Administration settings
In Administration > Settings, shared space admins can configure the shared space by setting properties and enabling features on the UFT Mobile server.
When using UFT Mobile as a managed service provided by an MSP or when shared spaces are enabled during installation, some settings may be controlled globally. For details, see Shared space management (on-premises).
Configure settings
To configure administration settings:
Select a category from the left panel. After you modify the settings in a specific section, click Verify and Save and wait for the server to acknowledge your changes.
To erase the changes that you made, click Discard Changes in the top right of the screen.
Note: Some properties and settings are only available for Trial, Enterprise, and Ultimate license types. For details, see UFT Mobile editions.
General
This section lets you configure general settings, such as compatibility validation, lock duration (for consecutive failed logins on the account and for idle devices), and password expiration time.
The following table provides additional information regarding some general settings:
Enable WebSocket Security | When this setting is enabled, all testing tools and integrated products connecting to UFT Mobile must use an execution key for authenticating the connection. For details, see Access key management. |
Enable compatibility validations | Validate that an app is compatible with the device on which the user is trying to install it, and only allow installation of compatible apps. |
Password expiration |
The default password expiration is 180 days. Twenty days before the expiration date, UFT Mobile issues a warning to the user to change the password. A "0" value indicates no expiration date. If a user's password expires or if a user forgets their password, the shared space admin can reset it from Lab Management, or using a script. For details, see Manage user accounts with scripts (on-premises). |
Lock duration |
To prevent users from being locked out after entering a wrong password three times, set the Lock duration to "0". |
Sanitize logs | Mask sensitive data from your logs (such as passwords, user names, etc.) |
Collect usage data | One type of data collection is for the purpose of evaluating the usage of your lab resources. You can download CSV reports from the console containing reservation, device, app, and job information. |
Device screen view idle timeout | When no actions are performed on the device for the defined period of time, the remote device screen display window is closed. The device remains locked. |
Device session idle timeout | When no actions are performed on the device for the defined period of time, the session ends and the device is unlocked. |
Reset idle time after device message | Resets the device's idle time whenever a new device message arrives (e.g. logs, metrics, etc.) |
Device screen view idle timeout | When no actions are performed on the device for the defined period of time, the remote device screen display window is closed. The device remains locked. |
Device session idle timeout | When no actions are performed on the device for the defined period of time, the session ends and the device is unlocked. |
Single-Sign-On init string | This is mandatory for integration with the ALM extension for UFT Mobile. Paste in the value of the COMMUNICATION_SECURITY_PASSPHRASE flag from the ALM Site Administration. If you leave this field empty, single sign-on will not work. For details, see UFT Mobile wizard. |
Permission to gather data |
Allow collection of data to be used internal by Micro Focus to improve the product, in accordance with the company’s privacy policy. |
Email address for administrator | The email address of the user to be used when users click Contact your admin from UFT Mobile. The user whose email is provided must be assigned a shared space administrator role. |
Execution/Connector max duration | Set the maximum number of days that Execution and Connector access keys are valid. After the limit is reached, the keys expire. If you leave these fields blank, the keys have no expiration date. You can also enable a setting to remove expired keys automatically from the list of access keys. For details on how to create access keys, see Access key management. |
Prometheus integration | Enable or disable the integration with Prometheus. After clicking verify and save, restart the server. |
Proxy setting (web access)
When using a proxy server, user this setting to configure the proxy server settings.
Device reservation
This section lets you configure device reservation settings such as duration, and number of devices that can be reserved. For more details on these settings, see Device reservation settings.
Android packaging service
To enable record and replay functionality when testing certain apps, you need to repackage them with UFT Mobile libraries. These sections allow you to specify the host machine, port, and protocol for the Android packager. The packaging service machine is set to localhost by default. You can also specify if packaged apps should trust self-signed and Android system certificates. This is required when recording a script for load testing using the VuGen MITM protocol. For details on when packaging is required, see App packaging and signing services.
iOS signing service
This section enables you to configure signing services for iOS apps. For more details on these settings, see iOS signing service.
iOS options
Globally control settings for all iOS devices.
Prevent Auto-Lock | When this option is enabled, UFT Mobile prevents the Auto-Lock if configured in the Settings on an iOS device, by waking up the device every 30 seconds. |
Auto-dismiss alerts during app launch | Alerts displayed during the launch of an app, for example a location permission request, may prevent UFT Mobile from identifying that the app was successfully launched. When this option is enabled, UFT Mobile automatically dismisses system alerts during app launch. |
Auto-dismiss system alerts when idle | Sometimes, alerts such as iOS update notifications can interfere with the UFT Mobile device plug-and- play process. When this option is enabled, UFT Mobile automatically dismisses system alerts every 15 seconds. To avoid interfering with tests, UFT Mobile will not dismiss alerts during record and replay. |
Use accessibilityId | For packaged apps, use the accessibilityId property and value for identifying components instead of the accessibilityLabel. |
Support for time and date changes |
Note: Enable this option only if your test involves changing the time and date. When enabled, this option prevents the remote view from freezing when the date or time is changed. |
Phone call support (Tech preview) | Enable phone calls to be made or received on devices during record and replay. Supported in iOS version 12 and later. Note: After enabling the setting, reconnect the iOS devices for the setting to take effect. |
Kanji keyboard support | When enabled, provides better support for the Kanji (Japanese) keyboard by looking up the key entered from the physical keyboard and passing it to the soft keyboard on the device screen. Note that this option should only be enabled for the Japanese keyboard. Note: The setting is supported on iOS 11.1 and later. |
Note: UFT Mobile dismisses alerts by selecting the negative option. For example, if the location permission alert is displayed, UFT Mobile will select Don’t Allow.
