Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
Note
Community interest groups have now moved from Yammer to Microsoft Viva Engage. To join a Viva Engage community and take part in the latest discussions, fill out the Request access to Finance and Operations Viva Engage Community form and choose the community you want to join.
This article explains how to download and install the Warehouse Management mobile app on each of your mobile devices, and how to configure the app to connect to your Microsoft Dynamics 365 Supply Chain Management environment. You can configure each device manually, or you can import connection settings through a file or by scanning a QR code.
The Warehouse Management mobile app is only for your internal business use. You may not republish or distribute the Warehouse Management mobile app externally in any app store or similar distribution service.
Prerequisites
Operating system requirements
The Warehouse Management mobile app is available for Microsoft Windows, Google Android, and Apple iOS operating systems. To use the app, your mobile devices must have one of the following operating systems installed:
- Windows 10 (Universal Windows Platform [UWP]) May 2020 update 1904.1 or later
- Android:
- Warehouse Management mobile app version 3.x requires Android 5.0 or later
- Warehouse Management mobile app version 4.x requires Android 7.0 or later
- iOS 13.0 or later
External URLs required by the app
For the Warehouse Management mobile app to function correctly, your internal network must allow it to access the following external URLs:
- *.microsoft.com
- *.microsoftonline.com
- login.windows.net
- *.appcenter.ms
- *.ces.microsoftcloud.com
- *.onyx.azure.net
- play.google.com
- itunes.apple.com
- *.cdn-apple.com
- *.networking.apple
- login.microsoftonline.com
- login.microsoft.com
- sts.windows.net
- login.partner.microsoftonline.cn
- login.chinacloudapi.cn
- login.microsoftonline.us
- login-us.microsoftonline.com
- *.applicationinsights.azure.com
- *.applicationinsights.azure.us
- *.applicationinsights.azure.cn
Get the Warehouse Management mobile app
For smaller deployments, you'll typically install the app on each device from the relevant store. Then, manually configure the connection to the environments that you're using.
For larger deployments, automate app deployment and configuration. This approach is more convenient if you manage many devices. For example, use a mobile device management and mobile application management solution such as Microsoft Intune. For information about how to mass deploy installations and updates for the Warehouse Management mobile app, see Mass deploy the mobile app with user-based authentication.
Install the app from an app store
The easiest way to install the app on a single device is to install it from an app store. The store always provides the latest generally available version. Microsoft Intune can also fetch apps from the app stores. Use one of the following links to install the app from an app store:
- Windows (UWP): Warehouse Management on Microsoft Store
- Android: Warehouse Management on Google Play Store
- iOS: Version 3 is available at the Apple App Store. Version 4 is currently available through Apple Test Flight and is expected to be available on the Apple App Store in January 2026.
Download the app from Microsoft App Center
As an alternative to installing from an app store, you can instead download the app from the Microsoft App Center. The App Center provides installable packages that you can sideload. In addition to the current version, the App Center also lets you download previous versions and might provide preview versions with upcoming features that you can try out. To download current, previous, or preview versions of the Warehouse Management mobile app from Microsoft App Center, use one of the following links:
Windows (UWP): Warehouse Management (Windows)
For instructions about how to install a downloaded package on a Windows device and then set up the required certificates, see Install a Build from App Center.
Android: Warehouse Management (Android)
A few extra steps might be required to install it. For details, see Testing Android Apps.
iOS: The iOS version of the app is only available through App Store.
For information about how to install a build downloaded from the App Center, see Install a build.
The Warehouse Management mobile app isn't available in app stores in China. However, you can download it from Microsoft App Center and use it along with Dynamics 365 Supply Chain Management operated by 21Vianet in China.
Decide which authentication methods you'll use
Because the Warehouse Management mobile app has read and write access to some of your Supply Chain Management data, each device must authenticate with Supply Chain Management. The app supports several authentication methods. Before you start to deploy the app, learn about the available authentication methods and decide which one you want to use.
After a device authenticates with Supply Chain Management, each worker who uses that device signs in by using their Supply Chain Management worker account. The app loads the worker's personal preferences, such as their default warehouse and app preferences. Therefore, different workers can sign in and out for each shift, while the device itself remains authenticated with Supply Chain Management.
For details about each authentication method and how to set it up, see User-based authentication for the Warehouse Management mobile app.
If a device is lost or compromised, you can revoke its authentication by following the instructions provided in Remove access for a device that uses user-based authentication.
Note
Shared Device Mode authentication isn't currently supported for the Warehouse Management mobile app.
Configure the application by importing connection settings
To make it easier to maintain and deploy the application on many mobile devices, import the connection settings instead of manually entering them on each device. The following table summarizes the available methods and when to use each one.
| Method | Best for | Platform support |
|---|---|---|
MDM managed configuration (ConnectionsJson key) |
Enterprise deployments with a mobile mass deployment (MDM) provider. The provider pushes connection settings through app configuration policies without touching the device file system. | Android, Windows, iOS |
| QR code | Small to medium deployments, or individual device setup. The app scans a QR code containing the connection JSON. | Android, Windows, iOS |
JSON file import (connections.json) |
Deployments where you can place files on the device file system. | Windows, Android (limited—see the note after this table) |
| Manual input | Individual device setup or troubleshooting. | Android, Windows, iOS |
Important
Android platform limitation: Starting with Android 11 (API level 30), Google enforces scoped storage restrictions that prevent external tools (including MDM file push, file managers, and USB file transfer) from writing to an app's private data folder. This restriction means the connections.json file can't be placed at the default path (Android/data/com.Microsoft.WarehouseManagement/files) by any tool other than the app itself. You can still use the app's Add from file option to browse and select a JSON file stored in an accessible location (such as the downloads folder), but automatic file-based import at the default path isn't possible on Android.
For enterprise Android deployments, use either the MDM managed configuration method (which uses providers such as Microsoft Intune or SOT to deliver connection settings through app configuration policies) or the QR code method. Learn more in Mass deploy the mobile app with user-based authentication.
The following subsections explain how to create and import the settings.
Create a connection settings file or QR code
You can import connection settings from either a file or a QR code. (Learn more in Use a QR code to connect the mobile app to Supply Chain Management.) For both approaches, you must first create a settings file that uses JavaScript Object Notation (JSON) format and syntax. The file must include a connection list that contains the individual connections that you need to add. The following table summarizes the parameters that you must specify in the connection settings file.
| Parameter | Description |
|---|---|
"ConnectionName" |
Specify the name of the connection setting. The maximum length is 20 characters. Because this value is the unique identifier for a connection setting, make sure that it's unique in the list. If a connection that has the same name already exists on the device, the settings from the imported file override it. |
"ActiveDirectoryClientAppId" |
Don't include this parameter if you're using Specify the client ID that you noted while setting up Microsoft Entra ID. Learn more in User-based authentication. |
"ActiveDirectoryResource" |
Specify the root URL of Supply Chain Management. |
"ActiveDirectoryTenant" |
Don't include this parameter if you're using Specify the Microsoft Entra ID domain name that you're using with the Supply Chain Management server. This value has the form |
"Company" |
Specify the legal entity in Supply Chain Management that you want the application to connect to. |
"ConnectionType" |
(Optional) Specify whether the connection setting should use a certificate, a client secret, or a device code to connect to an environment. Valid values are Note: You can't import client secrets. |
"IsEditable" |
(Optional) Specify whether the app user can edit the connection setting. Valid values are "true" and "false". The default value is "true". |
"IsDefaultConnection" |
(Optional) Specify whether the connection is the default connection. A connection that's set as the default connection is automatically preselected when the app is opened. Only one connection can be set as the default connection. Valid values are "true" and "false". The default value is "false". |
"CertificateThumbprint" |
(Optional) For Windows devices, you can specify the certificate thumbprint for the connection. For Android devices, the app user must select the certificate the first time that a connection is used. |
"UseBroker" |
(Optional) This parameter applies only to the
|
"DomainName" |
(Optional) This parameter applies only to the "UsernamePassword" connection type. It allows you to implement a simplified sign-in process. If you don't set this field, workers must always enter their full Microsoft Entra ID user principal name (UPN) to sign in. A UPN has the form <user name>@<domain name>. If you specify the <domain name> part here, workers can sign in by entering only the <user name> part. (Even if you set the domain name here, workers can still sign in using their full UPN.) |
"AuthCloud" |
Specify the type of Microsoft Entra ID app registration to authenticate with:
|
The following example shows a valid connection settings file that contains two connections. As you can see, the connection list (named "ConnectionList" in the file) is an object that has an array that stores each connection as an object. Each object must be enclosed in braces ({}) and separated by commas, and the array must be enclosed in brackets ([]).
{
"ConnectionList": [
{
"ConnectionName": "Connection1",
"ActiveDirectoryResource": "https://yourenvironment1.cloudax.dynamics.com",
"Company": "USMF",
"IsEditable": true,
"IsDefaultConnection": false,
"ConnectionType": "DeviceCode",
"AuthCloud": "AzureGlobal"
},
{
"ActiveDirectoryClientAppId":"aaaaaaaa-bbbb-ccccc-dddd-eeeeeeeeeeee",
"ConnectionName": "Connection2",
"ActiveDirectoryResource": "https://yourenvironment2.cloudax.dynamics.com",
"ActiveDirectoryTenant": "https://login.windows.net/contosooperations.onmicrosoft.com",
"Company": "USMF",
"IsEditable": false,
"IsDefaultConnection": true,
"CertificateThumbprint": "aaaabbbbcccccdddddeeeeefffffggggghhhhiiiii",
"ConnectionType": "Certificate",
"AuthCloud": "Manual"
},
{
"ActiveDirectoryClientAppId":"aaaaaaaa-bbbb-ccccc-dddd-eeeeeeeeeeee",
"ConnectionName": "Connection3",
"ActiveDirectoryResource": "https://yourenvironment3.cloudax.dynamics.com",
"ActiveDirectoryTenant": "https://login.windows.net/contosooperations.onmicrosoft.com",
"Company": "USMF",
"IsEditable": true,
"IsDefaultConnection": false,
"ConnectionType": "ClientSecret",
"AuthCloud": "Manual"
},
{
"ActiveDirectoryClientAppId":"aaaaaaaa-bbbb-ccccc-dddd-eeeeeeeeeeee",
"ConnectionName": "Connection4",
"ActiveDirectoryResource": "https://yourenvironment4.cloudax.dynamics.com",
"ActiveDirectoryTenant": "https://login.windows.net/contosooperations.onmicrosoft.com",
"Company": "USMF",
"IsEditable": true,
"IsDefaultConnection": false,
"ConnectionType": "DeviceCode",
"AuthCloud": "Manual"
},
{
"ActiveDirectoryClientAppId":"aaaaaaaa-bbbb-ccccc-dddd-eeeeeeeeeeee",
"ConnectionName": "Connection5",
"ActiveDirectoryResource": "https://yourenvironment5.cloudax.dynamics.com",
"ActiveDirectoryTenant": "https://login.windows.net/contosooperations.onmicrosoft.com",
"Company": "USMF",
"IsEditable": true,
"IsDefaultConnection": false,
"UseBroker": true,
"ConnectionType": "UsernamePassword",
"AuthCloud": "Manual"
}
]
}
You can either save the information as a JSON file or generate a QR code that has the same content. If you save the information as a file, we recommend that you save it by using the default name, connections.json, especially if you'll store it in the default location on each mobile device.
Save the connection settings file on each device
Typically, you'll use a device management tool or script to distribute the connection settings files to each device that you're managing. If you use the default name and location when you save the connection settings file on each device, the Warehouse Management mobile app automatically imports it, even during the first run after the app is installed. If you use a custom name or location for the file, the app user must specify the values during the first run. However, the app continues to use the specified name and location afterward.
Every time that the app starts, it reimports the connection settings from their previous location to check for changes. The app updates only connections that have the same names as the connections in the connection settings file. User-created connections that use other names aren't updated.
You can't remove a connection by using the connection settings file.
As mentioned, the default file name is connections.json. The default file location depends on which type of device you're using:
- Windows:
C:\Users\<User>\AppData\Local\Packages\Microsoft.WarehouseManagement_8wekyb3d8bbwe\LocalState - Android:
Android\data\com.Microsoft.WarehouseManagement\filesSee the important note about Android scoped storage limitations earlier in this section. - iOS: File sharing isn't supported. Use QR codes or MDM managed configuration instead.
Usually, the paths are automatically created after the first run of the app. However, you can manually create them if you must transfer the connection settings file to the device before installation.
Note
If you uninstall the app, the default path and its contents are removed.
Import the connection settings
Follow these steps to import connection settings from a file or a QR code.
Start the Warehouse Management mobile app on your mobile device. The first time that you start the app, a welcome message is shown. Select Connect.
If you're importing the connection settings from a file, and you used the default name and location when you saved the file, the app might find the file automatically. In this case, skip ahead to step 4. Otherwise, select Set up connection, and then continue to step 3.
In the Connection setup dialog, select Add from file or Add from QR code, depending on how you want to import the settings:
- If you're importing the connection settings from a file, select Add from file, browse to the file on your local device, and select it. If you select a custom location, the app stores it and automatically uses it the next time.
- If you're importing the connection settings by scanning a QR code, select Add from QR code. The app prompts you for permission to use the device's camera. After you give permission, the camera starts, so that you can use it for scanning. Depending on the quality of the device's camera and the complexity of the QR code, you might find it difficult to get a correct scan. In that case, try to reduce the complexity of the QR code by generating only one connection per QR code. (Currently, you can use only the device's camera to scan the QR code.)
