Profiles are the primary means to manage devices. Configure profiles so your iOS devices remain secure and configured to your preferred settings. You can think of profiles as the settings and rules that, when combined with compliance policies, help you enforce corporate rules and procedures. They contain the settings, configurations, and restrictions that you want to enforce on devices.
A profile consists of the general profile settings and a specific payload. Profiles work best when they contain only a single payload.
iOS profiles apply to a device at either the user level or the device level. When creating iOS profiles, you select the level the profile applies to. Some profiles can only be applied to the user level or device level.
Supervised Mode Requirement for Profiles
You can deploy some or all your iOS devices in Supervised mode. Supervised mode is a device-level setting that provides administrators with advanced management capabilities and restrictions.
Certain profile settings are available only to supervised devices. A supervised setting is tagged using an icon displayed to the right, which indicates the minimum iOS requirement needed for enforcement.
For example, prevent end users from using AirDrop to share files with other macOS computers and iOS devices, by deselecting the check box next to Allow AirDrop. The iOS 7 + Supervised icon means only devices that are running iOS 7 and set up in Supervised mode using Apple Configurator are affected by this restriction. For more information, please see Integration with Apple Configurator or the Apple Business Manager. To see a complete list of the iOS system requirements and supervision options, see Appendix – iOS Functionality: Supervised vs. Unsupervised.
Skip Setup Assistant
When creating iOS profiles, you can use the Skip Setup Assistant payload profile to skip all the screens or skip only some screens in iOS 14 and later devices. For more information, see Configure a Setup Assistant Profile
Some device profiles configure the settings for accessing an iOS device. Use these profiles to ensure that access to a device is limited only to authorized users.
Some examples of device access profiles include:
Ensure that your iOS devices remain secure through device profiles. These profiles configure the native iOS security features or configure corporate security settings on a device through Workspace ONE UEM.
Some examples of device security profiles include:
- Use a Wi-Fi profile to connect enrolled devices to your corporate Wi-Fi without sending the network credentials to users. For more information, see Create a Wi-Fi Profile for iOS Devices.
- Implement digital certificates to protect corporate assets. For more information, see Associate a SCEP/Credentials Payload to iOS Devices
- Ensure access to internal resources for your devices with the VPN profile. For more information, see Configure Virtual Private Network (VPN) Access for iOS Devices.
Configure the various settings of your iOS devices with the configuration profiles. These profiles configure the device settings to meet your business needs.
Some examples of device configuration profiles include:
- Set up an Exchange account on a device with an Exchange ActiveSync profile. For more information, see Deploy EAS Mail using Native Mail Client for iOS Devices.
- Whitelist a specific set of devices to receive Apple TV broadcast privileges with the AirPlay profile. For more information, see Create a tvOS AirPlay Whitelist Profile for iOS Devices.
- Ensure that the devices remain up to date with the iOS Updates profile. For more information, see Configure iOS Updates for iOS Devices.