BYO with me in 2025: iOS with User Enrollment in JAMF Pro
BYOD Is for Mobile Devices only right?
It really depends on your companies needs. For example many companies need to hire 1099 contractors and in such a case they come with their own devices but not the correct security settings or enforcements. Remember BYOD is a security construct. The idea here is that you should be securing the companies sensitive data in all forms.
You need to ensure its integrity, confidentiality and availability. Yes, the triad. You will see this come up again and again as a common theme. Securing against data leakage, accidental or intentional data deletion events and ensuring that the accuracy of the data is in tact. BYOD handles this by enforcing set security controls on the devices that store, process and transmit this sensitive data.
In many cases when you are architecting your program you really need to look at this as not just iOS and Andriod programs which in many cases they are. You need to consider what and how will you manage Windows, and macOS devices as well owned by contractors, employees, or staff members.
This is the first part in the series where I outline how I configured JAMF Pro to setup User Enrollment based BYOD program and all the settings that go along with it. In the next post I will outline how I configured JAMF Pro for macOS User Enrolled BYOD for scenerios where we have 1099 contractors who use their own macOS device. I will then cover our approach to Android and Windows management ia Microsoft Intune.
Part 1: Account Driven Enrollment with JAMF for iOS Devices
Implementing BYOD (Bring Your Own Device) for iOS devices using User Enrollment ensures a secure and seamless experience for both end users and IT administrators. This section outlines the specific steps required to set up BYOD for iOS User Enrollment, with a focus on the often-overlooked requirement of hosting a configuration file in the /.well-known/
path on a web host.
Prerequisites
Before proceeding, ensure the following requirements are met:
- Managed Apple IDs:
- Users need Managed Apple IDs to enable User Enrollment.
- These can be created and assigned in Apple School Manager or Apple Business Manager.
- Apple Push Notification Service (APNs) Certificate:
- Obtain and upload an APNs certificate to your Mobile Device Management (MDM) solution.
- Service Discovery File:
- Host a service discovery file on a public web server at the path:
/.well-known/
. - This file enables account-driven enrollment and allows iOS devices to discover the MDM server automatically.
- Host a service discovery file on a public web server at the path:
- MDM Configuration:
- Ensure your MDM supports User Enrollment and is configured to support BYOD.
Steps for Configuration
1. Prepare the Service Discovery File
The remote management file is a simple JSON file that helps iOS devices locate the MDM server. Create a file named com.apple.remotemanagement.json
with the following content:
- Replace
https://JAMF_PRO_URL.com/servicediscoveryenrollment/v1/userenroll
with your actual MDM server enrollment URL.
2. Host the File on the Web Server
-
Place the
com.apple.remotemanagement.json
file in the/.well-known/
directory of your web server. The full path should be: https://your-domain.com/.well-known/com.apple.remotemanagement -
Ensure the web server is publicly accessible and uses HTTPS.
-
Verify the file is accessible by navigating to the URL in a browser. For example:
3. Configure Managed Apple IDs
- Log in to Apple School Manager or Apple Business Manager.
- Create Managed Apple IDs for your users. The easiest way to do this and the way that I did this is to enable directory sync with federation. This approach allows you to let users login to Apple with their IDP configuration. This page provides he steps you need to federate and sync your directory with Apple Business Manager.
- NOTE when you federate you will run into issues where some users, who have setup Apple Accounts with their work email address will be asked to convert those non sanctioned accounts to allow Apple to reissue their work email address to their Apple Business Manager work sanctioned account.
- Communicate the Managed Apple IDs and their associated credentials to users.
Now that everyone has a managed Apple ID that allows them to login with their work email credentials user enrollment for iOS BYOD will be much more seamless.
4. Set Up MDM for User Enrollment
Account-driven User Enrollment
For personally owned mobile devices is enabled via Jamf Pro’s user-initiated enrollment settings. Source: Enabling User Enrollment in JAMF
- In Jamf Pro, click Settings icon in the sidebar.
- In the Global section, click User-initiated enrollment .
- Click the Edit icon .
- Click the Devices tab.
- Select the checkbox to enable account-driven User Enrollment for the type of personally owned devices you want to enroll.
- Click the Messaging tab and use the Language dialog to customize the way you want the Login page to display to users.
- Click the Save icon .
Automatically Registering Managed Apple IDs with Volume Purchasing
This is an important step in the process of MDM configuration with JAMF. Check out this article as a resource.
Users with Managed Apple IDs can be automatically registered with volume purchasing without any end user interaction.
Requirements
The Automatically register with volume purchasing if users have Managed Apple IDs checkbox must be selected for the volume location used to invite and assign content to users with Managed Apple IDs. For more information, see Volume Purchasing Integration.
- In Jamf Pro, click Users at the top of the sidebar.
- Click Smart User Groups in the sidebar.
- Click New .
- In the General pane, enter a Display Name, such as Managed Apple IDs.
- In the Criteria pane, add the following device criteria that includes all Managed Apple IDs in the smart group:
- Click Save .
- In Jamf Pro, click Users at the top of the sidebar.
- Click Invitations.
- In the General pane, enter a Display Name, such as Invitation for Managed Apple IDs.
- Choose Automatically register only users with Managed Apple IDs and skip invitation from the Distribution Method pop-up menu.
- In the Scope pane, add your smart group that contains Managed Apple IDs as a target for the invitation.
- Click Save .
Users with Managed Apple IDs are automatically registered with volume purchasing in Jamf Pro.
Creating a Volume Assignment
Create a volume assignment that assigns content to users.
- In Jamf Pro, click Users at the top of the sidebar.
- Click Volume Assignments in the sidebar.
- Click New .
Use the General payload to configure basic settings for the volume assignment, including the location.
Note: The assignment is automatically added to the site that the location belongs to.
Use the Apps and eBooks payloads to select the checkbox for each app and book you want to assign.
If a recently purchased app or book is not displayed in the list, follow the steps in the Recently Purchased Volume Content is not Displayed in Jamf Pro article to add that app or book to the list.
Click the Scope tab and configure the scope of the assignment.
Best Practice:To assign volume content to personally owned devices that have a Managed Apple ID, use a smart group that contains devices with Managed Apple IDs and add it to the scope of your volume assignment.
- Click Save .
Creating a Smart Group for Personally Owned Devices
To help you distribute content to personally owned devices, create a mobile device smart group that includes all personally owned devices. You can then configure the scope of distributed content in the following scenarios: Use the smart group to target personally owned devices for user-assigned content.
Use the smart group to exclude personally owned devices from device-assigned content.
- In Jamf Pro, click Devices at the top of the sidebar.
- Click Smart Device Groups in the sidebar.
- Click New .
- In the General pane, enter a Display Name.
- In the Criteria pane, add the the Device Ownership Type criteria:
- Click Save .
Distributing Content to Personally Owned Devices
Apps that are assigned to users via volume assignment in Jamf Pro can be distributed to the user’s personal device. Keep the following in mind when you distribute apps and books to personally owned devices:
- Make sure the Make app managed if currently installed as unmanaged checkbox is deselected.
- Jamf recommends distributing content with Jamf Self Service for iOS to devices enrolled via User Enrollment. To do this, make sure Make Available in Self Service is chosen from the Distribution Method pop-up menu. If you choose Install Automatically/Prompt Users to Install and the user ignores the prompt, Jamf Pro prompts users every four hours or during the next inventory update.
- If you distribute an app to both institutionally owned and personally owned devices in your environment, add two separate instances of the app in Jamf Pro: one for each distribution type. You can then use a smart group that includes personally owned devices to do the following:
- Use the smart group to target personally owned devices for user-assigned content.
- Use the smart group to exclude personally owned devices from device-assigned content.
App: Self Service: Follow the steps here to deploy the JAMF Self Service App for iOS
App Config:
5. Test the Enrollment Process
- On an iOS device, navigate to Settings > General > VPN & Device Management.
- Select Enroll in Device Management and sign in with your Company Email and a Managed Apple ID.
- The device will automatically locate the MDM server using the service discovery file and complete the enrollment process. You can see a great example of how we BYO at JAMF that shows the enrollment process.
Sources
- Prepare for Account-Driven Enrollment with Managed Apple IDs and Service Discovery
- Overview of BYOD
- Federation with Apple Business Manager
- Enabling User Enrollment in JAMF
- Deploy the Self Service App for iOS
- Content Distribution to Personally Owned Devices