Beginning with Android 10, mobile device management (MDM) systems, including ArborXR, are generally not able to report on the randomized MAC address of a device. This is when Google introduced MAC randomization as a default privacy feature to enhance user anonymity on Wi-Fi networks.
π‘ The exception to this is if the MDM provisions the Wi-Fi network on the device. MDMs, including ArborXR, are only able to obtain randomized MAC addresses for configurations which they create.
Although MDMs may have some level of system access, directly retrieving the randomized MAC address is typically restricted to protect user privacy. In some cases, MDM solutions might be able to indirectly infer network activity, but they cannot explicitly obtain the randomized MAC address used for each connection.
It's worth noting that:
Android 9 and lower: On these older versions, MAC randomization was not a default feature. Therefore, MDMs could likely still report the actual (non-randomized) MAC address of the device.
User-disabled randomization: If a user manually disables MAC randomization for a specific network, the MDM might be able to report the device's actual MAC address when connected to that network.
Manufacturer-specific implementations: Some device manufacturers may have specific implementations or APIs that allow MDM access to randomized MAC addresses under certain conditions. However, this is not a standard Android behavior and would vary across different devices.
Therefore, if you need to rely on MAC addresses for device identification or tracking in an MDM solution, it's crucial to consider the limitations imposed by MAC randomization on Android 10 and higher. You may need to explore alternative approaches or work with device manufacturers to address specific scenarios.