Amazon Device Farm integration
Amazon Device Farm (ADF) integration lets you use devices from the Amazon farm for testing purposes.
In this section, you provide the AWS security credentials. If you created a project that you want to use through the EC2 interface, specify its name here.
For details, see AWS Device Farm integration or follow the links to the AWS documentation in this pane.
- Note:
- These settings override any other settings that you may have defined for your test in the EC2 instance.
- When you disable ADF integration, the change may take up to 10 minutes to take effect.
User permissions
You can define permissions for users in your workspace regarding actions on apps and devices. By default, users have permissions to perform all actions. For more details on these settings, see User permissions.
Network Virtualization integration
This section lets you specify the NV Test Manager machine information, its authentication token, and the protocol to use (HTTP or HTTPS).
For details about these settings, see Set up Network Virtualization integration in UFT Mobile (on-premises).
LDAP integration
If your organization uses LDAP to manage user accounts, you can allow users to access UFT Mobile with their LDAP credentials. For more details on these settings, see LDAP settings.
When using shared spaces, some settings are controlled globally by the operator. For details, see Shared space management (on-premises).
SAML SSO integration
UFT Mobile supports single-sign on via SAML 2.0. SAML (Security Assertion Markup Language) is an XML-based standard for exchanging authentication and authorization data between an identity provider (IdP) and a service provider, such as UFT Mobile. In this section of settings, you can enable single-sign-on (SSO). This way, users can use one set of credentials for logging into UFT Mobile, as they do for logging into other SSO applications in their organization. For more details on these settings, see SAML SSO settings.
Micro Focus hosted device lab integration
This section lets you enable the integration with the Micro Focus hosted device lab. Micro Focus offers both public and private hosted devices. Micro Focus provides you with the key for accessing the lab when you purchase your UFT Mobile hosted devices contract.
To enable public devices, you also need to:
-
Install a public device hours license on the AutoPass server. For details, see License installation and management.
-
Configure the AutoPass server details. For details, see AutoPass license server configuration.
-
Enable the option to connect public devices. When this option is set to No, only private devices can be used.
For more details on hosted private devices, see the Hosted devices datasheet.
Service Virtualization (SV) integration
This section lets you enable Micro Focus Service Virtualization (SV) instrumentation when uploading apps.
This integration enables you to virtualize your sensors, APIs, and devices. For details, see Set up Service Virtualization (SV).
AutoPass license server configuration
Required only when using a time-based (public device hours or MSP device hours) license. After installing the AutoPass license server, specify the details of the AutoPass server machine. For details, see License installation and management.
Genymotion integration
This section lets you specify the account to use for integration with Genymotion cloud devices. For details, see Genymotion Cloud integration.
Defect Tracking System integration
Integrate UFT Mobile with Micro Focus Octane to open defects directly from exploratory sessions. Enable the integration setting, and then populate the fields as described below:
- Specify the Octane URL where you want to manage your defects.
- Include the Octane space ID. The space ID is the number that immediately follows the equals sign in the Octane URL, for example 45001 in the example below:
https://almoctane-ams.saas.microfocus.com/ui/?&p=45001/2004#/defects - You can use your own customized Octane form (template) for filling in the description field of the defect. The template must include the placeholder UFTM_TEST_STEPS. The placeholder will be populated with the steps from the step report.
When saving the settings, the connection to Octane will be verified.
Device Health Indication
This section lets you set the threshold values for alerts for several device health metrics. If a device's metric exceeds a threshold value, its card displays a warning icon .
For example, the default battery temperature for an Android device is 45°. If UFT Mobile detects a temperature that exceeds 45°, the card displays a warning icon. Hover over the icon to see details about the exceeded threshold.
For more information, see Manage devices.
Note that Battery health is only supported on Android devices. Thermal state on Android devices is only supported on Android 10 and later.
File storage
Set the total file storage size for UFT Mobile to store applications. Uploading apps will be blocked if the storage space reaches this limit.
Tip: You can view the file storage status in the admin dashboard. For details, see The UFT Mobile dashboard.
For better management of file storage space, you can also limit the number of uploads permitted per application. If you enable the setting, specify the maximum number of uploads per application to keep (Default: 30). The most recent uploads are kept, earlier uploads exceeding this number are deleted. For example, if you specify 15, only the 15 latest uploads of an app are kept.
Appium options
In this section you can enable the following:
-
Anonymous access for Appium (not supported with LDAP). This allows logins from Appium scripts to UFT Mobile when running tests, without an execution access key.
-
Appium insecure features. When you enable the setting, the Appium server runs with the --relaxed-security flag and all insecure features are turned on. For details on Appium insecure features, see the Appium documentation.
Tencent WeTest Device Farm integration
The Tencent WeTest Device Farm integration enables you to connect devices in your private WeTest cloud to the UFT Mobile lab. When you enable the integration, you need to provide the name of the connector installed in WeTest, the WeTest API address, and your WeTest account secret ID and secret key.
See also: