diff --git a/generated/google/apis/androidenterprise_v1.rb b/generated/google/apis/androidenterprise_v1.rb index e03737e81..ac40850ac 100644 --- a/generated/google/apis/androidenterprise_v1.rb +++ b/generated/google/apis/androidenterprise_v1.rb @@ -25,7 +25,7 @@ module Google # @see https://developers.google.com/android/work/play/emm-api module AndroidenterpriseV1 VERSION = 'V1' - REVISION = '20201104' + REVISION = '20201125' # Manage corporate Android devices AUTH_ANDROIDENTERPRISE = 'https://www.googleapis.com/auth/androidenterprise' diff --git a/generated/google/apis/androidenterprise_v1/service.rb b/generated/google/apis/androidenterprise_v1/service.rb index afb1dff47..c2bb3cb99 100644 --- a/generated/google/apis/androidenterprise_v1/service.rb +++ b/generated/google/apis/androidenterprise_v1/service.rb @@ -236,7 +236,10 @@ module Google execute_or_queue_command(command, &block) end - # Updates the device policy + # Updates the device policy. To ensure the policy is properly enforced, you need + # to prevent unmanaged accounts from accessing Google Play by setting the + # allowed_accounts in the managed configuration for the Google Play package. See + # restrict accounts in Google Play. # @param [String] enterprise_id # The ID of the enterprise. # @param [String] user_id diff --git a/generated/google/apis/androidenterprise_v1/synth.metadata b/generated/google/apis/androidenterprise_v1/synth.metadata index 1f8508191..b278f1f8f 100644 --- a/generated/google/apis/androidenterprise_v1/synth.metadata +++ b/generated/google/apis/androidenterprise_v1/synth.metadata @@ -4,7 +4,7 @@ "git": { "name": ".", "remote": "https://github.com/googleapis/google-api-ruby-client.git", - "sha": "0ba45b6d22f2eced00e873b91fc685285919d4ff" + "sha": "395dc0926bced7f77dee74e4f39c011395eb6efa" } } ]