Administration Settings

In Administration SETTINGS you can configure your shared space by setting properties and enabling features on the UFT Mobile server.

When using UFT Mobile as a managed service provided by an MSP or when shared spaces are enabled, some of the settings may be controlled globally. For details, see Shared space management (on-premises).

Configure settings

To configure administration settings:

Select a category from the left panel. After you modify the settings in a specific section, click Verify and Save and wait for the server to acknowledge your changes.

To erase the changes that you made, click Discard Changes in the top right of the screen.

Note: Some of the properties and settings are only available for Trial, Enterprise, and Ultimate license types. For details, see UFT Mobile editions.

Back to top


This section lets you configure general settings, such as compatibility validation, lock duration (for consecutive failed logins on the account and for idle devices), and password expiration time.

The following table provides additional information regarding some of the general settings:

Enable WebSocket Security When this setting is enabled, all testing tools and integrated products connecting to UFT Mobile must use an execution key for authenticating the connection. For details, see Access key management.
Password expiration

The default password expiration is 180 days. Twenty days before the expiration date, UFT Mobile issues a warning to the user to change the password. A "0" value indicates no expiration date.

If a user's password expires or if a user forgets their password, an administrator can reset it from the User Management page, or scripts. For details, see Manage user accounts with scripts (on-premises).

Lock duration

To prevent users from being locked out after entering a wrong password three times, set the Lock duration to "0".

Collect usage data One type of data collection is for the purpose of evaluating the usage of your lab resources. You can download CSV reports from the console containing reservation, device, app, and job information.
Single-Sign-On init string

This is mandatory for integration with the ALM extension for UFT Mobile. Paste in the value of the COMMUNICATION_SECURITY_PASSPHRASE flag from the ALM Site Administration. If you leave this field empty, single sign-on will not work. For details, see Open the UFT Mobile wizard.

Permission to gather data

Allow collection of data to be used interna by Micro Focus to improve the product, in accordance with the company’s privacy policy.

Limit application uploads You can limit the number of uploads for each application. This makes it easier for the administrator to manage the number of application uploads that need to be maintained, and reduces load on the file storage system.
Application upload limit When you define the maximum upload limit, older uploads exceeding the limit are deleted. If you seleced to delete old uploads of applications when upgrading the UFT Mobile, your settings will be copied over to this section.

Note that after the setting is enabled, or if the number of uploads to retain is decreased, the deletion of uploads will not be done immediately, but will be done in the background.
Execution/Connector key expiration You can set the expiration date for Execution and Connector access keys. If you leave these fields blank, the keys have no expiration date. For details on how to create access keys, see Access key management.

Back to top

Proxy setting (web access)

When using a proxy server, user this setting to configure the proxy server settings.

Back to top

Device reservation

This section lets you set the default reservation and extension durations, in minutes. In addition, you can set the default Dev Access duration.

Android packaging service

To enable record and replay functionality when testing certain apps, you need to repackage them with UFT Mobile libraries. These sections allow you to specify the host machine, port, and protocol for the Android packager. You can also specify if packaged apps should trust self-signed and Android system certificates. This is required when recording a script for load testing using the VuGen MITM protocol. For details, see App packaging and signing services.

iOS packaging service

Use the Add Service button to add anoother iOS packaging service, in addition to the primary one. You also indicate the workspace that will use the additional packaging service. Use the Remove button to remove packaging services that you added. You cannot remove the primary service.

If you enable SSL for the connection to the app packager, you can choose to use the self-signed certicate, or to use a certificate issued by a Certificate Authority (CA). If using a self-signed certificate, you can either import it to the UFT Mobile server as explained in Configure app signing services for iOS apps (on-premises) or disable the iOS app packager cerficate validation setting.

Note that the Agents are always signed with the primary packaging service. For information on how to distribute the signed Agents automatically, see View and manage connectors (Admin only). This capability is only available for Trial, Ultimate, and Enterprise type licenses.

Back to top

iOS options

Globally control settings for all iOS devices.

