In Apple Configurator 2, right click the device and select "Prepare".In the Microsoft Endpoint Manager admin center, under Home > Devices > iOS/iPadOS > Apple Configurator, select the profile, and then "Export Profile".
In Safari, this can be done by clicking the padlock next to the URL, clicking "Show Certificate", selecting Baltimore CyberTrust Root certificate and then dragging the large icon to the Desktop. NOTE: In Microsoft Edge or Chrome, this can be done by clicking the padlock next to the URL, clicking "Certificate", selecting Baltimore CyberTrust Root certificate and then dragging the large icon to the Desktop. You can read more about getting the Baltimore Cybertrust root certificate here: Configure Trusted Roots and Disallowed Certificates | Microsoft Docs.
#Apple configurator for windows download download#
#Apple configurator for windows download update#
However, if you plan to enroll new devices in the next few weeks there’s one set of steps post incident to enroll new devices, and then when the certificate update is completed, a quick profile update to ensure new enrollments are successful. Existing devices remain enrolled as they have already established trust through the Apple configurator setup assistant workflow. Unfortunately, as part of this incident, we have confirmed that there is a certificate mismatch between Apple Configurator profiles and the Intune certificate issuing service for iOS/iPadOS enrollment through this setup experience. We recently posted IT234239 on the Service Health Dashboard. Only setup assistant workflow is impacted – all other iOS/iPad enrollment workflows are not affected. Blog Note – This only impacts the iOS/iPadOS device enrollment using Apple Configurator – Setup Assistant – as documented here: iOS/iPadOS device enrollment - Apple Configurator-Setup Assistant - Microsoft Intune | Microsoft Doc.