Suitest public device lab

Managing your own device lab can become cumbersome, especially if you need to cover a wide range of platforms or test on devices from different brands. With our public device lab you can focus on what matters - your tests - and let Suitest handle the device management part.


Access to Suitest device lab

In order to get access to the public device lab you need to either register at Suitest using your business email address or create an organization and subscribe with a paid plan. The time that you spend testing on Suitest's lab devices will be subtracted from your testing minutes.

Unlike with your own devices, when testing on lab devices the amount of testing minutes used will be counted for the whole testing session - from the moment you connect to the device until you disconnect.

Available devices

At the moment, the Suitest device lab includes Smart TVs with the following operating systems: Android, LG webOS and Samsung Tizen. Therefore, you can test the following types of Smart TV apps in our device lab:

We are constantly working on adding more platforms to the device lab.

Device lab features

All devices in our lab include:

  • A way to automatically install and launch your application
  • A way to control the device using a virtual remote control for live testing
  • Real-time video streaming of the device screen for live testing
  • A way to run your Suitest tests on the device in an interactive or automated mode

Device lab limitations

In order to ensure top-notch security and high availability, we have to limit certain features for our lab devices.

  • Some remote control buttons are not available for lab devices. For example, you can't press SMART, INPUT, SETTINGS etc.
  • You can't use the virtual remote control if your application is not in the foreground. For example, you can't use button presses before you open the app.

Android limitations

We are limiting the app privileges for Android apps running on our lab devices to the following:

  • android.permission.ACCESS_NETWORK_STATE
  • android.permission.ACCESS_NOTIFICATION_POLICY
  • android.permission.ACCESS_WIFI_STATE
  • android.permission.BROADCAST_STICKY
  • android.permission.FOREGROUND_SERVICE
  • android.permission.GET_PACKAGE_SIZE
  • android.permission.INTERNET
  • android.permission.USE_FULL_SCREEN_INTENT
  • android.permission.VIBRATE
  • android.permission.WAKE_LOCK
  • android.permission.ACCESS_COARSE_LOCATION
  • android.permission.ACCESS_FINE_LOCATION
  • android.permission.ACCESS_BACKGROUND_LOCATION
  • android.permission.ACCESS_LOCATION_EXTRA_COMMANDS
  • android.permission.ACTIVITY_RECOGNITION
  • android.permission.BODY_SENSORS
  • android.permission.READ_CALENDAR
  • android.permission.READ_CALL_LOG
  • android.permission.READ_CONTACTS
  • android.permission.READ_PHONE_NUMBERS
  • android.permission.READ_PHONE_STATE
  • android.permission.READ_PRECISE_PHONE_STATE
  • android.permission.READ_SYNC_SETTINGS
  • android.permission.READ_SYNC_STATS
  • android.permission.RECEIVE_BOOT_COMPLETED
  • android.permission.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS
  • com.android.providers.tv.permission.READ_EPG_DATA
  • com.android.providers.tv.permission.WRITE_EPG_DATA

Feel free to contact us at support@suite.st if you need to run the app with other privileges on a lab device.

Samsung Tizen limitations

We are limiting the app privileges for Samsung Tizen apps running on our lab devices to the following:

  • http://developer.samsung.com/privilege/avplay
  • http://developer.samsung.com/privilege/productinfo
  • http://developer.samsung.com/privilege/network.public
  • http://developer.samsung.com/privilege/drmplay
  • http://developer.samsung.com/privilege/adinfo
  • http://developer.samsung.com/privilege/widgetdata
  • http://tizen.org/privilege/application.info
  • http://tizen.org/privilege/application.launch
  • http://tizen.org/privilege/content.read
  • http://tizen.org/privilege/content.write
  • http://tizen.org/privilege/display
  • http://tizen.org/privilege/download
  • http://tizen.org/privilege/filesystem.read
  • http://tizen.org/privilege/filesystem.write
  • http://tizen.org/privilege/fullscreen
  • http://tizen.org/privilege/internet
  • http://tizen.org/privilege/mediacontroller.client
  • http://tizen.org/privilege/mediacontroller.server
  • http://tizen.org/privilege/notification
  • http://tizen.org/privilege/package.info
  • http://tizen.org/privilege/system
  • http://tizen.org/privilege/tv.audio
  • http://tizen.org/privilege/tv.channel
  • http://tizen.org/privilege/tv.display
  • http://tizen.org/privilege/tv.inputdevice
  • http://tizen.org/privilege/tv.window
  • http://tizen.org/privilege/push
  • http://tizen.org/privilege/volume.set
  • http://tizen.org/privilege/unlimitedstorage
  • http://tizen.org/privilege/websetting

Feel free to contact us at support@suite.st if you need to run the app with other privileges on a lab device.

Device lab security

We do our very best to ensure that your data is removed from the device after you've finished using it. Your application package gets uninstalled from the device and the application cache is cleared, if the device provides a way to do this.

Android security

Suitest cannot guarantee the application data clean up when the data are stored outside of application private data storage. See Android documentation for more information.

HbbTV / Freeview Play security

For HbbTV / Freeview Play apps we recommend you to use our Suitestify proxy to ensure security. We do our best to clear application data, like cookies or local storage, but the thoroughness of such a cleanup varies widely among different device models. With Suitestify your app will use a different randomly generated domain name for every execution, thus greatly improving security.

Samsung Tizen security

Suitest cannot guarantee the application data clean up when shared file system storage is used. Make sure your application is using private file system folders. Read more about the file system at Samsung Tizen API Reference

Feel free to contact our sales team to discuss the option to set up a private device lab if you have specific security requirements.

Geo-blocking in device lab

To test an application with geo-blocked content you need to whitelist the IP addresses of our public device lab. It can be done by resolving the following DNS domain: devicelab-ips.suitest.cloud. Please be aware that it might resolve to more than one IP address, and that IP addresses might change in the future. Any change of IP addresses will be announced in advance. If you have any questions or concerns please contact our support team.