We are having issues working with bypass codes the server creates when initiating Activation Lock through MDM.
We are able to use the device-generated bypass codes without issue.
When using the end point to request activation lock as specified in https://developer.apple.com/documentation/devicemanagement/creating-and-using-bypass-codes/ we get a 200 response. But when using the endpoint to bypass the activation lock, we get a 404 response. If we try to manually input the activation lock bypass code, it also does not work.
Both of these methods work with the device-generated bypass codes.
Just to clarify when testing the server generated codes, we ensured that we did not test the device-generated codes.
All of this was tested on iOS devices.
Created feedback ticket FB21365819 with device specific details.
Explore the intersection of business and app development. Discuss topics like device management, education, and resources for aspiring app developers.
Selecting any option will automatically load the page
Post
Replies
Boosts
Views
Activity
Guideline 3.1.1 - Business - Payments - In-App Purchase
The app includes an account registration feature for businesses and organizations, which is considered access to external mechanisms for purchases or subscriptions to be used in the app.
Next Steps
Remove the account registration features for business and organizations.
Our application currently allows users to register and create multiple accounts using a phone number.
All users can freely create an account. The app is designed to help users manage their own products, orders, and sales invoices. It is purely a sales management tool. We do not provide any external purchase links, external payment methods, or subscription mechanisms outside of Apple’s In-App Purchase system.
However, our app was rejected under Guideline 3.1.1 with the explanation that the app includes “account registration for businesses or organizations,” which is considered access to external purchase mechanisms.
We are confused about this interpretation.
From our understanding:
Any individual user can register.
The registration process is only for authentication and data management.
The app must include an account registration feature in order to function properly.
There is no external purchasing mechanism involved in the registration process.
Could someone please clarify:
Why would allowing users (including small business owners) to register accounts be considered “access to external purchase mechanisms”?
What specifically qualifies as “account registration for businesses or organizations” under Guideline 3.1.1?
What changes would be required to comply with the guideline while still keeping mandatory account registration?
We would greatly appreciate clarification so we can properly address the issue and ensure full compliance with App Store policies.
Thank you.
Topic:
Business & Education
SubTopic:
General
New devices coming to this year is named as iPhone 17 ....
Why we care not going for iPhone 26. .... ?
if it is named as iPhone 26... in line with new version policy, it will be easier to relate in all perspective.
Hi everyone,
I’m working as an IT engineer in the cruise industry and need to troubleshoot passenger complaints about Apple’s new RCS messaging feature (introduced with iOS 18). Could someone help confirm which domains and ports iPhones use when they send RCS messages? My firewall team wants specifics: domains (or subdomains) that need whitelisting and the ports involved.
Any official or community-sourced info would be super helpful—thanks in advance!
Topic:
Business & Education
SubTopic:
General
We are experiencing a lot of problems deploying an enterprise app for in-house use since late January. All our iPads are managed by an MDM solution. It can take 10 or more attempts to successfully deploy the app. The deployment usually fails with the message "ASDErrorDomain error 854" among other messages. The company providing the MDM solution has no idea what causes this message or what it means. I suspect the error message is not generated by the MDM solutiion but rather gets passed through from iOS. After many attempts the installation may succeed suddenly, though, and the apps works as expected, but this may take weeks.
I have not done any changes to my development system. 'I am running XCode 15.3 with SDK version 17.4, the iPads are on iOS 18.3
Topic:
Business & Education
SubTopic:
Device Management
Tags:
Enterprise
iPadOS
Business and Enterprise
Finally got to the stage where the ACME certificate profile is successfully installed. However, the public key/certificate itself isn't appearing in the System Keychain. I'm not sure if this is normal or if it's an indication that something went wrong after the profile installation. Unfortunately, I didn't study the log detail at the time and I'm uncertain of how to retrieve those logs from two days ago for the ACME activities.
