Page tree

Versions Compared


  • This line was added.
  • This line was removed.
  • Formatting was changed.


Application policies are business logic rules that you can apply to individual iOS and Android apps in your Apperian organization. Applying policies—also referred to as wrapping an app—is done post-development, without requiring any code changes or SDKs. Policies provide added layers of security, management, and measurement capabilities to support corporate requirements and enhance your users' mobile experience. For example, the Jailbreak Protection policy protects enterprise data by blocking users from running apps on jailbroken devices and the App Usage policy tracks an app's usage. 

When you wrap an app with policies, your choices are flexible; you can apply one policy or multiple policies.

See the List of Policies below for a description of all available policies.


How Policies Work

When you first apply policies to an app, Apperian creates an application wrapper that defines its policies. Through the Admin Portal, you can sign the wrapped app and deploy it to your users. 

Because the application wrapper is provided as a layer around the app, it does not alter the functionality or performance of the app, nor does it compromise the user experience in any way.  On the device, Apperian evaluates policies whenever the user opens the app. During that evaluation, action is taken as necessary. For example, if an app is wrapped with the Self Updating App policy, Apperian checks if there is a new version of the app available and prompts the user to install it if there is. 

titleOn This Page
Table of Contents

titleRelated Pages
Children Display



Apperian evaluates most application's policies whenever the user opens the app, brings it to the foreground, or returns to it from a locked screen. (With some policies, Apperian does not count multiple launches within a minute. These exceptions are described in the policy descriptions in Application Policies.) When evaluating policies, Apperian blurs the app screen and displays a spinner. To the user, this looks like part of the process of starting the app, and it is typically quite fast—sometimes the user will not even notice the spinner. Depending on the types of policies you have applied, you may wish to evaluate policies less frequently to improve the user's experience with the application. For instructions, see Set the Policy Evaluation Frequency.

When evaluating some application policies, Apperian will attempt to communicate with the server to fetch the latest settings. If you have an application that is wrapped with policies and connects to the network through a VPN, you should ensure that your VPN gateway can access the Apperian server. To obtain the IP address(es) you need to whitelist for your gateway, contact support@apperian Customer

To adapt to changing business needs or to take advantage of new application policies, you can modify the policies applied to an application—even after the app is already deployed to users. Most policy changes take effect immediately, but some require you to re-wrap the app and deploy an update to users. This depends on whether the policy you are adding or changing is a dynamic or static policy:

  • Dynamic policies are updated on the Apperian server. Once you have applied policies to the app, you can add and modify those dynamic policies “on the fly”—without having to rewrap, re-sign, or deploy an update. 
  • Static application policies are embedded in the application wrapper. If you add or change a static policy, you must rewrap the app. Whenever an app is rewrapped, you need to re-sign it and then deploy the update. 

When you apply policies, you do not need to think about whether a policy is static or dynamic; the Admin Portal guides you through the process and prompts you to sign and deploy an update if needed.

titleBest Practice

As a best practice, Apperian recommends that you reapply policies to any applications that have not been wrapped in six months or longer. This will ensure that your applications take advantage of any recent enhancements, fixes, and optimizations to the policy wrapper.  After you reapply policies to an application, you need to re-sign it and redistribute it to your users. For instructions, see Rewrap an Application.

Using Policies with Unregistered Users

Apperian supports a universal app distribution model that allows you to securely deploy and manage mobile apps through a variety of distribution methods. With some of these distribution methods, such as the App Catalog, Apperian will know the identity of the app user; that is, the user will be a registered, authenticated user with Apperian. With other methods, such as sending a Direct Install URL, mobile device users can download and install apps even if they are not registered and do not have the App Catalog installed.

If you want to apply policies to an app that you will distribute to unregistered users, you should enable the "No-Registration Policies" setting for your organization. When the "No-Registration Policies" setting is enabled, you will see an option on the Policies tab that, when selected, allows you to apply only those policies that work with unregistered users. 

The following policies are currently supported with unregistered users:

  • App Usage
  • Collect Crash Reports
  • Self Updating App
  • App Expiration
  • Secure Microtunnel
  • Local App Authentication
  • Encrypted Data at Rest
  • Data Sharing
  • Client Certificates
  • Server Certificates

Some policies will never be supported with unregistered users because they do not make sense in that context. For example, the purpose of the Enterprise SSO policy is to secure an app at launch time by prompting the user to authenticate using the same authentication method used when logging in to the App Catalog; therefore, it doesn't make sense to apply the Enterprise SSO policy to an unregistered user.


If you apply the Self Updating App policy to an application, you must also mark the application for Direct Install in order for an unregistered user to install the update. If the app is not marked for Direct Install, the user will still be prompted when an update is available, but an error will display if the user taps Yes to install it.

For instructions on enabling a document for Direct Install, see Enable Direct Install.

For instructions on enabling no-registration policies for your organization, see Enable No-Registration Policies.

List of Policies

Click on a policy in the table below for more information, including a description of the mobile user's experience when the policy is enabled. 

PolicyDescriptionDynamic/StaticWorks with Unregistered Users
App Usage

Tracks usage of an app.

Collect Crash Reports

When an iOS application crashes, a crash report is stored on the device. The report describes the conditions under which the application terminated, and is useful for debugging issues in the application. Any time an app wrapped with this policy crashes, Apperian collects the crash report from the device and lists it on the Crash Reports tab of the app’s details page. From that list, you can view reports and export reports to send to developers for further analysis.

Enterprise SSORestricts access to the application using the same authentication method configured for the Admin Portal (either built-in authentication or Single Sign-On). This policy is useful when, for example, an employee's device falls into the wrong hands; the unauthorized individual will not have credentials to log in to Apperian and will therefore be blocked from using the app.Dynamic


Authenticating the user is the purpose of the app.

