Remotely enroll macOS, iOS, and iPadOS devices in Mobile Device Management (MDM). Automated Device Enrollment (ADE) lets you automatically enroll devices into ºÚÁϺ£½Ç91Èë¿Ú MDM during the device out-of-box experience. After devices are enrolled in ºÚÁϺ£½Ç91Èë¿Ú MDM, IT Admins have management and configuration control over managed devices. With a customized setting, Zero-Touch Automated Device Enrollment Onboarding can also automatically bind the user to the device after authentication.​​​​​
First, you'll configure ADE for your organization. Next, you'll add your device to the MDM server. Then, you'll sync the device with Apple. Finally, you'll configure your end users' zero-touch experience.
- Configure ADE for your Organization
- Add Device to the MDM Server
- Sync Device to ºÚÁϺ£½Ç91Èë¿Ú
- Configure your End Users' Experience
- Renew Your Automated Device Enrollment Token Annually
Configure Automated Device Enrollment for your Organization
- Log in to the .
- Go to DEVICE MANAGEMENT > MDM.
- On the MDM home page, click get started under Automated Device Enrollment Configuration.
- ​â¶Ä‹â¶Ä‹I²Ô&²Ô²ú²õ±è;Set Up Apple’s Automated Device Enrollment, click download under Generate a Key. ºÚÁϺ£½Ç91Èë¿Ú downloads a certificate that contains a key. Apple uses this to encrypt the Automated Device Enrollment token.
- Under Sign in to Apple, click sign into Apple Business Manager and enter your credentials. If you have an education account, click sign into Apple School Manager.
- Add your MDM server:
- Select your profile name, then select Preferences.
- Select MDM Server Assignment, then click Add MDM Server.
- Enter a name for your company’s MDM server and leave Allow this MDM Server to release devices selected.
- Click Choose File.
- Locate the jumpcloud-dep.pem file downloaded in Step 4, select it, and click Open.
- Click Save.
- Download the token by selecting the server and clicking Download Token, then clicking Download Server Token.
- In the Admin Portal, go to Set Up Apple’s Automated Device Enrollment and under Upload Automated Device Enrollment Token, install the new token by clicking Browse or dragging and dropping the server token for your MDM server.
- Click complete setup.
See the to learn more about Apple’s Automated Device Enrollment.
Add the Device to the MDM Server
- Log in to Apple Business Manager (ABM) or Apple School Manager (ASM).
- Click Devices and select your device. You may want to search for it by serial number.
- Click Edit MDM Server.
- Select Assign to the following MDM and choose your MDM server from the list.
- Click Continue, then click Confirm.
- Verify that the device was added to your MDM server.
The sync process between Apple and ºÚÁϺ£½Ç91Èë¿Ú ensures the device will contact ºÚÁϺ£½Ç91Èë¿Ú’s MDM server on first boot to enroll in MDM.
Sync the Device to ºÚÁϺ£½Ç91Èë¿Ú
Perform these steps every time you add new devices in ABM or ASM.
- Log in to the .
- Go to DEVICE MANAGEMENT > MDM.
- On the MDM home tab, click sync with Apple under Automated Device Enrollment Devices to ensure that your list of ºÚÁϺ£½Ç91Èë¿Ú Automated Device Enrollment devices matches what is in ABM or ASM.
From here, you can configure your end users' experience on company-owned Apple devices from day one. For macOS users, see Configure your macOS users' zero-touch experience. For iOS users, see Configure your iOS users' zero-touch experience.
Configure your End Users’ Experience
Configure your macOS users' zero-touch experience:
- Log in to the .
- Go to DEVICE MANAGEMENT > MDM.
- On the Apple tab, under Automated Device Enrollment Configuration, click Configure MacOS to configure your zero-touch experience.
- Configure the Default Group Association.
- Select the ºÚÁϺ£½Ç91Èë¿Ú device group to automatically bind this device to. Default device groups can use a policy to ensure that all devices enrolling in Automated Device Enrollment get the security and compliance levels applied immediately during enrollment.
- None - This device won’t be bound to a device group.
- An existing group - Select a macOS group that you've already created.
- Create New group - Click Create New Group to add a new device group and then return here to bind the device to it.
- Select the ºÚÁϺ£½Ç91Èë¿Ú device group to automatically bind this device to. Default device groups can use a policy to ensure that all devices enrolling in Automated Device Enrollment get the security and compliance levels applied immediately during enrollment.
