Professional Documents
Culture Documents
Uses Permissions - RAD Studio
Uses Permissions - RAD Studio
PAGE DISCUSSION READ VIEW SOURCE VIEW HISTORY Search RAD Studio
Topics
Libraries Reference
Uses Permissions
Code Examples
When you build an Android app with the Con guration set to Development (in the Projects Window), the INTERNET permission is always implicitly set, even if you disable the INTERNET permission on
Uses Permissions. This is because the RAD Studio debugger requires the INTERNET permission.
For the Application Store con guration, however, you can disable the INTERNET permission using Project > Options > Uses Permissions.
Here is the Projects Window with the Development con guration node set for an Android app:
Uses Permissions
The following uses permissions can be used as required for most Android applications. Some of the most commonly used basic permissions are preset by RAD Studio when you create an Android app.
Permission Description
Access location extra commands Allows an application to access extra location provider commands.
Access noti cation policy Marker permission for applications that wish to access noti cation policy.
Allows an application to broadcast sticky intents. These are broadcasts whose data is held by the system after being nished, so that clients can quickly retrieve
Broadcast sticky
that data without having to wait for the next broadcast.
Change con guration Allows an application to modify the current con guration, such as locale.
Expand status bar Allows an application to expand or collapse the status bar.
Get package size Allows an application to nd out the space used by any package.
Get tasks Allows an application to get information about the currently or recently running tasks.
Allows the global search system to access the data of speci c content providers. Typically Global search is used when the provider has some permissions
protecting it (which global search would not be expected to hold), and is added as a read-only permission to the path in the provider where global search
Global search
queries are performed. The Global search permission cannot be held by regular applications; it is used by applications to protect themselves from all other
applications except for global search.
Instant app foreground service Allows an instant app to create foreground services.
Manage own calls Allows a calling application which manages it own calls through the self-managed ConnectionService APIs.
Read GServices
Receive boot completed Allows an application to receive the ACTION_BOOT_COMPLETED that is broadcast after the system nishes booting.
Allows an application to request deleting packages. Apps targeting APIs Build.VERSION_CODES.P or greater must hold this permission in order to use
Request delete packages
Intent.ACTION_UNINSTALL_PACKAGE or PackageInstaller.uninstall(VersionedPackage, IntentSender).
Permission an application must hold in order to use Settings.ACTION_REQUEST_IGNORE_BATTERY_OPTIMIZATIONS. This is a normal permission: an app
Request ignore battery optimizations
requesting it will always be granted the permission, without the user needing to approve or see it.
Set alarm Allows an application to broadcast an Intent to set an alarm for the user.
Subscribed feeds read Allows an application to allow access the subscribed feeds ContentProvider.
Vending billing (In-app Billing) Allows using the In-app Billing service. See the Android documentation for additional information.
Wake lock Allows using PowerManager WakeLocks to keep processor from sleeping or screen from dimming.
The documentation in the Description column of the table above is licensed under Apache 2.0 . Copyright © Android Open Source Project.
Permission Description
Access coarse location Allows an app to access approximate location derived from network location sources such as cell towers and Wi-Fi.
Access ne location Allows an app to access precise location from location sources such as GPS, cell towers, and Wi-Fi.
Access mock location Allows an application to create mock location providers for testing.
Body sensors Allows an application to access data from sensors that the user uses to measure what is happening inside his/her body, such as heart rate.
Call phone Allows an application to initiate a phone call without going through the Dialer user interface for the user to con rm the call being placed.
Allows a calling app to continue a call which was started in another app. An example is a video calling app that wants to continue a voice call on the user's
Continue a call started in another app
mobile network.
Get accounts Allows access to the list of accounts in the Accounts Service.
Manage accounts Allows an application to manage the list of accounts in the AccountManager.
Process outgoing calls Allows an application to monitor, modify, or abort outgoing calls.
Read call log Allows an application to read the user call log.
Read history bookmarks Allows an application to read (but not write) the user browsing history and bookmarks.
