 | |
| parent | 679b589a36eec4075a1c6a7689202aac977e3da8 (diff) | |
Clarify deprecation docs for DPM.setPasswordQuality()
Clarify that the API is still available and not deprecated
for company-owned devices.
Bug: 194986764
Test: make docs
Change-Id: I3fd6179acfc1d42ed335788acbe129f4f3925834
| -rw-r--r-- | core/java/android/app/admin/DevicePolicyManager.java | 5 |
1 files changed, 4 insertions, 1 deletions
diff --git a/core/java/android/app/admin/DevicePolicyManager.java b/core/java/android/app/admin/DevicePolicyManager.java index 4051cc9b79ba..9a02b8551e55 100644 --- a/core/java/android/app/admin/DevicePolicyManager.java +++ b/core/java/android/app/admin/DevicePolicyManager.java @@ -3450,7 +3450,10 @@ public class DevicePolicyManager { * Setting custom, overly-complicated password requirements leads to passwords that are hard * for users to remember and may not provide any security benefits given as Android uses * hardware-backed throttling to thwart online and offline brute-forcing of the device's - * screen lock. + * screen lock. Company-owned devices (fully-managed and organization-owned managed profile + * devices) are able to continue using this method, though it is recommended that + * {@link #setRequiredPasswordComplexity(int)} should be used instead. + * * @param admin Which {@link DeviceAdminReceiver} this request is associated with. * @param quality The new desired quality. One of {@link #PASSWORD_QUALITY_UNSPECIFIED}, * {@link #PASSWORD_QUALITY_BIOMETRIC_WEAK}, |