
A self-signed certificate can’t be verified without user interaction. If iOS, iPadOS, or macOS can’t validate the trust chain of the signing CA, the service encounters an error. A certificate contains a public key, information about the client (or server), and is signed (verified) by a CA. These digital certificates can be used to securely identify a client or server, and to encrypt the communication between them using the public and private key pair. Authentication credentials and identity asset settingsĪpple devices include a number of preinstalled root certificates from various Certification Authorities (CAs), and iOS, iPadOS, and macOS validate the trust for these root certificates.Legacy interactive profile declarative configuration.Legacy profile declarative configuration.Subscribed Calendars declarative configuration.Google Accounts declarative configuration.Privacy Preferences Policy Control payload settings.Dynamic WEP, WPA Enterprise, and WPA2 Enterprise settings.

Kernel Extension Policy payload settings.Extensible Single Sign-on Kerberos payload settings.Extensible Single Sign-on payload settings.Exchange Web Services (EWS) payload settings.Exchange ActiveSync (EAS) payload settings.Conference Room Display payload settings.Certificate Transparency payload settings.Certificate Revocation payload settings.Certificate Preference payload settings.Autonomous Single App Mode payload settings.Active Directory Certificate payload settings.Automated Certificate Management Environment (ACME) payload settings.Automated Device Enrollment MDM payload list.Configure a Mac for smart card–only authentication.


