{
	"id": "22ebd273-638b-4d6a-b2f0-a9fafd37bf22",
	"created_at": "2026-04-06T00:12:21.558096Z",
	"updated_at": "2026-04-10T03:20:55.358051Z",
	"deleted_at": null,
	"sha1_hash": "8d8920029b88d4bef740b3ff27a421ca881eefac",
	"title": "Manifest.permission  |  API reference  |  Android Developers",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 1124651,
	"plain_text": "Manifest.permission  |  API reference  |  Android Developers\r\nArchived: 2026-04-05 21:14:19 UTC\r\nManifest.permission Stay organized with collections Save and categorize content\r\nbased on your preferences.\r\npublic static final class Manifest.permission\r\nextends Object\r\nSummary\r\nConstants\r\nString\r\nACCEPT_HANDOVER\r\nAllows a calling app to continue a call which was started in another app.\r\nString\r\nACCESS_BACKGROUND_LOCATION\r\nAllows an app to access location in the background.\r\nString\r\nACCESS_BIOMETRIC_SENSOR_STRENGTHS\r\nAllows an application to retrieve the sensor security strengths of the biometric sensors.\r\nString\r\nACCESS_BLOBS_ACROSS_USERS\r\nAllows an application to access data blobs across users.\r\nString\r\nACCESS_CHECKIN_PROPERTIES\r\nAllows read/write access to the \"properties\" table in the checkin database, to change values that\r\nget uploaded.\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 1 of 126\n\nString\r\nACCESS_COARSE_LOCATION\r\nAllows an app to access approximate location.\r\nString\r\nACCESS_FINE_LOCATION\r\nAllows an app to access precise location.\r\nString\r\nACCESS_HIDDEN_PROFILES\r\nAllows applications to access profiles with\r\nandroid.content.pm.UserProperties#PROFILE_API_VISIBILITY_HIDDEN user property, e.g.\r\nString\r\nACCESS_LAUNCHER_DATA\r\nThis permission protects a content provider within home/launcher applications, enabling\r\nmanagement of home screen metadata such as shortcut placement, launch intents, and labels.\r\nString\r\nACCESS_LOCAL_NETWORK\r\nRequired to be able to advertise and connect to local network devices.\r\nString\r\nACCESS_LOCATION_EXTRA_COMMANDS\r\nAllows an application to access extra location provider commands.\r\nString\r\nACCESS_MEDIA_LOCATION\r\nAllows an application to access any geographic locations persisted in the user's shared collection.\r\nString\r\nACCESS_NETWORK_STATE\r\nAllows applications to access information about networks.\r\nString\r\nACCESS_NOTIFICATION_POLICY\r\nMarker permission for applications that wish to access notification policy.\r\nString\r\nACCESS_WIFI_STATE\r\nAllows applications to access information about Wi-Fi networks.\r\nString ACCOUNT_MANAGER\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 2 of 126\n\nAllows applications to call into AccountAuthenticators.\r\nString\r\nACTIVITY_RECOGNITION\r\nAllows an application to recognize physical activity.\r\nString\r\nADD_VOICEMAIL\r\nAllows an application to add voicemails into the system.\r\nString\r\nANSWER_PHONE_CALLS\r\nAllows the app to answer an incoming phone call.\r\nString\r\nAPPLY_PICTURE_PROFILE\r\nAllows an app to apply a ERROR(/MediaQualityManager.PictureProfile) to a layer via\r\nERROR(/MediaCodec.PARAMETER_KEY_PICTURE_PROFILE) and, additionally, system apps via\r\nERROR(/SurfaceControl.Transaction#setPictureProfileHandle) .\r\nString\r\nBATTERY_STATS\r\nAllows an application to collect battery statistics\r\nProtection level: signature|privileged|development\r\nString\r\nBIND_ACCESSIBILITY_SERVICE\r\nMust be required by an AccessibilityService , to ensure that only the system can bind to it.\r\nString\r\nBIND_ALTERNATIVE_MESSAGE_TRANSPORT_SERVICE\r\nPermission needed to ensure that only the system process can bind with the\r\nAlternativeMessageTransportService .\r\nString\r\nBIND_APPWIDGET\r\nAllows an application to tell the AppWidget service which application can access AppWidget's\r\ndata.\r\nString\r\nBIND_APP_FUNCTION_SERVICE\r\nMust be required by an AppFunctionService , to ensure that only the system can bind to it.\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 3 of 126\n\nString\r\nBIND_AUTOFILL_SERVICE\r\nMust be required by a AutofillService , to ensure that only the system can bind to it.\r\nString\r\nBIND_CALL_REDIRECTION_SERVICE\r\nMust be required by a CallRedirectionService , to ensure that only the system can bind to it.\r\nString\r\nBIND_CARRIER_MESSAGING_CLIENT_SERVICE\r\nA subclass of CarrierMessagingClientService must be protected with this permission.\r\nString\r\nBIND_CARRIER_MESSAGING_SERVICE\r\nThis constant was deprecated in API level 23. Use BIND_CARRIER_SERVICES instead\r\nString\r\nBIND_CARRIER_SERVICES\r\nThe system process that is allowed to bind to services in carrier apps will have this permission.\r\nString\r\nBIND_CHOOSER_TARGET_SERVICE\r\nThis constant was deprecated in API level 30. For publishing direct share targets, please follow\r\nthe instructions in https://developer.android.com/training/sharing/receive.html#providing-direct-share-targets instead.\r\nString\r\nBIND_COMPANION_DEVICE_SERVICE\r\nMust be required by any CompanionDeviceService s to ensure that only the system can bind to it.\r\nString\r\nBIND_CONDITION_PROVIDER_SERVICE\r\nMust be required by a ConditionProviderService , to ensure that only the system can bind to it.\r\nString\r\nBIND_CONTROLS\r\nAllows SystemUI to request third party controls.\r\nString\r\nBIND_CREDENTIAL_PROVIDER_SERVICE\r\nMust be required by a CredentialProviderService to ensure that only the system can bind to it.\r\nString BIND_DATA_MIGRATION_FOR_PRIVATECOMPUTE\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 4 of 126\n\nAllows the system to bind to an application's data migration service for Private Compute.\r\nString\r\nBIND_DEVICE_ADMIN\r\nMust be required by device administration receiver, to ensure that only the system can interact\r\nwith it.\r\nString\r\nBIND_DREAM_SERVICE\r\nMust be required by an DreamService , to ensure that only the system can bind to it.\r\nString\r\nBIND_INCALL_SERVICE\r\nMust be required by a InCallService , to ensure that only the system can bind to it.\r\nString\r\nBIND_INPUT_METHOD\r\nMust be required by an InputMethodService , to ensure that only the system can bind to it.\r\nString\r\nBIND_MIDI_DEVICE_SERVICE\r\nMust be required by an MidiDeviceService , to ensure that only the system can bind to it.\r\nString\r\nBIND_NFC_SERVICE\r\nMust be required by a HostApduService or OffHostApduService to ensure that only the system\r\ncan bind to it.\r\nString\r\nBIND_NOTIFICATION_LISTENER_SERVICE\r\nMust be required by an NotificationListenerService , to ensure that only the system can bind\r\nto it.\r\nString\r\nBIND_PRINT_SERVICE\r\nMust be required by a PrintService , to ensure that only the system can bind to it.\r\nString\r\nBIND_QUICK_ACCESS_WALLET_SERVICE\r\nMust be required by a QuickAccessWalletService to ensure that only the system can bind to it.\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 5 of 126\n\nString\r\nBIND_QUICK_SETTINGS_TILE\r\nAllows an application to bind to third party quick settings tiles.\r\nString\r\nBIND_REMOTEVIEWS\r\nMust be required by a RemoteViewsService , to ensure that only the system can bind to it.\r\nString\r\nBIND_SCREENING_SERVICE\r\nMust be required by a CallScreeningService , to ensure that only the system can bind to it.\r\nString\r\nBIND_TELECOM_CONNECTION_SERVICE\r\nMust be required by a ConnectionService , to ensure that only the system can bind to it.\r\nString\r\nBIND_TEXT_SERVICE\r\nMust be required by a TextService (e.g. SpellCheckerService) to ensure that only the system can\r\nbind to it.\r\nString\r\nBIND_TV_AD_SERVICE\r\nMust be required by a android.media.tv.ad.TvAdService to ensure that only the system can bind\r\nto it.\r\nString\r\nBIND_TV_INPUT\r\nMust be required by a TvInputService to ensure that only the system can bind to it.\r\nString\r\nBIND_TV_INTERACTIVE_APP\r\nMust be required by a TvInteractiveAppService to ensure that only the system can bind to it.\r\nString\r\nBIND_VISUAL_VOICEMAIL_SERVICE\r\nMust be required by a link VisualVoicemailService to ensure that only the system can bind to\r\nit.\r\nString\r\nBIND_VOICE_INTERACTION\r\nMust be required by a VoiceInteractionService , to ensure that only the system can bind to it.\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 6 of 126\n\nString\r\nBIND_VPN_SERVICE\r\nMust be required by a VpnService , to ensure that only the system can bind to it.\r\nString\r\nBIND_VR_LISTENER_SERVICE\r\nMust be required by an VrListenerService , to ensure that only the system can bind to it.\r\nString\r\nBIND_WALLPAPER\r\nMust be required by a WallpaperService , to ensure that only the system can bind to it.\r\nString\r\nBLUETOOTH\r\nAllows applications to connect to paired bluetooth devices.\r\nString\r\nBLUETOOTH_ADMIN\r\nAllows applications to discover and pair bluetooth devices.\r\nString\r\nBLUETOOTH_ADVERTISE\r\nRequired to be able to advertise to nearby Bluetooth devices.\r\nString\r\nBLUETOOTH_CONNECT\r\nRequired to be able to connect to paired Bluetooth devices.\r\nString\r\nBLUETOOTH_PRIVILEGED\r\nAllows applications to pair bluetooth devices without user interaction, and to allow or disallow\r\nphonebook access or message access.\r\nString\r\nBLUETOOTH_SCAN\r\nRequired to be able to discover and pair nearby Bluetooth devices.\r\nString\r\nBODY_SENSORS\r\nAllows an application to access data from sensors that the user uses to measure what is happening\r\ninside their body, such as heart rate.\r\nString BODY_SENSORS_BACKGROUND\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 7 of 126\n\nAllows an application to access data from sensors that the user uses to measure what is happening\r\ninside their body, such as heart rate.\r\nString\r\nBROADCAST_PACKAGE_REMOVED\r\nAllows an application to broadcast a notification that an application package has been removed.\r\nString\r\nBROADCAST_SMS\r\nAllows an application to broadcast an SMS receipt notification.\r\nString\r\nBROADCAST_STICKY\r\nAllows an application to broadcast sticky intents.\r\nString\r\nBROADCAST_WAP_PUSH\r\nAllows an application to broadcast a WAP PUSH receipt notification.\r\nString\r\nCALL_COMPANION_APP\r\nAllows an app which implements the InCallService API to be eligible to be enabled as a\r\ncalling companion app.\r\nString\r\nCALL_PHONE\r\nAllows an application to initiate a phone call without going through the Dialer user interface for\r\nthe user to confirm the call.\r\nString\r\nCALL_PRIVILEGED\r\nAllows an application to call any phone number, including emergency numbers, without going\r\nthrough the Dialer user interface for the user to confirm the call being placed.\r\nString\r\nCAMERA\r\nRequired to be able to access the camera device.\r\nString\r\nCAPTURE_AUDIO_OUTPUT\r\nAllows an application to capture audio output.\r\nString CAPTURE_KEYBOARD\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 8 of 126\n\nAllows the currently focused application to be able to consume keys before Android system get\r\nchance to process system keys and shortcuts.\r\nString\r\nCHANGE_COMPONENT_ENABLED_STATE\r\nAllows an application to change whether an application component (other than its own) is\r\nenabled or not.\r\nString\r\nCHANGE_CONFIGURATION\r\nAllows an application to modify the current configuration, such as locale.\r\nString\r\nCHANGE_NETWORK_STATE\r\nAllows applications to change network connectivity state.\r\nString\r\nCHANGE_WIFI_MULTICAST_STATE\r\nAllows applications to enter Wi-Fi Multicast mode.\r\nString\r\nCHANGE_WIFI_STATE\r\nAllows applications to change Wi-Fi connectivity state.\r\nString\r\nCLEAR_APP_CACHE\r\nAllows an application to clear the caches of all installed applications on the device.\r\nString\r\nCONFIGURE_WIFI_DISPLAY\r\nAllows an application to configure and connect to Wifi displays\r\nString\r\nCONTROL_LOCATION_UPDATES\r\nAllows enabling/disabling location update notifications from the radio.\r\nString\r\nCREDENTIAL_MANAGER_QUERY_CANDIDATE_CREDENTIALS\r\nAllows a browser to invoke the set of query apis to get metadata about credential candidates\r\nprepared during the CredentialManager.prepareGetCredential API.\r\nString CREDENTIAL_MANAGER_SET_ALLOWED_PROVIDERS\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 9 of 126\n\nAllows specifying candidate credential providers to be queried in Credential Manager get flows,\r\nor to be preferred as a default in the Credential Manager create flows.\r\nString\r\nCREDENTIAL_MANAGER_SET_ORIGIN\r\nAllows a browser to invoke credential manager APIs on behalf of another RP.\r\nString\r\nDELETE_CACHE_FILES\r\nOld permission for deleting an app's cache files, no longer used, but signals for us to quietly\r\nignore calls instead of throwing an exception.\r\nString\r\nDELETE_PACKAGES\r\nAllows an application to delete packages.\r\nString\r\nDELIVER_COMPANION_MESSAGES\r\nAllows an application to deliver companion messages to system\r\nString\r\nDETECT_SCREEN_CAPTURE\r\nAllows an application to get notified when a screen capture of its windows is attempted.\r\nString\r\nDETECT_SCREEN_RECORDING\r\nAllows an application to get notified when it is being recorded.\r\nString\r\nDIAGNOSTIC\r\nAllows applications to RW to diagnostic resources.\r\nString\r\nDISABLE_KEYGUARD\r\nAllows applications to disable the keyguard if it is not secure.\r\nString\r\nDUMP\r\nAllows an application to retrieve state dump information from system services.\r\nString ENFORCE_UPDATE_OWNERSHIP\r\nAllows an application to indicate via\r\nPackageInstaller.SessionParams.setRequestUpdateOwnership(boolean) that it has the\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 10 of 126\n\nintention of becoming the update owner.\r\nString\r\nEXECUTE_APP_ACTION\r\nAllows an assistive application to perform actions on behalf of users inside of applications.\r\nString\r\nEXECUTE_APP_FUNCTIONS\r\nAllows an application to perform actions on behalf of users inside of applications.\r\nString\r\nEXPAND_STATUS_BAR\r\nAllows an application to expand or collapse the status bar.\r\nString\r\nFACTORY_TEST\r\nRun as a manufacturer test application, running as the root user.\r\nString\r\nFOREGROUND_SERVICE\r\nAllows a regular application to use Service.startForeground .\r\nString\r\nFOREGROUND_SERVICE_CAMERA\r\nAllows a regular application to use Service.startForeground with the type \"camera\".\r\nString\r\nFOREGROUND_SERVICE_CONNECTED_DEVICE\r\nAllows a regular application to use Service.startForeground with the type \"connectedDevice\".\r\nString\r\nFOREGROUND_SERVICE_DATA_SYNC\r\nAllows a regular application to use Service.startForeground with the type \"dataSync\".\r\nString\r\nFOREGROUND_SERVICE_HEALTH\r\nAllows a regular application to use Service.startForeground with the type \"health\".\r\nString\r\nFOREGROUND_SERVICE_LOCATION\r\nAllows a regular application to use Service.startForeground with the type \"location\".\r\nString FOREGROUND_SERVICE_MEDIA_PLAYBACK\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 11 of 126\n\nAllows a regular application to use Service.startForeground with the type \"mediaPlayback\".\r\nString\r\nFOREGROUND_SERVICE_MEDIA_PROCESSING\r\nAllows a regular application to use Service.startForeground with the type \"mediaProcessing\".\r\nString\r\nFOREGROUND_SERVICE_MEDIA_PROJECTION\r\nAllows a regular application to use Service.startForeground with the type \"mediaProjection\".\r\nString\r\nFOREGROUND_SERVICE_MICROPHONE\r\nAllows a regular application to use Service.startForeground with the type \"microphone\".\r\nString\r\nFOREGROUND_SERVICE_PHONE_CALL\r\nAllows a regular application to use Service.startForeground with the type \"phoneCall\".\r\nString\r\nFOREGROUND_SERVICE_REMOTE_MESSAGING\r\nAllows a regular application to use Service.startForeground with the type\r\n\"remoteMessaging\".\r\nString\r\nFOREGROUND_SERVICE_SPECIAL_USE\r\nAllows a regular application to use Service.startForeground with the type \"specialUse\".\r\nString\r\nFOREGROUND_SERVICE_SYSTEM_EXEMPTED\r\nAllows a regular application to use Service.startForeground with the type \"systemExempted\".\r\nString\r\nGET_ACCOUNTS\r\nAllows access to the list of accounts in the Accounts Service.\r\nString\r\nGET_ACCOUNTS_PRIVILEGED\r\nAllows access to the list of accounts in the Accounts Service.\r\nString\r\nGET_PACKAGE_SIZE\r\nAllows an application to find out the space used by any package.\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 12 of 126\n\nString\r\nGET_TASKS\r\nThis constant was deprecated in API level 21. No longer enforced.\r\nString\r\nGLOBAL_SEARCH\r\nThis permission can be used on content providers to allow the global search system to access their\r\ndata.\r\nString\r\nHIDE_OVERLAY_WINDOWS\r\nAllows an app to prevent non-system-overlay windows from being drawn on top of it\r\nString\r\nHIGH_SAMPLING_RATE_SENSORS\r\nAllows an app to access sensor data with a sampling rate greater than 200 Hz.\r\nString\r\nINSTALL_LOCATION_PROVIDER\r\nAllows an application to install a location provider into the Location Manager.\r\nString\r\nINSTALL_PACKAGES\r\nAllows an application to install packages.\r\nString\r\nINSTALL_SHORTCUT\r\nAllows an application to install a shortcut in Launcher.\r\nString\r\nINSTANT_APP_FOREGROUND_SERVICE\r\nAllows an instant app to create foreground services.\r\nString\r\nINTERACT_ACROSS_PROFILES\r\nAllows interaction across profiles in the same profile group.\r\nString\r\nINTERNET\r\nAllows applications to open network sockets.\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 13 of 126\n\nString\r\nKILL_BACKGROUND_PROCESSES\r\nAllows an application to call ActivityManager.killBackgroundProcesses(String) .\r\nString\r\nLAUNCH_CAPTURE_CONTENT_ACTIVITY_FOR_NOTE\r\nAllows an application to capture screen content to perform a screenshot using the intent action\r\nIntent.ACTION_LAUNCH_CAPTURE_CONTENT_ACTIVITY_FOR_NOTE .\r\nString\r\nLAUNCH_MULTI_PANE_SETTINGS_DEEP_LINK\r\nAn application needs this permission for\r\nSettings.ACTION_SETTINGS_EMBED_DEEP_LINK_ACTIVITY to show its Activity embedded in\r\nSettings app.\r\nString\r\nLOADER_USAGE_STATS\r\nAllows a data loader to read a package's access logs.\r\nString\r\nLOCATION_HARDWARE\r\nAllows an application to use location features in hardware, such as the geofencing api.\r\nString\r\nMANAGE_DEVICE_LOCK_STATE\r\nAllows financed device kiosk apps to perform actions on the Device Lock service\r\nProtection level: internal|role\r\nIntended for use by the FINANCED_DEVICE_KIOSK role only.\r\nString\r\nMANAGE_DEVICE_POLICY_ACCESSIBILITY\r\nAllows an application to manage policy related to accessibility.\r\nString\r\nMANAGE_DEVICE_POLICY_ACCOUNT_MANAGEMENT\r\nAllows an application to set policy related to account management.\r\nString\r\nMANAGE_DEVICE_POLICY_ACROSS_USERS\r\nAllows an application to set device policies outside the current user that are required for securing\r\ndevice ownership without accessing user data.\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 14 of 126\n\nString\r\nMANAGE_DEVICE_POLICY_ACROSS_USERS_FULL\r\nAllows an application to set device policies outside the current user.\r\nString\r\nMANAGE_DEVICE_POLICY_ACROSS_USERS_SECURITY_CRITICAL\r\nAllows an application to set device policies outside the current user that are critical for securing\r\ndata within the current user.\r\nString\r\nMANAGE_DEVICE_POLICY_AIRPLANE_MODE\r\nAllows an application to set policy related to airplane mode.\r\nString\r\nMANAGE_DEVICE_POLICY_APPS_CONTROL\r\nAllows an application to manage policy regarding modifying applications.\r\nString\r\nMANAGE_DEVICE_POLICY_APP_FUNCTIONS\r\nAllows an application to manage policy related to AppFunctions.\r\nString\r\nMANAGE_DEVICE_POLICY_APP_RESTRICTIONS\r\nAllows an application to manage application restrictions.\r\nString\r\nMANAGE_DEVICE_POLICY_APP_USER_DATA\r\nAllows an application to manage policy related to application user data.\r\nString\r\nMANAGE_DEVICE_POLICY_ASSIST_CONTENT\r\nAllows an application to set policy related to sending assist content to a privileged app such as the\r\nAssistant app.\r\nString\r\nMANAGE_DEVICE_POLICY_AUDIO_OUTPUT\r\nAllows an application to set policy related to audio output.\r\nString\r\nMANAGE_DEVICE_POLICY_AUTOFILL\r\nAllows an application to set policy related to autofill.\r\nString MANAGE_DEVICE_POLICY_BACKUP_SERVICE\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 15 of 126\n\nAllows an application to manage backup service policy.\r\nString\r\nMANAGE_DEVICE_POLICY_BLOCK_UNINSTALL\r\nAllows an application to manage policy related to block package uninstallation.\r\nString\r\nMANAGE_DEVICE_POLICY_BLUETOOTH\r\nAllows an application to set policy related to bluetooth.\r\nString\r\nMANAGE_DEVICE_POLICY_BUGREPORT\r\nAllows an application to request bugreports with user consent.\r\nString\r\nMANAGE_DEVICE_POLICY_CALLS\r\nAllows an application to manage calling policy.\r\nString\r\nMANAGE_DEVICE_POLICY_CAMERA\r\nAllows an application to set policy related to restricting a user's ability to use or enable and\r\ndisable the camera.\r\nString\r\nMANAGE_DEVICE_POLICY_CAMERA_TOGGLE\r\nAllows an application to manage policy related to camera toggle.\r\nString\r\nMANAGE_DEVICE_POLICY_CERTIFICATES\r\nAllows an application to set policy related to certificates.\r\nString\r\nMANAGE_DEVICE_POLICY_COMMON_CRITERIA_MODE\r\nAllows an application to manage policy related to common criteria mode.\r\nString\r\nMANAGE_DEVICE_POLICY_CONTENT_PROTECTION\r\nAllows an application to manage policy related to content protection.