- 23 Oct 2024
- 1 Minute to read
- DarkLight
Root detection
- Updated on 23 Oct 2024
- 1 Minute to read
- DarkLight
On Android and iOS, Mobile Authenticator Studio can be configured to prevent execution on rooted or jailbroken devices. By embedding a signature file that lists residual traces of the rooting process, Mobile Authenticator Studio can detect if a device was rooted. The signature file is embedded in the Mobile Authenticator Studio application during the customization process.
Mobile Authenticator Studio can be configured to react to root detection according to the following policies:
Mobile Authenticator Studio ignores the rooting status of the device. In this case, the application can value a mask in each URL that is used to inform a server of the device’s rooting status. For more information about the Rooting Status mask in URLs, refer to the Mobile Authenticator Studio Integration Guide.
Mobile Authenticator Studio refuses to start if the device is rooted. In this case, if the device is rooted upon application start, Mobile Authenticator Studio displays a customizable message to inform end users that their device is rooted and that the application cannot be executed.
The root detection policy is defined by the policy attribute of the RootDetection element in the configuration file.