Avalanche powered by Wavelink


Wi-Fi Payload

A Wi-Fi payload provisions smart devices with settings to connect to a wireless network. This may include the SSID and password, encryption and authentication types, and proxy settings. If multiple Wi-Fi payloads are deployed to the same device, the priority in which networks are connected to is determined at the device level and cannot be set in Avalanche.

If a Wi-Fi payload is removed from a smart device profile in Avalanche, the Wi-Fi settings are not removed from affected Android devices. If you want to remove the settings at the device level, you must perform a wipe on the desired devices, unenroll the devices, or remove the settings manually.

A Wi-Fi payload may have the following options, depending the selected security type:


When a Wi-Fi payload is deployed to an Android device, it has a higher priority over other manual and auto-scan Wi-Fi connections. The device will always attempt to connect to wireless networks from Avalanche payloads before attempting other networks.

Payload Name

The name of the payload.

Service set identifier

The SSID of the wireless network.

Auto join

Configures the device to automatically join the Wi-Fi network when it is available.

Hidden network

Allows the device to find the Wi-Fi network when the network is not open or broadcasting.

Security type

The encryption type of the Wi-Fi network.


Use a proxy server with the Wi-Fi connection. Selecting this option reveals additional proxy settings.

Manual (Android 4.0 and later)

Proxy server and port. The fully-qualified proxy server address and port number.

Proxy bypass. The hostname or IP address for traffic that won't be redirected through your proxy server. For example, your Active Directory server should be set as a bypass proxy for verifying credentials.

Automatic (Android 5.0 and later)

Proxy server URL. The URL of the proxy server the proxy settings can be automatically obtained from.

Enterprise settings

Use Enterprise settings to configure protocols and authentication settings when using 802.1x EAP encryption.

Protocols. Specify authentication protocols and the type of second phase identity authentication supported on the network.

Authentication. Provide credentials for connecting to the network and an identity certificate for connecting to ActiveSync.


Was this article useful?