Fleet logo
Menu An icon indicating that interacting with this button will open the navigation menu.
Fleet logo An 'X' icon indicating that this can be interacted with to close the navigation menu.

Solutions

a small chevron
Device management

Device management

Remotely manage, and protect laptops and mobile devices.

Orchestration

Orchestration

Automate tasks across devices, from app installs to scripts.

Software management

Software management

Inventory, patch, and manage installed software.

GitOps

Infrastructure as code

See every change, undo any error, repeat every success.

Deployment

Deployment

Run Fleet the way that fits your team.

Extend Fleet

Extend Fleet

Integrate your favorite tools with Fleet.


Customers
Pricing

More

a small chevron
Docs

Docs

Guides

Guides

Support

Support

News

News

Get your license

Get your license

The handbook

The handbook

GitOps for device management

In-person workshop for beginners.

Join us
Get a demo
Solutions A small chevron
Device management

Device management

Remotely manage, and protect laptops and mobile devices.

Orchestration

Orchestration

Automate tasks across devices, from app installs to scripts.

Software management

Software management

Inventory, patch, and manage installed software.

GitOps

Infrastructure as code

See every change, undo any error, repeat every success.

Deployment

Deployment

Run Fleet the way that fits your team.

Extend Fleet

Extend Fleet

Integrate your favorite tools with Fleet.

Customers Pricing
More A small chevron

GitOps for device management

In-person workshop for beginners.

Join us
Docs

Docs

Guides

Guides

Support

Support

News

News

Get your license

Get your license

The handbook

The handbook

Get a demo
{{categoryFriendlyName}}/
{{thisPage.meta.articleTitle}}
search

What is Apple MDM? How Mobile Device Management Works in 2026

{{articleSubtitle}}

Last updated on |
The author's GitHub profile picture

Brock Walters

Share

Share this article on Hacker News Share this article on LinkedIn Share this article on Twitter

On this page

{{topic.title}}
Docs Docs REST API REST API Guides Guides Get a demoGet a demo
Suggest an editSuggest an edit

What is Apple MDM? How Mobile Device Management Works in 2026

{{articleSubtitle}}

Last updated on | The author's GitHub profile picture

Brock Walters

Apple MDM: A complete guide

Managing Apple devices across an enterprise organization requires more than just deploying hardware. Configuration settings, security policies, and app distribution must reach hundreds or thousands of macOS, iOS, and iPadOS devices without manual intervention. Apple's Mobile Device Management (MDM) protocol provides the foundation for managing large device fleets, but the protocol itself is just one piece of the puzzle. This guide covers how Apple MDM works, integration with Apple Business Manager (ABM).

What is Apple MDM and how does it work?

Apple MDM is a protocol that lets IT administrators remotely configure, manage, and secure Apple devices through a combination of the Apple Push Notification service (APNs) integration, certificate-based authentication, and configuration profiles delivered as property list (plist) payloads. The protocol supports iOS, iPadOS, macOS, tvOS, watchOS, and visionOS devices.

The architecture relies on two core components working together. A check-in protocol handles device enrollment and validates eligibility for management, while the command execution protocol delivers actual management commands and queries to enrolled devices.

When administrators push a configuration change, the MDM server doesn't communicate directly with the device. Instead, it sends a push notification through APNs, which triggers the device to check in with the MDM server and retrieve any queued commands. This communication depends on valid certificates, including an APNs certificate that requires annual renewal to keep your fleet connected.

Managing enrollment and apps through Apple Business Manager

Without Apple Business Manager (ABM), enrollment is typically manual or user-initiated, often via profile installation or account-driven enrollment flows. These approaches work but are harder to scale than zero-touch deployment.

ABM connects Apple's activation servers to your MDM server. When you purchase devices through Apple or authorized resellers, they automatically appear in your ABM account. From there, you assign devices to your MDM server so they enroll automatically when employees power them on for the first time.

ABM also centralizes app purchasing through Apps and Books, letting you buy apps in bulk and distribute them to devices without requiring individual Apple IDs. Apple School Manager (ASM) provides the same capabilities for educational institutions.

Zero-touch deployment through automated device enrollment

Automated Device Enrollment (ADE) lets employees power on a new Mac or iPhone and start working without IT touching the device. The device automatically enrolls in your MDM server during Setup Assistant, receives its configuration profiles, and installs required apps.

Here's how it works: when an employee powers on a new device, it contacts Apple's activation servers, which recognize the device belongs to your organization through ABM. Apple redirects the device to your MDM server, and enrollment happens automatically. Depending on configuration (for example, Auto Advance on supported Macs), setup can be largely hands-off.

ADE provides capabilities that manual enrollment can't match:

  • Non-removable enrollment profiles: Users can't remove the MDM profile through Settings, ensuring devices stay managed.
  • Supervision capabilities: ADE-enrolled devices can be supervised, unlocking additional management restrictions unavailable on standard enrolled devices.
  • Streamlined onboarding: New employees receive a device that's already configured with corporate accounts, security settings, and required applications.

These advantages generally make ADE the preferred enrollment method for organization-owned hardware.

Supervised vs. unsupervised devices

On iOS and iPadOS, supervised devices unlock additional restrictions and controls, such as preventing users from modifying Find My settings, changing the device name, or pairing with unauthorized computers. On macOS, a key capability milestone is User Approved MDM (UAMDM), which grants additional privileges compared to non-approved enrollment. Enrollment method and OS version affect which advanced controls are available on each platform.

Apps and Books integration

Apps and Books (formerly VPP) lets you purchase apps in bulk and distribute them without requiring individual Apple IDs on every device. After connecting your Apps and Books token to your MDM server, you can assign app licenses to either devices or users. Device-assigned licenses are particularly useful for shared devices or kiosk deployments where no user signs in with a personal account.

The MDM server can install and update Apps and Books content even when the App Store is hidden on managed devices, letting administrators maintain tight control over which apps users can access while still keeping approved software current.

What is declarative device management?

Declarative Device Management (DDM) represents Apple's evolution of the traditional MDM protocol. Introduced at WWDC 2021, DDM shifts from an imperative command-response model to a declarative state-based approach where devices autonomously apply and maintain configurations based on declared desired states.

Traditional MDM operates through an asynchronous command-response model. The server sends a push notification to APNs, the device checks in to retrieve the queued command, processes it, and returns an acknowledgment. This architecture creates communication overhead because every configuration verification requires a round-trip exchange.

DDM changes this relationship. Instead of sending commands, you define the desired state through declarations. The device receives these declarations and becomes responsible for autonomously achieving and maintaining that state without requiring constant server communication. When device state changes, status channels report those changes back to your server.

Why DDM matters for large deployments

DDM's autonomous behavior delivers practical benefits for IT teams managing substantial fleets:

  • Autonomous device management: Devices maintain configurations independently rather than waiting for server commands.
  • Reduced server communication overhead: DDM's autonomous device behavior can bring increased performance and scalability improvements.
  • Context-aware management: DDM's predicate system enables conditional logic where configurations adapt based on device state or network conditions.

DDM coexists with traditional MDM commands and profiles, so you can adopt it gradually while your existing management workflows continue functioning.

Multi-platform MDM for Apple and beyond

Most enterprises manage more than just Apple devices. IT teams typically oversee fleets spanning macOS, Windows, and Linux and more. This historically has meant running separate management tools for each platform. Multi-platform MDM tools address this fragmentation by managing all devices through a single console.

The best multi-platform tools don't sacrifice Apple-specific capabilities for multi-platform coverage. They implement Apple's MDM protocol natively, including full support for ABM integration, ADE, Apps and Books, and declarative device management, while extending the same depth of management to Windows and Linux devices.

When Apple-only MDM falls short

Apple MDM works well for managing Apple devices, but most enterprises don't operate exclusively within the Apple ecosystem. Running parallel management systems for each platform adds work that grows as the fleet expands.

A core challenge is protocol incompatibility. Apple MDM uses proprietary protocols and APNs integration. Windows environments often use Active Directory, Group Policy Objects (GPOs), and Windows Management Instrumentation (WMI), alongside Windows MDM capabilities exposed through configuration service providers.

Linux typically uses configuration management tools like Ansible or Puppet with SSH-based access. These systems operate on fundamentally different architectures, which often forces IT teams to maintain separate administrative workflows and correlate data across disconnected tools.

What to look for in multi-platform management

When evaluating tools that manage Apple devices alongside other platforms, certain capabilities separate tools that genuinely simplify management from those that just add another layer of abstraction:

  • Native Apple MDM support: The tool should implement Apple's MDM protocol properly, including ABM integration, ADE, Apps and Books, and configuration profiles.
  • Declarative device management: Support for DDM helps ensure you can take advantage of Apple's modern management architecture.
  • GitOps workflows: Infrastructure-as-code approaches let you version control configurations and maintain audit trails.
  • API-first architecture: Robust APIs enable automation workflows and integration with your existing security and IT tools.
  • Real-time visibility: The ability to query device state on demand accelerates troubleshooting and compliance verification.

Open-source options add transparency to the equation. Organizations can inspect exactly how their devices are being managed, audit the code for security concerns, and avoid vendor lock-in. Fleet provides all of these capabilities as an open-core platform, combining MDM with osquery-based device visibility through hundreds of queryable data tables. Device reporting arrives in tens of seconds rather than multi-hour sync cycles, and both cloud-hosted and self-hosted deployment options address data residency requirements.

Manage Apple devices across your fleet

Apple MDM provides the protocol foundation for enterprise device management, while ABM and automated device enrollment enable zero-touch deployment workflows. Declarative device management points toward Apple's intended direction for modern management.

For comprehensive device management across Mac, iPhone, iPad, Windows, and Linux, Fleet provides open-core MDM that integrates with ABM. Fleet manages your devices with an API-first architecture that supports GitOps workflows and configuration as code. Try Fleet to see how unified device management works across your entire fleet.

Frequently asked questions

What's the difference between MDM and ABM?

MDM is the protocol and server infrastructure that actually manages devices, pushing configurations, enforcing policies, and executing commands. ABM is Apple's web portal for device enrollment and app purchasing. ABM connects to your MDM server and tells Apple's activation servers which MDM server should manage each device. You need both working together for automated enrollment and zero-touch deployment.

Can users remove MDM profiles from their devices?

It depends on the enrollment method. Devices enrolled through Automated Device Enrollment (ADE) and that are SUpervised can be configured to have non-removable MDM profiles. This prevents users from removing device management. Devices enrolled manually or through user-initiated enrollment typically allow profile removal. This is why ADE matters for institutionally-owned devices where strong policy enforcement is required.

How long does it take to set up Apple MDM for an organization?

Initial setup often takes anywhere from a few days to a couple of weeks, depending on your existing infrastructure. You'll need to establish an ABM account, obtain APNs certificates, connect your MDM server, and configure enrollment profiles. Fleet's MDM setup guide walks through the specific steps for connecting ABM.

Does Apple MDM work for BYOD scenarios?

Yes, through User Enrollment. This enrollment method provides cryptographic separation between managed corporate data and personal data on the device. Your MDM can configure work accounts and apps, enforce passcode requirements, and remove work data if needed, but it can't access personal information, see personal apps, or wipe the entire device. User Enrollment strikes a balance between organizational security requirements and employee privacy on personal devices. Fleet supports User Enrollment for BYOD scenarios alongside device-based enrollment for corporate devices.

Fleet logo
Solutions Device management Orchestration Software management Integrations Pricing
Documentation Support Docs API Release notes Get your license
Company About Trust Jobs Logos/artwork Why open source?
a small checkmarkSOC2 Type 2 Creative Commons Licence CC BY-SA 4.0
© 2026 Fleet Inc. Privacy
Slack logo GitHub logo LinkedIn logo X (Twitter) logo Youtube logo Mastadon logo