Administration settings

In Administration Settings, shared space admins can configure the shared space by setting properties and enabling features on the UFT Mobile server.

When using UFT Mobile as a managed service provided by an MSP or when shared spaces are enabled during installation, some settings may be controlled globally. For details, see Shared space management (on-premises).

Configure settings

To configure administration settings:

Select a category from the left panel. After you modify the settings in a specific section, click Verify and Save and wait for the server to acknowledge your changes.

To erase the changes that you made, click Discard Changes in the top right of the screen.

Note: Some properties and settings are only available for Trial, Enterprise, and Ultimate license types. For details, see UFT Mobile editions.

Back to top


This section lets you configure general settings, such as compatibility validation, lock duration (for consecutive failed logins on the account and for idle devices), and password expiration time.

The following table provides additional information regarding some general settings:

Enable WebSocket Security When this setting is enabled, all testing tools and integrated products connecting to UFT Mobile must use an execution key for authenticating the connection. For details, see Access key management.
Enable compatibility validations Validate that an app is compatible with the device on which the user is trying to install it, and only allow installation of compatible apps.
Password expiration

The default password expiration is 180 days. Twenty days before the expiration date, UFT Mobile issues a warning to the user to change the password. A "0" value indicates no expiration date.

If a user's password expires or if a user forgets their password, the shared space admin can reset it from Lab Management, or using a script. For details, see Manage user accounts with scripts (on-premises).

Lock duration

To prevent users from being locked out after entering a wrong password three times, set the Lock duration to "0".

Sanitize logs Mask sensitive data from your logs (such as passwords, user names, etc.)
Collect usage data One type of data collection is for the purpose of evaluating the usage of your lab resources. You can download CSV reports from the console containing reservation, device, app, and job information.
Device screen view idle timeout When no actions are performed on the device for the defined period of time, the remote device screen display window is closed. The device remains locked.
Device session idle timeout When no actions are performed on the device for the defined period of time, the session ends and the device is unlocked.
Reset idle time after device message Resets the device's idle time whenever a new device message arrives (e.g. logs, metrics, etc.)
Device screen view idle timeout When no actions are performed on the device for the defined period of time, the remote device screen display window is closed. The device remains locked.
Device session idle timeout When no actions are performed on the device for the defined period of time, the session ends and the device is unlocked.
Single-Sign-On init string This is mandatory for integration with the ALM extension for UFT Mobile. Paste in the value of the COMMUNICATION_SECURITY_PASSPHRASE flag from the ALM Site Administration. If you leave this field empty, single sign-on will not work. For details, see UFT Mobile wizard.
Permission to gather data

Allow collection of data to be used internal by Micro Focus to improve the product, in accordance with the company’s privacy policy.

Email address for administrator The email address of the user to be used when users click Contact your admin from UFT Mobile. The user whose email is provided must be assigned a shared space administrator role.
Execution/Connector max duration Set the maximum number of days that Execution and Connector access keys are valid. After the limit is reached, the keys expire. If you leave these fields blank, the keys have no expiration date. You can also enable a setting to remove expired keys automatically from the list of access keys.

For details on how to create access keys, see Access key management.
Prometheus integration Enable or disable the integration with Prometheus. After clicking verify and save, restart the server.

Back to top

Proxy setting (web access)

When using a proxy server, user this setting to configure the proxy server settings.

Back to top

Device reservation

This section lets you configure device reservation settings such as duration, and number of devices that can be reserved. For more details on these settings, see Device reservation settings.

Back to top

Android packaging service

To enable record and replay functionality when testing certain apps, you need to repackage them with UFT Mobile libraries. These sections allow you to specify the host machine, port, and protocol for the Android packager. The packaging service machine is set to localhost by default. You can also specify if packaged apps should trust self-signed and Android system certificates. This is required when recording a script for load testing using the VuGen MITM protocol. For details on when packaging is required, see App packaging and signing services.

iOS signing service

This section enables you to configure signing services for iOS apps. For more details on these settings, see iOS signing service.

Back to top

iOS options

Globally control settings for all iOS devices.

Prevent Auto-Lock When this option is enabled, UFT Mobile prevents the Auto-Lock if configured in the Settings on an iOS device, by waking up the device every 30 seconds.
Auto-dismiss alerts during app launch Alerts displayed during the launch of an app, for example a location permission request, may prevent UFT Mobile from identifying that the app was successfully launched.
When this option is enabled, UFT Mobile automatically dismisses system alerts during app launch.
Auto-dismiss system alerts when idle Sometimes, alerts such as iOS update notifications can interfere with the UFT Mobile device plug-and- play process.
When this option is enabled, UFT Mobile automatically dismisses system alerts every 15 seconds. To avoid interfering with tests, UFT Mobile will not dismiss alerts during record and replay.
Use accessibilityId For packaged apps, use the accessibilityId property and value for identifying components instead of the accessibilityLabel.
Support for time and date changes

Note: Enable this option only if your test involves changing the time and date.

When enabled, this option prevents the remote view from freezing when the date or time is changed.

