

- APPLE CONFIGURATOR 2 EXPORT BLUEPRINT UPDATE
- APPLE CONFIGURATOR 2 EXPORT BLUEPRINT FULL
- APPLE CONFIGURATOR 2 EXPORT BLUEPRINT PASSWORD
iMazing may ask for the target device’s backup encryption password while applying this blueprint. When configuring a blueprint which does not erase target devices, you may see the following inline warning: See the Uploading Supervising Identities section of JAMF's documentation on the subject for a good example of how MDM vendors expose this setting. To perform "supervised only" actions on such devices, you must add your organization's certificate to the DEP profile's Host Supervision Certificates field.

⚠ DEP devices: devices configured via Apple's Device Enrollment Program (DEP) retrieve their configuration from Apple's servers, via the download and installation of a DEP profile.

In Apple Configurator and iMazing, supervising identities can be imported by importing an organization. ⚠ Important: to execute a "supervised only" action, the same supervising identity must be configured on the host and on the target device. iMazing Configurator follows this practice. Many other configuration profile settingsĪpple and 3rd party vendors usually denote these capabilities by the "supervised only" mention, both in the UI of their solutions and in technical documentation.Pairing even if Allow pairing is set to false.Pairing without interacting with the target device.Zero-touch installation of configuration profiles.Single App Mode (also called Kiosk Mode).Save passcode unlock token and Clear passcode actions.Supervision unlocks a whole suite of device management capabilities: To supervise an iOS, iPadOS or tvOS device means to configure it in a way that guarantees a form of ownership of the device by it's supervising organization, via a certificate often called the supervising identity.
APPLE CONFIGURATOR 2 EXPORT BLUEPRINT UPDATE
APPLE CONFIGURATOR 2 EXPORT BLUEPRINT FULL
On the other hand, blueprints can also perform quite a few automation tasks: a typical 'refurbish' workflow would perform a battery health check, erase all data and settings, and update the OS before waiting for a full battery charge. This process usually involves taking ownership of the target devices via supervision, installing configuration profiles to pre-configure Wi-Fi access and enforce security policies, and pre-installing 3rd party or company apps. Blueprints can be leveraged to configure Apple mobile devices before handing them out to their end user.