Kanji keyboard suppport When enabled, provides better support for the Kanji (Japanese) keyboard by looking up the key entered from the physical keyboard and passing it to the soft keyboard on the device screen. Note that this option should only be enabled for the Japanese keyboard.
Prevent Auto-Lock When this option is enabled, UFT Mobile prevents the Auto-Lock if configured in the Settings on an iOS device, by waking up the device every 30 seconds.
Auto-dismiss system alerts when idle In some cases, alerts such as iOS update notifications can interfere with the UFT Mobile device plug-and- play process.
When this option is enabled, UFT Mobile automatically dismisses system alerts every 15 seconds.To avoid interfering with tests, UFT Mobile will not dismiss alerts during record and replay.
Auto-dismiss alerts during app launch Alerts displayed during the launch of an app, for example a location permission request, may prevent UFT Mobile from identifying that the app was successfully launched.
When this option is enabled, UFT Mobile automatically dismisses system alerts during app launch.
Support for time and date changes

Note: Enable this option only if your test involves changing the time and date.

When enabled, this option prevents the remote view from freezing when the date or time is changed.


  • UFT Mobile dismisses alerts by selecting the negative option. For example, if the location permission alert is displayed, UFT Mobile will select Don’t Allow.
  • The options above are currently supported only for English locale.

Amazon Device Farm integration

Amazon Device Farm (ADF) integration lets you use devices from the Amazon farm for testing purposes.

In this section, you provide the AWS security credentials. If you created a project that you want to use through the EC2 interface, specify its name here.

For details, see AWS Device Farm integration or follow the links to the AWS documentation in this pane.


  • These settings override any other settings that you may have defined for your test in the EC2 instance.
  • When you disable ADF integration, the change may take up to 10 minutes to take effect.

Back to top

User permissions

As administrator, you can define permissions for users in your workspace with regard to actions on apps and devices. By default, users have permissions to perform all of the above actions.

Device actions

For devices, you can indicate whether or not non-admin users can

  • Restart a device
  • Reconnect a device
  • Remove a disconnected device
  • Change a device name
  • Change the device settings on either (or both) Android and iOS devices. When you restrict non-admin users from accessing the device Settings, the icon is displayed on the device card.

Considerations when restricting access to device settings:


When the restriction is applied, the Settings app cannot be launched.


1. Remove all the accounts on the device (Settings > Account).

  • Some apps automatically add an additional account. After enabling the UFT Mobile setting, check that the account has not returned.
  • On some devices, there is a setting called Users. Delete any New user items.

2. Reconnect the device.

Note that after the administration setting is enabled and the icon is displayed, you can add the accounts back.


When the restriction is applied, the Settings app can still be launched but no action can be performed on it.

iOS versions lower than 11 using the UIA test framework

Access is blocked only for replay. Manual control is not blocked. Note that the icon is still displayed.

General Note: If restricting manual control fails for some reason (for example, if the accounts were not removed from the Android device) the icon will be displayed on the device.

App actions

For apps, you can indicate whether or not non-admin users can upload an app, install an app, or delete an app.

Note: Connecting to ADF devices is not supported when non - admin users are restricted from installing apps on devices.

Back to top

Network Virtualization integration

This section lets you specify the NV Test Manager machine information, its authentication token, and the protocol to use (HTTP or HTTPS).

For details about these settings, see Set up Network Virtualization integration in UFT Mobile (on-premises).

For information on how to set up your machine and devices, see Network Virtualization integration (on-premises).

Back to top

LDAP integration

Organizations that use LDAP to manage their user accounts, can let users access UFT Mobile with their LDAP credentials.

For guidelines for working with LDAP users, see Considerations when using LDAP Users. To use secure LDAP (SSL), see Use secure LDAP on the UFT Mobile server .

When using shared spaces, some of these settings are controlled globally by the operator. For details, see Shared space management (on-premises).

Note for UFT Mobile Saas: The LDAP must be accessible over the internet. Add the UFT Mobile SaaS address to your whitelist if needed.

Considerations when using LDAP:

  • When you change the Enable/Disable settings, you must restart the UFT Mobile server for them to take effect.
  • The User Search Filter setting indicates the form of the LDAP query used to find a user during login. It must include the pattern {0}, which is replaced with the user name when a user logs into the Cloud Service Management Console. If you specify CN={0}, it uses the CN to log in. If you specify mail = {0}, it uses the email.
  • When you enable or disable LDAP, all non-LDAP users, excluding, will be deleted.