Can anyone confirm that macOS 26 should be storing ACME-retrieved MDM profile-based certificates in the System Keychain? If they should be there, what can possibly go wrong? The most obvious issue I can see is that the ACME server has requested the certificate with two CN's, which comes from the MDM profile asking for the subject against CN and the OID (2.5.4.3). Both CN's are identical.
I'm surprised the profile installed if something is wrong. At first, I assumed Apple had decided to stop installing the certificates into the System Keychain.
Topic:
Business & Education
SubTopic:
Device Management
It seems like every time an IOS update is installed, the camera app file formats get reset to defaults. This setting is not available to manage at the MDM level. Many people need the the most compatible settings for the purpose of file sharing. So, now we have nearly 1,000 devices with a complete mix of photo and video formats. And IT has wasted MANY hours converting files for people.
Feature Request: Please either stop resetting the camera app file formats or allow us to manage those settings at the MDM level.
Respectfully,
Robert
Hello everyone,
I am looking for technical clarification regarding potential rate limits when automating frequent iOS device resets.
In my workflow, I need to reset test devices multiple times per day using the EraseDevice MDM command, often combined with the ReturnToService flag for automated setup.
I understand that after a full reset, the device undertakes several critical steps to become operational again, including device activation, system app installation, MDM re-enrollment, and subsequent validation of developer certificates for internally distributed apps.
Based on Apple’s documentation and my own observations, I am aware of the following domains being involved in these processes:
Device Activation: albert.apple.com, gs.apple.com, captive.apple.com, humb.apple.com, static.ips.apple.com, sq-device.apple.com, tbsc.apple.com, time*.apple.com
System App Installation: *.itunes.apple.com, *.apps.apple.com, *.mzstatic.com
MDM Enrollment: Communication with Apple ADE servers followed by the MDM server.
Developer Certificate Validation: ppq.apple.com, ocsp.apple.com, crl.apple.com
My primary question is: Are there any rate limits imposed by Apple’s servers on these specific processes when performed frequently on the exact same device within a short timeframe (e.g., multiple times per day)?
Specifically, could anyone provide information regarding potential limits for:
Device activation requests?
System app downloads post-activation?
Automated Device Enrollment checks and subsequent MDM enrollments?
Developer certificate validation requests?
Additionally, is the list of domains above comprehensive for these processes, or are there other key endpoints involved that I should be aware of regarding potential rate limiting?
Understanding these limitations is crucial for ensuring the reliability of automated device management workflows.
Thank you for any insights!
Hey everyone,
Is it possible and how to get Managed Apple ID (email) programmatically for user signed in to ipad through shared IPad feature ?
It would be good to have MDM independent solution, I mean API call to MDM service is not acceptable for us.
Maybe API call to ASM or ABM, or get that somehow on iOS device end... any advice ?
Thanks in advance,
Dima
Topic:
Business & Education
SubTopic:
General
Hi everyone,
I’m working as an IT engineer in the cruise industry and need to troubleshoot passenger complaints about Apple’s new RCS messaging feature (introduced with iOS 18). Could someone help confirm which domains and ports iPhones use when they send RCS messages? For the fortigate and palo alto firewalls I need specifics: domains (or subdomains) that need whitelisting and the ports involved.
Any official or community-sourced info would be super helpful—thanks in advance!
Topic:
Business & Education
SubTopic:
Device Management
Hello,
I've noticed some unexpected behavior when updating a user's FileVault password.
The set up:
All actions are performed in virtualized macOS 14 and 15.5 guests on a 15.5 Apple Silicon host.
FileVault is enabled.
sjsp is a standard user with a Secure Token.
The Mac is bound to AD, and the domain is reachable.
Reproduction:
systemctl -secureTokenStatus sjsp shows it's ENABLED.
fdesetup remove -user sjsp
fdesetup add -usertoadd sjsp
systemctl -secureTokenStatus sjsp shows it's DISABLED.
