diff --git a/generated/google/apis/androidenterprise_v1.rb b/generated/google/apis/androidenterprise_v1.rb index e03737e8165..ac40850ac1a 100644 --- a/generated/google/apis/androidenterprise_v1.rb +++ b/generated/google/apis/androidenterprise_v1.rb @@ -25,7 +25,7 @@ module Apis # @see https://developers.google.com/android/work/play/emm-api module AndroidenterpriseV1 VERSION = 'V1' - REVISION = '20201104' + REVISION = '20201125' # Manage corporate Android devices AUTH_ANDROIDENTERPRISE = 'https://www.googleapis.com/auth/androidenterprise' diff --git a/generated/google/apis/androidenterprise_v1/service.rb b/generated/google/apis/androidenterprise_v1/service.rb index afb1dff47e0..c2bb3cb99bf 100644 --- a/generated/google/apis/androidenterprise_v1/service.rb +++ b/generated/google/apis/androidenterprise_v1/service.rb @@ -236,7 +236,10 @@ def set_device_state(enterprise_id, user_id, device_id, device_state_object = ni execute_or_queue_command(command, &block) end - # Updates the device policy + # Updates the device policy. To ensure the policy is properly enforced, you need + # to prevent unmanaged accounts from accessing Google Play by setting the + # allowed_accounts in the managed configuration for the Google Play package. See + # restrict accounts in Google Play. # @param [String] enterprise_id # The ID of the enterprise. # @param [String] user_id diff --git a/generated/google/apis/androidenterprise_v1/synth.metadata b/generated/google/apis/androidenterprise_v1/synth.metadata index 1f850819174..b278f1f8ff2 100644 --- a/generated/google/apis/androidenterprise_v1/synth.metadata +++ b/generated/google/apis/androidenterprise_v1/synth.metadata @@ -4,7 +4,7 @@ "git": { "name": ".", "remote": "https://github.com/googleapis/google-api-ruby-client.git", - "sha": "0ba45b6d22f2eced00e873b91fc685285919d4ff" + "sha": "395dc0926bced7f77dee74e4f39c011395eb6efa" } } ]