Solutions
Device management
Remotely manage, and protect laptops and mobile devices.
Orchestration
Automate tasks across devices, from app installs to scripts.
Software management
Inventory, patch, and manage installed software.
Infrastructure as code
See every change, undo any error, repeat every success.
Deployment
Run Fleet the way that fits your team.
Extend Fleet
Integrate your favorite tools with Fleet.
More
Device management
Remotely manage, and protect laptops and mobile devices.
Orchestration
Automate tasks across devices, from app installs to scripts.
Software management
Inventory, patch, and manage installed software.
Infrastructure as code
See every change, undo any error, repeat every success.
Deployment
Run Fleet the way that fits your team.
Extend Fleet
Integrate your favorite tools with Fleet.
Brock Walters
Brock Walters
Managing Apple devices across an enterprise organization requires more than just deploying hardware. Configuration settings, security policies, and app distribution must reach hundreds or thousands of macOS, iOS, and iPadOS devices without manual intervention. Apple's Mobile Device Management (MDM) protocol provides the foundation for managing large device fleets, but the protocol itself is just one piece of the puzzle. This guide covers how Apple MDM works, integration with Apple Business Manager (ABM).
Apple MDM is a protocol that lets IT administrators remotely configure, manage, and secure Apple devices through a combination of the Apple Push Notification service (APNs) integration, certificate-based authentication, and configuration profiles delivered as property list (plist) payloads. The protocol supports iOS, iPadOS, macOS, tvOS, watchOS, and visionOS devices.
The architecture relies on two core components working together. A check-in protocol handles device enrollment and validates eligibility for management, while the command execution protocol delivers actual management commands and queries to enrolled devices.
When administrators push a configuration change, the MDM server doesn't communicate directly with the device. Instead, it sends a push notification through APNs, which triggers the device to check in with the MDM server and retrieve any queued commands. This communication depends on valid certificates, including an APNs certificate that requires annual renewal to keep your fleet connected.
Without Apple Business Manager (ABM), enrollment is typically manual or user-initiated, often via profile installation or account-driven enrollment flows. These approaches work but are harder to scale than zero-touch deployment.
ABM connects Apple's activation servers to your MDM server. When you purchase devices through Apple or authorized resellers, they automatically appear in your ABM account. From there, you assign devices to your MDM server so they enroll automatically when employees power them on for the first time.
ABM also centralizes app purchasing through Apps and Books, letting you buy apps in bulk and distribute them to devices without requiring individual Apple IDs. Apple School Manager (ASM) provides the same capabilities for educational institutions.
Automated Device Enrollment (ADE) lets employees power on a new Mac or iPhone and start working without IT touching the device. The device automatically enrolls in your MDM server during Setup Assistant, receives its configuration profiles, and installs required apps.
Here's how it works: when an employee powers on a new device, it contacts Apple's activation servers, which recognize the device belongs to your organization through ABM. Apple redirects the device to your MDM server, and enrollment happens automatically. Depending on configuration (for example, Auto Advance on supported Macs), setup can be largely hands-off.
ADE provides capabilities that manual enrollment can't match:
These advantages generally make ADE the preferred enrollment method for organization-owned hardware.
On iOS and iPadOS, supervised devices unlock additional restrictions and controls, such as preventing users from modifying Find My settings, changing the device name, or pairing with unauthorized computers. On macOS, a key capability milestone is User Approved MDM (UAMDM), which grants additional privileges compared to non-approved enrollment. Enrollment method and OS version affect which advanced controls are available on each platform.
Apps and Books (formerly VPP) lets you purchase apps in bulk and distribute them without requiring individual Apple IDs on every device. After connecting your Apps and Books token to your MDM server, you can assign app licenses to either devices or users. Device-assigned licenses are particularly useful for shared devices or kiosk deployments where no user signs in with a personal account.
The MDM server can install and update Apps and Books content even when the App Store is hidden on managed devices, letting administrators maintain tight control over which apps users can access while still keeping approved software current.
Declarative Device Management (DDM) represents Apple's evolution of the traditional MDM protocol. Introduced at WWDC 2021, DDM shifts from an imperative command-response model to a declarative state-based approach where devices autonomously apply and maintain configurations based on declared desired states.
Traditional MDM operates through an asynchronous command-response model. The server sends a push notification to APNs, the device checks in to retrieve the queued command, processes it, and returns an acknowledgment. This architecture creates communication overhead because every configuration verification requires a round-trip exchange.
DDM changes this relationship. Instead of sending commands, you define the desired state through declarations. The device receives these declarations and becomes responsible for autonomously achieving and maintaining that state without requiring constant server communication. When device state changes, status channels report those changes back to your server.
DDM's autonomous behavior delivers practical benefits for IT teams managing substantial fleets:
DDM coexists with traditional MDM commands and profiles, so you can adopt it gradually while your existing management workflows continue functioning.
Most enterprises manage more than just Apple devices. IT teams typically oversee fleets spanning macOS, Windows, and Linux and more. This historically has meant running separate management tools for each platform. Multi-platform MDM tools address this fragmentation by managing all devices through a single console.
The best multi-platform tools don't sacrifice Apple-specific capabilities for multi-platform coverage. They implement Apple's MDM protocol natively, including full support for ABM integration, ADE, Apps and Books, and declarative device management, while extending the same depth of management to Windows and Linux devices.
Apple MDM works well for managing Apple devices, but most enterprises don't operate exclusively within the Apple ecosystem. Running parallel management systems for each platform adds work that grows as the fleet expands.
A core challenge is protocol incompatibility. Apple MDM uses proprietary protocols and APNs integration. Windows environments often use Active Directory, Group Policy Objects (GPOs), and Windows Management Instrumentation (WMI), alongside Windows MDM capabilities exposed through configuration service providers.
Linux typically uses configuration management tools like Ansible or Puppet with SSH-based access. These systems operate on fundamentally different architectures, which often forces IT teams to maintain separate administrative workflows and correlate data across disconnected tools.
When evaluating tools that manage Apple devices alongside other platforms, certain capabilities separate tools that genuinely simplify management from those that just add another layer of abstraction:
Open-source options add transparency to the equation. Organizations can inspect exactly how their devices are being managed, audit the code for security concerns, and avoid vendor lock-in. Fleet provides all of these capabilities as an open-core platform, combining MDM with osquery-based device visibility through hundreds of queryable data tables. Device reporting arrives in tens of seconds rather than multi-hour sync cycles, and both cloud-hosted and self-hosted deployment options address data residency requirements.
Apple MDM provides the protocol foundation for enterprise device management, while ABM and automated device enrollment enable zero-touch deployment workflows. Declarative device management points toward Apple's intended direction for modern management.
For comprehensive device management across Mac, iPhone, iPad, Windows, and Linux, Fleet provides open-core MDM that integrates with ABM. Fleet manages your devices with an API-first architecture that supports GitOps workflows and configuration as code. Try Fleet to see how unified device management works across your entire fleet.
MDM is the protocol and server infrastructure that actually manages devices, pushing configurations, enforcing policies, and executing commands. ABM is Apple's web portal for device enrollment and app purchasing. ABM connects to your MDM server and tells Apple's activation servers which MDM server should manage each device. You need both working together for automated enrollment and zero-touch deployment.
It depends on the enrollment method. Devices enrolled through Automated Device Enrollment (ADE) and that are SUpervised can be configured to have non-removable MDM profiles. This prevents users from removing device management. Devices enrolled manually or through user-initiated enrollment typically allow profile removal. This is why ADE matters for institutionally-owned devices where strong policy enforcement is required.
Initial setup often takes anywhere from a few days to a couple of weeks, depending on your existing infrastructure. You'll need to establish an ABM account, obtain APNs certificates, connect your MDM server, and configure enrollment profiles. Fleet's MDM setup guide walks through the specific steps for connecting ABM.
Yes, through User Enrollment. This enrollment method provides cryptographic separation between managed corporate data and personal data on the device. Your MDM can configure work accounts and apps, enforce passcode requirements, and remove work data if needed, but it can't access personal information, see personal apps, or wipe the entire device. User Enrollment strikes a balance between organizational security requirements and employee privacy on personal devices. Fleet supports User Enrollment for BYOD scenarios alongside device-based enrollment for corporate devices.