Citrix Endpoint Management


To manage iOS devices in Citrix Endpoint Management, you set up an Apple Push Notification service (APNs) certificate from Apple. For information, see APNs certificates.

Enrollment profiles determine whether iOS devices enroll in MDM+MAM, with the option for users to opt out of Mobile Device Management (MDM). Citrix Endpoint Management supports the following authentication types for iOS devices in MDM+MAM. For information, see the following articles:

Requirements for trusted certificates in iOS 13:

Apple has new requirements for TLS server certificates. Verify that all certificates follow the new Apple requirements. See the Apple publication, For help with managing certificates, see Upload certificates.

A general workflow for starting iOS device management is as follows:

  1. Complete the onboarding process. See Onboarding and resource setup and Prepare to enroll devices and deliver resources.

  2. Choose and configure an enrollment method. See Supported enrollment methods.

  3. Configure iOS device policies.

  4. Enroll iOS devices.

  5. Set up device and app security actions. See Security actions.

For supported operating systems, see Supported device operating systems.

iOS 14 compatibility

Citrix Endpoint Management and Citrix mobile apps are compatible with iOS 14 but don’t currently support the new iOS 14 features.

For supervised iOS devices, you can postpone software upgrades for up to 90 days. In the restrictions device policy for iOS, use these settings:

  • Force delayed software updates
  • Enforce software update delay

See iOS settings. Those settings aren’t available for devices in user enrollment mode or unsupervised (full MDM) mode.

Apple host names that must remain open

Some Apple host names must be open to make sure proper operation of iOS, macOS, and Apple App Store. Blocking those host names can affect the installation, update, and proper operation of the following: iOS, iOS apps, MDM operation, and device and app enrollment. For more information, see

Supported enrollment methods

You specify how to manage iOS devices in enrollment profiles. You can choose between the following enrollment settings:

  • Apple User Enrollment: For BYOD devices, offers a balance of privacy for personal data and security for corporate data. This enrollment mode is available as a public preview. To enable this feature, contact your support team.
  • Apple Device Enrollment: For supervised iOS devices, with separate personal and corporate profiles on the device.
  • Do not manage devices: Exclude these devices from MDM if you want to manage apps only.

For more information about creating enrollment profiles, see Enrollment profiles.

Citrix Endpoint Management supports the following enrollment methods for iOS devices:

Method Supported
Apple Business Manager Yes
Apple School Manager Yes
Apple Configurator Yes
Manual enrollment Yes
Enrollment invitations Yes

The Apple Deployment Programs include Apple Business Manager (ABM) for business organizations and Apple School Manager (ASM) for educational organizations. For more information, see Deploy devices through the Apple Deployment Programs.

Apple School Manager is a type of Education Apple Deployment Program. See Integrate with Apple Education features.

Use the Apple Deployment Programs to bulkly enroll iOS, iPadOS, and macOS devices. You can buy those devices directly from Apple, a participating Apple Authorized Reseller, or a carrier. Whether you buy iOS devices directly from Apple, you can use the Apple Configurator to enroll those devices. See Enroll Apple devices in bulk.

Managed Apple IDs

User enrollment tightly integrates with Managed Apple IDs. You can create a Managed Apple ID manually using ABM/ASM or dynamically with Azure Active Directory (AAD).

For non-federated authentication, create Managed Apple IDs using ABM/ASM to add an account. For information about adding an account in ABM/ASM, see Apple documentation at and ASM at We recommend the following to avoid extra steps when users enroll:

  • Use an email matching the corporate email address when creating a Managed Apple ID.
  • Set the user role to Staff.
  • Have users manually change their password before enrolling. Let users know that we recommend they use the same password as the corporate account.

To dynamically create Managed Apple IDs, configure Citrix Cloud to use AAD as its identity provider. For more information about configuring Citrix Cloud to use AAD, see Authentication with Azure Active Directory through Citrix Cloud. Also, configure federated authentication in ABM/ASM. To learn more about configuring federated authentication in ABM or ASM, see the Apple Business Manager User Guide and the Apple School Manager User Guide.

