Kiosk Policy
The Kiosk Policy profile empowers IT administrators to enforce a secure kiosk mode on Linux devices by restricting access to a predefined list of permitted applications. This ensures that the enrolled devices operate within a controlled environment, limiting user interactions to authorized applications only.
This feature is supported only on Ubuntu 18.04 LTS and above.
To lock down the enrolled devices with an allowed list of application(s), follow these steps:
1. Navigate to the SureMDM Web Console > Profiles > Linux > Add > Kiosk Policy > Multi App Mode/Single App Mode.
2. Enter a Profile Name and click Add.
3. On the Multi App Mode prompt, Select the application(s) from App name drop-down list, select the required options Run at startup and Run At User Switch, and then click Add.
The added application(s) will be listed under the Multi App Mode section.
or
4. On the Single App Mode prompt, enter following details
- Lockdown Application - Chrome
Note: Currently Single App Mode is supported only for Chrome.
- Landing URL - URL that needs to be opened when in Kiosk Mode.
- Auto-Login to Kiosk Mode - Enabling this option allows the device to login automatically into Kiosk mode without user interaction.
- User name - Enter the username used to login to Kiosk mode.
- Password - Enter the password for provided username
Note :A new account will be created with the specified username and password if it doesn't already exist. If the account is present, the password will be updated
- Enable Admin Access - Account created above for Kiosk mode will be granted admin privileges.
- Auto-Launch Kiosk mode with restart - A device reboot is required to launch the application in Single app Kiosk mode. If unchecked, the administrator must create a run script job to initiate the device reboot for Kiosk mode.
4. Go back to the Home tab and select Linux device(s) or group(s).
5. Click Apply to launch the Apply Job/Profile To Device prompt.
6. In the Apply Job/Profile To Device prompt, select the job and click Apply.