Skip to content
Certificate

Certificate

Published by Apple, Inc.

Configure digital certificates for authentication, encryption, and secure communications across devices and services. Deploy trusted root certificates, intermediate CA certificates, user identity certificates, or device certificates to enable secure network access, VPN connections, email signing and encryption, or application authentication. Manage certificate trust settings, specify allowed uses, and ensure proper certificate chain validation to maintain security standards across your organization.

OS requirements
macOS 10.7+, iOS 4.0+, iPadOS 13.0+, tvOS 9.0+, visionOS 1.0+, Windows
Related items:
VPN
VPN

Configure Virtual Private Network connections for Apple devices to enable secure remote access to organizational resources. Define VPN protocols (IKEv2, IPSec, L2TP, Cisco AnyConnect), authentication methods, server endpoints, and connection parameters. Deploy this profile to establish encrypted tunnels for remote workers, protect data transmission over untrusted networks, and enforce always-on VPN policies. Supports split-tunnel configurations, on-demand connection rules, and per-app VPN assignments for granular access control.

SCEP
SCEP

Automate secure certificate distribution across your Apple and Windows devices using industry-standard Simple Certificate Enrollment Protocol (SCEP). Seamlessly provision digital certificates from your Certificate Authority to devices for authentication, encryption, and network access, eliminating manual certificate deployment while maintaining enterprise-grade security. Enable secure 802.1x network authentication, VPN connections, email signing, Wi-Fi access, and application-level authentication with centrally managed, automatically renewed certificates that scale across your entire organization.

WiFi
WiFi

Configure WiFi network settings for Apple and Windows, including SSID, security type, authentication credentials, proxy settings, and auto-join behavior. Deploy WiFi profiles to automatically connect devices to corporate, guest, or secure networks without manual configuration. Control network priority, enable captive portal bypass, and configure certificate-based authentication for enterprise WPA2/WPA3 networks. Essential for ensuring seamless connectivity across managed devices while maintaining security standards and reducing help desk tickets related to network access.