When you manually create Managed Apple IDs, you can configure a custom domain to use in place of the default domain. The custom domain that you configure replaces the existing domain. For example, your corporate email addresses follow the format, but you want to use as the domain for the Managed Apple ID instead. When creating the Managed Apple ID on ABM/ASM, the email address becomes

Add an iOS device manually

If you want to add an iOS device manually, such as for testing purposes, follow these steps.

  1. In the Citrix Endpoint Management console, click Manage > Devices. The Devices page appears.

    Devices page

  2. Click Add. The Add Device page appears.

    Add Device page

  3. Configure these settings:

    • Select platform: Click iOS.
    • Serial Number: Type the device serial number.
  4. Click Add. The Devices table appears with the device added to the bottom of the list. To view and confirm the device details: Choose the device that you added and then, in the menu that appears, click Edit.


    When you select the checkbox next to a device, the options menu appears above the device list. If you click anywhere else in the list, the options menu appears on the right side of the listing.

    • LDAP configured

    • If using local groups and local users:

      • One or more local groups.

      • Local users assigned to local groups.

      • Delivery groups are associated with local groups.

    • If using Active Directory:

      • Delivery groups are associated with Active Directory groups.

      Device Details list

  5. The General page lists the device Identifiers, such as the serial number and other information for the platform type. For Device Ownership, select Corporate or BYOD.

    The General page also lists device Security properties, such as Strong ID, Lock Device, Activation Lock Bypass, and other information for the platform type. The Full Wipe of Device field includes the user PIN code. The user must enter that code after the device is wiped. If the user forgets the code, you can look it up here.

  6. The Properties page lists the device properties that Citrix Endpoint Management provisions. This list shows any device properties included in the provisioning file used to add the device. To add a property, click Add and then select a property from the list. For valid values for each property, see the PDF Device property names and values.

    When you add a property, it initially appears under the category where you added it. After you click Next and then return to the Properties page, the property appears in the appropriate list.

    To delete a property, hover over the listing and then click the X on the right side. Citrix Endpoint Management deletes the item immediately.

  7. The remaining Device Details sections have summaries for the device.

    • User Properties: Displays RBAC roles, group memberships, Volume Purchase accounts, and properties for the user. You can retire a Volume Purchase account from this page.
    • Assigned Policies: Displays the number of deployed, pending, and failed policies. Provides the policy name, type, and last deployed information for each policy. Lets you reset the deployment status to pending and redeploy policies that the user removed.
    • Apps: Displays, for the last inventory, the number of installed, pending, and failed app deployments. Provides the app name, identifier, type, and other information. For a description of iOS and macOS inventory keys, such as HasUpdateAvailable, see Mobile Device Management (MDM) Protocol.
    • Media: Displays, for the last inventory, the number of deployed, pending, and failed media deployments.
    • Actions: Displays the number of deployed, pending, and failed actions. Provides the action name and time of the last deployment.
    • Delivery Groups: Displays the number of successful, pending, and failed delivery groups. For each deployment, provides the delivery group name and deployment time. Select a delivery group to view more detailed information, including status, action, and channel or user.
    • iOS Profiles: Displays the last iOS profile inventory, including name, type, organization, and description.
    • iOS Provisioning Profiles: Displays enterprise distribution provisioning profile information, such as the UUID, expiration date, and managed status.
    • Certificates: Displays, for valid, expired, or revoked certificates, information such as the type, provider, issuer, serial number, and the number of remaining days before expiration.
    • Connections: Displays the first connection status and the last connection status. Provides for each connection, the user name, penultimate (next to last) authentication time, and last authentication time.
    • MDM Status: Displays information such as the MDM status, last push time, and last device reply time.

Configure iOS device policies

Use these policies to configure how Citrix Endpoint Management interacts with devices running iOS or iPadOS. This table lists all device policies available for iOS and iPadOS devices.

AirPlay mirroring AirPrint APN  
App access App attributes App configuration  
App inventory App lock App uninstall  
Apps notifications Bluetooth Calendar (CalDAV)  
Cellular Contacts (CardDAV) Credentials  
Device name Education configuration Exchange  
Font Home screen layout Import iOS & macOS profile  
LDAP Location Lock screen message  
Mail Managed domains Maximum resident users  
MDM options Network Network usage  
Organization info OS update Passcode  
Passcode lock grace period Personal hotspot Profile removal  
Provisioning profile Provisioning profile removal Proxy  
Restrictions Roaming SCEP  
SSO account Store Subscribed calendars  
Terms and conditions VPN Wallpaper  
Web content filter Web clip    

Enroll iOS devices

This section shows how users enroll iOS devices (12.2 or later) into Citrix Endpoint Management. For more information about the iOS enrollment, watch the following video:

iOS enrollment video

  1. Go to the Apple store on your iOS device, download the Citrix Secure Hub app, and then tap the app.
  2. When prompted to install the app, tap Next and then tap Install.
  3. After Citrix Secure Hub installs, tap Open.
  4. Enter your corporate credentials, such as your Citrix Endpoint Management server name, User Principal Name (UPN), or email address. Then, click Next.
  5. Tap Yes, Enroll to enroll your iOS device.
  6. A list of the data Citrix Endpoint Management collects appears. Click Next. An explanation of how an organization uses that data appears. Click Next.
  7. After you type your credentials, tap Allow when prompted, to download the configuration profile. After you download the configuration profile, tap Close.
  8. In your device settings, install the XenMobile profile.
    • Go to Settings > General > Profile > XenMobile Profile Service and tap Install to add the profile.
    • In the notification window, tap Trust to enroll your device into remote management. Add the profile
  9. Once enrollment succeeds, open Citrix Secure Hub. If you’re enrolling into MDM+MAM: After your credentials validate, create and confirm your Citrix PIN when prompted.
  10. After the workflow completes, the device is enrolled. You can then access the app store to view the apps you can install on your iOS device.

Security actions

Device enrollment for iOS supports the following security actions. For a description of each security action, see Security actions.

  • Activation Lock Bypass
  • App Lock
  • App Wipe
  • ASM Activation Lock
  • Certificate Renewal
  • Clear Restrictions
  • Enable/Disable Lost Mode
  • Enable/Disable Tracking
  • Full Wipe
  • Locate
  • Lock
  • Ring
  • Request/Stop AirPlay Mirroring
  • Restart/Shut Down
  • Revoke/Authorize
  • Selective Wipe
  • Unlock

User enrollment for iOS supports the following security actions:

  • Revoke
  • Lock
  • Selective wipe
  • Certificate renewal

Lock iOS devices

You can lock a lost iOS device with an accompanying display of a message and phone number that displays on the device lock screen.

To display a message and phone number on a locked device, set the Passcode policy to true in the Citrix Endpoint Management console. Instead users can enable the passcode on the device manually.

  1. Click Manage > Devices. The Devices page appears.

    The Devices page

  2. Select the iOS device that you want to lock.

    Select the checkbox next to a device to show the options menu above the device list. Click anywhere else in the list to show the options menu on the right side of the listing.

    The options menu

    The options menu

  3. In the options menu, click Secure. The Security Actions dialog box appears.

    The Security Actions dialog box

  4. Click Lock. The Security Actions confirmation dialog box displays.

    The Security Actions confirmation

  5. Optionally, type a message and phone number that appears on the lock screen of the device.

    iOS appends the words “Lost iPad” to what you type in the Message field.

    If you leave the Message field empty and provide a phone number, Apple displays the message “Call owner” on the device lock screen.

  6. Click Lock Device.

Put iOS devices in Lost Mode

The Citrix Endpoint Management Lost Mode device property puts an iOS device in Lost Mode. Unlike Apple Managed Lost Mode, Citrix Endpoint Management Lost Mode doesn’t require a user to do either of the following actions to enable locating their device: Configure the Find My iPhone/iPad setting or enable the Location Services for Citrix Secure Hub.

In Citrix Endpoint Management Lost Mode, only Citrix Endpoint Management can unlock the device. (In contrast, if you use the Citrix Endpoint Management device lock feature, users can unlock the device directly by using a PIN code that you provide.

To enable or disable lost mode: Go to Manage > Devices, choose a supervised iOS device, and then click Secure. Then, click Enable Lost Mode or Disable Lost Mode.

The lost mode options

If you click Enable Lost Mode, type information to appear on the device when it’s in lost mode.

The information to appear on a device

Use any of the following methods to check Lost Mode status:

  • In the Security Actions window, verify if the button is set as Disable Lost Mode.
  • From Manage > Devices, on the General tab under Security, see the last Enable Lost Mode or Disable Lost Mode action.

The General tab

  • From Manage > Devices, on the Properties tab, verify that the value of the MDM lost mode enabled setting is correct.

The MDM lost mode enabled setting

If you enable Citrix Endpoint Management Lost Mode on an iOS device, the Citrix Endpoint Management console also changes as follows:

  • In Configure > Actions, the Actions list doesn’t include these automated actions: Revoke the device, Selectively wipe the device, and Completely wipe the device.
  • In Manage > Devices, the Security Actions list no longer includes the Revoke and Selective Wipe device actions. You can still use a security action to do a Full Wipe action, as needed.

iOS appends the words “Lost iPad” to what you type in the Message in the Security Actions screen.

If you leave the Message empty and provide a phone number, Apple shows the message “Call owner” on the device lock screen.

Bypass an iOS activation lock

Activation Lock is a feature of Find My iPhone/iPad that prevents reactivation of a lost or stolen supervised device. Activation Lock requires the user Apple ID and password before anyone can do these actions: Turn off Find My iPhone/iPad, erase the device, or reactivate the device. For the devices that your organization owns, bypassing an Activation Lock is necessary to, for example, reset or reallocate devices.

To enable Activation Lock, you configure and deploy the Citrix Endpoint Management MDM Options device policy. You can then manage a device from the Citrix Endpoint Management console without the Apple credentials of the user. To bypass the Apple credential requirement of an Activation Lock, issue the Activation Lock Bypass security action from the Citrix Endpoint Management console.

For example, if the user returns a lost phone or to set up the device before or after a Full Wipe: When the phone prompts for the Apple App Store account credential, bypass that step by issuing the Activation Lock Bypass security action.

Device requirements for activation lock bypass

  • Supervised through Apple Configurator or Apple Deployment Program
  • Configured with an iCloud account
  • Find My iPhone/iPad enabled
  • Enrolled in Citrix Endpoint Management
  • MDM Options device policy, with activation lock enabled, is deployed to devices

To bypass an activation lock before issuing a Full Wipe of a device:

  1. Go to Manage > Devices, select the device, click Secure, and then click Activation Lock Bypass.
  2. Wipe the device. The activation lock screen doesn’t appear during device setup.

To bypass an activation lock after issuing a Full Wipe of a device:

  1. Reset or wipe the device. The activation lock screen appears during device setup.
  2. Go to Manage > Devices, select the device, click Secure, and then click Activation Lock Bypass.
  3. Tap the Back button on the device. The home screen appears.

Keep in mind the following:

  • Advise your users not to turn off Find My iPhone/iPad. Don’t do a full wipe from the device. In either of those cases, the user is prompted to enter the iCloud account password. After account validation, the user won’t see an Activate iPhone/iPad screen after erasing all content and settings.
  • For a device that has a generated Activation lock bypass code and has the Activation lock enabled: If you can’t bypass the Activate iPhone/iPad page after a Full Wipe, you don’t need to delete the device from Citrix Endpoint Management. Either you or the user can contact Apple support to unblock the device directly.
  • During a hardware inventory, Citrix Endpoint Management queries a device for an Activation lock bypass code. If a bypass code is available, the device sends it to Citrix Endpoint Management. Then, to remove the bypass code from the device, send the Activation Lock Bypass security action from the Citrix Endpoint Management console. At that point, Citrix Endpoint Management and Apple have the bypass code required to unblock the device.
  • The Activation Lock Bypass security action relies on the availability of an Apple service. If the action doesn’t work, you can unblock a device using one of the following ways:
    • On the device, manually enter the credentials of the iCloud account.
    • Leave the user name field empty and type the bypass code in the password field. To look up the bypass code, go to Manage > Devices, select the device, click Edit, and click Properties. The Activation lock bypass code is under Security information.