Citrix Endpoint Management


To manage iOS devices in Endpoint Management, you set up an Apple Push Notification service (APNs) certificate from Apple. For information, see APNs certificates.

Enrollment profiles determine whether iOS devices enroll in MDM+MAM, with the option for users to opt out of MDM. Endpoint Management supports the following authentication types for iOS devices in MDM+MAM. For information, see the articles under Certificates and authentication.

  • Domain
  • Domain plus security token
  • Client certificate
  • Client certificate plus domain
  • Derived credentials
  • Identity providers:
    • Azure Active Directory
    • Citrix identity provider

Requirements for trusted certificates in iOS 13:

Apple has new requirements for TLS server certificates. Verify that all certificates follow the new Apple requirements. See the Apple publication, For help with managing certificates, see Uploading certificates in Endpoint Management.

A general workflow for starting iOS device management is as follows:

  1. Complete the onboarding process. See Onboarding and resource setup and Prepare to enroll devices and deliver resources.

  2. Choose and configure an enrollment method. See Supported enrollment methods.

  3. Configure iOS device policies.

  4. Enroll iOS devices.

  5. Set up device and app security actions. See Security actions.

For supported operating systems, see Supported device operating systems.

iOS 14 compatibility

Endpoint Management and Citrix mobile apps are compatible with iOS 14, but don’t currently support the new iOS 14 features.

For supervised iOS devices, you can delay software upgrades for up to 90 days. In the Restrictions device policy for iOS, use these settings:

  • Force delayed software updates
  • Enforce software update delay

See iOS settings. Those settings aren’t available for devices in user enrollment mode or unsupervised (full MDM) mode.

Apple host names that must remain open

Some Apple host names must remain open to ensure proper operation of iOS, macOS, and Apple App Store. Blocking those host names can affect the installation, update, and proper operation of the following: iOS, iOS apps, MDM operation, and device and app enrollment. For more information, see

Supported enrollment methods

You specify how to manage iOS devices in enrollment profiles. You can choose device enrollment or no MDM enrollment.

To configure enrollment settings for iOS devices, go to Configure > Enrollment Profiles > iOS.

Enrollment Profile page for iOS

The following table lists which enrollment methods Endpoint Management supports for iOS devices:

Method Supported
Apple Deployment Program Yes
Apple School Manager Yes
Apple Configurator Yes
Manual enrollment Yes
Enrollment invitations Yes

Apple has device enrollment programs for business and education accounts. For business accounts, you enroll in the Apple Deployment Program to use the Apple Deployment Program for device enrollment and management in Endpoint Management. That program is for iOS, macOS, and Apple TV devices. See Deploy devices through Apple Deployment Program.

For education accounts, you create an Apple School Manager account. Apple School Manager unifies the Deployment Program and volume purchase. Apple School Manager is a type of Education Apple Deployment Program. See Integrate with Apple Education features.

You can use the Apple Deployment Program to bulk enroll iOS, iPadOS, macOS, and tvOS devices. You can purchase those devices directly from Apple, a participating Apple Authorized Reseller, or a carrier. Whether you purchase iOS devices directly from Apple, you can use the Apple Configurator to enroll those devices. See Bulk enrollment of Apple devices.

Add an iOS device manually

If you want to add an iOS device manually, such as for testing purposes, follow these steps.

  1. In the Endpoint Management console, click Manage > Devices. The Devices page appears.

    Devices page

  2. Click Add. The Add Device page appears.

    Add Device page

  3. Configure these settings:

    • Select platform: Click iOS.
    • Serial Number: Type the device serial number.
  4. Click Add. The Devices table appears with the device added to the bottom of the list. To view and confirm the device details: Choose the device you added and then, in the menu that appears, click Edit.


    When you select the check box next to a device, the options menu appears above the device list. When you click anywhere else in the list, the options menu appears on the right side of the listing.

    • LDAP configured

    • If using local groups and local users:

      • One or more local groups.

      • Local users assigned to local groups.

      • Delivery groups are associated with local groups.

    • If using Active Directory:

      • Delivery groups are associated with Active Directory groups.

      Device Details list

  5. The General page lists device Identifiers, such as the serial number and other information for the platform type. For Device Ownership, select Corporate or BYOD.

    The General page also lists device Security properties, such as Strong ID, Lock Device, Activation Lock Bypass, and other information for the platform type. The Full Wipe of Device field includes the user PIN code. The user must enter that code after the device is wiped. If the user forgets the code, you can look it up here.

  6. The Properties page lists the device properties that Endpoint Management is to provision. This list shows any device properties included in the provisioning file used to add the device. To add a property, click Add and then select a property from the list. For valid values for each property, see the PDF Device property names and values.

    When you add a property, it initially appears under the category where you added it. After you click Next and then return to the Properties page, the property appears in the appropriate list.

    To delete a property, hover over the listing and then click the X on the right side. Endpoint Management deletes the item immediately.

  7. The remaining Device Details sections contain summary information for the device.

    • User Properties: Displays RBAC roles, group memberships, volume purchase accounts, and properties for the user. You can retire a volume purchase account from this page.
    • Assigned Policies: Displays the number of deployed, pending, and failed policies. Provides the policy name, type, and last deployed information for each policy. Lets you reset the deployment status to pending and redeploy policies that the user removed.
    • Apps: Displays, for the last inventory, the number of installed, pending, and failed app deployments. Provides the app name, identifier, type, and other information. For a description of iOS and macOS inventory keys, such as HasUpdateAvailable, see Mobile Device Management (MDM) Protocol.
    • Media: Displays, for the last inventory, the number of deployed, pending, and failed media deployments.
    • Actions: Displays the number of deployed, pending, and failed actions. Provides the action name and time of the last deployment.
    • Delivery Groups: Displays the number of successful, pending, and failed delivery groups. For each deployment, provides the delivery group name and deployment time. Select a delivery group to view more detailed information, including status, action, and channel or user.
    • iOS Profiles: Displays the last iOS profile inventory, including name, type, organization, and description.
    • iOS Provisioning Profiles: Displays enterprise distribution provisioning profile information, such as the UUID, expiration date, and managed status.
    • Certificates: Displays, for valid, expired, or revoked certificates, information such as the type, provider, issuer, serial number, and the number of remaining days before expiration.
    • Connections: Displays the first connection status and the last connection status. Provides for each connection, the user name, penultimate (next to last) authentication time, and last authentication time.
    • MDM Status: Displays information such as the MDM status, last push time, and last device reply time.

Configure iOS device policies

Use these policies to configure how Endpoint Management interacts with devices running iOS or iPadOS. This table lists all device policies available for iOS and iPadOS devices.

AirPlay Mirroring AirPrint APN
App Access App Attributes App Configuration
App Inventory App Lock App Uninstall
Apps Notifications Calendar (CalDAV) Cellular
Contacts (CardDAV) Control OS Update Credentials
Device Name Education Configuration Exchange
Font Home Screen Layout Import iOS & macOS Profile
LDAP Location Lock Screen Message
Mail Managed Domains MDM Options
Network Usage Organization Info Passcode
Personal Hotspot Profile Removal Provisioning Profile
Provisioning Profile Removal Proxy Restrictions
Roaming SCEP Shared iPad - Maximum Resident Users
Shared iPad - Passcode Lock Grace Period SSO Account Store
Subscribed Calendars Terms & Conditions VPN
Wallpaper Web Content Filter Web clip

Enroll iOS devices

This section shows how users enroll iOS devices (12.2 or later) into Endpoint Management. For more information about the iOS enrollment, open the following video:

iOS enrollment video

For information about enrollment when using derived credentials, see Device enrollment.

  1. Go to the Apple store on your iOS device, download the Citrix Secure Hub app, and then tap the app.
  2. When prompted to install the app, tap Next and then tap Install.
  3. After Secure Hub installs, tap Open.
  4. Enter your corporate credentials, such as your Endpoint Management server name, User Principal Name (UPN), or email address. Then, click Next. Enter your credentials
  5. Tap Yes, Enroll to enroll your iOS device. Enroll the device
  6. A list of the data Endpoint Management collects appears. Click Next. An explanation of how an organization uses that data appears. Click Next. Information access
  7. After you type your credentials, tap Allow when prompted, to download the configuration profile. After you download the configuration profile, tap Close. Download the profile
  8. In your device settings, install the XenMobile profile.
    • Go to Settings > General > Profile > XenMobile Profile Service and tap Install to add the profile.
    • In the notification window, tap Trust to enroll your device into remote management. Add the profile
  9. Once enrollment succeeds, open Secure Hub. If you are enrolling into MDM+MAM: After your credentials validate, create and confirm your Citrix PIN when prompted.
  10. After the workflow completes, the device is enrolled. You can then access the app store to view the apps you can install on your iOS device.

Security actions

iOS supports the following security actions. For a description of each security action, see Security actions.

Activation Lock Bypass App Lock App Wipe
ASM Activation Lock Certificate Renewal Clear Restrictions
Enable/Disable Lost Mode Enable/Disable Tracking Full Wipe
Locate Lock Ring
Request/Stop AirPlay Mirroring Restart/Shut Down Revoke/Authorize
Selective Wipe Unlock  

Lock iOS devices

You can lock a lost iOS device with an accompanying display of a message and phone number that displays on the device lock screen.

To display a message and phone number on a locked device, set the Passcode policy to true in the Endpoint Management console. Alternatively, users can enable the passcode on the device manually.

  1. Click Manage > Devices. The Devices page appears.

    The Devices page

  2. Select the iOS device you want to lock.

    Select the check box next to a device to show the options menu above the device list. Click anywhere else in the list to show the options menu on the right side of the listing.

    The options menu

    The options menu

  3. In the options menu, click Secure. The Security Actions dialog box appears.

    The Security Actions dialog box

  4. Click Lock. The Security Actions confirmation dialog box displays.

    The Security Actions confirmation

  5. Optionally, type a message and phone number that appears on the lock screen of the device.

    iOS appends the words “Lost iPad” to what you type in the Message field.

    If you leave the Message field empty and provide a phone number, Apple displays the message “Call owner” on the device lock screen.

  6. Click Lock Device.

Put iOS devices in Lost Mode

The Endpoint Management Lost Mode device property puts an iOS device in Lost Mode. Unlike Apple Managed Lost Mode, Endpoint Management Lost Mode doesn’t require a user to perform either of the following actions to enable locating their device: Configure the Find My iPhone/iPad setting or enable the Location Services for Citrix Secure Hub.

In Endpoint Management Lost Mode, only Endpoint Management can unlock the device. (In contrast, if you use the Endpoint Management device lock feature, users can unlock the device directly by using a PIN code that you provide.

To enable or disable lost mode: Go to Manage > Devices, choose a supervised iOS device, and then click Secure. Then, click Enable Lost Mode or Disable Lost Mode.

The lost mode options

If you click Enable Lost Mode, type information to appear on the device when it’s in lost mode.

The information to appear on a device

Use any of the following methods to check Lost Mode status:

  • In the Security Actions window, verify if the button is Disable Lost Mode.
  • From Manage > Devices, on the General tab under Security, see the last Enable Lost Mode or Disable Lost Mode action.

The General tab

  • From Manage > Devices, on the Properties tab, verify that the value of the MDM lost mode enabled setting is correct.

The MDM lost mode enabled setting

If you enable Endpoint Management Lost Mode on an iOS device, the Endpoint Management console also changes as follows:

  • In Configure > Actions, the Actions list doesn’t include these automated actions: Revoke the device, Selectively wipe the device, and Completely wipe the device.
  • In Manage > Devices, the Security Actions list no longer includes the Revoke and Selective Wipe device actions. You can still use a security action to perform a Full Wipe action, as needed.

iOS appends the words “Lost iPad” to what you type in the Message in the Security Actions screen.

If you leave the Message empty and provide a phone number, Apple shows the message “Call owner” on the device lock screen.

Bypass an iOS activation lock

Activation Lock is a feature of Find My iPhone/iPad that prevents reactivation of a lost or stolen supervised device. Activation Lock requires the user Apple ID and password before anyone can perform these actions: Turn off Find My iPhone/iPad, erase the device, or reactivate the device. For the devices that your organization owns, bypassing an Activation Lock is necessary to, for example, reset or reallocate devices.

To enable Activation Lock, you configure and deploy the Endpoint Management MDM Options device policy. You can then manage a device from the Endpoint Management console without the Apple credentials of the user. To bypass the Apple credential requirement of an Activation Lock, issue the Activation Lock Bypass security action from the Endpoint Management console.

For example, if the user returns a lost phone or to set up the device before or after a Full Wipe: When the phone prompts for the Apple App Store account credential, you can bypass that step by issuing the Activation Lock Bypass security action from the Endpoint Management console.

Device requirements for activation lock bypass

  • Supervised through Apple Configurator or Apple Deployment Program
  • Configured with an iCloud account
  • Find My iPhone/iPad enabled
  • Enrolled in Endpoint Management
  • MDM Options device policy, with activation lock enabled, is deployed to devices

To bypass an activation lock before issuing a Full Wipe of a device:

  1. Go to Manage > Devices, select the device, click Secure, and then click Activation Lock Bypass.
  2. Wipe the device. The activation lock screen doesn’t appear during device setup.

To bypass an activation lock after issuing a Full Wipe of a device:

  1. Reset or wipe the device. The activation lock screen appears during device setup.
  2. Go to Manage > Devices, select the device, click Secure, and then click Activation Lock Bypass.
  3. Tap the Back button on the device. The home screen appears.

Keep in mind the following:

  • Advise your users not to turn off Find My iPhone/iPad. Don’t perform a full wipe from the device. In either of those cases, the user is prompted to enter the iCloud account password. After account validation, the user won’t see an Activate iPhone/iPad screen after erasing all content and settings.
  • For a device with a generated Activation lock bypass code and with the Activation lock enabled: If you can’t bypass the Activate iPhone/iPad page after a Full Wipe, there is no need to delete the device from Endpoint Management. Either you or the user can contact Apple support to unblock the device directly.
  • During a hardware inventory, Endpoint Management queries a device for an Activation lock bypass code. If a bypass code is available, the device sends it to Endpoint Management. Then, to remove the bypass code from the device, send the Activation Lock Bypass security action from the Endpoint Management console. At that point, Endpoint Management and Apple have the bypass code required to unblock the device.
  • The Activation Lock Bypass security action relies on the availability of an Apple service. If the action doesn’t work, you can unblock a device as follows. On the device, manually enter the credentials of the iCloud account. Or, leave the user name field empty and type the bypass code in the password field. To look up the bypass code, go to Manage > Devices, select the device, click Edit, and click Properties. The Activation lock bypass code is under Security information.