hybridfert.blogg.se

Apple configurator 2 blueprints guide
Apple configurator 2 blueprints guide







  1. #APPLE CONFIGURATOR 2 BLUEPRINTS GUIDE UPDATE#
  2. #APPLE CONFIGURATOR 2 BLUEPRINTS GUIDE FULL#
  3. #APPLE CONFIGURATOR 2 BLUEPRINTS GUIDE PASSWORD#
  4. #APPLE CONFIGURATOR 2 BLUEPRINTS GUIDE DOWNLOAD#

The blueprint editor is structured in a way that allows in place configuration of every aspect of a blueprint, from the generation of a supervision identity to the creation of configuration profiles – because of this, you do not need to lay any preparatory ground work before creating a new blueprint in iMazing Configurator's library. That being said, the blueprint editor will inform you inline of important contradictions or limitations, and features a contextual help button pointing to the relevant article of our online documentation. The app may be already present on the target device. Pushing files to an app which is not configured to be installed is not an error.Adding supervised only actions to a blueprint which does not supervise devices is not an error: the target device may be already supervised.

#APPLE CONFIGURATOR 2 BLUEPRINTS GUIDE PASSWORD#

IMazing Configurator can do quite a bit more than Apple Configurator without erasing the target device, but will always honor data ownership: if a backup password has been set, some actions will become impossible without erasing the device or providing the backup password.īecause the state of the target devices to which a blueprint is applied cannot be known in advance, the blueprint editor performs only minimal validation. iMazing may ask for the target device’s backup encryption password while applying this blueprint.

apple configurator 2 blueprints guide

When configuring a blueprint which does not erase target devices, you may see the following inline warning: See the Uploading Supervising Identities section of JAMF's documentation on the subject_ for a good example of how MDM vendors expose this setting._ To perform "supervised only" actions on such devices, you must add your organization's certificate to the ADE profile's Host Supervision Certificates field.

#APPLE CONFIGURATOR 2 BLUEPRINTS GUIDE DOWNLOAD#

⚠ _ ADE devices: devices configured via Apple's Automated Device Enrollment (ADE, formerly Device Enrollment Program – DEP) retrieve their configuration from Apple's servers, via the download and installation of an ADE profile. In Apple Configurator and iMazing, supervising identities can be imported by importing an organization. ⚠ Important: to execute a "supervised only" action, the same supervising identity must be configured on the host and on the target device. iMazing Configurator follows this practice. Many other configuration profile settingsĪpple and 3rd party vendors usually denote these capabilities by the "supervised only" mention, both in the UI of their solutions and in technical documentation.Pairing even if Allow pairing is set to false.Pairing without interacting with the target device.Zero-touch installation of configuration profiles.Single App Mode (also called Kiosk Mode).Save passcode unlock token and Clear passcode actions.Supervision unlocks a whole suite of device management capabilities: To supervise an iOS, iPadOS or tvOS device means to configure it in a way that guarantees a form of ownership of the device by it's supervising organization, via a certificate often called the supervising identity.

apple configurator 2 blueprints guide

#APPLE CONFIGURATOR 2 BLUEPRINTS GUIDE UPDATE#

  • Erase All Data and Settings will be replaced by an OS restore if the blueprint also contains the Update OS action.
  • Erase All Data and Settings will be skipped if the device is already erased.
  • Update OS will not be performed if the device is already running the latest available OS.
  • Apps which are already installed will not be installed again if up to date.
  • In any case, iMazing Configurator will take into account the entirety of the blueprint and the state of the target devices to skip redundant actions: Another type of workflow may require the blueprint to copy documents to a specific app, sync contacts, books, music or photos, or even configure an app's settings before launching it in Kiosk mode.

    apple configurator 2 blueprints guide

    #APPLE CONFIGURATOR 2 BLUEPRINTS GUIDE FULL#

    On the other hand, blueprints can also perform quite a few automation tasks: a typical 'refurbish' workflow would perform a battery health check, erase all data and settings, and update the OS before waiting for a full battery charge. This process usually involves taking ownership of the target devices via supervision, installing configuration profilesto pre-configure Wi-Fi access and enforce security policies, and pre-installing 3rd party or company apps.

    apple configurator 2 blueprints guide

    Blueprints can be leveraged to configure Apple mobile devices before handing them out to their end user.









    Apple configurator 2 blueprints guide