If the default device group you select is configured to update group membership dynamically, ensure that the group's membership rules are compatible with the devices you're expecting to auto-enroll. See Configure Dynamic Device Groups to learn more.
Verify that you’ve included all the policies you want for the device group. Do not include the ºÚÁϺ£½Ç91Èë¿Ú MDM Enrollment policy, as this is already implemented during automated enrollment.
- Configure the Welcome Screen details, such as title, description, button name, and logo that your users see:
- Screen Title - Update the title of the Welcome screen.
- Description - Add critical information to the Welcome screen.
- Button - Type a new name for the button. The default is continue.
- Logo - Add your logo to the Welcome screen by going to Settings, selecting Organization Profile, and uploading it there.
- Configure the Setup Assistant Settings. Select the screens that you do not want your users to see during account configuration. Controlling what users see can help you troubleshoot any onboarding issues:
- Select all - None of these screens show during account configuration.
- Select a screen - Select a specific screen to exclude it during account configuration:
- Skip Accessibility setup - macOS 11+
- Skip Analytics
- Skip Apple Pay setup
- Skip Privacy Consent screen
- Skip restoring from backup
- Skip Screen Time screen
- Skip Siri setup
- Skip iCloud Analytics
- Skip Unlock Your Mac with Apple Watch - macOS 12+
- Skip Apple Intelligence setup - macOS 15+
- Skip Wallpaper setup - macOS 14.1+
- Skip iCloud Documents and Desktop setup
- Skip Location Services setup
- Skip Appearance setup
- Skip Apple ID sign-in
- Skip Touch ID setup
- Skip DisplayTone setup
- Skip manual FileVault setup
- Skip Terms and Conditions
- Skip Lockdown Mode setup - macOS 14+
- Skip Terms of Address setup - macOS 13+
- Under User authentication, select Enable to turn on User authentication, which requires users to authenticate during Automated Device Enrollment. A successful macOS authentication automatically binds the user's ºÚÁϺ£½Ç91Èë¿Ú account to the device with Sudo Admin permissions. If users aren’t prompted to authenticate when they power up their devices, you didn’t enable user authentication here.
After the macOS user authenticates, you can change the user's permissions to remove Sudo Admin permissions. See Set Admin/Sudo Permissions to learn more.
- Click save.
- You can require users to change a password when authenticating during Automated Device Enrollment:
- Go to USER MANAGEMENT > Users.
- Select the checkbox for one user or select all users, then click more actions.
- Choose Force Password Change. The user must reset the password when authenticating during Automated Device Enrollment.
- Click force change.
- After the user authenticates, verify that the user was automatically bound to the macOS device and has Sudo permissions:
- Go to DEVICE MANAGEMENT > Devices.
- Select the device and select the Users tab.
- Verify that the correct user appears as an Admin with Sudo permissions on the device. Each macOS device requires at least one admin account per device as part of MDM enrollment.
To see a simulation of what your macOS user will see when they open the box to log into their new device, see our simulations linked in Additional Resources below.
Note: The actual screens might be slightly different depending on the screens that you chose when you customized the zero-touch settings.
If an unsupported macOS device is assigned to the ºÚÁϺ£½Ç91Èë¿Ú MDM server in ABM, it will attempt to install the agent, which will generate an error and cause the device to hang at the install screen. The device will need to have the ºÚÁϺ£½Ç91Èë¿Ú MDM server unassigned in ABM. This can be done by removing the ºÚÁϺ£½Ç91Èë¿Ú MDM server from the Default Device Assignment under Device Management Settings or by changing the Device Management settings for the individual device.
Configure your iOS users’ zero-touch experience
- Log in to the .
- Go to DEVICE MANAGEMENT > MDM.
- Under Automated Device Enrollment Configuration in the MDM home tab, click configure iOS and iPadOS to configure your zero-touch experience.
- Select a ºÚÁϺ£½Ç91Èë¿Ú iOS device group to automatically bind to this device. Default device groups can use a policy to ensure that all devices enrolling in Automated Device Enrollment get the security and compliance levels applied immediately during enrollment.
- None - This device won’t be assigned to a device group.
- An existing group - Select an iOS device group that you already created.
- New group - Click Create New Group to add a new group and then return here to bind the group to the device.
Verify that you’ve included all the policies you want for the device group. Do not include the ºÚÁϺ£½Ç91Èë¿Ú MDM Enrollment policy, as this is already implemented during automated enrollment.