Back to top

SAML SSO integration

UFT Mobile supports single-sign on via SAML 2.0. SAML (Security Assertion Markup Language) is an XML-based standard for exchanging authentication and authorization data between an identity provider (IdP) and a service provider, such as UFT Mobile. In this section of settings, you can enable single-sign on (SSO). This way, users can use one set of credentials for logging into UFT Mobile, as they do for logging into other SSO applications in their organization.

To enable SAML SSO integration, you need to add UFT Mobile to your Identity Provider (IdP). Refer to your Identity Provider documentation for instructions on how to configure your IdP for a new SAML 2.0 application. You will need information (metadata) about UFT Mobile when configuring your IdP. Download this by clicking the DOWNLOAD UFT Mobile METADATA link.

You will also need to add the following information from your IdP to UFT Mobile, so that SAML-based authentication requests can be sent to your IdP:

IdP SAML metadata

This can be a URL, or you can copy and paste the contents of the IdP metadata .xml file into this field.

Administrator login name

This is a user, defined in the IdP, that will granted UFT Mobile administrator permissions. Initially, only this user will be able to access the Administration menu to perform administation tasks such as configuring settings, and managing workspaces, licenses, and access keys. The administrator can assign admin permissions to additonal users by changing the user role in Administration > Settings > Users. For details, see User management.

Username attribute identifier

User attributes are information used to identify individual users. In this field, provide the SAML attribute name for the username attribute that the IdP uses for identification on sign in. Depending on how you configured your IdP, the username attribute for signing in can be an email address, or a unique user name.

Tip: You can find the attribute identifier in the AttributeStatement section of the IdP SAML response. Look for the SAML attribute name with a value that equals the attribute that IdP uses for identification on sign in.

For example, if email address is used for authentication of users against the IdP, the identifier in the example below is

Alternatively, use {$id} to take the username from the subject of the SAML assertion, and not from Attribute section.

After you have successfully defined the SSO settings, or if you update any of the settings, you will be prompted to log out and to log in again using your organization credentials. If you disable SAML SSO, you will need to use your UFT Mobile credentials to log in again.

Note: When you enable or disable the SSO setting, all existing users, excluding, will be deleted.

If you enabled SSO but cannot log in to UFT Mobile as an administrator, for example, if you wrongly configured the administrator user, you can disable SAML SSO by running the User management script.

Note for UFT Mobile Saas: The IdP must be accessible over the internet. Add the UFT Mobile SaaS address to your whitelist if needed.

Back to top

UFT Mobile hosted device lab integration

This section lets you enable integration with a UFT Mobile hosted device lab and specify the Oauth2 credentials needed to access the devices.

Micro Focus provides you with the access key when you purchase your UFT Mobile hosted devices contract. For details, see the Hosted devices datasheet.

Back to top

Service Virtualization (SV) integration

This section lets you enable Micro Focus Service Virtualization (SV) instrumentation when uploading apps.

This integration allows you to virtualize you sensors, APIs, and devices. For details, see Set up Service Virtualization (on-premises)and Use Service Virtualization (on-premises).

Back to top

Autopass license server configuration

Required only when using a time-based device minutes license. After installing the Autopass license server, specifiy the details of the Autopass server machine. For details, see License installation and management.

Back to top

Genymotion integration

This section lets you specify the account to use for integration with Genymotion cloud devices. For details, see Genymotion cloud integration.

Back to top

Device Health Indication

This section lets you set the threshold values for the device health, for several metrics which represent the readiness of the device. If a device's metric exceeds a threshold value, its card displays a warning icon .

For example, the default battery temperature for an Android device is 45°. If UFT Mobile detects a temperature that exceeds 45°, the card displays a warning icon. Hover over the icon to see details about the exceeded threshold.

For more information, see View and manage devices.

Note that some of the metrics are only available for Android, while others only for iOS. The Thermal state metric is only supported for iOS versions greater than 10.

Back to top

See also: