Skip to content

Commit ddd652b

Browse files
authored
Merge pull request #6993 from lenewsad/Bootstrap9539461
Draft for 2203 bootstrap token feature
2 parents 528a262 + 068ce5c commit ddd652b

1 file changed

Lines changed: 48 additions & 20 deletions

File tree

memdocs/intune/enrollment/macos-enroll.md

Lines changed: 48 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ keywords:
88
author: Lenewsad
99
ms.author: lanewsad
1010
manager: dougeby
11-
ms.date: 06/12/2020
11+
ms.date: 03/23/2022
1212
ms.topic: overview
1313
ms.service: microsoft-intune
1414
ms.subservice: enrollment
@@ -46,32 +46,56 @@ Complete the following prerequisites before setting up macOS device enrollment:
4646
- [Make sure your device is eligible for Apple device enrollment](https://support.apple.com/en-us/HT204142#eligibility).
4747
- [Configure domains](../fundamentals/custom-domain-name-configure.md)
4848
- [Set the MDM Authority](../fundamentals/mdm-authority-set.md)
49-
- [Create groups](../fundamentals/groups-add.md)
50-
- [Configure the Company Portal](../apps/company-portal-app.md)
49+
- [Get an Apple MDM push certificate](../enrollment/apple-mdm-push-certificate-get.md)
5150
- Assign user licenses in the [Microsoft 365 admin center](https://go.microsoft.com/fwlink/p/?LinkId=698854)
52-
- [Get an Apple MDM push certificate](../enrollment/apple-mdm-push-certificate-get.md)
51+
- [Create groups](../fundamentals/groups-add.md)
52+
- [Configure the Company Portal app](../apps/company-portal-app.md)
5353

54-
## User-owned macOS devices (BYOD)
5554

56-
You can let users enroll their own personal devices into Intune management. This is known as "bring your own device" or BYOD. After you've completed the prerequisites and assigned user licenses, your users can enroll their devices by:
57-
- Going to the [Company Portal website](https://portal.manage.microsoft.com) or
58-
- Downloading the Mac Company Portal app at [aka.ms/EnrollMyMac](https://aka.ms/EnrollMyMac).
55+
## User-owned macOS devices (BYOD)
5956

60-
You can also send your users a link to online enrollment steps: [Enroll your macOS device in Intune](../user-help/enroll-your-device-in-intune-macos-cp.md).
57+
Intune supports *bring-your-own-device*, or *BYOD*, which lets people enroll their personal devices themselves. To set up enrollment for BYOD scenarios, complete the prerequisites in this article. Then tell your device users to use one of these options to enroll devices:
6158

62-
For information about other end-user tasks, see these articles:
59+
- Sign in to [Company Portal website](https://portal.manage.microsoft.com) and follow on-screen instructions to add device.
60+
- Install Company Portal app for Mac at [aka.ms/EnrollMyMac](https://aka.ms/EnrollMyMac) and follow-on screen instructions to add device.
6361

64-
- [Resources about the end-user experience with Microsoft Intune](../fundamentals/end-user-educate.md)
65-
- [Using your macOS device with Intune](../user-help/enroll-your-device-in-intune-macos-cp.md)
6662

6763
## Company-owned macOS devices
68-
For organizations that purchase devices for their users, Intune supports the following macOS company-owned device enrollment methods:
69-
- [Apple's Automated Device Enrollment (ADE)](device-enrollment-program-enroll-macos.md): Organizations can purchase macOS devices through ADE. ADE lets you deploy an enrollment profile "over the air" to bring devices into management.
70-
- [Device enrollment manager (DEM)](device-enrollment-manager-enroll.md): You can use a DEM account to enroll up to 1,000 devices.
71-
- [Direct enrollment](device-enrollment-direct-enroll-macos.md): Direct enrollment does not wipe the device.
64+
Intune supports the following enrollment methods for company-owned macOS devices:
65+
66+
- [Apple Automated Device Enrollment](device-enrollment-program-enroll-macos.md): Use this method to automate the enrollment experience on devices purchased through Apple Business Manager or Apple School Manager. Automated device enrollment deploys the enrollment profile over-the-air,so you don't need to have physical access to devices.
67+
- [Device enrollment manager (DEM)](device-enrollment-manager-enroll.md): Use this method for large-scale deployments and when there are multiple people in your organization who can help with enrollment setup. Someone with device enrollment manager (DEM) permissions can enroll up to 1,000 devices with a single Azure Active Directory account. This method uses the Company Portal app or Microsoft Intune app to enroll devices. You can't use a DEM account to enroll devices via Automated Device Enrollment.
68+
- [Direct enrollment](device-enrollment-direct-enroll-macos.md): Direct enrollment enrolls devices with no user affinity, so this method is best for devices that aren't associated with a single user. This method requires you to have physical access to the Macs you're enrolling.
69+
70+
## Bootstrap tokens (preview)
71+
72+
> [!IMPORTANT]
73+
> This feature is in [public preview](../fundamentals/public-preview.md). It is not available in GCC High and government cloud tenants.
74+
75+
Intune supports the use of bootstrap tokens on enrolled Macs running macOS 10.15 or later. Bootstrap tokens grant volume ownership status to local user accounts, so that non-admin users can approve important operations that an admin would otherwise need to do. Operations such as:
76+
77+
* User-initiated software updates
78+
* Silent FileVault encryption
79+
* Kernel extension installation on Apple silicon
7280

73-
## Block macOS enrollment
74-
By default, Intune lets macOS devices enroll. To block macOS devices from enrollment, see [Set device type restrictions](enrollment-restrictions-set.md).
81+
You can utilize bootstrap tokens on supervised Macs, and Macs enrolled via automated device enrollment.
82+
83+
### Get bootstrap token
84+
85+
The bootstrap token is automatically generated when:
86+
87+
* A newly-enrolled Mac checks in with Intune and
88+
* A secure token-enabled user (typically an Intune administrator) signs in to the Mac with their clear text password
89+
90+
The token is then automatically escrowed to Microsoft Intune. You can use a command line tool to manually view, generate, and escrow a bootstrap token, if needed. For more information, see [Use secure token, bootstrap token, and volume ownership in deployments](https://support.apple.com/guide/deployment/use-secure-and-bootstrap-tokens-dep24dbdcf9e/1/web/1.0) on Apple Support.
91+
92+
### Manage kernel extensions
93+
A bootstrap token can be used to approve the installation of both kernel extensions and software updates on a Mac with Apple silicon. Kernel extension management is automatically available on Macs running macOS 11 or later and enrolled via automated device enrollment.
94+
95+
To authorize the remote management of kernel extensions on a device that isn't enrolled via automated device enrollment, you must restart the Mac in recovery mode and downgrade its security settings. For more information, see [Change security settings on the startup disk of a Mac with Apple silicon](https://support.apple.com/guide/mac-help/change-security-settings-startup-disk-a-mac-mchl768f7291/mac) on Apple Support.
96+
97+
## Block macOS enrollment
98+
By default, Intune lets macOS devices enroll. To block macOS devices from enrollment, see [Set device type restrictions](enrollment-restrictions-set.md).
7599

76100
## Enroll virtual macOS machines for testing
77101

@@ -84,7 +108,7 @@ For Parallels Desktop, you need to set the hardware type and the serial number f
84108

85109
For VMware Fusion, you need to [edit the .vmx file](https://kb.vmware.com/s/article/1014782) to set the virtual machine's hardware model and serial number. We recommend that you match the hardware type of the device running the virtual machines to the hardware type of the virtual machines that you're creating. You can find this hardware type in **Apple menu** > **About this Mac** > **System Report** > **Model Identifier**.
86110

87-
## User Approved enrollment
111+
## User approved enrollment
88112

89113
User Approved MDM enrollment is a type of macOS enrollment that you can use to manage certain security-sensitive settings. For more information, see [Apple's support documentation](https://support.apple.com/HT208019).
90114

@@ -100,4 +124,8 @@ BYOD macOS MDM enrollments prior to June 2020 may not be user approved if the en
100124

101125
## Next steps
102126

103-
After macOS devices are enrolled, you can [create custom settings for macOS devices](../configuration/custom-settings-macos.md).
127+
* For user-help documentation, which provides step-by-step enrollment instructions for device users, see [Enroll your macOS device in Intune](../user-help/enroll-your-device-in-intune-macos-cp.md). You can also create your own instructions if you prefer to capture your organization's branded or customized enrollment experience.
128+
129+
* After macOS devices are enrolled, you can [create custom settings for macOS devices](../configuration/custom-settings-macos.md).
130+
131+
*

0 commit comments

Comments
 (0)