When the connection settings are successfully loaded, the selected connection is shown.
Complete one of the following steps to select the authentication certificate, depending on which type of device that you're using.
- If you're using an Android device and are using a certificate for authentication, the device prompts you to select the certificate.
- If you're using an iOS device and are using a certificate for authentication, select Edit connection settings and then select Select certificate. On the page that opens, select Select certificate to open a file browser and select your certificate file. The app then shows a Certificate is selected confirmation. Enter the certificate password and select Import certificate. Finally, save the connection settings.
The app connects to your Supply Chain Management server and shows the sign-in page.
Manually configure the application
If you don't have a file or QR code, you can manually configure the app on the device so that it connects to the Supply Chain Management server through the Microsoft Entra ID application.
Start the Warehouse Management mobile app on your mobile device.
If the app starts in Demo mode, select Connection settings. If the Sign-in page appears when the app starts, select Change connection.
Select Set up connection.
Select Input manually. The New Connection page appears and shows the settings that you need to enter manually.
Enter the following information:
Connection name – Enter a name for the new connection. This name appears in the Select connection field the next time you open the connection settings. The name you enter must be unique. (In other words, it must differ from all other connection names that are stored on your device, if any other connection names are stored there.)
Environment URL – Specify the root URL of Supply Chain Management.
Important
- Don't end this value with a slash (/).
- Ensure that the HTTPS (SSL) certificate is valid.
Company – Enter the legal entity (company) in Supply Chain Management that you want the application to connect to.
Authentication method – Select one of the following values to specify the method that you use to authenticate with Supply Chain Management. The method that you select here must match the setup of the app in Azure.
- Device code – Authenticate by using the device code flow. This method is a user-based authentication method.
- Username and password – Authenticate by using SSO or by asking the user to enter a user name and password. This method is a user-based authentication method.
Cloud – Specify the type of Microsoft Entra ID app registration to authenticate with:
Azure Global (recommended) – Authenticate by using the global Microsoft Entra ID application that's registered and maintained by Microsoft. This option supports most scenarios, including Microsoft Entra Conditional Access. If you choose this option, you don't have to register or maintain your own Microsoft Entra ID app.
Manual – Authenticate through your own custom Microsoft Entra ID app registration. Use this option only if you have specific requirements that the global application doesn't meet (for example, certain on-premises environment configurations). If you choose this option, you must register and maintain a custom app in Microsoft Entra ID and also specify Microsoft Entra ID client ID and Microsoft Entra ID tenant values for this connection.
Microsoft Entra ID client ID – This field is available only when the Cloud field is set to Manual. Enter the client ID that you noted while setting up Microsoft Entra ID. Learn more in User-based authentication.
Microsoft Entra ID tenant – This field is available only when the Cloud field is set to Manual. Enter the Microsoft Entra ID domain name that you're using with the Supply Chain Management server. This value has the form
https://login.windows.net/<your-Microsoft-Entra-ID-domain-name>. Here's an example:https://login.windows.net/contosooperations.onmicrosoft.com. For more information about how to find your Microsoft Entra ID domain name, see Locate important IDs for a user.Important
Don't end this value with a slash (/).
Use Broker – This option applies only when the Authentication method field is set to Username and password. It determines whether a broker is used for SSO authentication with Intune Company Portal (Android only) or Microsoft Authenticator (Android and iOS). Set this option to Yes for broker-based authentication and SSO. Set it to No to require manual input of a user name and password.
Domain name – This field applies only when the Authentication method field is set to Username and password. You can use it to make sign-in easier for workers. If you don't set this field, workers must enter their full Microsoft Entra ID user principal name to sign in. A user principal name has the form <user name>@<domain name>. If you specify the <domain name> part here, workers can sign in by entering only the <user name> part. (Nevertheless, workers can still enter their full user principal name.)
Select the Save button in the upper-right corner of the page.
If you're using a certificate for authentication, complete one of the following steps:
- For Android devices, select the certificate when prompted.
- For iOS devices, follow the instructions given in step 5 in the Import the connection settings section.
The app connects to your Supply Chain Management server and shows the sign-in page.
Remove access for a lost or compromised device
If a device is lost or compromised, remove its access to Supply Chain Management. The method you use to remove access depends on how the device is configured to authenticate with Supply Chain Management. For instructions, see one of the following articles:
- If you use user-based authentication, see User-based authentication