Glink access to WiFi mac address and Serial number on Android 11 and newer
It is very common to use the WiFi mac address to identify a TN5250 terminal connected to an IBM iSeries/AS400 server. Some also use it to identify VT terminals connected to Linux/AIX/UNIX/Windows servers.
​
The WiFi mac address was available for all Android applications up to and including Android 10, but starting from Android 11 it was either not available or randomized. This was to protect the privacy of consumers, but it created a problem for professional users of IBM5250 and VT terminal emulation applications, like Glink for Android.
​
In cooperation with the following manufacturers, G&R has implemented a way for Glink to obtain the WiFi mac address also on Android 11 and newer:
AML, Chainway, Cipherlab, Datalogic, Honeywell, M3 Mobile, Movfast, Newland, Point Mobile, Seuic, Urovo and Zebra.
​
On devices from these manufacturers Glink also read the Serial number and allows the user to use the WiFi mac address and Serial number for identification of the devices for license administration.
​
This capability is available in version 2.5.7 and later of the Glink for Android applications: Glink 5250, Glink VT, Glink 3270 and Glink (All).
​
Some manufacturers have implemented this feature in their Android OS, others provide the functionality in add-on modules. The latter is the case for Cipherlab, Datalogic, Honeywell and Seuic. Contact us at support@gar.no if you want to know more or want to download one of these add on modules.
​
​
​​​