\r\nString\r\nMANAGE_DEVICE_POLICY_DEBUGGING_FEATURES\r\nAllows an application to manage debugging features policy.\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 16 of 126\n\nString\r\nMANAGE_DEVICE_POLICY_DEFAULT_SMS\r\nAllows an application to set policy related to the default sms application.\r\nString\r\nMANAGE_DEVICE_POLICY_DEVICE_IDENTIFIERS\r\nAllows an application to manage policy related to device identifiers.\r\nString\r\nMANAGE_DEVICE_POLICY_DISPLAY\r\nAllows an application to set policy related to the display.\r\nString\r\nMANAGE_DEVICE_POLICY_FACTORY_RESET\r\nAllows an application to set policy related to factory reset.\r\nString\r\nMANAGE_DEVICE_POLICY_FUN\r\nAllows an application to set policy related to fun.\r\nString\r\nMANAGE_DEVICE_POLICY_INPUT_METHODS\r\nAllows an application to set policy related to input methods.\r\nString\r\nMANAGE_DEVICE_POLICY_INSTALL_UNKNOWN_SOURCES\r\nAllows an application to manage installing from unknown sources policy.\r\nString\r\nMANAGE_DEVICE_POLICY_KEEP_UNINSTALLED_PACKAGES\r\nAllows an application to set policy related to keeping uninstalled packages.\r\nString\r\nMANAGE_DEVICE_POLICY_KEYGUARD\r\nAllows an application to manage policy related to keyguard features.\r\nString\r\nMANAGE_DEVICE_POLICY_LOCALE\r\nAllows an application to set policy related to locale.\r\nString\r\nMANAGE_DEVICE_POLICY_LOCATION\r\nAllows an application to set policy related to location.\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 17 of 126\n\nString\r\nMANAGE_DEVICE_POLICY_LOCK\r\nAllows an application to lock a profile or the device with the appropriate cross-user permission.\r\nString\r\nMANAGE_DEVICE_POLICY_LOCK_CREDENTIALS\r\nAllows an application to set policy related to lock credentials.\r\nString\r\nMANAGE_DEVICE_POLICY_LOCK_TASK\r\nAllows an application to manage lock task policy.\r\nString\r\nMANAGE_DEVICE_POLICY_MANAGED_SUBSCRIPTIONS\r\nAllows an application to set policy related to subscriptions downloaded by an admin.\r\nString\r\nMANAGE_DEVICE_POLICY_METERED_DATA\r\nAllows an application to manage policy related to metered data.\r\nString\r\nMANAGE_DEVICE_POLICY_MICROPHONE\r\nAllows an application to set policy related to restricting a user's ability to use or enable and\r\ndisable the microphone.\r\nString\r\nMANAGE_DEVICE_POLICY_MICROPHONE_TOGGLE\r\nAllows an application to manage policy related to microphone toggle.\r\nString\r\nMANAGE_DEVICE_POLICY_MOBILE_NETWORK\r\nAllows an application to set policy related to mobile networks.\r\nString\r\nMANAGE_DEVICE_POLICY_MODIFY_USERS\r\nAllows an application to manage policy preventing users from modifying users.\r\nString\r\nMANAGE_DEVICE_POLICY_MTE\r\nAllows an application to manage policy related to the Memory Tagging Extension (MTE).\r\nString MANAGE_DEVICE_POLICY_NEARBY_COMMUNICATION\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 18 of 126\n\nAllows an application to set policy related to nearby communications (e.g. Beam and nearby\r\nstreaming).\r\nString\r\nMANAGE_DEVICE_POLICY_NETWORK_LOGGING\r\nAllows an application to set policy related to network logging.\r\nString\r\nMANAGE_DEVICE_POLICY_ORGANIZATION_IDENTITY\r\nAllows an application to manage the identity of the managing organization.\r\nString\r\nMANAGE_DEVICE_POLICY_OVERRIDE_APN\r\nAllows an application to set policy related to override APNs.\r\nString\r\nMANAGE_DEVICE_POLICY_PACKAGE_STATE\r\nAllows an application to set policy related to hiding and suspending packages.\r\nString\r\nMANAGE_DEVICE_POLICY_PHYSICAL_MEDIA\r\nAllows an application to set policy related to physical media.\r\nString\r\nMANAGE_DEVICE_POLICY_PRINTING\r\nAllows an application to set policy related to printing.\r\nString\r\nMANAGE_DEVICE_POLICY_PRIVATE_DNS\r\nAllows an application to set policy related to private DNS.\r\nString\r\nMANAGE_DEVICE_POLICY_PROFILES\r\nAllows an application to set policy related to profiles.\r\nString\r\nMANAGE_DEVICE_POLICY_PROFILE_INTERACTION\r\nAllows an application to set policy related to interacting with profiles (e.g. Disallowing cross-profile copy and paste).\r\nString\r\nMANAGE_DEVICE_POLICY_PROXY\r\nAllows an application to set a network-independent global HTTP proxy.\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 19 of 126\n\nString\r\nMANAGE_DEVICE_POLICY_QUERY_SYSTEM_UPDATES\r\nAllows an application query system updates.\r\nString\r\nMANAGE_DEVICE_POLICY_RESET_PASSWORD\r\nAllows an application to force set a new device unlock password or a managed profile challenge\r\non current user.\r\nString\r\nMANAGE_DEVICE_POLICY_RESTRICT_PRIVATE_DNS\r\nAllows an application to set policy related to restricting the user from configuring private DNS.\r\nString\r\nMANAGE_DEVICE_POLICY_RUNTIME_PERMISSIONS\r\nAllows an application to set the grant state of runtime permissions on packages.\r\nString\r\nMANAGE_DEVICE_POLICY_RUN_IN_BACKGROUND\r\nAllows an application to set policy related to users running in the background.\r\nString\r\nMANAGE_DEVICE_POLICY_SAFE_BOOT\r\nAllows an application to manage safe boot policy.\r\nString\r\nMANAGE_DEVICE_POLICY_SCREEN_CAPTURE\r\nAllows an application to set policy related to screen capture.\r\nString\r\nMANAGE_DEVICE_POLICY_SCREEN_CONTENT\r\nAllows an application to set policy related to the usage of the contents of the screen.\r\nString\r\nMANAGE_DEVICE_POLICY_SECURITY_LOGGING\r\nAllows an application to set policy related to security logging.\r\nString\r\nMANAGE_DEVICE_POLICY_SETTINGS\r\nAllows an application to set policy related to settings.\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 20 of 126\n\nString\r\nMANAGE_DEVICE_POLICY_SMS\r\nAllows an application to set policy related to sms.\r\nString\r\nMANAGE_DEVICE_POLICY_STATUS_BAR\r\nAllows an application to set policy related to the status bar.\r\nString\r\nMANAGE_DEVICE_POLICY_SUPPORT_MESSAGE\r\nAllows an application to set support messages for when a user action is affected by an active\r\npolicy.\r\nString\r\nMANAGE_DEVICE_POLICY_SUSPEND_PERSONAL_APPS\r\nAllows an application to set policy related to suspending personal apps.\r\nString\r\nMANAGE_DEVICE_POLICY_SYSTEM_APPS\r\nAllows an application to manage policy related to system apps.\r\nString\r\nMANAGE_DEVICE_POLICY_SYSTEM_DIALOGS\r\nAllows an application to set policy related to system dialogs.\r\nString\r\nMANAGE_DEVICE_POLICY_SYSTEM_UPDATES\r\nAllows an application to set policy related to system updates.\r\nString\r\nMANAGE_DEVICE_POLICY_THREAD_NETWORK\r\nAllows an application to set policy related to Thread network.\r\nString\r\nMANAGE_DEVICE_POLICY_TIME\r\nAllows an application to manage device policy relating to time.\r\nString\r\nMANAGE_DEVICE_POLICY_USB_DATA_SIGNALLING\r\nAllows an application to set policy related to usb data signalling.\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 21 of 126\n\nString\r\nMANAGE_DEVICE_POLICY_USB_FILE_TRANSFER\r\nAllows an application to set policy related to usb file transfers.\r\nString\r\nMANAGE_DEVICE_POLICY_USERS\r\nAllows an application to set policy related to users.\r\nString\r\nMANAGE_DEVICE_POLICY_VPN\r\nAllows an application to set policy related to VPNs.\r\nString\r\nMANAGE_DEVICE_POLICY_WALLPAPER\r\nAllows an application to set policy related to the wallpaper.\r\nString\r\nMANAGE_DEVICE_POLICY_WIFI\r\nAllows an application to set policy related to Wifi.\r\nString\r\nMANAGE_DEVICE_POLICY_WINDOWS\r\nAllows an application to set policy related to windows.\r\nString\r\nMANAGE_DEVICE_POLICY_WIPE_DATA\r\nAllows an application to manage policy related to wiping data.\r\nString\r\nMANAGE_DOCUMENTS\r\nAllows an application to manage access to documents, usually as part of a document picker.\r\nString\r\nMANAGE_EXTERNAL_STORAGE\r\nAllows an application a broad access to external storage in scoped storage.\r\nString\r\nMANAGE_MEDIA\r\nAllows an application to modify and delete media files on this device or any connected storage\r\ndevice without user confirmation.\r\nString MANAGE_ONGOING_CALLS\r\nAllows to query ongoing call details and manage ongoing calls\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 22 of 126\n\nProtection level: signature|appop\r\nString\r\nMANAGE_OWN_CALLS\r\nAllows a calling application which manages its own calls through the self-managed\r\nConnectionService APIs.\r\nString\r\nMANAGE_WIFI_INTERFACES\r\nAllows applications to get notified when a Wi-Fi interface request cannot be satisfied without\r\ntearing down one or more other interfaces, and provide a decision whether to approve the request\r\nor reject it.\r\nString\r\nMANAGE_WIFI_NETWORK_SELECTION\r\nThis permission is used to let OEMs grant their trusted app access to a subset of privileged wifi\r\nAPIs to improve wifi performance.\r\nString\r\nMASTER_CLEAR\r\nNot for use by third-party applications.\r\nString\r\nMEDIA_CONTENT_CONTROL\r\nAllows an application to know what content is playing and control its playback.\r\nString\r\nMEDIA_ROUTING_CONTROL\r\nAllows an application to control the routing of media apps.\r\nString\r\nMODIFY_AUDIO_SETTINGS\r\nAllows an application to modify global audio settings.\r\nString\r\nMODIFY_PHONE_STATE\r\nAllows modification of the telephony state - power on, mmi, etc.\r\nString\r\nMOUNT_FORMAT_FILESYSTEMS\r\nAllows formatting file systems for removable storage.\r\nString MOUNT_UNMOUNT_FILESYSTEMS\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 23 of 126\n\nAllows mounting and unmounting file systems for removable storage.\r\nString\r\nNEARBY_WIFI_DEVICES\r\nRequired to be able to advertise and connect to nearby devices via Wi-Fi.\r\nString\r\nNFC\r\nAllows applications to perform I/O operations over NFC.\r\nString\r\nNFC_PREFERRED_PAYMENT_INFO\r\nAllows applications to receive NFC preferred payment service information.\r\nString\r\nNFC_TRANSACTION_EVENT\r\nAllows applications to receive NFC transaction events.\r\nString\r\nOVERRIDE_MEDIA_SESSION_OWNER\r\nAllows an application to override the owner of a MediaSession.\r\nString\r\nOVERRIDE_WIFI_CONFIG\r\nAllows an application to modify any wifi configuration, even if created by another application.\r\nString\r\nPACKAGE_USAGE_STATS\r\nAllows an application to collect component usage statistics\r\nDeclaring the permission implies intention to use the API and the user of the device can grant\r\npermission through the Settings application.\r\nString\r\nPERSISTENT_ACTIVITY\r\nThis constant was deprecated in API level 15. This functionality will be removed in the future;\r\nplease do not use. Allow an application to make its activities persistent.\r\nString\r\nPOST_NOTIFICATIONS\r\nAllows an app to post notifications\r\nProtection level: dangerous\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 24 of 126\n\nString\r\nPOST_PROMOTED_NOTIFICATIONS\r\nRequired for apps to post promoted notifications.\r\nString\r\nPROCESS_OUTGOING_CALLS\r\nThis constant was deprecated in API level 29. Applications should use CallRedirectionService\r\ninstead of the Intent.ACTION_NEW_OUTGOING_CALL broadcast.\r\nString\r\nPROVIDE_OWN_AUTOFILL_SUGGESTIONS\r\nAllows an application to display its suggestions using the autofill framework.\r\nString\r\nPROVIDE_PRIVATE_COMPUTE_SERVICES\r\nAllows an application to act as Private Compute Services, which allows the application to\r\ncommunicate with Private Compute Core components.\r\nString\r\nPROVIDE_REMOTE_CREDENTIALS\r\nAllows an application to be able to store and retrieve credentials from a remote device.\r\nString\r\nQUERY_ADVANCED_PROTECTION_MODE\r\nAllows an application to query the device's advanced protection mode status.\r\nString\r\nQUERY_ALL_PACKAGES\r\nAllows query of any normal app on the device, regardless of manifest declarations.\r\nString\r\nRANGING\r\nRequired to be able to range to devices using generic ranging module.\r\nString\r\nREAD_ASSISTANT_APP_SEARCH_DATA\r\nAllows an application to query over global data in AppSearch that's visible to the ASSISTANT\r\nrole.\r\nString\r\nREAD_ASSIST_STRUCTURE_SCREEN_CONTENT\r\nAllows an assistant application to read screen content in the AssistStructure.\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 25 of 126\n\nString\r\nREAD_BASIC_PHONE_STATE\r\nAllows read only access to phone state with a non dangerous permission, including the\r\ninformation like cellular network type, software version.\r\nString\r\nREAD_CALENDAR\r\nAllows an application to read the user's calendar data.\r\nString\r\nREAD_CALL_LOG\r\nAllows an application to read the user's call log.\r\nString\r\nREAD_COLOR_ZONES\r\nAllows an application to read the aggregated color zones on the screen for use cases like TV\r\nambient backlight usages.\r\nString\r\nREAD_CONTACTS\r\nAllows an application to read the user's contacts data.\r\nString\r\nREAD_DROPBOX_DATA\r\nAllows an application to access the data in Dropbox.\r\nString\r\nREAD_EXTERNAL_STORAGE\r\nAllows an application to read from external storage.\r\nString\r\nREAD_HOME_APP_SEARCH_DATA\r\nAllows an application to query over global data in AppSearch that's visible to the HOME role.\r\nString\r\nREAD_INPUT_STATE\r\nThis constant was deprecated in API level 16. The API that used this permission has been\r\nremoved.\r\nString\r\nREAD_LOGS\r\nAllows an application to read the low-level system log files.\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 26 of 126\n\nString\r\nREAD_MEDIA_AUDIO\r\nAllows an application to read audio files from external storage.\r\nString\r\nREAD_MEDIA_IMAGES\r\nAllows an application to read image files from external storage.\r\nString\r\nREAD_MEDIA_VIDEO\r\nAllows an application to read video files from external storage.\r\nString\r\nREAD_MEDIA_VISUAL_USER_SELECTED\r\nAllows an application to read image or video files from external storage that a user has selected\r\nvia the permission prompt photo picker.\r\nString\r\nREAD_NEARBY_STREAMING_POLICY\r\nAllows an application to read nearby streaming policy.\r\nString\r\nREAD_PHONE_NUMBERS\r\nAllows read access to the device's phone number(s), which is exposed to instant applications.\r\nString\r\nREAD_PHONE_STATE\r\nAllows read only access to phone state, including the current cellular network information, the\r\nstatus of any ongoing calls, and a list of any PhoneAccount s registered on the device.\r\nString\r\nREAD_PRECISE_PHONE_STATE\r\nAllows read only access to precise phone state.\r\nString\r\nREAD_SMS\r\nAllows an application to read SMS messages.\r\nString\r\nREAD_SYNC_SETTINGS\r\nAllows applications to read the sync settings.\r\nString READ_SYNC_STATS\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 27 of 126\n\nAllows applications to read the sync stats.\r\nString\r\nREAD_SYSTEM_PREFERENCES\r\nAllows an application to access the Settings Preference services to read settings exposed by the\r\nsystem Settings app and system apps that contribute settings surfaced by the Settings app.\r\nString\r\nREAD_VOICEMAIL\r\nAllows an application to read voicemails in the system.\r\nString\r\nREBOOT\r\nRequired to be able to reboot the device.\r\nString\r\nRECEIVE_BOOT_COMPLETED\r\nAllows an application to receive the Intent.ACTION_BOOT_COMPLETED that is broadcast after the\r\nsystem finishes booting.\r\nString\r\nRECEIVE_MMS\r\nAllows an application to monitor incoming MMS messages.\r\nString\r\nRECEIVE_SENSITIVE_NOTIFICATIONS\r\nAllows apps with a NotificationListenerService to receive notifications with sensitive information\r\nApps with a NotificationListenerService without this permission will not be able to view certain\r\ntypes of sensitive information contained in notifications\r\nThis permission also allows apps with the SMS permissions to query and receive broadcasts\r\nabout SMS messages that contain One Time Passwords\r\nProtection level: signature|preinstalled|knownSigner|role\r\nString\r\nRECEIVE_SMS\r\nAllows an application to receive SMS messages.\r\nString\r\nRECEIVE_WAP_PUSH\r\nAllows an application to receive WAP push messages.\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 28 of 126\n\nString\r\nRECORD_AUDIO\r\nAllows an application to record audio.\r\nString\r\nREORDER_TASKS\r\nAllows an application to change the Z-order of tasks.\r\nString\r\nREPOSITION_SELF_WINDOWS\r\nAllows an application to programmatically move and resize its tasks when the system is in a state\r\nthat allows such operations, e.g. in a desktop-like environment.\r\nString\r\nREQUEST_COMPANION_PROFILE_APP_STREAMING\r\nAllows application to request to be associated with a virtual device capable of streaming Android\r\napplications ( AssociationRequest.DEVICE_PROFILE_APP_STREAMING ) by\r\nCompanionDeviceManager .\r\nString\r\nREQUEST_COMPANION_PROFILE_AUTOMOTIVE_PROJECTION\r\nAllows application to request to be associated with a vehicle head unit capable of automotive\r\nprojection ( AssociationRequest.DEVICE_PROFILE_AUTOMOTIVE_PROJECTION ) by\r\nCompanionDeviceManager .\r\nString\r\nREQUEST_COMPANION_PROFILE_COMPUTER\r\nAllows application to request to be associated with a computer to share functionality and/or data\r\nwith other devices, such as notifications, photos and media\r\n( AssociationRequest.DEVICE_PROFILE_COMPUTER ) by CompanionDeviceManager .\r\nString\r\nREQUEST_COMPANION_PROFILE_GLASSES\r\nAllows app to request to be associated with a device via CompanionDeviceManager as \"glasses\"\r\nProtection level: normal\r\nString\r\nREQUEST_COMPANION_PROFILE_MEDICAL\r\nAllows application to request to associate with a AssociationRequest.DEVICE_PROFILE_MEDICAL\r\ndevice via CompanionDeviceManager .\r\nString REQUEST_COMPANION_PROFILE_NEARBY_DEVICE_STREAMING\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 29 of 126\n\nAllows application to request to stream content from an Android host to a nearby device\r\n( AssociationRequest.DEVICE_PROFILE_NEARBY_DEVICE_STREAMING ) by\r\nCompanionDeviceManager .\r\nString\r\nREQUEST_COMPANION_PROFILE_WATCH\r\nAllows app to request to be associated with a device via CompanionDeviceManager as a \"watch\"\r\nProtection level: normal\r\nString\r\nREQUEST_COMPANION_RUN_IN_BACKGROUND\r\nAllows a companion app to run in the background.\r\nString\r\nREQUEST_COMPANION_SELF_MANAGED\r\nAllows an application to create a \"self-managed\" association.\r\nString\r\nREQUEST_COMPANION_START_FOREGROUND_SERVICES_FROM_BACKGROUND\r\nAllows a companion app to start a foreground service from the background.\r\nString\r\nREQUEST_COMPANION_USE_DATA_IN_BACKGROUND\r\nAllows a companion app to use data in the background.\r\nString\r\nREQUEST_DELETE_PACKAGES\r\nAllows an application to request deleting packages.\r\nString\r\nREQUEST_IGNORE_BATTERY_OPTIMIZATIONS\r\nPermission an application must hold in order to use\r\nSettings.ACTION_REQUEST_IGNORE_BATTERY_OPTIMIZATIONS .\r\nString\r\nREQUEST_INSTALL_PACKAGES\r\nAllows an application to request installing packages.\r\nString\r\nREQUEST_OBSERVE_COMPANION_DEVICE_PRESENCE\r\nAllows an application to subscribe to notifications about the presence status change of their\r\nassociated companion device\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 30 of 126\n\nString\r\nREQUEST_OBSERVE_DEVICE_UUID_PRESENCE\r\nAllows an application to subscribe to notifications about the nearby devices' presence status\r\nchange base on the UUIDs.\r\nString\r\nREQUEST_PASSWORD_COMPLEXITY\r\nAllows an application to request the screen lock complexity and prompt users to update the screen\r\nlock to a certain complexity level.\r\nString\r\nRESTART_PACKAGES\r\nThis constant was deprecated in API level 15. The ActivityManager.restartPackage(String)\r\nAPI is no longer supported.\r\nString\r\nRUN_USER_INITIATED_JOBS\r\nAllows applications to use the user-initiated jobs API.\r\nString\r\nSCHEDULE_EXACT_ALARM\r\nAllows applications to use exact alarm APIs.\r\nString\r\nSEND_RESPOND_VIA_MESSAGE\r\nAllows an application (Phone) to send a request to other applications to handle the respond-via-message action during incoming calls.\r\nString\r\nSEND_SMS\r\nAllows an application to send SMS messages.\r\nString\r\nSET_ALARM\r\nAllows an application to broadcast an Intent to set an alarm for the user.\r\nString\r\nSET_ALWAYS_FINISH\r\nAllows an application to control whether activities are immediately finished when put in the\r\nbackground.\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 31 of 126\n\nString\r\nSET_ANIMATION_SCALE\r\nModify the global animation scaling factor.\r\nString\r\nSET_BIOMETRIC_DIALOG_ADVANCED\r\nAllows an application to set the advanced features on BiometricDialog (SystemUI), including\r\nlogo, logo description, and content view with more options button.\r\nString\r\nSET_DEBUG_APP\r\nConfigure an application for debugging.\r\nString\r\nSET_PREFERRED_APPLICATIONS\r\nThis constant was deprecated in API level 15. No longer useful, see\r\nPackageManager.addPackageToPreferred(String) for details.\r\nString\r\nSET_PROCESS_LIMIT\r\nAllows an application to set the maximum number of (not needed) application processes that can\r\nbe running.\r\nString\r\nSET_TIME\r\nAllows applications to set the system time directly.\r\nString\r\nSET_TIME_ZONE\r\nAllows applications to set the system time zone directly.\r\nString\r\nSET_WALLPAPER\r\nAllows applications to set the wallpaper.\r\nString\r\nSET_WALLPAPER_HINTS\r\nAllows applications to set the wallpaper hints.\r\nString\r\nSHOW_POWER_MENU\r\nPermission needed to request to show the Power Menu.\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 32 of 126\n\nString\r\nSHOW_POWER_MENU_PRIVILEGED\r\nPermission needed to request to show the Power Menu.\r\nString\r\nSIGNAL_PERSISTENT_PROCESSES\r\nAllow an application to request that a signal be sent to all persistent processes.\r\nString\r\nSMS_FINANCIAL_TRANSACTIONS\r\nThis constant was deprecated in API level 31. The API that used this permission is no longer\r\nfunctional.\r\nString\r\nSTART_FOREGROUND_SERVICES_FROM_BACKGROUND\r\nAllows an application to start foreground services from the background at any time.\r\nString\r\nSTART_VIEW_APP_FEATURES\r\nAllows the holder to start the screen with a list of app features.\r\nString\r\nSTART_VIEW_PERMISSION_USAGE\r\nAllows the holder to start the permission usage screen for an app.\r\nString\r\nSTATUS_BAR\r\nAllows an application to open, close, or disable the status bar and its icons.\r\nString\r\nSUBSCRIBE_TO_KEYGUARD_LOCKED_STATE\r\nAllows an application to subscribe to device locked and keyguard locked (i.e., showing) state.\r\nString\r\nSYSTEM_ALERT_WINDOW\r\nAllows an app to create windows using the type\r\nWindowManager.LayoutParams.TYPE_APPLICATION_OVERLAY , shown on top of all other apps.\r\nString\r\nTRANSMIT_IR\r\nAllows using the device's IR transmitter, if available.\r\nString TURN_SCREEN_ON\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 33 of 126\n\nAllows an app to turn on the screen on, e.g. with PowerManager.ACQUIRE_CAUSES_WAKEUP .\r\nString\r\nTV_IMPLICIT_ENTER_PIP\r\nAllows an app to enter Picture-in-Picture mode when the user is not explicitly requesting it.\r\nString\r\nUNINSTALL_SHORTCUT\r\nDon't use this permission in your app.\r\nString\r\nUPDATE_DEVICE_STATS\r\nAllows an application to update device statistics.\r\nString\r\nUPDATE_PACKAGES_WITHOUT_USER_ACTION\r\nAllows an application to indicate via\r\nPackageInstaller.SessionParams.setRequireUserAction(int) that user action should not be\r\nrequired for an app update.\r\nString\r\nUSE_BIOMETRIC\r\nAllows an app to use device supported biometric modalities.\r\nString\r\nUSE_EXACT_ALARM\r\nAllows apps to use exact alarms just like with SCHEDULE_EXACT_ALARM but without needing to\r\nrequest this permission from the user.\r\nString\r\nUSE_FINGERPRINT\r\nThis constant was deprecated in API level 28. Applications should request USE_BIOMETRIC\r\ninstead\r\nString\r\nUSE_FULL_SCREEN_INTENT\r\nRequired for apps targeting Build.VERSION_CODES.Q that want to use notification full\r\nscreen intents .\r\nString\r\nUSE_ICC_AUTH_WITH_DEVICE_IDENTIFIER\r\nAllows to read device identifiers and use ICC based authentication like EAP-AKA.\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 34 of 126\n\nString\r\nUSE_LOCATION_BUTTON\r\nAllows an app use location button, which grants temporary location permission when a user\r\nclicks the button.\r\nString\r\nUSE_LOOPBACK_INTERFACE\r\nRequired to be able to interact with other applications via IP packets on the loopback interface.\r\nString\r\nUSE_PINNED_WINDOWING_LAYER\r\nAllows an application to use ActivityManager.AppTask.WINDOWING_LAYER_PINNED for its Tasks,\r\ntypically requested via ActivityManager.AppTask.requestWindowingLayer(int, Executor,\r\nOutcomeReceiver) .\r\nString\r\nUSE_SIP\r\nAllows an application to use SIP service.\r\nString\r\nUWB_RANGING\r\nRequired to be able to range to devices using ultra-wideband.\r\nString\r\nVIBRATE\r\nAllows access to the vibrator.\r\nString\r\nWAKE_LOCK\r\nAllows using PowerManager WakeLocks to keep processor from sleeping or screen from\r\ndimming.\r\nString\r\nWRITE_APN_SETTINGS\r\nAllows applications to write the apn settings and read sensitive fields of an existing apn settings\r\nlike user and password.\r\nString\r\nWRITE_CALENDAR\r\nAllows an application to write the user's calendar data.\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 35 of 126\n\nString\r\nWRITE_CALL_LOG\r\nAllows an application to write and read the user's call log data.\r\nString\r\nWRITE_CONTACTS\r\nAllows an application to write the user's contacts data.\r\nString\r\nWRITE_EXTERNAL_STORAGE\r\nAllows an application to write to external storage.\r\nString\r\nWRITE_GSERVICES\r\nAllows an application to modify the Google service map.\r\nString\r\nWRITE_SECURE_SETTINGS\r\nAllows an application to read or write the secure system settings.\r\nString\r\nWRITE_SETTINGS\r\nAllows an application to read or write the system settings.\r\nString\r\nWRITE_SYNC_SETTINGS\r\nAllows applications to write the sync settings.\r\nString\r\nWRITE_SYSTEM_PREFERENCES\r\nAllows an application to access the Settings Preference services to write settings values exposed\r\nby the system Settings app and system apps that contribute settings surfaced in the Settings app.\r\nString\r\nWRITE_VOICEMAIL\r\nAllows an application to modify and remove existing voicemails in the system.\r\nPublic constructors\r\npermission()\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 36 of 126\n\nInherited methods\r\nFrom class java.lang.Object\r\nObject\r\nclone()\r\nCreates and returns a copy of this object.\r\nboolean\r\nequals(Object obj)\r\nIndicates whether some other object is \"equal to\" this one.\r\nvoid\r\nfinalize()\r\nCalled by the garbage collector on an object when garbage collection determines that\r\nthere are no more references to the object.\r\nfinal\r\nClass\u003c?\u003e\r\ngetClass()\r\nReturns the runtime class of this Object .\r\nint\r\nhashCode()\r\nReturns a hash code value for the object.\r\nfinal void\r\nnotify()\r\nWakes up a single thread that is waiting on this object's monitor.\r\nfinal void\r\nnotifyAll()\r\nWakes up all threads that are waiting on this object's monitor.\r\nString\r\ntoString()\r\nReturns a string representation of the object.\r\nfinal void\r\nwait(long timeoutMillis, int nanos)\r\nCauses the current thread to wait until it is awakened, typically by being notified or\r\ninterrupted, or until a certain amount of real time has elapsed.\r\nfinal void wait(long timeoutMillis)\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 37 of 126\n\nCauses the current thread to wait until it is awakened, typically by being notified or\r\ninterrupted, or until a certain amount of real time has elapsed.\r\nfinal void\r\nwait()\r\nCauses the current thread to wait until it is awakened, typically by being notified or\r\ninterrupted.\r\nConstants\r\nACCEPT_HANDOVER\r\npublic static final String ACCEPT_HANDOVER\r\nAllows a calling app to continue a call which was started in another app. An example is a video calling app that\r\nwants to continue a voice call on the user's mobile network.\r\nWhen the handover of a call from one app to another takes place, there are two devices which are involved in the\r\nhandover; the initiating and receiving devices. The initiating device is where the request to handover the call was\r\nstarted, and the receiving device is where the handover request is confirmed by the other party.\r\nThis permission protects access to the TelecomManager.acceptHandover(Uri, int, PhoneAccountHandle) which\r\nthe receiving side of the handover uses to accept a handover.\r\nProtection level: dangerous\r\nConstant Value: \"android.permission.ACCEPT_HANDOVER\"\r\nACCESS_BACKGROUND_LOCATION\r\npublic static final String ACCESS_BACKGROUND_LOCATION\r\nAllows an app to access location in the background. If you're requesting this permission, you must also request\r\neither ACCESS_COARSE_LOCATION or ACCESS_FINE_LOCATION . Requesting this permission by itself doesn't give\r\nyou location access.\r\nProtection level: dangerous\r\nThis is a hard restricted permission which cannot be held by an app until the installer on record allowlists the\r\npermission. For more details see\r\nPackageInstaller.SessionParams.setWhitelistedRestrictedPermissions(Set) .\r\nConstant Value: \"android.permission.ACCESS_BACKGROUND_LOCATION\"\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 38 of 126\n\nACCESS_BIOMETRIC_SENSOR_STRENGTHS\r\npublic static final String ACCESS_BIOMETRIC_SENSOR_STRENGTHS\r\nAllows an application to retrieve the sensor security strengths of the biometric sensors.\r\nThis permission is currently granted only to the WALLET role, the DEVICE_POLICY_MANAGEMENT role,\r\nand the SYSTEM_SHELL role (for easier control during testing).\r\nConstant Value: \"android.permission.ACCESS_BIOMETRIC_SENSOR_STRENGTHS\"\r\nACCESS_BLOBS_ACROSS_USERS\r\npublic static final String ACCESS_BLOBS_ACROSS_USERS\r\nAllows an application to access data blobs across users.\r\nConstant Value: \"android.permission.ACCESS_BLOBS_ACROSS_USERS\"\r\nACCESS_CHECKIN_PROPERTIES\r\npublic static final String ACCESS_CHECKIN_PROPERTIES\r\nAllows read/write access to the \"properties\" table in the checkin database, to change values that get uploaded.\r\nNot for use by third-party applications.\r\nConstant Value: \"android.permission.ACCESS_CHECKIN_PROPERTIES\"\r\nACCESS_COARSE_LOCATION\r\npublic static final String ACCESS_COARSE_LOCATION\r\nAllows an app to access approximate location. Alternatively, you might want ACCESS_FINE_LOCATION .\r\nProtection level: dangerous\r\nConstant Value: \"android.permission.ACCESS_COARSE_LOCATION\"\r\nACCESS_FINE_LOCATION\r\npublic static final String ACCESS_FINE_LOCATION\r\nAllows an app to access precise location. Alternatively, you might want ACCESS_COARSE_LOCATION .\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 39 of 126\n\nProtection level: dangerous\r\nConstant Value: \"android.permission.ACCESS_FINE_LOCATION\"\r\nACCESS_HIDDEN_PROFILES\r\npublic static final String ACCESS_HIDDEN_PROFILES\r\nAllows applications to access profiles with\r\nandroid.content.pm.UserProperties#PROFILE_API_VISIBILITY_HIDDEN user property, e.g.\r\nUserManager.USER_TYPE_PROFILE_PRIVATE .\r\nProtection level: normal\r\nConstant Value: \"android.permission.ACCESS_HIDDEN_PROFILES\"\r\nACCESS_LAUNCHER_DATA\r\npublic static final String ACCESS_LAUNCHER_DATA\r\nThis permission protects a content provider within home/launcher applications, enabling management of home\r\nscreen metadata such as shortcut placement, launch intents, and labels.\r\nConstant Value: \"android.permission.ACCESS_LAUNCHER_DATA\"\r\nACCESS_LOCATION_EXTRA_COMMANDS\r\npublic static final String ACCESS_LOCATION_EXTRA_COMMANDS\r\nAllows an application to access extra location provider commands.\r\nProtection level: normal\r\nConstant Value: \"android.permission.ACCESS_LOCATION_EXTRA_COMMANDS\"\r\nACCESS_MEDIA_LOCATION\r\npublic static final String ACCESS_MEDIA_LOCATION\r\nAllows an application to access any geographic locations persisted in the user's shared collection.\r\nProtection level: dangerous\r\nConstant Value: \"android.permission.ACCESS_MEDIA_LOCATION\"\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 40 of 126\n\nACCESS_NETWORK_STATE\r\npublic static final String ACCESS_NETWORK_STATE\r\nAllows applications to access information about networks.\r\nProtection level: normal\r\nConstant Value: \"android.permission.ACCESS_NETWORK_STATE\"\r\nACCESS_NOTIFICATION_POLICY\r\npublic static final String ACCESS_NOTIFICATION_POLICY\r\nMarker permission for applications that wish to access notification policy. This permission is not supported on\r\nmanaged profiles.\r\nProtection level: normal\r\nConstant Value: \"android.permission.ACCESS_NOTIFICATION_POLICY\"\r\nACCESS_WIFI_STATE\r\npublic static final String ACCESS_WIFI_STATE\r\nAllows applications to access information about Wi-Fi networks.\r\nProtection level: normal\r\nConstant Value: \"android.permission.ACCESS_WIFI_STATE\"\r\nACCOUNT_MANAGER\r\npublic static final String ACCOUNT_MANAGER\r\nAllows applications to call into AccountAuthenticators.\r\nNot for use by third-party applications.\r\nConstant Value: \"android.permission.ACCOUNT_MANAGER\"\r\nACTIVITY_RECOGNITION\r\npublic static final String ACTIVITY_RECOGNITION\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 41 of 126\n\nAllows an application to recognize physical activity.\r\nProtection level: dangerous\r\nConstant Value: \"android.permission.ACTIVITY_RECOGNITION\"\r\nADD_VOICEMAIL\r\npublic static final String ADD_VOICEMAIL\r\nAllows an application to add voicemails into the system.\r\nProtection level: dangerous\r\nConstant Value: \"com.android.voicemail.permission.ADD_VOICEMAIL\"\r\nANSWER_PHONE_CALLS\r\npublic static final String ANSWER_PHONE_CALLS\r\nAllows the app to answer an incoming phone call.\r\nProtection level: dangerous\r\nConstant Value: \"android.permission.ANSWER_PHONE_CALLS\"\r\nBATTERY_STATS\r\npublic static final String BATTERY_STATS\r\nAllows an application to collect battery statistics\r\nProtection level: signature|privileged|development\r\nConstant Value: \"android.permission.BATTERY_STATS\"\r\nBIND_ACCESSIBILITY_SERVICE\r\npublic static final String BIND_ACCESSIBILITY_SERVICE\r\nMust be required by an AccessibilityService , to ensure that only the system can bind to it.\r\nProtection level: signature\r\nConstant Value: \"android.permission.BIND_ACCESSIBILITY_SERVICE\"\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 42 of 126\n\nBIND_ALTERNATIVE_MESSAGE_TRANSPORT_SERVICE\r\npublic static final String BIND_ALTERNATIVE_MESSAGE_TRANSPORT_SERVICE\r\nPermission needed to ensure that only the system process can bind with the\r\nAlternativeMessageTransportService .\r\nConstant Value: \"android.permission.BIND_ALTERNATIVE_MESSAGE_TRANSPORT_SERVICE\"\r\nBIND_APPWIDGET\r\npublic static final String BIND_APPWIDGET\r\nAllows an application to tell the AppWidget service which application can access AppWidget's data. The normal\r\nuser flow is that a user picks an AppWidget to go into a particular host, thereby giving that host application access\r\nto the private data from the AppWidget app. An application that has this permission should honor that contract.\r\nNot for use by third-party applications.\r\nConstant Value: \"android.permission.BIND_APPWIDGET\"\r\nBIND_APP_FUNCTION_SERVICE\r\npublic static final String BIND_APP_FUNCTION_SERVICE\r\nMust be required by an AppFunctionService , to ensure that only the system can bind to it.\r\nProtection level: signature\r\nConstant Value: \"android.permission.BIND_APP_FUNCTION_SERVICE\"\r\nBIND_AUTOFILL_SERVICE\r\npublic static final String BIND_AUTOFILL_SERVICE\r\nMust be required by a AutofillService , to ensure that only the system can bind to it.\r\nProtection level: signature\r\nConstant Value: \"android.permission.BIND_AUTOFILL_SERVICE\"\r\nBIND_CALL_REDIRECTION_SERVICE\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 43 of 126\n\npublic static final String BIND_CALL_REDIRECTION_SERVICE\r\nMust be required by a CallRedirectionService , to ensure that only the system can bind to it.\r\nProtection level: signature|privileged\r\nConstant Value: \"android.permission.BIND_CALL_REDIRECTION_SERVICE\"\r\nBIND_CARRIER_MESSAGING_CLIENT_SERVICE\r\npublic static final String BIND_CARRIER_MESSAGING_CLIENT_SERVICE\r\nA subclass of CarrierMessagingClientService must be protected with this permission.\r\nProtection level: signature\r\nConstant Value: \"android.permission.BIND_CARRIER_MESSAGING_CLIENT_SERVICE\"\r\nBIND_CARRIER_MESSAGING_SERVICE\r\npublic static final String BIND_CARRIER_MESSAGING_SERVICE\r\nThis constant was deprecated in API level 23.\r\nUse BIND_CARRIER_SERVICES instead\r\nConstant Value: \"android.permission.BIND_CARRIER_MESSAGING_SERVICE\"\r\nBIND_CARRIER_SERVICES\r\npublic static final String BIND_CARRIER_SERVICES\r\nThe system process that is allowed to bind to services in carrier apps will have this permission. Carrier apps\r\nshould use this permission to protect their services that only the system is allowed to bind to.\r\nProtection level: signature|privileged\r\nConstant Value: \"android.permission.BIND_CARRIER_SERVICES\"\r\nBIND_CHOOSER_TARGET_SERVICE\r\npublic static final String BIND_CHOOSER_TARGET_SERVICE\r\nThis constant was deprecated in API level 30.\r\nFor publishing direct share targets, please follow the instructions in\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 44 of 126\n\nhttps://developer.android.com/training/sharing/receive.html#providing-direct-share-targets instead.\r\nMust be required by a ChooserTargetService , to ensure that only the system can bind to it.\r\nProtection level: signature\r\nConstant Value: \"android.permission.BIND_CHOOSER_TARGET_SERVICE\"\r\nBIND_COMPANION_DEVICE_SERVICE\r\npublic static final String BIND_COMPANION_DEVICE_SERVICE\r\nMust be required by any CompanionDeviceService s to ensure that only the system can bind to it.\r\nConstant Value: \"android.permission.BIND_COMPANION_DEVICE_SERVICE\"\r\nBIND_CONDITION_PROVIDER_SERVICE\r\npublic static final String BIND_CONDITION_PROVIDER_SERVICE\r\nMust be required by a ConditionProviderService , to ensure that only the system can bind to it.\r\nProtection level: signature\r\nConstant Value: \"android.permission.BIND_CONDITION_PROVIDER_SERVICE\"\r\nBIND_CONTROLS\r\npublic static final String BIND_CONTROLS\r\nAllows SystemUI to request third party controls.\r\nShould only be requested by the System and required by ControlsProviderService declarations.\r\nConstant Value: \"android.permission.BIND_CONTROLS\"\r\nBIND_CREDENTIAL_PROVIDER_SERVICE\r\npublic static final String BIND_CREDENTIAL_PROVIDER_SERVICE\r\nMust be required by a CredentialProviderService to ensure that only the system can bind to it.\r\nProtection level: signature\r\nConstant Value: \"android.permission.BIND_CREDENTIAL_PROVIDER_SERVICE\"\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 45 of 126\n\nBIND_DATA_MIGRATION_FOR_PRIVATECOMPUTE\r\npublic static final String BIND_DATA_MIGRATION_FOR_PRIVATECOMPUTE\r\nAllows the system to bind to an application's data migration service for Private Compute.\r\nProtection level: signature\r\nConstant Value: \"android.permission.BIND_DATA_MIGRATION_FOR_PRIVATECOMPUTE\"\r\nBIND_DEVICE_ADMIN\r\npublic static final String BIND_DEVICE_ADMIN\r\nMust be required by device administration receiver, to ensure that only the system can interact with it.\r\nProtection level: signature\r\nConstant Value: \"android.permission.BIND_DEVICE_ADMIN\"\r\nBIND_DREAM_SERVICE\r\npublic static final String BIND_DREAM_SERVICE\r\nMust be required by an DreamService , to ensure that only the system can bind to it.\r\nProtection level: signature\r\nConstant Value: \"android.permission.BIND_DREAM_SERVICE\"\r\nBIND_INCALL_SERVICE\r\npublic static final String BIND_INCALL_SERVICE\r\nMust be required by a InCallService , to ensure that only the system can bind to it.\r\nProtection level: signature|privileged\r\nConstant Value: \"android.permission.BIND_INCALL_SERVICE\"\r\nBIND_INPUT_METHOD\r\npublic static final String BIND_INPUT_METHOD\r\nMust be required by an InputMethodService , to ensure that only the system can bind to it.\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 46 of 126\n\nProtection level: signature\r\nConstant Value: \"android.permission.BIND_INPUT_METHOD\"\r\nBIND_MIDI_DEVICE_SERVICE\r\npublic static final String BIND_MIDI_DEVICE_SERVICE\r\nMust be required by an MidiDeviceService , to ensure that only the system can bind to it.\r\nProtection level: signature\r\nConstant Value: \"android.permission.BIND_MIDI_DEVICE_SERVICE\"\r\nBIND_NFC_SERVICE\r\npublic static final String BIND_NFC_SERVICE\r\nMust be required by a HostApduService or OffHostApduService to ensure that only the system can bind to it.\r\nProtection level: signature\r\nConstant Value: \"android.permission.BIND_NFC_SERVICE\"\r\nBIND_NOTIFICATION_LISTENER_SERVICE\r\npublic static final String BIND_NOTIFICATION_LISTENER_SERVICE\r\nMust be required by an NotificationListenerService , to ensure that only the system can bind to it.\r\nProtection level: signature\r\nConstant Value: \"android.permission.BIND_NOTIFICATION_LISTENER_SERVICE\"\r\nBIND_PRINT_SERVICE\r\npublic static final String BIND_PRINT_SERVICE\r\nMust be required by a PrintService , to ensure that only the system can bind to it.\r\nProtection level: signature\r\nConstant Value: \"android.permission.BIND_PRINT_SERVICE\"\r\nBIND_QUICK_ACCESS_WALLET_SERVICE\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 47 of 126\n\npublic static final String BIND_QUICK_ACCESS_WALLET_SERVICE\r\nMust be required by a QuickAccessWalletService to ensure that only the system can bind to it.\r\nProtection level: signature\r\nConstant Value: \"android.permission.BIND_QUICK_ACCESS_WALLET_SERVICE\"\r\nBIND_QUICK_SETTINGS_TILE\r\npublic static final String BIND_QUICK_SETTINGS_TILE\r\nAllows an application to bind to third party quick settings tiles.\r\nShould only be requested by the System, should be required by TileService declarations.\r\nConstant Value: \"android.permission.BIND_QUICK_SETTINGS_TILE\"\r\nBIND_REMOTEVIEWS\r\npublic static final String BIND_REMOTEVIEWS\r\nMust be required by a RemoteViewsService , to ensure that only the system can bind to it.\r\nProtection level: signature|privileged\r\nConstant Value: \"android.permission.BIND_REMOTEVIEWS\"\r\nBIND_SCREENING_SERVICE\r\npublic static final String BIND_SCREENING_SERVICE\r\nMust be required by a CallScreeningService , to ensure that only the system can bind to it.\r\nProtection level: signature|privileged\r\nConstant Value: \"android.permission.BIND_SCREENING_SERVICE\"\r\nBIND_TELECOM_CONNECTION_SERVICE\r\npublic static final String BIND_TELECOM_CONNECTION_SERVICE\r\nMust be required by a ConnectionService , to ensure that only the system can bind to it.\r\nProtection level: signature|privileged\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 48 of 126\n\nConstant Value: \"android.permission.BIND_TELECOM_CONNECTION_SERVICE\"\r\nBIND_TEXT_SERVICE\r\npublic static final String BIND_TEXT_SERVICE\r\nMust be required by a TextService (e.g. SpellCheckerService) to ensure that only the system can bind to it.\r\nProtection level: signature\r\nConstant Value: \"android.permission.BIND_TEXT_SERVICE\"\r\nBIND_TV_AD_SERVICE\r\npublic static final String BIND_TV_AD_SERVICE\r\nMust be required by a android.media.tv.ad.TvAdService to ensure that only the system can bind to it.\r\nProtection level: signature|privileged\r\nConstant Value: \"android.permission.BIND_TV_AD_SERVICE\"\r\nBIND_TV_INPUT\r\npublic static final String BIND_TV_INPUT\r\nMust be required by a TvInputService to ensure that only the system can bind to it.\r\nProtection level: signature|privileged\r\nConstant Value: \"android.permission.BIND_TV_INPUT\"\r\nBIND_TV_INTERACTIVE_APP\r\npublic static final String BIND_TV_INTERACTIVE_APP\r\nMust be required by a TvInteractiveAppService to ensure that only the system can bind to it.\r\nProtection level: signature|privileged\r\nConstant Value: \"android.permission.BIND_TV_INTERACTIVE_APP\"\r\nBIND_VISUAL_VOICEMAIL_SERVICE\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 49 of 126\n\npublic static final String BIND_VISUAL_VOICEMAIL_SERVICE\r\nMust be required by a link VisualVoicemailService to ensure that only the system can bind to it.\r\nProtection level: signature|privileged\r\nConstant Value: \"android.permission.BIND_VISUAL_VOICEMAIL_SERVICE\"\r\nBIND_VOICE_INTERACTION\r\npublic static final String BIND_VOICE_INTERACTION\r\nMust be required by a VoiceInteractionService , to ensure that only the system can bind to it.\r\nProtection level: signature\r\nConstant Value: \"android.permission.BIND_VOICE_INTERACTION\"\r\nBIND_VPN_SERVICE\r\npublic static final String BIND_VPN_SERVICE\r\nMust be required by a VpnService , to ensure that only the system can bind to it.\r\nProtection level: signature\r\nConstant Value: \"android.permission.BIND_VPN_SERVICE\"\r\nBIND_VR_LISTENER_SERVICE\r\npublic static final String BIND_VR_LISTENER_SERVICE\r\nMust be required by an VrListenerService , to ensure that only the system can bind to it.\r\nProtection level: signature\r\nConstant Value: \"android.permission.BIND_VR_LISTENER_SERVICE\"\r\nBIND_WALLPAPER\r\npublic static final String BIND_WALLPAPER\r\nMust be required by a WallpaperService , to ensure that only the system can bind to it.\r\nProtection level: signature|privileged\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 50 of 126\n\nConstant Value: \"android.permission.BIND_WALLPAPER\"\r\nBLUETOOTH\r\npublic static final String BLUETOOTH\r\nAllows applications to connect to paired bluetooth devices.\r\nProtection level: normal\r\nConstant Value: \"android.permission.BLUETOOTH\"\r\nBLUETOOTH_ADMIN\r\npublic static final String BLUETOOTH_ADMIN\r\nAllows applications to discover and pair bluetooth devices.\r\nProtection level: normal\r\nConstant Value: \"android.permission.BLUETOOTH_ADMIN\"\r\nBLUETOOTH_ADVERTISE\r\npublic static final String BLUETOOTH_ADVERTISE\r\nRequired to be able to advertise to nearby Bluetooth devices.\r\nProtection level: dangerous\r\nConstant Value: \"android.permission.BLUETOOTH_ADVERTISE\"\r\nBLUETOOTH_CONNECT\r\npublic static final String BLUETOOTH_CONNECT\r\nRequired to be able to connect to paired Bluetooth devices.\r\nProtection level: dangerous\r\nConstant Value: \"android.permission.BLUETOOTH_CONNECT\"\r\nBLUETOOTH_PRIVILEGED\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 51 of 126\n\npublic static final String BLUETOOTH_PRIVILEGED\r\nAllows applications to pair bluetooth devices without user interaction, and to allow or disallow phonebook access\r\nor message access.\r\nNot for use by third-party applications.\r\nConstant Value: \"android.permission.BLUETOOTH_PRIVILEGED\"\r\nBLUETOOTH_SCAN\r\npublic static final String BLUETOOTH_SCAN\r\nRequired to be able to discover and pair nearby Bluetooth devices.\r\nProtection level: dangerous\r\nConstant Value: \"android.permission.BLUETOOTH_SCAN\"\r\nBODY_SENSORS\r\npublic static final String BODY_SENSORS\r\nAllows an application to access data from sensors that the user uses to measure what is happening inside their\r\nbody, such as heart rate.\r\nProtection level: dangerous\r\nConstant Value: \"android.permission.BODY_SENSORS\"\r\nBODY_SENSORS_BACKGROUND\r\npublic static final String BODY_SENSORS_BACKGROUND\r\nAllows an application to access data from sensors that the user uses to measure what is happening inside their\r\nbody, such as heart rate. If you're requesting this permission, you must also request BODY_SENSORS . Requesting\r\nthis permission by itself doesn't give you Body sensors access.\r\nProtection level: dangerous\r\nThis is a hard restricted permission which cannot be held by an app until the installer on record allowlists the\r\npermission. For more details see\r\nPackageInstaller.SessionParams.setWhitelistedRestrictedPermissions(Set) .\r\nConstant Value: \"android.permission.BODY_SENSORS_BACKGROUND\"\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 52 of 126\n\nBROADCAST_PACKAGE_REMOVED\r\npublic static final String BROADCAST_PACKAGE_REMOVED\r\nAllows an application to broadcast a notification that an application package has been removed.\r\nNot for use by third-party applications.\r\nConstant Value: \"android.permission.BROADCAST_PACKAGE_REMOVED\"\r\nBROADCAST_SMS\r\npublic static final String BROADCAST_SMS\r\nAllows an application to broadcast an SMS receipt notification.\r\nNot for use by third-party applications.\r\nConstant Value: \"android.permission.BROADCAST_SMS\"\r\nBROADCAST_STICKY\r\npublic static final String BROADCAST_STICKY\r\nAllows an application to broadcast sticky intents. These are broadcasts whose data is held by the system after\r\nbeing finished, so that clients can quickly retrieve that data without having to wait for the next broadcast.\r\nProtection level: normal\r\nConstant Value: \"android.permission.BROADCAST_STICKY\"\r\nBROADCAST_WAP_PUSH\r\npublic static final String BROADCAST_WAP_PUSH\r\nAllows an application to broadcast a WAP PUSH receipt notification.\r\nNot for use by third-party applications.\r\nConstant Value: \"android.permission.BROADCAST_WAP_PUSH\"\r\nCALL_COMPANION_APP\r\npublic static final String CALL_COMPANION_APP\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 53 of 126\n\nAllows an app which implements the InCallService API to be eligible to be enabled as a calling companion\r\napp. This means that the Telecom framework will bind to the app's InCallService implementation when there are\r\ncalls active. The app can use the InCallService API to view information about calls on the system and control\r\nthese calls.\r\nProtection level: normal\r\nConstant Value: \"android.permission.CALL_COMPANION_APP\"\r\nCALL_PHONE\r\npublic static final String CALL_PHONE\r\nAllows an application to initiate a phone call without going through the Dialer user interface for the user to\r\nconfirm the call.\r\nNote: An app holding this permission can also call carrier MMI codes to change settings such as call forwarding\r\nor call waiting preferences.\r\nProtection level: dangerous\r\nConstant Value: \"android.permission.CALL_PHONE\"\r\nCALL_PRIVILEGED\r\npublic static final String CALL_PRIVILEGED\r\nAllows an application to call any phone number, including emergency numbers, without going through the Dialer\r\nuser interface for the user to confirm the call being placed.\r\nNot for use by third-party applications.\r\nConstant Value: \"android.permission.CALL_PRIVILEGED\"\r\nCAMERA\r\npublic static final String CAMERA\r\nRequired to be able to access the camera device.\r\nThis will automatically enforce the uses-feature manifest element for all camera features. If you do not require all\r\ncamera features or can properly operate if a camera is not available, then you must modify your manifest as\r\nappropriate in order to install on devices that don't support all camera features.\r\nProtection level: dangerous\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 54 of 126\n\nConstant Value: \"android.permission.CAMERA\"\r\nCAPTURE_AUDIO_OUTPUT\r\npublic static final String CAPTURE_AUDIO_OUTPUT\r\nAllows an application to capture audio output. Use the CAPTURE_MEDIA_OUTPUT permission if only the\r\nUSAGE_UNKNOWN ), USAGE_MEDIA ) or USAGE_GAME ) usages are intended to be captured.\r\nNot for use by third-party applications.\r\nConstant Value: \"android.permission.CAPTURE_AUDIO_OUTPUT\"\r\nCAPTURE_KEYBOARD\r\npublic static final String CAPTURE_KEYBOARD\r\nAllows the currently focused application to be able to consume keys before Android system get chance to process\r\nsystem keys and shortcuts.\r\nThe keys are always sent to the currently focussed application, this permission allows the focussed application to\r\nreceive the keys that are normally consumed by the system for shortcuts, allowing it to have custom shortcut\r\nbehavior primarily for use cases like virtual machine apps where the host OS wants to handle the shortcuts\r\ndifferently.\r\nCertain shortcuts and system keys like Home, Overview, Power, etc are never sent to the currently focused\r\napplication and are always consumed by the system.\r\nUser can escape out of the capture mode by long pressing the Escape key or simply navigating out of the\r\napplication.\r\nProtection level: normal\r\nConstant Value: \"android.permission.CAPTURE_KEYBOARD\"\r\nCHANGE_COMPONENT_ENABLED_STATE\r\npublic static final String CHANGE_COMPONENT_ENABLED_STATE\r\nAllows an application to change whether an application component (other than its own) is enabled or not.\r\nNot for use by third-party applications.\r\nConstant Value: \"android.permission.CHANGE_COMPONENT_ENABLED_STATE\"\r\nCHANGE_CONFIGURATION\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 55 of 126\n\npublic static final String CHANGE_CONFIGURATION\r\nAllows an application to modify the current configuration, such as locale.\r\nProtection level: signature|privileged|development\r\nConstant Value: \"android.permission.CHANGE_CONFIGURATION\"\r\nCHANGE_NETWORK_STATE\r\npublic static final String CHANGE_NETWORK_STATE\r\nAllows applications to change network connectivity state.\r\nProtection level: normal\r\nConstant Value: \"android.permission.CHANGE_NETWORK_STATE\"\r\nCHANGE_WIFI_MULTICAST_STATE\r\npublic static final String CHANGE_WIFI_MULTICAST_STATE\r\nAllows applications to enter Wi-Fi Multicast mode.\r\nProtection level: normal\r\nConstant Value: \"android.permission.CHANGE_WIFI_MULTICAST_STATE\"\r\nCHANGE_WIFI_STATE\r\npublic static final String CHANGE_WIFI_STATE\r\nAllows applications to change Wi-Fi connectivity state.\r\nProtection level: normal\r\nConstant Value: \"android.permission.CHANGE_WIFI_STATE\"\r\nCLEAR_APP_CACHE\r\npublic static final String CLEAR_APP_CACHE\r\nAllows an application to clear the caches of all installed applications on the device.\r\nProtection level: signature|privileged\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 56 of 126\n\nConstant Value: \"android.permission.CLEAR_APP_CACHE\"\r\nCONFIGURE_WIFI_DISPLAY\r\npublic static final String CONFIGURE_WIFI_DISPLAY\r\nAllows an application to configure and connect to Wifi displays\r\nConstant Value: \"android.permission.CONFIGURE_WIFI_DISPLAY\"\r\nCONTROL_LOCATION_UPDATES\r\npublic static final String CONTROL_LOCATION_UPDATES\r\nAllows enabling/disabling location update notifications from the radio.\r\nNot for use by third-party applications.\r\nConstant Value: \"android.permission.CONTROL_LOCATION_UPDATES\"\r\nCREDENTIAL_MANAGER_QUERY_CANDIDATE_CREDENTIALS\r\npublic static final String CREDENTIAL_MANAGER_QUERY_CANDIDATE_CREDENTIALS\r\nAllows a browser to invoke the set of query apis to get metadata about credential candidates prepared during the\r\nCredentialManager.prepareGetCredential API.\r\nProtection level: normal\r\nConstant Value: \"android.permission.CREDENTIAL_MANAGER_QUERY_CANDIDATE_CREDENTIALS\"\r\nCREDENTIAL_MANAGER_SET_ALLOWED_PROVIDERS\r\npublic static final String CREDENTIAL_MANAGER_SET_ALLOWED_PROVIDERS\r\nAllows specifying candidate credential providers to be queried in Credential Manager get flows, or to be preferred\r\nas a default in the Credential Manager create flows.\r\nProtection level: normal\r\nConstant Value: \"android.permission.CREDENTIAL_MANAGER_SET_ALLOWED_PROVIDERS\"\r\nCREDENTIAL_MANAGER_SET_ORIGIN\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 57 of 126\n\npublic static final String CREDENTIAL_MANAGER_SET_ORIGIN\r\nAllows a browser to invoke credential manager APIs on behalf of another RP.\r\nProtection level: normal\r\nConstant Value: \"android.permission.CREDENTIAL_MANAGER_SET_ORIGIN\"\r\nDELETE_CACHE_FILES\r\npublic static final String DELETE_CACHE_FILES\r\nOld permission for deleting an app's cache files, no longer used, but signals for us to quietly ignore calls instead of\r\nthrowing an exception.\r\nProtection level: signature|privileged\r\nConstant Value: \"android.permission.DELETE_CACHE_FILES\"\r\nDELETE_PACKAGES\r\npublic static final String DELETE_PACKAGES\r\nAllows an application to delete packages.\r\nNot for use by third-party applications.\r\nStarting in Build.VERSION_CODES.N , user confirmation is requested when the application deleting the package is\r\nnot the same application that installed the package.\r\nConstant Value: \"android.permission.DELETE_PACKAGES\"\r\nDELIVER_COMPANION_MESSAGES\r\npublic static final String DELIVER_COMPANION_MESSAGES\r\nAllows an application to deliver companion messages to system\r\nConstant Value: \"android.permission.DELIVER_COMPANION_MESSAGES\"\r\nDETECT_SCREEN_CAPTURE\r\npublic static final String DETECT_SCREEN_CAPTURE\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 58 of 126\n\nAllows an application to get notified when a screen capture of its windows is attempted.\r\nProtection level: normal\r\nConstant Value: \"android.permission.DETECT_SCREEN_CAPTURE\"\r\nDETECT_SCREEN_RECORDING\r\npublic static final String DETECT_SCREEN_RECORDING\r\nAllows an application to get notified when it is being recorded.\r\nProtection level: normal\r\nConstant Value: \"android.permission.DETECT_SCREEN_RECORDING\"\r\nDIAGNOSTIC\r\npublic static final String DIAGNOSTIC\r\nAllows applications to RW to diagnostic resources.\r\nNot for use by third-party applications.\r\nConstant Value: \"android.permission.DIAGNOSTIC\"\r\nDISABLE_KEYGUARD\r\npublic static final String DISABLE_KEYGUARD\r\nAllows applications to disable the keyguard if it is not secure.\r\nProtection level: normal\r\nConstant Value: \"android.permission.DISABLE_KEYGUARD\"\r\nDUMP\r\npublic static final String DUMP\r\nAllows an application to retrieve state dump information from system services.\r\nNot for use by third-party applications.\r\nConstant Value: \"android.permission.DUMP\"\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 59 of 126\n\nEXECUTE_APP_ACTION\r\npublic static final String EXECUTE_APP_ACTION\r\nAllows an assistive application to perform actions on behalf of users inside of applications.\r\nFor now, this permission is only granted to the Assistant application selected by the user.\r\nProtection level: internal|role\r\nConstant Value: \"android.permission.EXECUTE_APP_ACTION\"\r\nEXECUTE_APP_FUNCTIONS\r\npublic static final String EXECUTE_APP_FUNCTIONS\r\nAllows an application to perform actions on behalf of users inside of applications.\r\nThis permission is currently only granted to privileged system apps.\r\nProtection level: internal|privileged\r\nConstant Value: \"android.permission.EXECUTE_APP_FUNCTIONS\"\r\nEXPAND_STATUS_BAR\r\npublic static final String EXPAND_STATUS_BAR\r\nAllows an application to expand or collapse the status bar.\r\nProtection level: normal\r\nConstant Value: \"android.permission.EXPAND_STATUS_BAR\"\r\nFACTORY_TEST\r\npublic static final String FACTORY_TEST\r\nRun as a manufacturer test application, running as the root user. Only available when the device is running in\r\nmanufacturer test mode.\r\nNot for use by third-party applications.\r\nConstant Value: \"android.permission.FACTORY_TEST\"\r\nFOREGROUND_SERVICE\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 60 of 126\n\npublic static final String FOREGROUND_SERVICE\r\nAllows a regular application to use Service.startForeground .\r\nProtection level: normal\r\nConstant Value: \"android.permission.FOREGROUND_SERVICE\"\r\nFOREGROUND_SERVICE_CAMERA\r\npublic static final String FOREGROUND_SERVICE_CAMERA\r\nAllows a regular application to use Service.startForeground with the type \"camera\".\r\nProtection level: normal|instant\r\nConstant Value: \"android.permission.FOREGROUND_SERVICE_CAMERA\"\r\nFOREGROUND_SERVICE_CONNECTED_DEVICE\r\npublic static final String FOREGROUND_SERVICE_CONNECTED_DEVICE\r\nAllows a regular application to use Service.startForeground with the type \"connectedDevice\".\r\nProtection level: normal|instant\r\nConstant Value: \"android.permission.FOREGROUND_SERVICE_CONNECTED_DEVICE\"\r\nFOREGROUND_SERVICE_DATA_SYNC\r\npublic static final String FOREGROUND_SERVICE_DATA_SYNC\r\nAllows a regular application to use Service.startForeground with the type \"dataSync\".\r\nProtection level: normal|instant\r\nConstant Value: \"android.permission.FOREGROUND_SERVICE_DATA_SYNC\"\r\nFOREGROUND_SERVICE_HEALTH\r\npublic static final String FOREGROUND_SERVICE_HEALTH\r\nAllows a regular application to use Service.startForeground with the type \"health\".\r\nProtection level: normal|instant\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 61 of 126\n\nConstant Value: \"android.permission.FOREGROUND_SERVICE_HEALTH\"\r\nFOREGROUND_SERVICE_LOCATION\r\npublic static final String FOREGROUND_SERVICE_LOCATION\r\nAllows a regular application to use Service.startForeground with the type \"location\".\r\nProtection level: normal|instant\r\nConstant Value: \"android.permission.FOREGROUND_SERVICE_LOCATION\"\r\nFOREGROUND_SERVICE_MEDIA_PLAYBACK\r\npublic static final String FOREGROUND_SERVICE_MEDIA_PLAYBACK\r\nAllows a regular application to use Service.startForeground with the type \"mediaPlayback\".\r\nProtection level: normal|instant\r\nConstant Value: \"android.permission.FOREGROUND_SERVICE_MEDIA_PLAYBACK\"\r\nFOREGROUND_SERVICE_MEDIA_PROCESSING\r\npublic static final String FOREGROUND_SERVICE_MEDIA_PROCESSING\r\nAllows a regular application to use Service.startForeground with the type \"mediaProcessing\".\r\nProtection level: normal|instant\r\nConstant Value: \"android.permission.FOREGROUND_SERVICE_MEDIA_PROCESSING\"\r\nFOREGROUND_SERVICE_MEDIA_PROJECTION\r\npublic static final String FOREGROUND_SERVICE_MEDIA_PROJECTION\r\nAllows a regular application to use Service.startForeground with the type \"mediaProjection\".\r\nProtection level: normal|instant\r\nConstant Value: \"android.permission.FOREGROUND_SERVICE_MEDIA_PROJECTION\"\r\nFOREGROUND_SERVICE_MICROPHONE\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 62 of 126\n\npublic static final String FOREGROUND_SERVICE_MICROPHONE\r\nAllows a regular application to use Service.startForeground with the type \"microphone\".\r\nProtection level: normal|instant\r\nConstant Value: \"android.permission.FOREGROUND_SERVICE_MICROPHONE\"\r\nFOREGROUND_SERVICE_PHONE_CALL\r\npublic static final String FOREGROUND_SERVICE_PHONE_CALL\r\nAllows a regular application to use Service.startForeground with the type \"phoneCall\".\r\nProtection level: normal|instant\r\nConstant Value: \"android.permission.FOREGROUND_SERVICE_PHONE_CALL\"\r\nFOREGROUND_SERVICE_REMOTE_MESSAGING\r\npublic static final String FOREGROUND_SERVICE_REMOTE_MESSAGING\r\nAllows a regular application to use Service.startForeground with the type \"remoteMessaging\".\r\nProtection level: normal|instant\r\nConstant Value: \"android.permission.FOREGROUND_SERVICE_REMOTE_MESSAGING\"\r\nFOREGROUND_SERVICE_SPECIAL_USE\r\npublic static final String FOREGROUND_SERVICE_SPECIAL_USE\r\nAllows a regular application to use Service.startForeground with the type \"specialUse\".\r\nProtection level: normal|appop|instant\r\nConstant Value: \"android.permission.FOREGROUND_SERVICE_SPECIAL_USE\"\r\nFOREGROUND_SERVICE_SYSTEM_EXEMPTED\r\npublic static final String FOREGROUND_SERVICE_SYSTEM_EXEMPTED\r\nAllows a regular application to use Service.startForeground with the type \"systemExempted\". Apps are\r\nallowed to use this type only in the use cases listed in ServiceInfo.FOREGROUND_SERVICE_TYPE_SYSTEM_EXEMPTED .\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 63 of 126\n\nProtection level: normal|instant\r\nConstant Value: \"android.permission.FOREGROUND_SERVICE_SYSTEM_EXEMPTED\"\r\nGET_ACCOUNTS\r\npublic static final String GET_ACCOUNTS\r\nAllows access to the list of accounts in the Accounts Service.\r\nNote: Beginning with Android 6.0 (API level 23), if an app shares the signature of the authenticator that manages\r\nan account, it does not need \"GET_ACCOUNTS\" permission to read information about that account. On Android 5.1\r\nand lower, all apps need \"GET_ACCOUNTS\" permission to read information about any account.\r\nProtection level: dangerous\r\nConstant Value: \"android.permission.GET_ACCOUNTS\"\r\nGET_ACCOUNTS_PRIVILEGED\r\npublic static final String GET_ACCOUNTS_PRIVILEGED\r\nAllows access to the list of accounts in the Accounts Service.\r\nProtection level: signature|privileged\r\nConstant Value: \"android.permission.GET_ACCOUNTS_PRIVILEGED\"\r\nGET_PACKAGE_SIZE\r\npublic static final String GET_PACKAGE_SIZE\r\nAllows an application to find out the space used by any package.\r\nProtection level: normal\r\nConstant Value: \"android.permission.GET_PACKAGE_SIZE\"\r\nGET_TASKS\r\npublic static final String GET_TASKS\r\nThis constant was deprecated in API level 21.\r\nNo longer enforced.\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 64 of 126\n\nConstant Value: \"android.permission.GET_TASKS\"\r\nGLOBAL_SEARCH\r\npublic static final String GLOBAL_SEARCH\r\nThis permission can be used on content providers to allow the global search system to access their data. Typically\r\nit used when the provider has some permissions protecting it (which global search would not be expected to hold),\r\nand added as a read-only permission to the path in the provider where global search queries are performed. This\r\npermission can not be held by regular applications; it is used by applications to protect themselves from everyone\r\nelse besides global search.\r\nProtection level: signature|privileged\r\nConstant Value: \"android.permission.GLOBAL_SEARCH\"\r\nHIDE_OVERLAY_WINDOWS\r\npublic static final String HIDE_OVERLAY_WINDOWS\r\nAllows an app to prevent non-system-overlay windows from being drawn on top of it\r\nConstant Value: \"android.permission.HIDE_OVERLAY_WINDOWS\"\r\nHIGH_SAMPLING_RATE_SENSORS\r\npublic static final String HIGH_SAMPLING_RATE_SENSORS\r\nAllows an app to access sensor data with a sampling rate greater than 200 Hz.\r\nProtection level: normal\r\nConstant Value: \"android.permission.HIGH_SAMPLING_RATE_SENSORS\"\r\nINSTALL_LOCATION_PROVIDER\r\npublic static final String INSTALL_LOCATION_PROVIDER\r\nAllows an application to install a location provider into the Location Manager.\r\nNot for use by third-party applications.\r\nConstant Value: \"android.permission.INSTALL_LOCATION_PROVIDER\"\r\nINSTALL_PACKAGES\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 65 of 126\n\npublic static final String INSTALL_PACKAGES\r\nAllows an application to install packages.\r\nNot for use by third-party applications.\r\nConstant Value: \"android.permission.INSTALL_PACKAGES\"\r\nINSTALL_SHORTCUT\r\npublic static final String INSTALL_SHORTCUT\r\nAllows an application to install a shortcut in Launcher.\r\nIn Android O (API level 26) and higher, the INSTALL_SHORTCUT broadcast no longer has any effect on your app\r\nbecause it's a private, implicit broadcast. Instead, you should create an app shortcut by using the\r\nrequestPinShortcut() method from the ShortcutManager class.\r\nProtection level: normal\r\nConstant Value: \"com.android.launcher.permission.INSTALL_SHORTCUT\"\r\nINSTANT_APP_FOREGROUND_SERVICE\r\npublic static final String INSTANT_APP_FOREGROUND_SERVICE\r\nAllows an instant app to create foreground services.\r\nProtection level: signature|development|instant|appop\r\nConstant Value: \"android.permission.INSTANT_APP_FOREGROUND_SERVICE\"\r\nINTERACT_ACROSS_PROFILES\r\npublic static final String INTERACT_ACROSS_PROFILES\r\nAllows interaction across profiles in the same profile group.\r\nConstant Value: \"android.permission.INTERACT_ACROSS_PROFILES\"\r\nINTERNET\r\npublic static final String INTERNET\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 66 of 126\n\nAllows applications to open network sockets.\r\nProtection level: normal\r\nConstant Value: \"android.permission.INTERNET\"\r\nLAUNCH_CAPTURE_CONTENT_ACTIVITY_FOR_NOTE\r\npublic static final String LAUNCH_CAPTURE_CONTENT_ACTIVITY_FOR_NOTE\r\nAllows an application to capture screen content to perform a screenshot using the intent action\r\nIntent.ACTION_LAUNCH_CAPTURE_CONTENT_ACTIVITY_FOR_NOTE .\r\nProtection level: internal|role\r\nIntended for use by ROLE_NOTES only.\r\nConstant Value: \"android.permission.LAUNCH_CAPTURE_CONTENT_ACTIVITY_FOR_NOTE\"\r\nLOADER_USAGE_STATS\r\npublic static final String LOADER_USAGE_STATS\r\nAllows a data loader to read a package's access logs. The access logs contain the set of pages referenced over time.\r\nDeclaring the permission implies intention to use the API and the user of the device can grant permission through\r\nthe Settings application.\r\nProtection level: signature|privileged|appop\r\nA data loader has to be the one which provides data to install an app.\r\nA data loader has to have both permission:LOADER_USAGE_STATS AND appop:LOADER_USAGE_STATS\r\nallowed to be able to access the read logs.\r\nConstant Value: \"android.permission.LOADER_USAGE_STATS\"\r\nLOCATION_HARDWARE\r\npublic static final String LOCATION_HARDWARE\r\nAllows an application to use location features in hardware, such as the geofencing api.\r\nNot for use by third-party applications.\r\nConstant Value: \"android.permission.LOCATION_HARDWARE\"\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 67 of 126\n\nMANAGE_DEVICE_LOCK_STATE\r\npublic static final String MANAGE_DEVICE_LOCK_STATE\r\nAllows financed device kiosk apps to perform actions on the Device Lock service\r\nProtection level: internal|role\r\nIntended for use by the FINANCED_DEVICE_KIOSK role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_LOCK_STATE\"\r\nMANAGE_DEVICE_POLICY_ACCESSIBILITY\r\npublic static final String MANAGE_DEVICE_POLICY_ACCESSIBILITY\r\nAllows an application to manage policy related to accessibility.\r\nManifest.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this\r\npermission on users different to the calling user.\r\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_ACCESSIBILITY\"\r\nMANAGE_DEVICE_POLICY_ACCOUNT_MANAGEMENT\r\npublic static final String MANAGE_DEVICE_POLICY_ACCOUNT_MANAGEMENT\r\nAllows an application to set policy related to account management.\r\nManifest.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS is required to call APIs protected by this permission\r\non users different to the calling user.\r\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_ACCOUNT_MANAGEMENT\"\r\nMANAGE_DEVICE_POLICY_ACROSS_USERS\r\npublic static final String MANAGE_DEVICE_POLICY_ACROSS_USERS\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 68 of 126\n\nAllows an application to set device policies outside the current user that are required for securing device\r\nownership without accessing user data.\r\nHolding this permission allows the use of other held MANAGE_DEVICE_POLICY_* permissions across all\r\nusers on the device provided they do not grant access to user data.\r\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS\"\r\nMANAGE_DEVICE_POLICY_ACROSS_USERS_FULL\r\npublic static final String MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL\r\nAllows an application to set device policies outside the current user.\r\nFuller form of MANAGE_DEVICE_POLICY_ACROSS_USERS that removes the restriction on accessing user data.\r\nHolding this permission allows the use of any other held MANAGE_DEVICE_POLICY_* permissions across all\r\nusers on the device.\r\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL\"\r\nMANAGE_DEVICE_POLICY_ACROSS_USERS_SECURITY_CRITICAL\r\npublic static final String MANAGE_DEVICE_POLICY_ACROSS_USERS_SECURITY_CRITICAL\r\nAllows an application to set device policies outside the current user that are critical for securing data within the\r\ncurrent user.\r\nHolding this permission allows the use of other held MANAGE_DEVICE_POLICY_* permissions across all\r\nusers on the device provided they are required for securing data within the current user.\r\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value:\r\n\"android.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS_SECURITY_CRITICAL\"\r\nMANAGE_DEVICE_POLICY_AIRPLANE_MODE\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 69 of 126\n\npublic static final String MANAGE_DEVICE_POLICY_AIRPLANE_MODE\r\nAllows an application to set policy related to airplane mode.\r\nManifest.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS is required to call APIs protected by this permission\r\non users different to the calling user.\r\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_AIRPLANE_MODE\"\r\nMANAGE_DEVICE_POLICY_APPS_CONTROL\r\npublic static final String MANAGE_DEVICE_POLICY_APPS_CONTROL\r\nAllows an application to manage policy regarding modifying applications.\r\nManifest.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this\r\npermission on users different to the calling user.\r\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_APPS_CONTROL\"\r\nMANAGE_DEVICE_POLICY_APP_FUNCTIONS\r\npublic static final String MANAGE_DEVICE_POLICY_APP_FUNCTIONS\r\nAllows an application to manage policy related to AppFunctions.\r\nProtection level: internal|role\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_APP_FUNCTIONS\"\r\nMANAGE_DEVICE_POLICY_APP_RESTRICTIONS\r\npublic static final String MANAGE_DEVICE_POLICY_APP_RESTRICTIONS\r\nAllows an application to manage application restrictions.\r\nManifest.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this\r\npermission on users different to the calling user.\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 70 of 126\n\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_APP_RESTRICTIONS\"\r\nMANAGE_DEVICE_POLICY_APP_USER_DATA\r\npublic static final String MANAGE_DEVICE_POLICY_APP_USER_DATA\r\nAllows an application to manage policy related to application user data.\r\nManifest.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this\r\npermission on users different to the calling user.\r\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_APP_USER_DATA\"\r\nMANAGE_DEVICE_POLICY_ASSIST_CONTENT\r\npublic static final String MANAGE_DEVICE_POLICY_ASSIST_CONTENT\r\nAllows an application to set policy related to sending assist content to a privileged app such as the Assistant app.\r\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_ASSIST_CONTENT\"\r\nMANAGE_DEVICE_POLICY_AUDIO_OUTPUT\r\npublic static final String MANAGE_DEVICE_POLICY_AUDIO_OUTPUT\r\nAllows an application to set policy related to audio output.\r\nManifest.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this\r\npermission on users different to the calling user.\r\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_AUDIO_OUTPUT\"\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 71 of 126\n\nMANAGE_DEVICE_POLICY_AUTOFILL\r\npublic static final String MANAGE_DEVICE_POLICY_AUTOFILL\r\nAllows an application to set policy related to autofill.\r\nManifest.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this\r\npermission on users different to the calling user.\r\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_AUTOFILL\"\r\nMANAGE_DEVICE_POLICY_BACKUP_SERVICE\r\npublic static final String MANAGE_DEVICE_POLICY_BACKUP_SERVICE\r\nAllows an application to manage backup service policy.\r\nManifest.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this\r\npermission on users different to the calling user.\r\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_BACKUP_SERVICE\"\r\nMANAGE_DEVICE_POLICY_BLOCK_UNINSTALL\r\npublic static final String MANAGE_DEVICE_POLICY_BLOCK_UNINSTALL\r\nAllows an application to manage policy related to block package uninstallation.\r\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_BLOCK_UNINSTALL\"\r\nMANAGE_DEVICE_POLICY_BLUETOOTH\r\npublic static final String MANAGE_DEVICE_POLICY_BLUETOOTH\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 72 of 126\n\nAllows an application to set policy related to bluetooth.\r\nManifest.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this\r\npermission on users different to the calling user.\r\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_BLUETOOTH\"\r\nMANAGE_DEVICE_POLICY_BUGREPORT\r\npublic static final String MANAGE_DEVICE_POLICY_BUGREPORT\r\nAllows an application to request bugreports with user consent.\r\nManifest.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this\r\npermission on users different to the calling user.\r\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_BUGREPORT\"\r\nMANAGE_DEVICE_POLICY_CALLS\r\npublic static final String MANAGE_DEVICE_POLICY_CALLS\r\nAllows an application to manage calling policy.\r\nManifest.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this\r\npermission on users different to the calling user.\r\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_CALLS\"\r\nMANAGE_DEVICE_POLICY_CAMERA\r\npublic static final String MANAGE_DEVICE_POLICY_CAMERA\r\nAllows an application to set policy related to restricting a user's ability to use or enable and disable the camera.\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 73 of 126\n\nManifest.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS is required to call APIs protected by this permission\r\non users different to the calling user.\r\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_CAMERA\"\r\nMANAGE_DEVICE_POLICY_CAMERA_TOGGLE\r\npublic static final String MANAGE_DEVICE_POLICY_CAMERA_TOGGLE\r\nAllows an application to manage policy related to camera toggle.\r\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_CAMERA_TOGGLE\"\r\nMANAGE_DEVICE_POLICY_CERTIFICATES\r\npublic static final String MANAGE_DEVICE_POLICY_CERTIFICATES\r\nAllows an application to set policy related to certificates.\r\nManifest.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this\r\npermission on users different to the calling user.\r\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_CERTIFICATES\"\r\nMANAGE_DEVICE_POLICY_COMMON_CRITERIA_MODE\r\npublic static final String MANAGE_DEVICE_POLICY_COMMON_CRITERIA_MODE\r\nAllows an application to manage policy related to common criteria mode.\r\nManifest.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this\r\npermission on users different to the calling user.\r\nProtection level: internal|role\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 74 of 126\n\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_COMMON_CRITERIA_MODE\"\r\nMANAGE_DEVICE_POLICY_CONTENT_PROTECTION\r\npublic static final String MANAGE_DEVICE_POLICY_CONTENT_PROTECTION\r\nAllows an application to manage policy related to content protection.\r\nProtection level: internal|role\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_CONTENT_PROTECTION\"\r\nMANAGE_DEVICE_POLICY_DEBUGGING_FEATURES\r\npublic static final String MANAGE_DEVICE_POLICY_DEBUGGING_FEATURES\r\nAllows an application to manage debugging features policy.\r\nManifest.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this\r\npermission on users different to the calling user.\r\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_DEBUGGING_FEATURES\"\r\nMANAGE_DEVICE_POLICY_DEFAULT_SMS\r\npublic static final String MANAGE_DEVICE_POLICY_DEFAULT_SMS\r\nAllows an application to set policy related to the default sms application.\r\nManifest.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS is required to call APIs protected by this permission\r\non users different to the calling user.\r\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_DEFAULT_SMS\"\r\nMANAGE_DEVICE_POLICY_DEVICE_IDENTIFIERS\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 75 of 126\n\npublic static final String MANAGE_DEVICE_POLICY_DEVICE_IDENTIFIERS\r\nAllows an application to manage policy related to device identifiers.\r\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_DEVICE_IDENTIFIERS\"\r\nMANAGE_DEVICE_POLICY_DISPLAY\r\npublic static final String MANAGE_DEVICE_POLICY_DISPLAY\r\nAllows an application to set policy related to the display.\r\nManifest.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this\r\npermission on users different to the calling user.\r\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_DISPLAY\"\r\nMANAGE_DEVICE_POLICY_FACTORY_RESET\r\npublic static final String MANAGE_DEVICE_POLICY_FACTORY_RESET\r\nAllows an application to set policy related to factory reset.\r\nManifest.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this\r\npermission on users different to the calling user.\r\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_FACTORY_RESET\"\r\nMANAGE_DEVICE_POLICY_FUN\r\npublic static final String MANAGE_DEVICE_POLICY_FUN\r\nAllows an application to set policy related to fun.\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 76 of 126\n\nManifest.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this\r\npermission on users different to the calling user.\r\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_FUN\"\r\nMANAGE_DEVICE_POLICY_INPUT_METHODS\r\npublic static final String MANAGE_DEVICE_POLICY_INPUT_METHODS\r\nAllows an application to set policy related to input methods.\r\nManifest.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS is required to call APIs protected by this permission\r\non users different to the calling user.\r\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_INPUT_METHODS\"\r\nMANAGE_DEVICE_POLICY_INSTALL_UNKNOWN_SOURCES\r\npublic static final String MANAGE_DEVICE_POLICY_INSTALL_UNKNOWN_SOURCES\r\nAllows an application to manage installing from unknown sources policy.\r\nMANAGE_SECURITY_CRITICAL_DEVICE_POLICY_ACROSS_USERS is required to call APIs protected by\r\nthis permission on users different to the calling user.\r\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_INSTALL_UNKNOWN_SOURCES\"\r\nMANAGE_DEVICE_POLICY_KEEP_UNINSTALLED_PACKAGES\r\npublic static final String MANAGE_DEVICE_POLICY_KEEP_UNINSTALLED_PACKAGES\r\nAllows an application to set policy related to keeping uninstalled packages.\r\nManifest.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this\r\npermission on users different to the calling user.\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 77 of 126\n\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_KEEP_UNINSTALLED_PACKAGES\"\r\nMANAGE_DEVICE_POLICY_KEYGUARD\r\npublic static final String MANAGE_DEVICE_POLICY_KEYGUARD\r\nAllows an application to manage policy related to keyguard features. Like whether the camera, notifications are\r\nallowed on the secure keyguard screens.\r\nManifest.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS_SECURITY_CRITICAL is required to call APIs\r\nprotected by this permission on users different to the calling user.\r\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_KEYGUARD\"\r\nMANAGE_DEVICE_POLICY_LOCALE\r\npublic static final String MANAGE_DEVICE_POLICY_LOCALE\r\nAllows an application to set policy related to locale.\r\nManifest.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this\r\npermission on users different to the calling user.\r\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_LOCALE\"\r\nMANAGE_DEVICE_POLICY_LOCATION\r\npublic static final String MANAGE_DEVICE_POLICY_LOCATION\r\nAllows an application to set policy related to location.\r\nManifest.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this\r\npermission on users different to the calling user.\r\nProtection level: internal|role\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 78 of 126\n\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_LOCATION\"\r\nMANAGE_DEVICE_POLICY_LOCK\r\npublic static final String MANAGE_DEVICE_POLICY_LOCK\r\nAllows an application to lock a profile or the device with the appropriate cross-user permission.\r\nManifest.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this\r\npermission on users different to the calling user.\r\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_LOCK\"\r\nMANAGE_DEVICE_POLICY_LOCK_CREDENTIALS\r\npublic static final String MANAGE_DEVICE_POLICY_LOCK_CREDENTIALS\r\nAllows an application to set policy related to lock credentials.\r\nManifest.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS_SECURITY_CRITICAL is required to call APIs\r\nprotected by this permission on users different to the calling user.\r\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_LOCK_CREDENTIALS\"\r\nMANAGE_DEVICE_POLICY_LOCK_TASK\r\npublic static final String MANAGE_DEVICE_POLICY_LOCK_TASK\r\nAllows an application to manage lock task policy.\r\nManifest.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this\r\npermission on users different to the calling user.\r\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 79 of 126\n\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_LOCK_TASK\"\r\nMANAGE_DEVICE_POLICY_MANAGED_SUBSCRIPTIONS\r\npublic static final String MANAGE_DEVICE_POLICY_MANAGED_SUBSCRIPTIONS\r\nAllows an application to set policy related to subscriptions downloaded by an admin.\r\nManifest.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this\r\npermission on users different to the calling user.\r\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_MANAGED_SUBSCRIPTIONS\"\r\nMANAGE_DEVICE_POLICY_METERED_DATA\r\npublic static final String MANAGE_DEVICE_POLICY_METERED_DATA\r\nAllows an application to manage policy related to metered data.\r\nManifest.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this\r\npermission on users different to the calling user.\r\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_METERED_DATA\"\r\nMANAGE_DEVICE_POLICY_MICROPHONE\r\npublic static final String MANAGE_DEVICE_POLICY_MICROPHONE\r\nAllows an application to set policy related to restricting a user's ability to use or enable and disable the\r\nmicrophone.\r\nManifest.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS is required to call APIs protected by this permission\r\non users different to the calling user.\r\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_MICROPHONE\"\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 80 of 126\n\nMANAGE_DEVICE_POLICY_MICROPHONE_TOGGLE\r\npublic static final String MANAGE_DEVICE_POLICY_MICROPHONE_TOGGLE\r\nAllows an application to manage policy related to microphone toggle.\r\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_MICROPHONE_TOGGLE\"\r\nMANAGE_DEVICE_POLICY_MOBILE_NETWORK\r\npublic static final String MANAGE_DEVICE_POLICY_MOBILE_NETWORK\r\nAllows an application to set policy related to mobile networks.\r\nManifest.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this\r\npermission on users different to the calling user.\r\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_MOBILE_NETWORK\"\r\nMANAGE_DEVICE_POLICY_MODIFY_USERS\r\npublic static final String MANAGE_DEVICE_POLICY_MODIFY_USERS\r\nAllows an application to manage policy preventing users from modifying users.\r\nManifest.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this\r\npermission on users different to the calling user\r\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_MODIFY_USERS\"\r\nMANAGE_DEVICE_POLICY_MTE\r\npublic static final String MANAGE_DEVICE_POLICY_MTE\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 81 of 126\n\nAllows an application to manage policy related to the Memory Tagging Extension (MTE).\r\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_MTE\"\r\nMANAGE_DEVICE_POLICY_NEARBY_COMMUNICATION\r\npublic static final String MANAGE_DEVICE_POLICY_NEARBY_COMMUNICATION\r\nAllows an application to set policy related to nearby communications (e.g. Beam and nearby streaming).\r\nManifest.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this\r\npermission on users different to the calling user.\r\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_NEARBY_COMMUNICATION\"\r\nMANAGE_DEVICE_POLICY_NETWORK_LOGGING\r\npublic static final String MANAGE_DEVICE_POLICY_NETWORK_LOGGING\r\nAllows an application to set policy related to network logging.\r\nManifest.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this\r\npermission on users different to the calling user.\r\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_NETWORK_LOGGING\"\r\nMANAGE_DEVICE_POLICY_ORGANIZATION_IDENTITY\r\npublic static final String MANAGE_DEVICE_POLICY_ORGANIZATION_IDENTITY\r\nAllows an application to manage the identity of the managing organization.\r\nManifest.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this\r\npermission on users different to the calling user.\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 82 of 126\n\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_ORGANIZATION_IDENTITY\"\r\nMANAGE_DEVICE_POLICY_OVERRIDE_APN\r\npublic static final String MANAGE_DEVICE_POLICY_OVERRIDE_APN\r\nAllows an application to set policy related to override APNs.\r\nManifest.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this\r\npermission on users different to the calling user.\r\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_OVERRIDE_APN\"\r\nMANAGE_DEVICE_POLICY_PACKAGE_STATE\r\npublic static final String MANAGE_DEVICE_POLICY_PACKAGE_STATE\r\nAllows an application to set policy related to hiding and suspending packages.\r\nManifest.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS is required to call APIs protected by this permission\r\non users different to the calling user.\r\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_PACKAGE_STATE\"\r\nMANAGE_DEVICE_POLICY_PHYSICAL_MEDIA\r\npublic static final String MANAGE_DEVICE_POLICY_PHYSICAL_MEDIA\r\nAllows an application to set policy related to physical media.\r\nManifest.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this\r\npermission on users different to the calling user.\r\nProtection level: internal|role\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 83 of 126\n\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_PHYSICAL_MEDIA\"\r\nMANAGE_DEVICE_POLICY_PRINTING\r\npublic static final String MANAGE_DEVICE_POLICY_PRINTING\r\nAllows an application to set policy related to printing.\r\nManifest.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this\r\npermission on users different to the calling user.\r\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_PRINTING\"\r\nMANAGE_DEVICE_POLICY_PRIVATE_DNS\r\npublic static final String MANAGE_DEVICE_POLICY_PRIVATE_DNS\r\nAllows an application to set policy related to private DNS.\r\nManifest.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this\r\npermission on users different to the calling user.\r\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_PRIVATE_DNS\"\r\nMANAGE_DEVICE_POLICY_PROFILES\r\npublic static final String MANAGE_DEVICE_POLICY_PROFILES\r\nAllows an application to set policy related to profiles.\r\nManifest.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this\r\npermission on users different to the calling user.\r\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 84 of 126\n\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_PROFILES\"\r\nMANAGE_DEVICE_POLICY_PROFILE_INTERACTION\r\npublic static final String MANAGE_DEVICE_POLICY_PROFILE_INTERACTION\r\nAllows an application to set policy related to interacting with profiles (e.g. Disallowing cross-profile copy and\r\npaste).\r\nManifest.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this\r\npermission on users different to the calling user.\r\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_PROFILE_INTERACTION\"\r\nMANAGE_DEVICE_POLICY_PROXY\r\npublic static final String MANAGE_DEVICE_POLICY_PROXY\r\nAllows an application to set a network-independent global HTTP proxy.\r\nManifest.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this\r\npermission on users different to the calling user.\r\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_PROXY\"\r\nMANAGE_DEVICE_POLICY_QUERY_SYSTEM_UPDATES\r\npublic static final String MANAGE_DEVICE_POLICY_QUERY_SYSTEM_UPDATES\r\nAllows an application query system updates.\r\nManifest.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this\r\npermission on users different to the calling user.\r\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_QUERY_SYSTEM_UPDATES\"\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 85 of 126\n\nMANAGE_DEVICE_POLICY_RESET_PASSWORD\r\npublic static final String MANAGE_DEVICE_POLICY_RESET_PASSWORD\r\nAllows an application to force set a new device unlock password or a managed profile challenge on current user.\r\nManifest.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this\r\npermission on users different to the calling user.\r\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_RESET_PASSWORD\"\r\nMANAGE_DEVICE_POLICY_RESTRICT_PRIVATE_DNS\r\npublic static final String MANAGE_DEVICE_POLICY_RESTRICT_PRIVATE_DNS\r\nAllows an application to set policy related to restricting the user from configuring private DNS.\r\nManifest.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS is required to call APIs protected by this permission\r\non users different to the calling user.\r\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_RESTRICT_PRIVATE_DNS\"\r\nMANAGE_DEVICE_POLICY_RUNTIME_PERMISSIONS\r\npublic static final String MANAGE_DEVICE_POLICY_RUNTIME_PERMISSIONS\r\nAllows an application to set the grant state of runtime permissions on packages.\r\nManifest.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this\r\npermission on users different to the calling user.\r\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_RUNTIME_PERMISSIONS\"\r\nMANAGE_DEVICE_POLICY_RUN_IN_BACKGROUND\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 86 of 126\n\npublic static final String MANAGE_DEVICE_POLICY_RUN_IN_BACKGROUND\r\nAllows an application to set policy related to users running in the background.\r\nManifest.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this\r\npermission on users different to the calling user.\r\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_RUN_IN_BACKGROUND\"\r\nMANAGE_DEVICE_POLICY_SAFE_BOOT\r\npublic static final String MANAGE_DEVICE_POLICY_SAFE_BOOT\r\nAllows an application to manage safe boot policy.\r\nManifest.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this\r\npermission on users different to the calling user.\r\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_SAFE_BOOT\"\r\nMANAGE_DEVICE_POLICY_SCREEN_CAPTURE\r\npublic static final String MANAGE_DEVICE_POLICY_SCREEN_CAPTURE\r\nAllows an application to set policy related to screen capture.\r\nManifest.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS is required to call APIs protected by this permission\r\non users different to the calling user.\r\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_SCREEN_CAPTURE\"\r\nMANAGE_DEVICE_POLICY_SCREEN_CONTENT\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 87 of 126\n\npublic static final String MANAGE_DEVICE_POLICY_SCREEN_CONTENT\r\nAllows an application to set policy related to the usage of the contents of the screen.\r\nManifest.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this\r\npermission on users different to the calling user.\r\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_SCREEN_CONTENT\"\r\nMANAGE_DEVICE_POLICY_SECURITY_LOGGING\r\npublic static final String MANAGE_DEVICE_POLICY_SECURITY_LOGGING\r\nAllows an application to set policy related to security logging.\r\nManifest.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this\r\npermission on users different to the calling user.\r\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_SECURITY_LOGGING\"\r\nMANAGE_DEVICE_POLICY_SETTINGS\r\npublic static final String MANAGE_DEVICE_POLICY_SETTINGS\r\nAllows an application to set policy related to settings.\r\nManifest.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this\r\npermission on users different to the calling user.\r\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_SETTINGS\"\r\nMANAGE_DEVICE_POLICY_SMS\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 88 of 126\n\npublic static final String MANAGE_DEVICE_POLICY_SMS\r\nAllows an application to set policy related to sms.\r\nManifest.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this\r\npermission on users different to the calling user.\r\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_SMS\"\r\nMANAGE_DEVICE_POLICY_STATUS_BAR\r\npublic static final String MANAGE_DEVICE_POLICY_STATUS_BAR\r\nAllows an application to set policy related to the status bar.\r\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_STATUS_BAR\"\r\nMANAGE_DEVICE_POLICY_SUPPORT_MESSAGE\r\npublic static final String MANAGE_DEVICE_POLICY_SUPPORT_MESSAGE\r\nAllows an application to set support messages for when a user action is affected by an active policy.\r\nManifest.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this\r\npermission on users different to the calling user.\r\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_SUPPORT_MESSAGE\"\r\nMANAGE_DEVICE_POLICY_SUSPEND_PERSONAL_APPS\r\npublic static final String MANAGE_DEVICE_POLICY_SUSPEND_PERSONAL_APPS\r\nAllows an application to set policy related to suspending personal apps.\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 89 of 126\n\nManifest.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this\r\npermission on users different to the calling user.\r\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_SUSPEND_PERSONAL_APPS\"\r\nMANAGE_DEVICE_POLICY_SYSTEM_APPS\r\npublic static final String MANAGE_DEVICE_POLICY_SYSTEM_APPS\r\nAllows an application to manage policy related to system apps.\r\nManifest.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this\r\npermission on users different to the calling user.\r\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_SYSTEM_APPS\"\r\nMANAGE_DEVICE_POLICY_SYSTEM_DIALOGS\r\npublic static final String MANAGE_DEVICE_POLICY_SYSTEM_DIALOGS\r\nAllows an application to set policy related to system dialogs.\r\nManifest.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this\r\npermission on users different to the calling user.\r\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_SYSTEM_DIALOGS\"\r\nMANAGE_DEVICE_POLICY_SYSTEM_UPDATES\r\npublic static final String MANAGE_DEVICE_POLICY_SYSTEM_UPDATES\r\nAllows an application to set policy related to system updates.\r\nManifest.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this\r\npermission on users different to the calling user.\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 90 of 126\n\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_SYSTEM_UPDATES\"\r\nMANAGE_DEVICE_POLICY_THREAD_NETWORK\r\npublic static final String MANAGE_DEVICE_POLICY_THREAD_NETWORK\r\nAllows an application to set policy related to Thread network.\r\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_THREAD_NETWORK\"\r\nMANAGE_DEVICE_POLICY_TIME\r\npublic static final String MANAGE_DEVICE_POLICY_TIME\r\nAllows an application to manage device policy relating to time.\r\nManifest.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this\r\npermission on users different to the calling user.\r\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_TIME\"\r\nMANAGE_DEVICE_POLICY_USB_DATA_SIGNALLING\r\npublic static final String MANAGE_DEVICE_POLICY_USB_DATA_SIGNALLING\r\nAllows an application to set policy related to usb data signalling.\r\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_USB_DATA_SIGNALLING\"\r\nMANAGE_DEVICE_POLICY_USB_FILE_TRANSFER\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 91 of 126\n\npublic static final String MANAGE_DEVICE_POLICY_USB_FILE_TRANSFER\r\nAllows an application to set policy related to usb file transfers.\r\nManifest.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this\r\npermission on users different to the calling user.\r\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_USB_FILE_TRANSFER\"\r\nMANAGE_DEVICE_POLICY_USERS\r\npublic static final String MANAGE_DEVICE_POLICY_USERS\r\nAllows an application to set policy related to users.\r\nManifest.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this\r\npermission on users different to the calling user.\r\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_USERS\"\r\nMANAGE_DEVICE_POLICY_VPN\r\npublic static final String MANAGE_DEVICE_POLICY_VPN\r\nAllows an application to set policy related to VPNs.\r\nManifest.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this\r\npermission on users different to the calling user.\r\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_VPN\"\r\nMANAGE_DEVICE_POLICY_WALLPAPER\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 92 of 126\n\npublic static final String MANAGE_DEVICE_POLICY_WALLPAPER\r\nAllows an application to set policy related to the wallpaper.\r\nManifest.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this\r\npermission on users different to the calling user.\r\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_WALLPAPER\"\r\nMANAGE_DEVICE_POLICY_WIFI\r\npublic static final String MANAGE_DEVICE_POLICY_WIFI\r\nAllows an application to set policy related to Wifi.\r\nManifest.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS is required to call APIs protected by this permission\r\non users different to the calling user.\r\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_WIFI\"\r\nMANAGE_DEVICE_POLICY_WINDOWS\r\npublic static final String MANAGE_DEVICE_POLICY_WINDOWS\r\nAllows an application to set policy related to windows.\r\nManifest.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this\r\npermission on users different to the calling user.\r\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_WINDOWS\"\r\nMANAGE_DEVICE_POLICY_WIPE_DATA\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 93 of 126\n\npublic static final String MANAGE_DEVICE_POLICY_WIPE_DATA\r\nAllows an application to manage policy related to wiping data.\r\nManifest.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS is required to call APIs protected by this permission\r\non users different to the calling user.\r\nProtection level: internal|role\r\nIntended for use by the DEVICE_POLICY_MANAGEMENT role only.\r\nConstant Value: \"android.permission.MANAGE_DEVICE_POLICY_WIPE_DATA\"\r\nMANAGE_DOCUMENTS\r\npublic static final String MANAGE_DOCUMENTS\r\nAllows an application to manage access to documents, usually as part of a document picker.\r\nThis permission should only be held by the platform document management app and the shell (for CTS). This\r\npermission cannot be granted to third-party apps.\r\nConstant Value: \"android.permission.MANAGE_DOCUMENTS\"\r\nMANAGE_EXTERNAL_STORAGE\r\npublic static final String MANAGE_EXTERNAL_STORAGE\r\nAllows an application a broad access to external storage in scoped storage. Intended to be used by few apps that\r\nneed to manage files on behalf of the users.\r\nProtection level: signature|appop|preinstalled\r\nConstant Value: \"android.permission.MANAGE_EXTERNAL_STORAGE\"\r\nMANAGE_ONGOING_CALLS\r\npublic static final String MANAGE_ONGOING_CALLS\r\nAllows to query ongoing call details and manage ongoing calls\r\nProtection level: signature|appop\r\nConstant Value: \"android.permission.MANAGE_ONGOING_CALLS\"\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 94 of 126\n\nMANAGE_OWN_CALLS\r\npublic static final String MANAGE_OWN_CALLS\r\nAllows a calling application which manages its own calls through the self-managed ConnectionService APIs.\r\nSee PhoneAccount.CAPABILITY_SELF_MANAGED for more information on the self-managed ConnectionService\r\nAPIs.\r\nProtection level: normal\r\nConstant Value: \"android.permission.MANAGE_OWN_CALLS\"\r\nMANAGE_WIFI_INTERFACES\r\npublic static final String MANAGE_WIFI_INTERFACES\r\nAllows applications to get notified when a Wi-Fi interface request cannot be satisfied without tearing down one or\r\nmore other interfaces, and provide a decision whether to approve the request or reject it.\r\nNot for use by third-party applications.\r\nConstant Value: \"android.permission.MANAGE_WIFI_INTERFACES\"\r\nMANAGE_WIFI_NETWORK_SELECTION\r\npublic static final String MANAGE_WIFI_NETWORK_SELECTION\r\nThis permission is used to let OEMs grant their trusted app access to a subset of privileged wifi APIs to improve\r\nwifi performance. Allows applications to manage Wi-Fi network selection related features such as enable or\r\ndisable global auto-join, modify connectivity scan intervals, and approve Wi-Fi Direct connections.\r\nNot for use by third-party applications.\r\nConstant Value: \"android.permission.MANAGE_WIFI_NETWORK_SELECTION\"\r\nMASTER_CLEAR\r\npublic static final String MASTER_CLEAR\r\nNot for use by third-party applications.\r\nConstant Value: \"android.permission.MASTER_CLEAR\"\r\nMEDIA_CONTENT_CONTROL\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 95 of 126\n\npublic static final String MEDIA_CONTENT_CONTROL\r\nAllows an application to know what content is playing and control its playback.\r\nNot for use by third-party applications due to privacy of media consumption\r\nConstant Value: \"android.permission.MEDIA_CONTENT_CONTROL\"\r\nMEDIA_ROUTING_CONTROL\r\npublic static final String MEDIA_ROUTING_CONTROL\r\nAllows an application to control the routing of media apps.\r\nOnly for use by role COMPANION_DEVICE_WATCH\r\nConstant Value: \"android.permission.MEDIA_ROUTING_CONTROL\"\r\nMODIFY_AUDIO_SETTINGS\r\npublic static final String MODIFY_AUDIO_SETTINGS\r\nAllows an application to modify global audio settings.\r\nProtection level: normal\r\nConstant Value: \"android.permission.MODIFY_AUDIO_SETTINGS\"\r\nMODIFY_PHONE_STATE\r\npublic static final String MODIFY_PHONE_STATE\r\nAllows modification of the telephony state - power on, mmi, etc. Does not include placing calls.\r\nNot for use by third-party applications.\r\nConstant Value: \"android.permission.MODIFY_PHONE_STATE\"\r\nMOUNT_FORMAT_FILESYSTEMS\r\npublic static final String MOUNT_FORMAT_FILESYSTEMS\r\nAllows formatting file systems for removable storage.\r\nNot for use by third-party applications.\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 96 of 126\n\nConstant Value: \"android.permission.MOUNT_FORMAT_FILESYSTEMS\"\r\nMOUNT_UNMOUNT_FILESYSTEMS\r\npublic static final String MOUNT_UNMOUNT_FILESYSTEMS\r\nAllows mounting and unmounting file systems for removable storage.\r\nNot for use by third-party applications.\r\nConstant Value: \"android.permission.MOUNT_UNMOUNT_FILESYSTEMS\"\r\nNEARBY_WIFI_DEVICES\r\npublic static final String NEARBY_WIFI_DEVICES\r\nRequired to be able to advertise and connect to nearby devices via Wi-Fi.\r\nProtection level: dangerous\r\nConstant Value: \"android.permission.NEARBY_WIFI_DEVICES\"\r\nNFC\r\npublic static final String NFC\r\nAllows applications to perform I/O operations over NFC.\r\nProtection level: normal\r\nConstant Value: \"android.permission.NFC\"\r\nNFC_PREFERRED_PAYMENT_INFO\r\npublic static final String NFC_PREFERRED_PAYMENT_INFO\r\nAllows applications to receive NFC preferred payment service information.\r\nProtection level: normal\r\nConstant Value: \"android.permission.NFC_PREFERRED_PAYMENT_INFO\"\r\nNFC_TRANSACTION_EVENT\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 97 of 126\n\npublic static final String NFC_TRANSACTION_EVENT\r\nAllows applications to receive NFC transaction events.\r\nProtection level: normal\r\nConstant Value: \"android.permission.NFC_TRANSACTION_EVENT\"\r\nOVERRIDE_MEDIA_SESSION_OWNER\r\npublic static final String OVERRIDE_MEDIA_SESSION_OWNER\r\nAllows an application to override the owner of a MediaSession.\r\nNot for use by third-party applications due to privacy of media applications.\r\nConstant Value: \"android.permission.OVERRIDE_MEDIA_SESSION_OWNER\"\r\nOVERRIDE_WIFI_CONFIG\r\npublic static final String OVERRIDE_WIFI_CONFIG\r\nAllows an application to modify any wifi configuration, even if created by another application. Once reconfigured\r\nthe original creator cannot make any further modifications.\r\nNot for use by third-party applications.\r\nConstant Value: \"android.permission.OVERRIDE_WIFI_CONFIG\"\r\nPACKAGE_USAGE_STATS\r\npublic static final String PACKAGE_USAGE_STATS\r\nAllows an application to collect component usage statistics\r\nDeclaring the permission implies intention to use the API and the user of the device can grant permission through\r\nthe Settings application.\r\nProtection level: signature|privileged|development|appop|retailDemo\r\nConstant Value: \"android.permission.PACKAGE_USAGE_STATS\"\r\nPERSISTENT_ACTIVITY\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 98 of 126\n\npublic static final String PERSISTENT_ACTIVITY\r\nThis constant was deprecated in API level 15.\r\nThis functionality will be removed in the future; please do not use. Allow an application to make its activities\r\npersistent.\r\nConstant Value: \"android.permission.PERSISTENT_ACTIVITY\"\r\nPOST_NOTIFICATIONS\r\npublic static final String POST_NOTIFICATIONS\r\nAllows an app to post notifications\r\nProtection level: dangerous\r\nConstant Value: \"android.permission.POST_NOTIFICATIONS\"\r\nPOST_PROMOTED_NOTIFICATIONS\r\npublic static final String POST_PROMOTED_NOTIFICATIONS\r\nRequired for apps to post promoted notifications.\r\nThis is required in addition to (not instead of) POST_NOTIFICATIONS .\r\nProtection level: normal|appops\r\nConstant Value: \"android.permission.POST_PROMOTED_NOTIFICATIONS\"\r\nPROCESS_OUTGOING_CALLS\r\npublic static final String PROCESS_OUTGOING_CALLS\r\nThis constant was deprecated in API level 29.\r\nApplications should use CallRedirectionService instead of the Intent.ACTION_NEW_OUTGOING_CALL broadcast.\r\nAllows an application to see the number being dialed during an outgoing call with the option to redirect the call to\r\na different number or abort the call altogether.\r\nProtection level: dangerous\r\nThis is a hard restricted permission which cannot be held by an app until the installer on record allowlists the\r\npermission. For more details see\r\nPackageInstaller.SessionParams.setWhitelistedRestrictedPermissions(Set) .\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 99 of 126\n\nConstant Value: \"android.permission.PROCESS_OUTGOING_CALLS\"\r\nPROVIDE_OWN_AUTOFILL_SUGGESTIONS\r\npublic static final String PROVIDE_OWN_AUTOFILL_SUGGESTIONS\r\nAllows an application to display its suggestions using the autofill framework.\r\nFor now, this permission is only granted to the Browser application.\r\nProtection level: internal|role\r\nConstant Value: \"android.permission.PROVIDE_OWN_AUTOFILL_SUGGESTIONS\"\r\nPROVIDE_PRIVATE_COMPUTE_SERVICES\r\npublic static final String PROVIDE_PRIVATE_COMPUTE_SERVICES\r\nAllows an application to act as Private Compute Services, which allows the application to communicate with\r\nPrivate Compute Core components.\r\nProtection level: signature|privileged\r\nConstant Value: \"android.permission.PROVIDE_PRIVATE_COMPUTE_SERVICES\"\r\nPROVIDE_REMOTE_CREDENTIALS\r\npublic static final String PROVIDE_REMOTE_CREDENTIALS\r\nAllows an application to be able to store and retrieve credentials from a remote device.\r\nProtection level: signature|privileged|role\r\nConstant Value: \"android.permission.PROVIDE_REMOTE_CREDENTIALS\"\r\nQUERY_ADVANCED_PROTECTION_MODE\r\npublic static final String QUERY_ADVANCED_PROTECTION_MODE\r\nAllows an application to query the device's advanced protection mode status.\r\nConstant Value: \"android.permission.QUERY_ADVANCED_PROTECTION_MODE\"\r\nQUERY_ALL_PACKAGES\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 100 of 126\n\npublic static final String QUERY_ALL_PACKAGES\r\nAllows query of any normal app on the device, regardless of manifest declarations.\r\nProtection level: normal\r\nConstant Value: \"android.permission.QUERY_ALL_PACKAGES\"\r\nRANGING\r\npublic static final String RANGING\r\nRequired to be able to range to devices using generic ranging module.\r\nProtection level: dangerous\r\nConstant Value: \"android.permission.RANGING\"\r\nREAD_ASSISTANT_APP_SEARCH_DATA\r\npublic static final String READ_ASSISTANT_APP_SEARCH_DATA\r\nAllows an application to query over global data in AppSearch that's visible to the ASSISTANT role.\r\nConstant Value: \"android.permission.READ_ASSISTANT_APP_SEARCH_DATA\"\r\nREAD_ASSIST_STRUCTURE_SCREEN_CONTENT\r\npublic static final String READ_ASSIST_STRUCTURE_SCREEN_CONTENT\r\nAllows an assistant application to read screen content in the AssistStructure.\r\nNote: Beginning with ERROR(C android.os.Build.VERSION_CODES.CINNAMON_BUN /Android C\r\nandroid.os.Build.VERSION_CODES.CINNAMON_BUN) This permission is required by any VoiceInteractionService that\r\nwishes to receive screen content in the AssistStructure when the assistant's VoiceInteractionService is invoked\r\neither via hotword detection or from the system. If this permission is not held, the AssistStructure will only obtain\r\nwindow data and will omit any screen content from the provided AssistStructure.\r\nProtection level: normal\r\nConstant Value: \"android.permission.READ_ASSIST_STRUCTURE_SCREEN_CONTENT\"\r\nREAD_BASIC_PHONE_STATE\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 101 of 126\n\npublic static final String READ_BASIC_PHONE_STATE\r\nAllows read only access to phone state with a non dangerous permission, including the information like cellular\r\nnetwork type, software version.\r\nConstant Value: \"android.permission.READ_BASIC_PHONE_STATE\"\r\nREAD_CALENDAR\r\npublic static final String READ_CALENDAR\r\nAllows an application to read the user's calendar data.\r\nProtection level: dangerous\r\nConstant Value: \"android.permission.READ_CALENDAR\"\r\nREAD_COLOR_ZONES\r\npublic static final String READ_COLOR_ZONES\r\nAllows an application to read the aggregated color zones on the screen for use cases like TV ambient backlight\r\nusages.\r\nProtection level: normal\r\nConstant Value: \"android.permission.READ_COLOR_ZONES\"\r\nREAD_CONTACTS\r\npublic static final String READ_CONTACTS\r\nAllows an application to read the user's contacts data.\r\nProtection level: dangerous\r\nConstant Value: \"android.permission.READ_CONTACTS\"\r\nREAD_DROPBOX_DATA\r\npublic static final String READ_DROPBOX_DATA\r\nAllows an application to access the data in Dropbox.\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 102 of 126\n\nNot for use by third-party applications.\r\nConstant Value: \"android.permission.READ_DROPBOX_DATA\"\r\nREAD_EXTERNAL_STORAGE\r\npublic static final String READ_EXTERNAL_STORAGE\r\nAllows an application to read from external storage.\r\nNote: Starting in API level 33, this permission has no effect. If your app accesses other apps' media files, request\r\none or more of these permissions instead: READ_MEDIA_IMAGES , READ_MEDIA_VIDEO , READ_MEDIA_AUDIO . Learn\r\nmore about the storage permissions that are associated with media files.\r\nThis permission is enforced starting in API level 19. Before API level 19, this permission is not enforced and all\r\napps still have access to read from external storage. You can test your app with the permission enforced by\r\nenabling Protect USB storage under Developer options in the Settings app on a device running Android 4.1 or\r\nhigher.\r\nAlso starting in API level 19, this permission is not required to read or write files in your application-specific\r\ndirectories returned by Context.getExternalFilesDir(String) and Context.getExternalCacheDir() .\r\nStarting in API level 29, apps don't need to request this permission to access files in their app-specific directory on\r\nexternal storage, or their own files in the MediaStore . Apps shouldn't request this permission unless they need to\r\naccess other apps' files in the MediaStore . Read more about these changes in the scoped storage section of the\r\ndeveloper documentation.\r\nIf both your minSdkVersion and targetSdkVersion values are set to 3 or lower, the system implicitly grants\r\nyour app this permission. If you don't need this permission, be sure your targetSdkVersion is 4 or higher.\r\nThis is a soft restricted permission which cannot be held by an app it its full form until the installer on record\r\nallowlists the permission. Specifically, if the permission is allowlisted the holder app can access external storage\r\nand the visual and aural media collections while if the permission is not allowlisted the holder app can only access\r\nto the visual and aural medial collections. Also the permission is immutably restricted meaning that the allowlist\r\nstate can be specified only at install time and cannot change until the app is installed. For more details see\r\nPackageInstaller.SessionParams.setWhitelistedRestrictedPermissions(Set) .\r\nProtection level: dangerous\r\nConstant Value: \"android.permission.READ_EXTERNAL_STORAGE\"\r\nREAD_HOME_APP_SEARCH_DATA\r\npublic static final String READ_HOME_APP_SEARCH_DATA\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 103 of 126\n\nAllows an application to query over global data in AppSearch that's visible to the HOME role.\r\nConstant Value: \"android.permission.READ_HOME_APP_SEARCH_DATA\"\r\nREAD_INPUT_STATE\r\npublic static final String READ_INPUT_STATE\r\nThis constant was deprecated in API level 16.\r\nThe API that used this permission has been removed.\r\nAllows an application to retrieve the current state of keys and switches.\r\nNot for use by third-party applications.\r\nConstant Value: \"android.permission.READ_INPUT_STATE\"\r\nREAD_LOGS\r\npublic static final String READ_LOGS\r\nAllows an application to read the low-level system log files.\r\nNot for use by third-party applications, because Log entries can contain the user's private information.\r\nConstant Value: \"android.permission.READ_LOGS\"\r\nREAD_MEDIA_VISUAL_USER_SELECTED\r\npublic static final String READ_MEDIA_VISUAL_USER_SELECTED\r\nAllows an application to read image or video files from external storage that a user has selected via the permission\r\nprompt photo picker. Apps can check this permission to verify that a user has decided to use the photo picker,\r\ninstead of granting access to READ_MEDIA_IMAGES or READ_MEDIA_VIDEO . It does not prevent apps from accessing\r\nthe standard photo picker manually. This permission should be requested alongside READ_MEDIA_IMAGES and/or\r\nREAD_MEDIA_VIDEO , depending on which type of media is desired.\r\nThis permission will be automatically added to an app's manifest if the app requests READ_MEDIA_IMAGES ,\r\nREAD_MEDIA_VIDEO , or ACCESS_MEDIA_LOCATION regardless of target SDK. If an app does not request this\r\npermission, then the grant dialog will return `PERMISSION_GRANTED` for READ_MEDIA_IMAGES and/or\r\nREAD_MEDIA_VIDEO , but the app will only have access to the media selected by the user. This false grant state will\r\npersist until the app goes into the background.\r\nProtection level: dangerous\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 104 of 126\n\nConstant Value: \"android.permission.READ_MEDIA_VISUAL_USER_SELECTED\"\r\nREAD_PHONE_NUMBERS\r\npublic static final String READ_PHONE_NUMBERS\r\nAllows read access to the device's phone number(s), which is exposed to instant applications.\r\nProtection level: dangerous\r\nConstant Value: \"android.permission.READ_PHONE_NUMBERS\"\r\nREAD_PHONE_STATE\r\npublic static final String READ_PHONE_STATE\r\nAllows read only access to phone state, including the current cellular network information, the status of any\r\nongoing calls, and a list of any PhoneAccount s registered on the device.\r\nNote: If both your minSdkVersion and targetSdkVersion values are set to 3 or lower, the system implicitly\r\ngrants your app this permission. If you don't need this permission, be sure your targetSdkVersion is 4 or higher.\r\nProtection level: dangerous\r\nConstant Value: \"android.permission.READ_PHONE_STATE\"\r\nREAD_PRECISE_PHONE_STATE\r\npublic static final String READ_PRECISE_PHONE_STATE\r\nAllows read only access to precise phone state. Allows reading of detailed information about phone state for\r\nspecial-use applications such as dialers, carrier applications, or ims applications.\r\nConstant Value: \"android.permission.READ_PRECISE_PHONE_STATE\"\r\nREAD_SYNC_SETTINGS\r\npublic static final String READ_SYNC_SETTINGS\r\nAllows applications to read the sync settings.\r\nProtection level: normal\r\nConstant Value: \"android.permission.READ_SYNC_SETTINGS\"\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 105 of 126\n\nREAD_SYNC_STATS\r\npublic static final String READ_SYNC_STATS\r\nAllows applications to read the sync stats.\r\nProtection level: normal\r\nConstant Value: \"android.permission.READ_SYNC_STATS\"\r\nREAD_SYSTEM_PREFERENCES\r\npublic static final String READ_SYSTEM_PREFERENCES\r\nAllows an application to access the Settings Preference services to read settings exposed by the system Settings\r\napp and system apps that contribute settings surfaced by the Settings app.\r\nThis allows the calling application to read settings values through the host application, agnostic of underlying\r\nstorage.\r\nConstant Value: \"android.permission.READ_SYSTEM_PREFERENCES\"\r\nREAD_VOICEMAIL\r\npublic static final String READ_VOICEMAIL\r\nAllows an application to read voicemails in the system.\r\nProtection level: signature|privileged|role\r\nConstant Value: \"com.android.voicemail.permission.READ_VOICEMAIL\"\r\nREBOOT\r\npublic static final String REBOOT\r\nRequired to be able to reboot the device.\r\nNot for use by third-party applications.\r\nConstant Value: \"android.permission.REBOOT\"\r\nRECEIVE_BOOT_COMPLETED\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 106 of 126\n\npublic static final String RECEIVE_BOOT_COMPLETED\r\nAllows an application to receive the Intent.ACTION_BOOT_COMPLETED that is broadcast after the system finishes\r\nbooting. If you don't request this permission, you will not receive the broadcast at that time. Though holding this\r\npermission does not have any security implications, it can have a negative impact on the user experience by\r\nincreasing the amount of time it takes the system to start and allowing applications to have themselves running\r\nwithout the user being aware of them. As such, you must explicitly declare your use of this facility to make that\r\nvisible to the user.\r\nProtection level: normal\r\nConstant Value: \"android.permission.RECEIVE_BOOT_COMPLETED\"\r\nRECEIVE_MMS\r\npublic static final String RECEIVE_MMS\r\nAllows an application to monitor incoming MMS messages.\r\nProtection level: dangerous\r\nThis is a hard restricted permission which cannot be held by an app until the installer on record allowlists the\r\npermission. For more details see\r\nPackageInstaller.SessionParams.setWhitelistedRestrictedPermissions(Set) .\r\nConstant Value: \"android.permission.RECEIVE_MMS\"\r\nRECEIVE_SENSITIVE_NOTIFICATIONS\r\npublic static final String RECEIVE_SENSITIVE_NOTIFICATIONS\r\nAllows apps with a NotificationListenerService to receive notifications with sensitive information\r\nApps with a NotificationListenerService without this permission will not be able to view certain types of sensitive\r\ninformation contained in notifications\r\nThis permission also allows apps with the SMS permissions to query and receive broadcasts about SMS messages\r\nthat contain One Time Passwords\r\nProtection level: signature|preinstalled|knownSigner|role\r\nConstant Value: \"android.permission.RECEIVE_SENSITIVE_NOTIFICATIONS\"\r\nRECEIVE_SMS\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 107 of 126\n\npublic static final String RECEIVE_SMS\r\nAllows an application to receive SMS messages.\r\nProtection level: dangerous\r\nThis is a hard restricted permission which cannot be held by an app until the installer on record allowlists the\r\npermission. For more details see\r\nPackageInstaller.SessionParams.setWhitelistedRestrictedPermissions(Set) .\r\nConstant Value: \"android.permission.RECEIVE_SMS\"\r\nRECEIVE_WAP_PUSH\r\npublic static final String RECEIVE_WAP_PUSH\r\nAllows an application to receive WAP push messages.\r\nProtection level: dangerous\r\nThis is a hard restricted permission which cannot be held by an app until the installer on record allowlists the\r\npermission. For more details see\r\nPackageInstaller.SessionParams.setWhitelistedRestrictedPermissions(Set) .\r\nConstant Value: \"android.permission.RECEIVE_WAP_PUSH\"\r\nRECORD_AUDIO\r\npublic static final String RECORD_AUDIO\r\nAllows an application to record audio.\r\nProtection level: dangerous\r\nConstant Value: \"android.permission.RECORD_AUDIO\"\r\nREORDER_TASKS\r\npublic static final String REORDER_TASKS\r\nAllows an application to change the Z-order of tasks.\r\nProtection level: normal\r\nConstant Value: \"android.permission.REORDER_TASKS\"\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 108 of 126\n\nREPOSITION_SELF_WINDOWS\r\npublic static final String REPOSITION_SELF_WINDOWS\r\nAllows an application to programmatically move and resize its tasks when the system is in a state that allows such\r\noperations, e.g. in a desktop-like environment. It is only extended to the default browser and OEM specific\r\nsignature apps.\r\nProtection level: signature|role\r\nConstant Value: \"android.permission.REPOSITION_SELF_WINDOWS\"\r\nREQUEST_COMPANION_PROFILE_APP_STREAMING\r\npublic static final String REQUEST_COMPANION_PROFILE_APP_STREAMING\r\nAllows application to request to be associated with a virtual device capable of streaming Android applications\r\n( AssociationRequest.DEVICE_PROFILE_APP_STREAMING ) by CompanionDeviceManager .\r\nNot for use by third-party applications.\r\nConstant Value: \"android.permission.REQUEST_COMPANION_PROFILE_APP_STREAMING\"\r\nREQUEST_COMPANION_PROFILE_AUTOMOTIVE_PROJECTION\r\npublic static final String REQUEST_COMPANION_PROFILE_AUTOMOTIVE_PROJECTION\r\nAllows application to request to be associated with a vehicle head unit capable of automotive projection\r\n( AssociationRequest.DEVICE_PROFILE_AUTOMOTIVE_PROJECTION ) by CompanionDeviceManager .\r\nNot for use by third-party applications.\r\nConstant Value: \"android.permission.REQUEST_COMPANION_PROFILE_AUTOMOTIVE_PROJECTION\"\r\nREQUEST_COMPANION_PROFILE_COMPUTER\r\npublic static final String REQUEST_COMPANION_PROFILE_COMPUTER\r\nAllows application to request to be associated with a computer to share functionality and/or data with other\r\ndevices, such as notifications, photos and media ( AssociationRequest.DEVICE_PROFILE_COMPUTER ) by\r\nCompanionDeviceManager .\r\nNot for use by third-party applications.\r\nConstant Value: \"android.permission.REQUEST_COMPANION_PROFILE_COMPUTER\"\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 109 of 126\n\nREQUEST_COMPANION_PROFILE_GLASSES\r\npublic static final String REQUEST_COMPANION_PROFILE_GLASSES\r\nAllows app to request to be associated with a device via CompanionDeviceManager as \"glasses\"\r\nProtection level: normal\r\nConstant Value: \"android.permission.REQUEST_COMPANION_PROFILE_GLASSES\"\r\nREQUEST_COMPANION_PROFILE_NEARBY_DEVICE_STREAMING\r\npublic static final String REQUEST_COMPANION_PROFILE_NEARBY_DEVICE_STREAMING\r\nAllows application to request to stream content from an Android host to a nearby device\r\n( AssociationRequest.DEVICE_PROFILE_NEARBY_DEVICE_STREAMING ) by CompanionDeviceManager .\r\nNot for use by third-party applications.\r\nConstant Value:\r\n\"android.permission.REQUEST_COMPANION_PROFILE_NEARBY_DEVICE_STREAMING\"\r\nREQUEST_COMPANION_PROFILE_WATCH\r\npublic static final String REQUEST_COMPANION_PROFILE_WATCH\r\nAllows app to request to be associated with a device via CompanionDeviceManager as a \"watch\"\r\nProtection level: normal\r\nConstant Value: \"android.permission.REQUEST_COMPANION_PROFILE_WATCH\"\r\nREQUEST_COMPANION_SELF_MANAGED\r\npublic static final String REQUEST_COMPANION_SELF_MANAGED\r\nAllows an application to create a \"self-managed\" association.\r\nConstant Value: \"android.permission.REQUEST_COMPANION_SELF_MANAGED\"\r\nREQUEST_COMPANION_START_FOREGROUND_SERVICES_FROM_BACKGROUND\r\npublic static final String REQUEST_COMPANION_START_FOREGROUND_SERVICES_FROM_BACKGROUND\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 110 of 126\n\nAllows a companion app to start a foreground service from the background.\r\nProtection level: normal\r\nConstant Value:\r\n\"android.permission.REQUEST_COMPANION_START_FOREGROUND_SERVICES_FROM_BACKGROUND\"\r\nREQUEST_COMPANION_USE_DATA_IN_BACKGROUND\r\npublic static final String REQUEST_COMPANION_USE_DATA_IN_BACKGROUND\r\nAllows a companion app to use data in the background.\r\nProtection level: normal\r\nConstant Value: \"android.permission.REQUEST_COMPANION_USE_DATA_IN_BACKGROUND\"\r\nREQUEST_IGNORE_BATTERY_OPTIMIZATIONS\r\npublic static final String REQUEST_IGNORE_BATTERY_OPTIMIZATIONS\r\nPermission an application must hold in order to use Settings.ACTION_REQUEST_IGNORE_BATTERY_OPTIMIZATIONS .\r\nProtection level: normal\r\nConstant Value: \"android.permission.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS\"\r\nREQUEST_INSTALL_PACKAGES\r\npublic static final String REQUEST_INSTALL_PACKAGES\r\nAllows an application to request installing packages. Apps targeting APIs greater than 25 must hold this\r\npermission in order to use Intent.ACTION_INSTALL_PACKAGE .\r\nProtection level: signature\r\nConstant Value: \"android.permission.REQUEST_INSTALL_PACKAGES\"\r\nREQUEST_OBSERVE_COMPANION_DEVICE_PRESENCE\r\npublic static final String REQUEST_OBSERVE_COMPANION_DEVICE_PRESENCE\r\nAllows an application to subscribe to notifications about the presence status change of their associated companion\r\ndevice\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 111 of 126\n\nConstant Value: \"android.permission.REQUEST_OBSERVE_COMPANION_DEVICE_PRESENCE\"\r\nREQUEST_OBSERVE_DEVICE_UUID_PRESENCE\r\npublic static final String REQUEST_OBSERVE_DEVICE_UUID_PRESENCE\r\nAllows an application to subscribe to notifications about the nearby devices' presence status change base on the\r\nUUIDs.\r\nNot for use by third-party applications.\r\nConstant Value: \"android.permission.REQUEST_OBSERVE_DEVICE_UUID_PRESENCE\"\r\nREQUEST_PASSWORD_COMPLEXITY\r\npublic static final String REQUEST_PASSWORD_COMPLEXITY\r\nAllows an application to request the screen lock complexity and prompt users to update the screen lock to a\r\ncertain complexity level.\r\nProtection level: normal\r\nConstant Value: \"android.permission.REQUEST_PASSWORD_COMPLEXITY\"\r\nRESTART_PACKAGES\r\npublic static final String RESTART_PACKAGES\r\nThis constant was deprecated in API level 15.\r\nThe ActivityManager.restartPackage(String) API is no longer supported.\r\nConstant Value: \"android.permission.RESTART_PACKAGES\"\r\nRUN_USER_INITIATED_JOBS\r\npublic static final String RUN_USER_INITIATED_JOBS\r\nAllows applications to use the user-initiated jobs API. For more details see\r\nJobInfo.Builder.setUserInitiated(boolean) .\r\nProtection level: normal\r\nConstant Value: \"android.permission.RUN_USER_INITIATED_JOBS\"\r\nSCHEDULE_EXACT_ALARM\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 112 of 126\n\npublic static final String SCHEDULE_EXACT_ALARM\r\nAllows applications to use exact alarm APIs.\r\nThis is a special access permission that can be revoked by the system or the user. It should only be used to enable\r\nuser-facing features that require exact alarms. For more details, please go through the associated developer docs.\r\nApps need to target API Build.VERSION_CODES.S or above to be able to request this permission. Note that apps\r\ntargeting lower API levels do not need this permission to use exact alarm APIs.\r\nApps that hold this permission and target API Build.VERSION_CODES.TIRAMISU and below always stay in the\r\nWORKING_SET or lower standby bucket.\r\nIf your app relies on exact alarms for core functionality, it can instead request USE_EXACT_ALARM once it targets\r\nAPI Build.VERSION_CODES.TIRAMISU . All apps using exact alarms for secondary features (which should still be\r\nuser facing) should continue using this permission.\r\nProtection level: signature|privileged|appop\r\nConstant Value: \"android.permission.SCHEDULE_EXACT_ALARM\"\r\nSEND_RESPOND_VIA_MESSAGE\r\npublic static final String SEND_RESPOND_VIA_MESSAGE\r\nAllows an application (Phone) to send a request to other applications to handle the respond-via-message action\r\nduring incoming calls.\r\nNot for use by third-party applications.\r\nConstant Value: \"android.permission.SEND_RESPOND_VIA_MESSAGE\"\r\nSET_ALARM\r\npublic static final String SET_ALARM\r\nAllows an application to broadcast an Intent to set an alarm for the user.\r\nProtection level: normal\r\nConstant Value: \"com.android.alarm.permission.SET_ALARM\"\r\nSET_ALWAYS_FINISH\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 113 of 126\n\npublic static final String SET_ALWAYS_FINISH\r\nAllows an application to control whether activities are immediately finished when put in the background.\r\nNot for use by third-party applications.\r\nConstant Value: \"android.permission.SET_ALWAYS_FINISH\"\r\nSET_ANIMATION_SCALE\r\npublic static final String SET_ANIMATION_SCALE\r\nModify the global animation scaling factor.\r\nNot for use by third-party applications.\r\nConstant Value: \"android.permission.SET_ANIMATION_SCALE\"\r\nSET_BIOMETRIC_DIALOG_ADVANCED\r\npublic static final String SET_BIOMETRIC_DIALOG_ADVANCED\r\nAllows an application to set the advanced features on BiometricDialog (SystemUI), including logo, logo\r\ndescription, and content view with more options button.\r\nNot for use by third-party applications.\r\nConstant Value: \"android.permission.SET_BIOMETRIC_DIALOG_ADVANCED\"\r\nSET_DEBUG_APP\r\npublic static final String SET_DEBUG_APP\r\nConfigure an application for debugging.\r\nNot for use by third-party applications.\r\nConstant Value: \"android.permission.SET_DEBUG_APP\"\r\nSET_PREFERRED_APPLICATIONS\r\npublic static final String SET_PREFERRED_APPLICATIONS\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 114 of 126\n\nThis constant was deprecated in API level 15.\r\nNo longer useful, see PackageManager.addPackageToPreferred(String) for details.\r\nConstant Value: \"android.permission.SET_PREFERRED_APPLICATIONS\"\r\nSET_PROCESS_LIMIT\r\npublic static final String SET_PROCESS_LIMIT\r\nAllows an application to set the maximum number of (not needed) application processes that can be running.\r\nNot for use by third-party applications.\r\nConstant Value: \"android.permission.SET_PROCESS_LIMIT\"\r\nSET_TIME\r\npublic static final String SET_TIME\r\nAllows applications to set the system time directly.\r\nNot for use by third-party applications.\r\nConstant Value: \"android.permission.SET_TIME\"\r\nSET_TIME_ZONE\r\npublic static final String SET_TIME_ZONE\r\nAllows applications to set the system time zone directly.\r\nNot for use by third-party applications.\r\nConstant Value: \"android.permission.SET_TIME_ZONE\"\r\nSET_WALLPAPER\r\npublic static final String SET_WALLPAPER\r\nAllows applications to set the wallpaper.\r\nProtection level: normal\r\nConstant Value: \"android.permission.SET_WALLPAPER\"\r\nSET_WALLPAPER_HINTS\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 115 of 126\n\npublic static final String SET_WALLPAPER_HINTS\r\nAllows applications to set the wallpaper hints.\r\nProtection level: normal\r\nConstant Value: \"android.permission.SET_WALLPAPER_HINTS\"\r\npublic static final String SHOW_POWER_MENU\r\nPermission needed to request to show the Power Menu.\r\nGranted to the current holder of the ASSISTANT role.\r\nConstant Value: \"android.permission.SHOW_POWER_MENU\"\r\npublic static final String SHOW_POWER_MENU_PRIVILEGED\r\nPermission needed to request to show the Power Menu.\r\nGranted to certain privileged apps.\r\nConstant Value: \"android.permission.SHOW_POWER_MENU_PRIVILEGED\"\r\nSIGNAL_PERSISTENT_PROCESSES\r\npublic static final String SIGNAL_PERSISTENT_PROCESSES\r\nAllow an application to request that a signal be sent to all persistent processes.\r\nNot for use by third-party applications.\r\nConstant Value: \"android.permission.SIGNAL_PERSISTENT_PROCESSES\"\r\nSMS_FINANCIAL_TRANSACTIONS\r\npublic static final String SMS_FINANCIAL_TRANSACTIONS\r\nThis constant was deprecated in API level 31.\r\nThe API that used this permission is no longer functional.\r\nAllows financial apps to read filtered sms messages. Protection level: signature|appop\r\nConstant Value: \"android.permission.SMS_FINANCIAL_TRANSACTIONS\"\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 116 of 126\n\nSTART_FOREGROUND_SERVICES_FROM_BACKGROUND\r\npublic static final String START_FOREGROUND_SERVICES_FROM_BACKGROUND\r\nAllows an application to start foreground services from the background at any time. This permission is not for use\r\nby third-party applications, with the only exception being if the app is the default SMS app. Otherwise, it's only\r\nusable by privileged apps, app verifier app, and apps with any of the EMERGENCY or SYSTEM GALLERY\r\nroles.\r\nConstant Value: \"android.permission.START_FOREGROUND_SERVICES_FROM_BACKGROUND\"\r\nSTART_VIEW_APP_FEATURES\r\npublic static final String START_VIEW_APP_FEATURES\r\nAllows the holder to start the screen with a list of app features.\r\nProtection level: signature|installer\r\nConstant Value: \"android.permission.START_VIEW_APP_FEATURES\"\r\nSTART_VIEW_PERMISSION_USAGE\r\npublic static final String START_VIEW_PERMISSION_USAGE\r\nAllows the holder to start the permission usage screen for an app.\r\nProtection level: signature|installer\r\nConstant Value: \"android.permission.START_VIEW_PERMISSION_USAGE\"\r\nSTATUS_BAR\r\npublic static final String STATUS_BAR\r\nAllows an application to open, close, or disable the status bar and its icons.\r\nNot for use by third-party applications.\r\nConstant Value: \"android.permission.STATUS_BAR\"\r\nSUBSCRIBE_TO_KEYGUARD_LOCKED_STATE\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 117 of 126\n\npublic static final String SUBSCRIBE_TO_KEYGUARD_LOCKED_STATE\r\nAllows an application to subscribe to device locked and keyguard locked (i.e., showing) state.\r\nProtection level: signature|privileged|module|role\r\nIntended for use by ROLE_ASSISTANT, VDM, and signature / privileged apps only.\r\nConstant Value: \"android.permission.SUBSCRIBE_TO_KEYGUARD_LOCKED_STATE\"\r\nSYSTEM_ALERT_WINDOW\r\npublic static final String SYSTEM_ALERT_WINDOW\r\nAllows an app to create windows using the type WindowManager.LayoutParams.TYPE_APPLICATION_OVERLAY ,\r\nshown on top of all other apps. Very few apps should use this permission; these windows are intended for system-level interaction with the user.\r\nNote: If the app targets API level 23 or higher, the app user must explicitly grant this permission to the app\r\nthrough a permission management screen. The app requests the user's approval by sending an intent with action\r\nSettings.ACTION_MANAGE_OVERLAY_PERMISSION . The app can check whether it has this authorization by calling\r\nSettings.canDrawOverlays() .\r\nProtection level: signature|setup|appop|installer|pre23|development\r\nConstant Value: \"android.permission.SYSTEM_ALERT_WINDOW\"\r\nTRANSMIT_IR\r\npublic static final String TRANSMIT_IR\r\nAllows using the device's IR transmitter, if available.\r\nProtection level: normal\r\nConstant Value: \"android.permission.TRANSMIT_IR\"\r\nTURN_SCREEN_ON\r\npublic static final String TURN_SCREEN_ON\r\nAllows an app to turn on the screen on, e.g. with PowerManager.ACQUIRE_CAUSES_WAKEUP .\r\nIntended to only be used by home automation apps.\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 118 of 126\n\nConstant Value: \"android.permission.TURN_SCREEN_ON\"\r\nUNINSTALL_SHORTCUT\r\npublic static final String UNINSTALL_SHORTCUT\r\nDon't use this permission in your app.\r\nThis permission is no longer supported.\r\nConstant Value: \"com.android.launcher.permission.UNINSTALL_SHORTCUT\"\r\nUPDATE_DEVICE_STATS\r\npublic static final String UPDATE_DEVICE_STATS\r\nAllows an application to update device statistics.\r\nNot for use by third-party applications.\r\nConstant Value: \"android.permission.UPDATE_DEVICE_STATS\"\r\nUPDATE_PACKAGES_WITHOUT_USER_ACTION\r\npublic static final String UPDATE_PACKAGES_WITHOUT_USER_ACTION\r\nAllows an application to indicate via PackageInstaller.SessionParams.setRequireUserAction(int) that user\r\naction should not be required for an app update.\r\nProtection level: normal\r\nConstant Value: \"android.permission.UPDATE_PACKAGES_WITHOUT_USER_ACTION\"\r\nUSE_BIOMETRIC\r\npublic static final String USE_BIOMETRIC\r\nAllows an app to use device supported biometric modalities.\r\nProtection level: normal\r\nConstant Value: \"android.permission.USE_BIOMETRIC\"\r\nUSE_EXACT_ALARM\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 119 of 126\n\npublic static final String USE_EXACT_ALARM\nAllows apps to use exact alarms just like with SCHEDULE_EXACT_ALARM but without needing to request this\npermission from the user.\nThis is only intended for use by apps that rely on exact alarms for their core functionality. You should\ncontinue using SCHEDULE_EXACT_ALARM if your app needs exact alarms for a secondary feature that users may or\nmay not use within your app.\nKeep in mind that this is a powerful permission and app stores may enforce policies to audit and review the use of\nthis permission. Such audits may involve removal from the app store if the app is found to be misusing this\npermission.\nApps need to target API Build.VERSION_CODES.TIRAMISU or above to be able to request this permission. Note that\nonly one of USE_EXACT_ALARM or SCHEDULE_EXACT_ALARM should be requested on a device. If your app is already\nusing SCHEDULE_EXACT_ALARM on older SDKs but needs USE_EXACT_ALARM on SDK 33 and above, then\nSCHEDULE_EXACT_ALARM should be declared with a max-sdk attribute, like: Apps that hold this permission, always stay in the WORKING_SET or lower standby bucket.\nConstant Value: \"android.permission.USE_EXACT_ALARM\"\nUSE_FINGERPRINT\npublic static final String USE_FINGERPRINT\nThis constant was deprecated in API level 28.\nApplications should request USE_BIOMETRIC instead\nAllows an app to use fingerprint hardware.\nProtection level: normal\nConstant Value: \"android.permission.USE_FINGERPRINT\"\nUSE_ICC_AUTH_WITH_DEVICE_IDENTIFIER\npublic static final String USE_ICC_AUTH_WITH_DEVICE_IDENTIFIER\nhttps://developer.android.com/reference/android/Manifest.permission\nPage 120 of 126\n\nAllows to read device identifiers and use ICC based authentication like EAP-AKA. Often required in\r\nauthentication to access the carrier's server and manage services of the subscriber.\r\nProtection level: signature|appop\r\nConstant Value: \"android.permission.USE_ICC_AUTH_WITH_DEVICE_IDENTIFIER\"\r\nUSE_LOCATION_BUTTON\r\npublic static final String USE_LOCATION_BUTTON\r\nAllows an app use location button, which grants temporary location permission when a user clicks the button.\r\nProtection level: normal\r\nConstant Value: \"android.permission.USE_LOCATION_BUTTON\"\r\nUSE_LOOPBACK_INTERFACE\r\npublic static final String USE_LOOPBACK_INTERFACE\r\nRequired to be able to interact with other applications via IP packets on the loopback interface.\r\nProtection level: normal\r\nConstant Value: \"android.permission.USE_LOOPBACK_INTERFACE\"\r\nUSE_PINNED_WINDOWING_LAYER\r\npublic static final String USE_PINNED_WINDOWING_LAYER\r\nAllows an application to use ActivityManager.AppTask.WINDOWING_LAYER_PINNED for its Tasks, typically\r\nrequested via ActivityManager.AppTask.requestWindowingLayer(int, Executor, OutcomeReceiver) .\r\nGranting this permission allows an app to request its task be placed above normal application windows.\r\nTo ensure system integrity and a consistent user experience, the system imposes several restrictions on tasks using\r\nthis layer. These may include, but are not limited to:\r\nForcing the task to be completely opaque and display system decorations.\r\nStrictly limiting the number of tasks in this layer (e.g., only one at a time).\r\nLimiting the application's control over the task's initial size and position.\r\nMaking the task non-movable programmatically (including restrictions on workarounds like resizing).\r\nProviding users with immediate settings access to disable the feature.\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 121 of 126\n\nSee the API documentation for ActivityManager.AppTask.requestWindowingLayer(int, Executor,\r\nOutcomeReceiver) for the full documentation.\r\nProtection level: normal\r\nConstant Value: \"android.permission.USE_PINNED_WINDOWING_LAYER\"\r\nUSE_SIP\r\npublic static final String USE_SIP\r\nAllows an application to use SIP service.\r\nProtection level: dangerous\r\nConstant Value: \"android.permission.USE_SIP\"\r\nUWB_RANGING\r\npublic static final String UWB_RANGING\r\nRequired to be able to range to devices using ultra-wideband.\r\nProtection level: dangerous\r\nConstant Value: \"android.permission.UWB_RANGING\"\r\nVIBRATE\r\npublic static final String VIBRATE\r\nAllows access to the vibrator.\r\nProtection level: normal\r\nConstant Value: \"android.permission.VIBRATE\"\r\nWAKE_LOCK\r\npublic static final String WAKE_LOCK\r\nAllows using PowerManager WakeLocks to keep processor from sleeping or screen from dimming.\r\nProtection level: normal\r\nConstant Value: \"android.permission.WAKE_LOCK\"\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 122 of 126\n\nWRITE_APN_SETTINGS\r\npublic static final String WRITE_APN_SETTINGS\r\nAllows applications to write the apn settings and read sensitive fields of an existing apn settings like user and\r\npassword.\r\nNot for use by third-party applications.\r\nConstant Value: \"android.permission.WRITE_APN_SETTINGS\"\r\nWRITE_CALENDAR\r\npublic static final String WRITE_CALENDAR\r\nAllows an application to write the user's calendar data.\r\nProtection level: dangerous\r\nConstant Value: \"android.permission.WRITE_CALENDAR\"\r\nWRITE_CALL_LOG\r\npublic static final String WRITE_CALL_LOG\r\nAllows an application to write and read the user's call log data.\r\nNote: If your app uses the WRITE_CONTACTS permission and both your minSdkVersion and targetSdkVersion\r\nvalues are set to 15 or lower, the system implicitly grants your app this permission. If you don't need this\r\npermission, be sure your targetSdkVersion is 16 or higher.\r\nProtection level: dangerous\r\nThis is a hard restricted permission which cannot be held by an app until the installer on record allowlists the\r\npermission. For more details see\r\nPackageInstaller.SessionParams.setWhitelistedRestrictedPermissions(Set) .\r\nConstant Value: \"android.permission.WRITE_CALL_LOG\"\r\nWRITE_CONTACTS\r\npublic static final String WRITE_CONTACTS\r\nAllows an application to write the user's contacts data.\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 123 of 126\n\nProtection level: dangerous\r\nConstant Value: \"android.permission.WRITE_CONTACTS\"\r\nWRITE_EXTERNAL_STORAGE\r\npublic static final String WRITE_EXTERNAL_STORAGE\r\nAllows an application to write to external storage.\r\nNote: If your app targets Build.VERSION_CODES.R or higher, this permission has no effect.\r\nIf your app is on a device that runs API level 19 or higher, you don't need to declare this permission to read and\r\nwrite files in your application-specific directories returned by Context.getExternalFilesDir(String) and\r\nContext.getExternalCacheDir() .\r\nLearn more about how to modify media files that your app doesn't own, and how to modify non-media files that\r\nyour app doesn't own.\r\nIf your app is a file manager and needs broad access to external storage files, then the system must place your app\r\non an allowlist so that you can successfully request the MANAGE_EXTERNAL_STORAGE permission. Learn\r\nmore about the appropriate use cases for minSdkVersion and targetSdkVersion values are set to 3 or lower, the\r\nsystem implicitly grants your app this permission. If you don't need this permission, be sure your\r\ntargetSdkVersion is 4 or higher.\r\nProtection level: dangerous\r\nConstant Value: \"android.permission.WRITE_EXTERNAL_STORAGE\"\r\nWRITE_GSERVICES\r\npublic static final String WRITE_GSERVICES\r\nAllows an application to modify the Google service map.\r\nNot for use by third-party applications.\r\nConstant Value: \"android.permission.WRITE_GSERVICES\"\r\nWRITE_SECURE_SETTINGS\r\npublic static final String WRITE_SECURE_SETTINGS\r\nAllows an application to read or write the secure system settings.\r\nNot for use by third-party applications.\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 124 of 126\n\nConstant Value: \"android.permission.WRITE_SECURE_SETTINGS\"\r\nWRITE_SETTINGS\r\npublic static final String WRITE_SETTINGS\r\nAllows an application to read or write the system settings.\r\nNote: If the app targets API level 23 or higher, the app user must explicitly grant this permission to the app\r\nthrough a permission management screen. The app requests the user's approval by sending an intent with action\r\nSettings.ACTION_MANAGE_WRITE_SETTINGS . The app can check whether it has this authorization by calling\r\nSettings.System.canWrite() .\r\nProtection level: signature|preinstalled|appop|pre23\r\nConstant Value: \"android.permission.WRITE_SETTINGS\"\r\nWRITE_SYNC_SETTINGS\r\npublic static final String WRITE_SYNC_SETTINGS\r\nAllows applications to write the sync settings.\r\nProtection level: normal\r\nConstant Value: \"android.permission.WRITE_SYNC_SETTINGS\"\r\nWRITE_SYSTEM_PREFERENCES\r\npublic static final String WRITE_SYSTEM_PREFERENCES\r\nAllows an application to access the Settings Preference services to write settings values exposed by the system\r\nSettings app and system apps that contribute settings surfaced in the Settings app.\r\nThis allows the calling application to write settings values through the host application, agnostic of underlying\r\nstorage.\r\nProtection Level: signature|privileged|appop\r\nConstant Value: \"android.permission.WRITE_SYSTEM_PREFERENCES\"\r\nWRITE_VOICEMAIL\r\npublic static final String WRITE_VOICEMAIL\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 125 of 126\n\nAllows an application to modify and remove existing voicemails in the system.\r\nProtection level: signature|privileged|role\r\nConstant Value: \"com.android.voicemail.permission.WRITE_VOICEMAIL\"\r\nPublic constructors\r\npermission\r\npublic permission ()\r\nSource: https://developer.android.com/reference/android/Manifest.permission\r\nhttps://developer.android.com/reference/android/Manifest.permission\r\nPage 126 of 126",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MITRE"
	],
	"references": [
		"https://developer.android.com/reference/android/Manifest.permission"
	],
	"report_names": [
		"Manifest.permission"
	],
	"threat_actors": [],
	"ts_created_at": 1775434341,
	"ts_updated_at": 1775791255,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/8d8920029b88d4bef740b3ff27a421ca881eefac.pdf",
		"text": "https://archive.orkl.eu/8d8920029b88d4bef740b3ff27a421ca881eefac.txt",
		"img": "https://archive.orkl.eu/8d8920029b88d4bef740b3ff27a421ca881eefac.jpg"
	}
}