Self Updating App

Allows an app to "self-update" at launch time by checking for a new version and prompting the user to install when one is available.

Data WipeEnables an administrator to delete all user data from an application on a selected device.DynamicNo
Runtime Integrity CheckCalculates the checksum of the app at runtime and compares it with the checksum stored in the database for that same version of the app. If the checksums do not match, the app will not open. This policy ensures that a user cannot run an app that was downloaded or installed incorrectly, or compromised in some way after it was installed.DynamicNo
Data Protection Enforcement (iOS apps only)

Ensures that an application can be used on a device only when its content is secured using Apple's iOS Data Protection. iOS Data Protection is a built-in capability that encrypts data stored on an iOS device whenever the device is locked.

Jailbreak/Root Protection  

Blocks users from running apps on jailbroken (iOS) or rooted (Android) devices.

App ExpirationBlocks users from running the application outside of a defined access period (start and end date).DynamicYes
Open Web PageOpens a browser window to a specified web page after the user opens the app a predefined number of times. Use this policy, for example, to administer a survey to collect feedback about an app after a user has opened the app 10 times. DynamicNo
Apple On-Demand VPN (iOS apps only)Establishes a pre-configured VPN connection and prompts for VPN credentials whenever the user opens the application. Use this policy to help prevent malicious apps from accessing your corporate network, and to ensure apps are used on a secure network only. To work, the device must be running iOS 8 or higher. Apps using this policy must be signed with a mobile provisioning profile that has the Personal VPN entitlement enabled.DynamicNo
Pulse Secure VPN (iOS apps only)

Establishes a pre-configured Pulse Secure® VPN connection and prompts for VPN credentials when the user opens the application. Use this policy to provide apps with access to resources in your secure corporate network. To use this policy, you need access to a Pulse Connect Secure VPN gateway and will need to provide a URL for connecting to that gateway.

Applications with this policy applied can run only on devices running iOS 8 or higher.

App Password (iOS apps only)Protects the application by requiring the user to enter a user-set password before granting access to the app. To work, the device must be running iOS 8 or higher.StaticNo
Check Location Services
(iOS apps only) 
Checks that Location Services are activated for the device and that Location Access is allowed for the app.DynamicNo


If a user installs an app that is wrapped with any of the above policies, and that user is later disabled or deleted, Apperian will block the user from running the app. 


The following policies use Blue Cedar Networks Mobile App Protection (MAP); the ability to apply these policies is disabled by default. If you are interested in applying MAP policies, contact your Apperian Account Manager at

All MAP policies are static.

Secure Microtunnel

Establishes a secure VPN connection between the application and your enterprise network's Atlas Gateway. You must have the Blue Cedar Networks Atlas Platform to use this platform.

Local App AuthenticationProtects apps by requiring the user to authenticate before opening the app. The user can authenticate with a user-set passphrase or a fingerprint (if fingerprint authentication is enabled for the policy and supported on the device).StaticYes
Encrypted Data at RestProtects each piece of application data before saving it on the mobile device. When the app needs an encrypted piece of data, the policy decrypts it on the fly.StaticYes
Data SharingPrevents data leakage by prohibiting the user from copying and pasting data between an app protected with this policy and other apps that are not protected with this policy.StaticYes

Client Certificates

Obtains a client certificate from your Atlas Gateway server and stores it on the user's device. The application can then present this certificate to sites it needs to access, thereby allowing the user to skip additional logins and have a smoother mobile experience. You must have the Blue Cedar Networks Atlas Platform to use this policy.StaticYes
Server CertificatesLets you upload one or more trusted SSL (X.509) certificates that the app can then use when establishing an SSL connection with the servers it needs to access. Similar to how browsers have a pre-installed list of trusted SSL certificates, this policy lets you pre-install a list of certificates on a per-app basis. StaticYes


While policies are supported with native iOS and Android apps only, the hybrid apps feature provides a way to also apply policies to web apps. A hybrid app delivers a web app as part of a native iOS or Android app. Therefore, like any other iOS or Android app, you can apply policies to it. For more information, see Hybrid Applications (Delivering a Web App as a Native App).

Application Policies Workflow

The following table describes the typical workflow for implementing app policies within an Apperian implementation.

StepFor instructions, see...

Define app policies defaults for your Apperian organization. Policy defaults represent your company's standard set of security and usage policies. You and other administrators can alter these settings, as necessary, when applying policies to a specific app.

Optionally, you can configure the frequency at which an application's policies will be evaluated. The default is Always, which evaluates policies whenever the user launches the app, brings it to the foreground, or returns to it from a locked screen.

If you plan to apply the Secure Microtunnel policy to any apps, during this step you will need to create one or more VPN connections.

Set Application Policy Defaults

Set the Policy Evaluation Frequency

Create a VPN Connection


Apply policies to a specific app. You apply most policies from the Policies tab on the app's Details page.

Apply Policies to an Application

Edit or Update an Application


Depending on which policies you applied, you may need to update the app in the Admin Portal to deploy the new version to your users. Apperian provides a system message indicating whether an update is required.

When an update is required, you need to sign the updated app. For more information, see About Signing.

Sign an App (Admin Portal)

Sign an App (Signing Package)

Policies Page

Use the Policies page of the Admin Portal to perform the following tasks:

  • Modify the default settings that display on the Policies tab for an app.
  • Create the VPN connections used with the Secure Microtunnel policy.
  • List which apps are currently wrapped with each policy

For instructions, see Set Application Policy Defaults and Create a VPN Connection.

Image Removed