Read phone numbers Allows read access to the device's phone number(s). This is a subset of the capabilities granted by READ_PHONE_STATE but is exposed to instant applications.
Read pro le Allows an application to read the user personal pro le data.
Read social stream Allows an application to read from the user social stream.
Receive boot completed Allows an application to receive the ACTION_BOOT_COMPLETED that is broadcast after the system nishes booting.
Receive mms Allows an application to monitor incoming MMS messages, to record or perform processing on them.
Receive sms Allows an application to monitor incoming SMS messages, to record or perform processing on them.
Receive WAP push Allows an application to monitor incoming WAP push messages.
Subscribed feeds write Allows an application to allow write the subscribed feeds ContentProvider.
Write calendar Allows an application to write (but not read) the user calendar data.
Write call log Allows an application to write (but not read) the user contacts data.
Write contacts Allows an application to write (but not read) the user contacts data.
Write history bookmarks Allows an application to write (but not read) the user browsing history and bookmarks.
Write pro le Allows an application to write (but not read) the user personal pro le data.
Write social stream Allows an application to write (but not read) the user social stream data.
The documentation in the Description column of the table above is licensed under Apache 2.0 . Copyright © Android Open Source Project.
Permission Description
Bind accessibility service Must be required by an AccessibilityService, to ensure that only the system can bind to it.
Bind auto ll service Must be required by a Auto llService, to ensure that only the system can bind to it.
Bind call screening service Must be required by a CallScreeningService, to ensure that only the system can bind to it.
The system process that is allowed to bind to services in carrier apps will have this permission. Carrier apps should use this permission to protect their services
Bind carrier service
that only the system is allowed to bind to.
Bind chooser target service Must be required by a ChooserTargetService, to ensure that only the system can bind to it.
Bind condition provider service Must be required by a ConditionProviderService, to ensure that only the system can bind to it.
Bind device admin Must be required by device administration receiver, to ensure that only the system can interact with it.
Bind dream service Must be required by an DreamService, to ensure that only the system can bind to it.
Bind in-call service Must be required by a InCallService, to ensure that only the system can bind to it.
Bind input method Must be required by an InputMethodService, to ensure that only the system can bind to it.
Bind MIDI device service Must be required by an MidiDeviceService, to ensure that only the system can bind to it.
Bind NFC service Must be required by a HostApduService or O HostApduService to ensure that only the system can bind to it.
Bind noti cation listener service Must be required by an Noti cationListenerService, to ensure that only the system can bind to it.
Bind print service Must be required by a PrintService, to ensure that only the system can bind to it.
Bind remoteviews Must be required by a RemoteViewsService, to ensure that only the system can bind to it.
Bind telecom connection service Must be required by a ConnectionService, to ensure that only the system can bind to it.
Bind TV input Must be required by a TvInputService to ensure that only the system can bind to it.
Bind visual voicemail service Must be required by a link VisualVoicemailService to ensure that only the system can bind to it.
Bind voice interaction Must be required by a VoiceInteractionService, to ensure that only the system can bind to it.
Bind VPN service Must be required by an VpnService, to ensure that only the system can bind to it.
Bind VR listener service Must be required by an VrListenerService, to ensure that only the system can bind to it.
Bind wallpaper Must be required by a WallpaperService, to ensure that only the system can bind to it.
Clear app cache Allows an application to clear the caches of all installed applications on the device.
Allows an application to request installing packages. Apps targeting APIs greater than 25 must hold this permission in order to use
Request install packages
Intent.ACTION_INSTALL_PACKAGE.
System alert window Allows an application to open windows using the type TYPE_SYSTEM_ALERT, shown on top of all other applications.
Write voicemail Allows an application to modify and remove existing voicemails in the system.
The documentation in the Description column of the table above is licensed under Apache 2.0 . Copyright © Android Open Source Project.
See Also
Application page
Version Info page
Preparing an Android Application for Deployment
Con guring Your System to Detect Your Android Device
Android Mobile Application Development
Creating an Android App
Privacy policy About RAD Studio Disclaimers Help Feedback (QP, email) Mobile view