Phone call support (Tech preview) Enable phone calls to be made or received on devices during record and replay. Supported in iOS version 12 and later. Note: After enabling the setting, reconnect the iOS devices for the setting to take effect.
Kanji keyboard support When enabled, provides better support for the Kanji (Japanese) keyboard by looking up the key entered from the physical keyboard and passing it to the soft keyboard on the device screen. Note that this option should only be enabled for the Japanese keyboard. Note: The setting is supported on iOS 11.1 and later.

Note: UFT Mobile dismisses alerts by selecting the negative option. For example, if the location permission alert is displayed, UFT Mobile will select Don’t Allow.

Amazon Device Farm integration

Amazon Device Farm (ADF) integration lets you use devices from the Amazon farm for testing purposes.

In this section, you provide the AWS security credentials. If you created a project that you want to use through the EC2 interface, specify its name here.

For details, see AWS Device Farm integration or follow the links to the AWS documentation in this pane.

  • These settings override any other settings that you may have defined for your test in the EC2 instance.
  • When you disable ADF integration, the change may take up to 10 minutes to take effect.

Back to top

User permissions

You can define permissions for users in your workspace regarding actions on apps and devices. By default, users have permissions to perform all actions. For more details on these settings, see User permissions.

Back to top

Network Virtualization integration

This section lets you specify the NV Test Manager machine information, its authentication token, and the protocol to use (HTTP or HTTPS).

For details about these settings, see Set up Network Virtualization integration in UFT Mobile (on-premises).

Back to top

LDAP integration

If your organization uses LDAP to manage user accounts, you can allow users to access UFT Mobile with their LDAP credentials. For more details on these settings, see LDAP settings.

When using shared spaces, some settings are controlled globally by the operator. For details, see Shared space management (on-premises).

Back to top

SAML SSO integration

UFT Mobile supports single-sign on via SAML 2.0. SAML (Security Assertion Markup Language) is an XML-based standard for exchanging authentication and authorization data between an identity provider (IdP) and a service provider, such as UFT Mobile. In this section of settings, you can enable single-sign-on (SSO). This way, users can use one set of credentials for logging into UFT Mobile, as they do for logging into other SSO applications in their organization. For more details on these settings, see SAML SSO  settings.

Back to top

Micro Focus hosted device lab integration

This section lets you enable the integration with the Micro Focus hosted device lab. Micro Focus offers both public and private hosted devices. Micro Focus provides you with the key for accessing the lab when you purchase your UFT Mobile hosted devices contract.

To enable public devices, you also need to:

For more details on hosted private devices, see the Hosted devices datasheet.

Back to top

Service Virtualization (SV) integration

This section lets you enable Micro Focus Service Virtualization (SV) instrumentation when uploading apps.

This integration enables you to virtualize your sensors, APIs, and devices. For details, see Set up Service Virtualization (SV).

Back to top

AutoPass license server configuration

Required only when using a time-based (public device hours or MSP device hours) license. After installing the AutoPass license server, specify the details of the AutoPass server machine. For details, see License installation and management.

Back to top

Genymotion integration

This section lets you specify the account to use for integration with Genymotion cloud devices. For details, see Genymotion Cloud integration.

Back to top

Defect Tracking System integration

Integrate UFT Mobile with Micro Focus Octane to open defects directly from exploratory sessions. Enable the integration setting, and then populate the fields as described below:

  • Specify the Octane URL where you want to manage your defects.
  • Include the Octane space ID. The space ID is the number that immediately follows the equals sign in the Octane URL, for example 45001 in the example below:
  • You can use your own customized Octane form (template) for filling in the description field of the defect. The template must include the placeholder UFTM_TEST_STEPS. The placeholder will be populated with the steps from the step report.

When saving the settings, the connection to Octane will be verified.

Back to top

Device Health Indication

This section lets you set the threshold values for alerts for several device health metrics. If a device's metric exceeds a threshold value, its card displays a warning icon .

For example, the default battery temperature for an Android device is 45°. If UFT Mobile detects a temperature that exceeds 45°, the card displays a warning icon. Hover over the icon to see details about the exceeded threshold.

For more information, see Manage devices.

Note that Battery health is only supported on Android devices. Thermal state on Android devices is only supported on Android 10 and later.

Back to top

File storage

Set the total file storage size for UFT Mobile to store applications. Uploading apps will be blocked if the storage space reaches this limit.

Tip: You can view the file storage status in the admin dashboard. For details, see The UFT Mobile dashboard.

For better management of file storage space, you can also limit the number of uploads permitted per application. If you enable the setting, specify the maximum number of uploads per application to keep (Default: 30). The most recent uploads are kept, earlier uploads exceeding this number are deleted. For example, if you specify 15, only the 15 latest uploads of an app are kept.

Back to top

Appium options

In this section you can enable the following:

  • Anonymous access for Appium (not supported with LDAP). This allows logins from Appium scripts to UFT Mobile when running tests, without an execution access key.

  • Appium insecure features. When you enable the setting, the Appium server runs with the --relaxed-security flag and all insecure features are turned on. For details on Appium insecure features, see the Appium documentation.

Back to top

Tencent WeTest Device Farm integration

The Tencent WeTest Device Farm integration enables you to connect devices in your private WeTest cloud to the UFT Mobile lab. When you enable the integration, you need to provide the name of the connector installed in WeTest, the WeTest API address, and your WeTest account secret ID and secret key.

Back to top

See also: