Merk
Tilgang til denne siden krever autorisasjon. Du kan prøve å logge på eller endre kataloger.
Tilgang til denne siden krever autorisasjon. Du kan prøve å endre kataloger.
Use Apple Business with Microsoft Intune to simplify and automate device enrollment for iOS/iPadOS devices procured through Apple Business. Automated device enrollment, which we'll set up in this tutorial, enables secure automatic enrollment the first time the user turns on the device by deploying the enrollment policy to the device over-the-air.
In this tutorial, you'll learn how to:
- Get an Apple device enrollment token
- Sync managed devices to Intune
- Create an enrollment policy
- Assign the enrollment policy to devices
At the end of this tutorial, devices will be ready to distribute for enrollment.
Prerequisites
- Set mobile device management (MDM) authority.
- Get Apple MDM Push certificate.
- Have new or wiped devices purchased from Apple Business.
- Add purchase information under device management settings in Apple Business.
If you don't have an Intune subscription, sign up for a free trial account.
Step 1: Add MDM server
Create an MDM server profile for Microsoft Intune in Apple Business. The token you download in this step will enable the connection between Microsoft Intune and Apple Business in a later step.
Sign in to the Microsoft Intune admin center.
Go to Devices.
Expand Device onboarding, and then select Enrollment.
Select Apple mobile.
Select Enrollment program tokens.
Select Create.
Select I agree to grant permission to Microsoft to send user and device information to Apple.
Select Download your public key to download the server's public key certificate (a .pem file) to your local drive.
Select Create a token via Apple Business and sign in to Apple Business with your company Apple ID.
Important
While you're in Apple Business, don't close the browser tab with Microsoft Intune. You'll return to it later.
Add an MDM server called TestMDMServer and download the server token for it in Apple Business. For details and instructions, see Link to a third-party MDM server(opens Apple Business User Guide). Save the server token locally as a P7M file (.p7m). Then continue to Step 2: Assign devices.
Step 2: Assign devices
While you're in Apple Business, assign devices to your new MDM server (TestMDMServer or whatever you named it). For details and instructions, see Assign, reassign, or unassign devices in Apple Business(opens Apple Business User Guide). When you're done assigning devices, continue to Step 3: Upload MDM server token.
Step 3: Upload MDM server token
Return to the Microsoft Intune admin center to upload the MDM server token to Intune. After you upload the token, Microsoft Intune can sync and enroll iOS/iPadOS devices assigned to TestMDMServer.
- For Apple ID, enter the Apple ID you used to create the token.
- For Apple token, upload the server token you saved earlier. The file must be in P7M format.
- Select Next.
- Optionally, apply scope tags to the enrollment token to limit other admins from accessing or making changes to it. For more information about scope tags, see Use role-based access control (RBAC) and scope tags for distributed IT.
- Select Next.
- On Review + create, select Create to finish linking Microsoft Intune and Apple Business.
Microsoft Intune automatically syncs with Apple Business. Devices can take up to 12 hours to appear in the admin center. You can wait for these devices to sync, or manually start the sync. To start the sync yourself, select your token from the list in the admin center, and then choose Devices > Sync.
Step 4: Create an Apple enrollment policy
Create an enrollment policy for corporate-owned iOS/iPadOS devices. A device enrollment policy defines the settings applied to a group of devices during enrollment.
Select your token in the admin center, and then choose Enrollment policies.
Select Create policy > iOS/iPadOS.
On the Basics page, enter TestPolicy for Name and Testing ADE for iOS/iPadOS devices for Description. Users don't see these details.
Select Next.
Decide if you want your devices to enroll with or without User Affinity. User Affinity is designed for devices that will be used by particular users. If your users will want to use the Company Portal for services like installing apps, choose Enroll with User Affinity. If your users don't need the Company Portal or you want to provision the device for many users, choose Enroll without User Affinity.
- If you chose to enroll with User Affinity, the Select where users must authenticate option appears. Decide if you want to Authenticate with Company Portal or Apple Setup Assistant (legacy), or Setup Assistant with modern authentication. For more information about authentication methods, see Authentication methods for automated device enrollment in Intune.
If you chose to enroll with User Affinity and Authenticate with Company Portal, the Install Company Portal with VPP option appears. If you install the Company Portal with a VPP token, your user won't have to enter an Apple ID and Password to download the Company Portal from the app store during enrollment. Choose Use Token: under Install Company Portal with VPP to select a VPP token that has free licenses of the Company Portal available. If you don't want to use VPP to deploy the Company Portal, choose Don't use VPP.
- If you chose to enroll with User Affinity, Authenticate with Company Portal, and Install Company Portal with VPP, decide if you want to run the Company Portal in Single App Mode until Authentication. With this setting, you can ensure the user doesn't have access to other apps until they finish the corporate enrollment. If you want to restrict the user to this flow until enrollment is completed, choose Yes under Run Company Portal in Single App Mode until authentication.
Under Device Management Settings, choose Yes for Supervised. Supervision gives you more management options and disables Apple Activation Lock by default. Microsoft recommends using automated device enrollment as the mechanism for enabling Intune's supervised mode, especially for organizations that are deploying large numbers of iOS/iPadOS devices.
Choose Yes under Locked enrollment to ensure your users can't remove device management from their corporate device.
By default, Apple names the device with the device type, such as iPad. If you want to provide a different name template, choose Yes under Apply device name template. Enter the name you want to apply to the devices, where the strings {{SERIAL}} and {{DEVICETYPE}} will substitute each device's serial number and device type. Otherwise, choose No under Apply device name template.
Choose Next.
On the Setup Assistant page, enter Tutorial department for Department Name. This string is what users see when they tap About configuration during device activation.
Under Department Phone, enter a phone number. This number appears when users tap the Need help button during activation.
You can Show or Hide various screens during device activation. For the most seamless enrollment experience, set all screens to Hide.
Choose Next.
Review the policy settings. To save the policy, select Create
Step 5: Assign an enrollment policy to iOS/iPadOS devices
You must assign an automated device enrollment policy to devices before they can enroll. These devices are synced to Intune from Apple, and must be assigned to the proper MDM server token in Apple Business or Apple School Manager.
- In the admin center, return to Enrollment program tokens. Choose your token from the list.
- Select Devices, and then choose the devices you want to assign.
- Select Assign policy. Then select a policy for the devices.
- Select Assign.
Note
Ensure that Device Type Restrictions, found within your tenant's Enrollment Restrictions, does not have the default All Users policy set to block the iOS/iPadOS platform. This setting will cause automated enrollment to fail and your device will show as an invalid profile, regardless of user attestation. To permit enrollment only by company-managed devices, block only personally owned devices, which will permit corporate devices to enroll. Microsoft defines a corporate device as a device that's enrolled via a device enrollment program or a device that's manually entered in the admin center under Corporate device identifiers.
Step 6: Distribute devices to users
You've set up management and syncing between Apple and Intune, and assigned a policy to let your ADE devices enroll. You can now distribute devices to users. Devices with user affinity require each user be assigned an Intune license.
Related configurations
In addition to assigning devices to your MDM server and creating an enrollment policy, you can optionally use Apple access management settings in Apple Business (or Apple School Manager) to configure service access for Apple accounts on organization-owned devices. Microsoft Intune enforces these settings after enrollment. For more information, see Configure service access for Apple accounts.