- Customize the Welcome screen title, description, and button name that your users see:
- Screen Title - Update the title of the Welcome screen.
- Description - Add critical information to the Welcome screen.
- Button - Type a new name for the button. The default is continue.
- Logo - Add your logo to the Welcome screen by going to Settings, selecting Organization Profile, and uploading your logo.
- Select the screens that you do not want your iOS users to see during device configuration. Controlling what users see can help you troubleshoot any issues:
- Select all - None of these screens show during device configuration.
- Select a screen - Select the screens to exclude during configuration.
- Select Enable to turn on User authentication, which requires users to authenticate during Automated Device Enrollment. A successful iOS authentication automatically assigns the ºÚÁϺ£½Ç91Èë¿Ú user to the device. If users aren’t prompted to authenticate when they power up their devices, you did not enable user authentication here.
- Click save.
- To increase device security, you can require users to change their password when authenticating during Automated Device Enrollment:
- Go to USER MANAGEMENT > Users.
- Select the checkbox for one user or select all users, then click more actions.
- Choose Force Password Change. The user must reset the password when authenticating during Automated Device Enrollment.
- Click force change.
- After the user authenticates, verify that the user is assigned to the device and that the device appears in the Devices list.
- Go to DEVICE MANAGEMENT > Devices.
- Select Devices, select the device, then select Users.
Default Password Sync
By default, any new users associated to devices have their ºÚÁϺ£½Ç91Èë¿Ú password synced to their device password. Toggle this Off to disable password sync and have users enter a local password to log into their device instead. See Device Password Sync to learn more.
Renew Your Automated Device Enrollment Token Annually
You need to renew Apple’s Automated Device Enrollment server token every year to continue enrolling new devices with Automated Device Enrollment. Your token expiration date is visible in the MDM home page under Automated Device Enrollment Configuration.
- Log in to the .
- Go to DEVICE MANAGEMENT > MDM.
- On the MDM home tab, click renew under Automated Device Enrollment Configuration.
- Under Sign in to Apple, click sign into Apple Business Manager, then enter your credentials. (If you have an education account, click sign into Apple School Manager.)
- In ABM or ASM, select your profile name and choose Preferences.
- Under Your MDM Servers, select your MDM server.
- Click Download Token, then click Download Server Token.
- In the ºÚÁϺ£½Ç91Èë¿Ú Admin Portal, return to the Renew Apple’s Automated Device Enrollment page.
- Under Upload Automated Device Enrollment Token, click Browse or drag and drop the new Automated Device Enrollment token for your MDM server.
- Click complete. A message on the MDM home tab indicates that your Automated Device Enrollment configuration was renewed.
Troubleshooting
Resolving Errors after a Major OS Version Release
When a new major OS version is released by Apple, the Software License Agreement for macOS, iOS, iPadOS, and tvOS is typically updated. Apple ensures that you review and accept their Terms and Conditions by restricting access to VPP licenses and ADE processes for new devices (currently enrolled devices are not affected) until the terms are accepted.
If you see the following errors on the MDM page in the ºÚÁϺ£½Ç91Èë¿Ú Admin Portal after a new major OS release, you will need to log in to your Apple Business Manager or Apple School Manager account and approve the updated Terms and Conditions:
ºÚÁϺ£½Ç91Èë¿Ú's list of Automated Device Enrollment devices could not be updated to match your Apple Business Manager list. Please try again.
You don't have permission to make this change. If you think this is an error, contact your admin.
Repairing an Out-of-Sync Automated Device Enrollment Token
You can repair an out-of-sync Automated Device Enrollment token when it is invalidated or when a Mobile Device Management (MDM) server in ABM has been deleted.
Prerequisites
- An account with Apple Business Manager (ABM) or Apple School Manager (ASM) is required, with the role of Administrator or Content Manager.
Repairing Automated Device Enrollment and ABM Synchronization
If your MDM server token is out of sync, you can re-upload a ºÚÁϺ£½Ç91Èë¿Ú-generated Automated Device Enrollment Key into your MDM Device Server to re-sync your Apple devices with ºÚÁϺ£½Ç91Èë¿Ú.
When an MDM Server token is out of sync, the ºÚÁϺ£½Ç91Èë¿Ú Admin Portal displays the following message when attempting to refresh your Automated Device Enrollment Device List:
ºÚÁϺ£½Ç91Èë¿Ú's list of Automated Device Enrollment devices could not be updated to match your Apple Business Manager list. Please try again.
- Retrieve your MDM ID using the ºÚÁϺ£½Ç91Èë¿Ú API and the curl command from a supported command line interface like Terminal on macOS. After ºÚÁϺ£½Ç91Èë¿Ú MDM is configured, a unique MDM ID is generated. This ID is necessary to make changes to your MDM settings. Start by fetching your MDM ID. The output of this GET request will generate your MDM ID (id).
curl -X GET https://console.jumpcloud.com/api/v2/applemdms \
-H 'accept: application/json' \
-H 'content-type: application/json' \
-H 'x-api-key: {API_KEY}'
- Use your MDM ID to generate your ºÚÁϺ£½Ç91Èë¿Ú Automated Device Enrollment Key:
curl -X GET https://console.jumpcloud.com/api/v2/applemdms/{MDM_ID_FROM_ABOVE_HERE}/depkey \
-H 'Accept: application/x-pem-file' \
-H 'content-type: application/json' \
-H 'x-api-key: {API_KEY}'
- The resulting certificate should resemble the output below:
-----BEGIN CERTIFICATE-----
Q2xvdWQgTURNMB4XDTIxMDgxMzE3MDEyNloXDTIxMDkxMjE3MDEyNlowGDEWMBQG
ggEBAKU3pjvrGUi4pZfEbiN0C8tJmIHBkBSAl3nlcIXFaJ/o9thtwEQ8iXrQRIq1
apwKAz5cF+J9M155Qj04mjrEIrZc3x34S5dvAKkDfxTzGBqBxBeCFfWa+IM9FOqt
C7gOW70rxPUyC1pYkYo4rwTU9PH406iCnMaL2amTPbdsQQjgI8zui04AcyRhsoGB
GEUattwIFK/1XnyUE8fqnS0nnL5yH4a8nROb6SOMwrd8F4H/U+kpUcnDIX3L8j2a
A1UEAxMNSnVtcENsb3VkIE1ETTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoC
rbx0O2hzag0x2rih0jQ+pdQ+HsUCAwEAAaMCMAAwDQYJKoZIhvcNAQELBQADggEB
ABI9C9zUsVVCVoyAoCD7Qqcx1EbsN4q9KcCkp0fIwe0ttKKBxWwQPVzWwwjAtDoZ
mOG6Ow1Avnd7EQzItDdqbtOA+Waji7NWdzvwSx7t0HcgrzUFE4zd57hZVemrwkK4
t34z2S+vcsK+8zazDYdSnRmAhvwkoHkaWpj7pM6lg9gvZhau3eGffaQBqLhm/0sN
eTVrJuE/+FZtcF5+7aQuK8YXMikwonMtOhN0wcgpgjQVUZw1VMROBcWkgUAS87wT
1I4PFW/iPHZg7apOW8VCzeka/ZXvwAEh+5qtXxE8zbxTS0YZHq6HMy1thLNlQETh
MIICrTCCAZWgAwIBAgIBATANBgkqhkiG9w0BAQsFADAYMRYwFAYDVQQDEw1KdW1w
F+QRpHuWQHkTB4xAxqRPnfADH4dQq0nTjRkj89zsZI3umtav40gy+dScgrrWAGlw
mVqzP/HnSggPQ3LusHdNop8=
-----END CERTIFICATE-----
- Create a new .pem file using the following command:
touch jc_depkey.pem
- Copy and paste the Automated Device Enrollment key, including Begin Certificate and End
- Save the .pem file.
- Log in to your ABM or ASM account.
- Select your profile name, then click Preferences.
- Select MDM Server Assignment, then select the MDM server you want to sync with ºÚÁϺ£½Ç91Èë¿Ú.
- Click Edit.
- Under MDM Server Settings, click Upload New, then upload the JC_depkey.pem file.
- Click Save.
- Click Download Token.
- Log in to the .
- Go to DEVICE MANAGEMENT > MDM.
- In the MDM Home page under Automated Device Enrollment Configuration, click renew.
- Upload the newly downloaded token from ABM or ASM.
- Click Complete.
- After the token is renewed, click sync with Apple to refresh your Automated Device Enrollment Device List. A successful synchronization will display the following message, and your Automated Device Enrollment devices will be listed as expected.
Additional Resources
Show Me: