Fleet logo
Menu An icon indicating that interacting with this button will open the navigation menu.
Fleet logo An 'X' icon indicating that this can be interacted with to close the navigation menu.
Multi platform
Device management   (+ MDM) Orchestration   (+ monitoring) Software management   (+ CVEs) Integrations

Docs
Pricing
More
News Case studies Ask around Meetups Share your story The handbook Get your license Schedule a demo
Schedule a demo
Multi platform
Device management + MDM Orchestration + monitoring Software management + CVEs, usage, software catalog Integrations
Docs Pricing
More
News Case studies Ask around Meetups Share your story
The handbook Get your license Schedule a demo
Try it yourself
{{categoryFriendlyName}}/
{{thisPage.meta.articleTitle}}
search

Fleet 4.31.0 | MDM enrollment workflow, API user role.

{{articleSubtitle}}

| The author's GitHub profile picture

JD Strong

Share this article on Hacker News Share this article on LinkedIn Share this article on Twitter

On this page

{{topic.title}}
Docs Docs REST API REST API Guides Guides Talk to an engineer Talk to an engineer
Suggest an editSuggest an edit

Try it out

See what Fleet can do

Start now
macOS Windows Linux

Fleet 4.31.0 | MDM enrollment workflow, API user role.

{{articleSubtitle}}

| The author's GitHub profile picture

JD Strong

Fleet 4.31.0 | MDM enrollment workflow, API user role.

Fleet 4.31.0

Fleet 4.31.0 is live. Check out the full changelog or continue reading to get the highlights. For upgrade instructions, see our upgrade guide in the Fleet docs.

Highlights

  • MDM enrollment workflow
  • mTLS support in Fleet
  • GitOps user role

MDM enrollment workflow

Hot on the heels of Fleet’s public beta announcement for MDM, we continue to provide 🟢 Results by adding several new features in the enrollment workflow, including SAML authentication and complete support for bootstrap packages.

Authentication for device enrollments enables you to integrate the MDM enrollment process with an identity provider. With Fleet, you can configure authentication for enrollments using any identity provider service that supports custom SAML integrations, including Google Workspace, Microsoft Azure, Okta, OneLogin, and JumpCloud, to name a few. Once set up, users must authenticate against their identity provider using their credentials to successfully enroll their devices into Fleet.

In addition to Fleet Desktop, Fleet can also deliver a bootstrap software package or installer that to initiate the deployment and configuration of devices during the enrollment process. Use a bootstrap package to deploy your own configuration manager, such as Munki, Chef, or Puppet. With a seamless deployment and configuration of your preferred configuration manager on devices enrolled in Fleet, you will have more granular control and customized management of your organization's devices.

mTLS support in fleetd (Orbit)

Available in Fleet Premium and Fleet Ultimate

Mutual TLS (mTLS) ensures secure and authenticated communication between two parties. Unlike traditional TLS, where only the server's identity is verified, mTLS requires both the server and the client to authenticate each other using digital certificates. This additional layer of security helps prevent unauthorized access and enhances data privacy. mTLS is often leveraged in a zero-trust networking environment, because security measures are applied regardless of whether the user or device is inside or outside the network perimeter.

Fleet is bringing 🟢 Results with support for TLS client certificates in fleetd (Orbit) to ensure secure communication to fleet. Learn more about using mTLS certificates when generating your Fleet packages.

GitOps user role

Available in Fleet Premium and Fleet Ultimate

Take 🟠 Ownership of Fleet account roles with greater granularity. Fleet 4.31.0 includes a new user role, gitops.

The gitops user role is ideal for automated workflows as part of continuous integration/continuous development (CI/CD) actions, such as MDM profile commitments and security profiles. The gitops user role can only access Fleet using the API and is unable to access the Fleet dashboard.