Surprisingly, sjsp is still able to unlock FileVault.
Looking at unified logs for opendirectoryd and fdesetup, I see that a password change is being attempted in response to fdesetup add, which is unexpected.
default 13:34:41.320883+0100 opendirectoryd Changing password for <private> (E5CC46D7-0C1F-4009-8421-9AA8217CB784)
info 13:34:41.321317+0100 opendirectoryd No unlock record exists for E5CC46D7-0C1F-4009-8421-9AA8217CB784
info 13:34:41.321331+0100 opendirectoryd <private> (E5CC46D7-0C1F-4009-8421-9AA8217CB784) is not a SecureToken user: no unlock record
default 13:34:41.321341+0100 opendirectoryd Changing password for <private> (E5CC46D7-0C1F-4009-8421-9AA8217CB784): user <private> SecureToken, only new password provided, credential <private>
default 13:34:41.321454+0100 opendirectoryd Changing password for <private> (E5CC46D7-0C1F-4009-8421-9AA8217CB784) with no existing unlock record
info 13:34:41.321857+0100 opendirectoryd No unlock record exists for E5CC46D7-0C1F-4009-8421-9AA8217CB784
default 13:34:41.321873+0100 opendirectoryd Record <private> (E5CC46D7-0C1F-4009-8421-9AA8217CB784) is eligible for SecureToken
default 13:34:41.322637+0100 fdesetup DMAPFS cryptoUserForMacOSUserForVolume DMErr=-69594 retErr=-69594 outAPFSCryptoUser=(null)
default 13:34:41.322699+0100 opendirectoryd While changing password for <private> (E5CC46D7-0C1F-4009-8421-9AA8217CB784): Not adding SecureToken; other unlock records exist, but no existing unlock record provided
If I disconnect the network and follow the reproduction steps then the Secure Token is retained. Reconnecting and waiting a while doesn't cause the Secure Token to be lost. There are no log entries about attempting to change the password.
Any help or explanation would be appreciated, thanks in advance.
How can we receive the iPadOS 18.6.1 update on an iPad? We have configured the MDM update days policy to receive recent, but not the latest, iPadOS updates; however, we are only able to get versions 18.6.2 and 18.6. Is the availability of iPadOS updates dependent on the iPad's region?
Thank you in advance for your assistance.
I've been running the betas fine for a while, now, where do you want to go??
Topic:
Business & Education
SubTopic:
Device Management
My company signed the application with enterprise certificate, the Provisioning Profile expired on March 20, 2025. Some iPhones didn't update the application before the expiration.
We have update the Provisioning Profile and repackaged application. However, these iPhones still can't use the application after reinstalling the new ipa. After opening the application, the screen is blank and then flashes back without any error prompt.
Restarting iPhone didn't help.
Downloaded screensavers not appearing in 4KSDR240FPS folder
Topic:
Business & Education
SubTopic:
Device Management
Hi Team,
Could you please share how to change/extend the expiry date of the existing iOS Distribution (In-House) certificate?
Since the membership renewal date is in March 2026 and the iOS distribution(In-House) certificate expiry date is in Feb 2026.
We use to distribute the mobile apps using the product intunes (Company portal) and via direct download link.
Please suggest since this certificate is used by multiple mobile apps by the users which can affect lot of iPhone users?
Thank you in advance
Deepak
Apple iPad Air device failing to enroll through ABM with "failed to retrieve configuration" error. This error occurs while reaching Apple ABM for fetching MDM server enrollment details. When we checked console logs when enrolling the device we found following error:
default 13:54:07.229022+1000 teslad Error: Error Domain=MCCloudConfigurationErrorDomain Code=34004 "The cloud configuration server is unavailable or busy." UserInfo={NSLocalizedDescription=The cloud configuration server is unavailable or busy., CloudConfigurationErrorType=CloudConfigurationFatalError}
default 13:54:07.229120+1000 Setup Service completed
default 13:54:07.230096+1000 Setup Could not retrieve cloud configuration. Error: <Error domain: MCCloudConfigErrorDomain, code 33001>\
Feedback raised along with screenshot and console logs as well : FB17785513. Please analyse this issue and reply back to us.
Topic:
Business & Education
SubTopic:
Device Management
Tags:
iPad
Apple Business Manager
Device Management
Hello,
I have an Apple Developer Enterprise account, and Apple Support has already enabled MDM for my account. I successfully downloaded and installed my MDM Vendor Certificate (it shows up in Keychain as MDM Vendor: [My Company Name] with its private key).
Here’s what I’ve done so far:
Exported the Vendor Certificate + private key as a .p12, then converted to .pem and .key using OpenSSL.
Generated an unsigned CSR with CN=com.apple.mgmt.External. using OpenSSL.
Attempted to sign the CSR using:
my Vendor certificate
the Vendor private key
Apple Worldwide Developer Relations (WWDR) intermediate certificate
OpenSSL smime -sign command with DER output
Problem:
Every time I try to upload the vendor-signed CSR to the Apple Push Certificates Portal, I get an error (CSR rejected).
Sometimes OpenSSL even fails with “unable to load certificates” depending on how the WWDR certificate is included.
My Questions:
What is the correct OpenSSL command and certificate chain Apple expects for signing the CSR?
Do I need to include any additional intermediates besides WWDR?
Is there an official Apple reference example for generating the vendor-signed CSR that the Push Certificates Portal will accept?
Any guidance from the community (or someone who has successfully done this end-to-end) would be greatly appreciated.
Thank you,
Sergio Sanchez
Topic:
Business & Education
SubTopic:
Device Management
Tags:
APNS
Signing Certificates
Apple Business Manager
Family Controls
Issue
Using the DeviceInformationCommand API, the following device information can no longer be retrieved on iOS/iPadOS 26 and later.
IMEI
ICCID
PhoneNumber
This issue does not occur on devices running iOS/iPadOS 18.x or earlier. We would appreciate it if you could advise us on a solution to enable the retrieval of this information.
Request XML
<?xml version=\"1.0\" encoding=\"UTF-8\"?>
<!DOCTYPE plist PUBLIC \"-//Apple//DTD PLIST 1.0//EN\" \"http://www.apple.com/DTDs/PropertyList-1.0.dtd\">
<plist version=\"1.0\">
<dict>
<key>CommandUUID</key>
<string><!-- Here is CommandUUID --></string>
<key>Command</key>
<dict>
<key>RequestType</key>
<string>DeviceInformation</string>
<key>Queries</key>
<array>
<string>IMEI</string>
<string>ICCID</string>
<string>PhoneNumber</string>
</array>
</dict>
</dict>
</plist>
Hi Apple Community,
At WWDC25, introduced a native device migration feature with iOS/macOS 26 and Apple Business Manager that promises seamless migration from one MDM to another without wiping devices or manual re-enrollment.
That said, while testing this in iOS/macOS 26 beta, we ran into an issue: the Wi-Fi settings deployed by the old MDM aren’t retained during the migration. This means devices lose Wi-Fi connectivity partway through, and users have to manually reconnect before the migration to the new MDM can continue.
This interrupts what should be a smooth, hands-off process. We wanted to ask if this is a known issue or limitation with the current beta? Are there any recommended ways to avoid losing Wi-Fi profiles during this migration window? Will this improve in future updates so that the Wi-Fi connection is preserved or seamlessly handed off to the new MDM?
Any tips, workarounds, or official guidance Apple can share on best practices for handling Wi-Fi profiles during ABM-native device migrations would be hugely appreciated.
Added Feedback with FeedBackAssistant ID : FB20150763
Thanks in advance.
Topic:
Business & Education
SubTopic:
Device Management
Tags:
Apple Business Manager
Device Management