More new features, improvements, and bug fixes

List of features

  • Added gitops user role to Fleet. GitOps users are users that can manage configuration.
  • Added the fleetctl get mdm-commands command to get a list of MDM commands that were executed. Added the GET /api/latest/fleet/mdm/apple/commands API endpoint.
  • Added Fleet UI flows for uploading, downloading, deleting, and viewing information about a Fleet MDM bootstrap package.
  • Added apple_bm_enabled_and_configured to app config responses.
  • Added support for the mdm.macos_setup.macos_setup_assistant key in the 'config' and 'team' YAML payloads supported by fleetctl apply.
  • Added the endpoints to set, get and delete the macOS setup assistant associated with a team or no team (GET, POST and DELETE methods on the /api/latest/fleet/mdm/apple/enrollment_profile path).
  • Added functionality to gate Apple MDM login behind SAML authentication.
  • Added new "verifying" status for MDM profiles.
  • Migrated MDM status values from "applied" to "verifying" and updated associated endpoints.
  • Updated macOS settings status filters and aggregate counts to more accurately reflect the status of FileVault settings.
  • Filter out non-observer_can_run queries for observers in fleetctl get queries to match the UI behavior.
  • Fall back to a previous NVD release if the asset we want is not in the latest release.
  • Users can now click back to software to return to the filtered host details software tab or filtered manage software page.
  • Users can now bookmark software table filters.
  • Added a maximum height to the teams dropdown, allowing the user to scroll through a large number of teams.
  • Present the 403 error page when a user with no access logs in.
  • Back to hosts and back to software in host details and software details return to previous table state.
  • Bookmarkable URLs are now the source of truth for Manage Host and Manage Software table states.
  • Removed old Okta configuration that was only documented for internal usage. These configs are being replaced for a general approach to gate profiles behind SSO.
  • Removed any host's packs information for observers and observer plus in UI.
  • Added changed_macos_setup_assistant and deleted_macos_setup_assistant activities for the macOS setup assistant setting.
  • Hide reset sessions in user dropdown for current user.
  • Added a suite of UI logic for premium features in the Sandbox environment.
  • In Sandbox, added "Premium Feature" icons for premium-only option to designate a policy as "Critical," as well as copy to the tooltip above the icon next to policies designated "Critical" in the Manage policies table.
  • Added a star to let a sandbox user know that the "Probability of exploit" column of the Manage Software page is a premium feature.
  • Added "Premium Feature" icons for premium-only columns of the Vulnerabilities table when in Sandbox mode.
  • Inform prospective customers that Teams is a Premium feature.
  • Fixed animation for opening edit user modal.
  • Fixed nav bar buttons not responsively resizing when small screen widths cannot fit default size nav bar.
  • Fixed a bug with and improved the overall experience of tabbed navigation through the setup flow.
  • Fixed /api/_version/fleet/logout to return HTTP 401 if unauthorized.
  • Fixed endpoint to return proper status code (401) on /api/fleet/orbit/enroll if secret is invalid.
  • Fixed a bug where a white bar appears at the top of the login page before the app renders.
  • Fixed bug in manage hosts table where UI elements related to row selection were displayed to a team observer user when that user was also a team and maintainer or admin on another team.
  • Fixed bug in add policy UI where a user that is team maintainer or team admin cannot access the UI to save a new policy if that user is also an observer on another team.
  • Fixed UI bug where dashboard links to hosts filtered by platform did not carry over the selected team filter.
  • Fixed not showing software card on dashboard when clicking on vulnerabilities.
  • Fixed a UI bug where fields on the "My account" page were cut off at smaller viewport widths.
  • Fixed software table to match UI spec (responsively hidden vulnerabilities/probability of export column under 990px width).
  • Fixed a bug where bundle information displayed in tooltips over a software's name was mistakenly hidden.
  • Fixed an HTTP 500 on GET /api/_version_/fleet/hosts returned when mdm_enrollment_status is invalid.

Ready to upgrade?

Visit our Upgrade guide in the Fleet docs for instructions on updating to Fleet 4.31.0.

Fleet logo
Multi platform Device management Orchestration Software management Integrations Pricing
Documentation Support Docs API Release notes Get your license
Company About News Jobs Logos/artwork Why open source?
ISO 27001 coming soon a small checkmarkSOC2 Type 2 Creative Commons Licence CC BY-SA 4.0
© 2025 Fleet Inc. Privacy
Slack logo GitHub logo LinkedIn logo X (Twitter) logo Youtube logo Mastadon logo
Tried Fleet yet?

Get started with Fleet

Start
continue
×