Manage Devices by Who’s Using Them — Not by Serial Number: Announcing Public Beta
Your identity provider (IdP) knows everything about your organization: every department, role, and group membership. Updates happen in real time as people join, switch teams, or leave.
Your Apple MDM knows everything about your devices: every Mac, iPhone, and iPad. What software is installed, what settings are applied, what policies are enforced and more. But those two systems need to talk to one another to enable true zero-touch onboarding, role-based changes, and offboarding.
When a new engineer starts on Monday, you don’t want to be assigning their Mac to the right policy, making sure Xcode and Docker get installed, or configuring access levels all by hand. Because if that engineer moves teams or leaves six months later? You may be doing it all over again.
This is the daily reality for IT teams or MSPs managing hundreds or thousands of Apple devices. The information exists, but the automation didn’t – until now.
Introducing End User Management
The Real Cost of Manual Apple MDM
The numbers tell the story. Across hundreds of IT organizations, support tickets related to device naming, user-to-device mapping, and manual policy assignment pile up. Onboarding and offboarding workflows alone generate tickets that take an average of 25 days to resolve—not because the work is hard, but because it’s manual, repetitive, and easy to forget.
One IT admin put it bluntly: “We have to treat the email, write it in the device, in a file, collect it with custom data fields, push it through the system… all that just to collect an email address.”
Another admin described managing 340 iPads—every single one named iPad in the console—with no way to tell which belonged to whom without physically checking each device.
These aren’t edge cases. They’re the norm.MSPs and IT teams have built fragile workarounds—scripts, spreadsheets, manual tagging—to connect people to devices. And every workaround breaks the moment someone forgets to update it.
Introducing End User Management for Zero-Touch Apple MDM in Addigy
End User Management or ‘user based policy assignments’ connect your identity provider to Addigy so Apple MDM automation can happen without manual intervention. Connect Okta or Microsoft Entra ID via SCIM. Your users, groups, and attributes sync into Addigy. Map users to their devices. Then create policies that apply automatically—so deployments, access changes, and security actions don’t depend on someone remembering to file (or work) another ticket.
When attributes change in your IdP, device configurations update to match. No manual intervention. No tickets. No lag.
End User Management is now available as a public beta open to all Addigy customers on every plan.
How End User Device Management Works
- Connect your identity provider
Addigy integrates with Okta and Microsoft Entra ID via SCIM—the industry standard for identity provisioning. Once connected, your users and groups sync automatically. Your IdP remains the single source of truth. Addigy listens and acts. - Map users to devices
Know exactly which user owns which device. Assignment can happen automatically through Addigy Identity or Enrollment SSO when users authenticate. Or assign manually, or upload a CSV for bulk assignment of existing fleets. Need to find a user’s devices? Search by name or email and instantly see every Mac, iPhone, and iPad they’re using. - Define policies that power zero-touch
This is where the paradigm shifts. In Flex Policies, create conditions based on user attributes from your IdP: Department, group membership, role, and more. When someone logs into a device, Addigy evaluates who they are and applies the right policies automatically. When their attributes change in your IdP, their device configuration updates automatically—without rework. - Audit everything
Every attribute-driven policy change is logged. You can see exactly why a policy was applied to a device, when the last sync occurred, and what changed—creating a clear audit trail for compliance and troubleshooting.
What This Means for Your Team
True zero-touch onboarding
A new hire unboxes their Mac, walks through Setup Assistant, and authenticates. Based on their department and role in your IdP, they automatically receive the right software, settings, and access levels. By the time they reach the desktop, they’re ready to work.
You don’t need to touch a thing.
Automatic offboarding
When HR disables an account in your IdP, Addigy sees it. Policies can automatically revoke access, enable Lost Mode, or trigger your offboarding workflow. No more discovering weeks later that a departed employee’s laptop still has full access to everything.
Role changes that just work
Someone moves from Marketing to Sales. Their IdP group membership changes. Addigy detects it, removes the Marketing tools, and deploys the Sales stack. No ticket required. No one had to remember.
Management at the user level, not the device level
Stop thinking “these 50 Macs need this software.” Start thinking “Engineers need these tools.” The devices follow the people.
How to Get Started with End User Management for Addigy Customers
Step 1: Enable the beta
Go to End Users in your Addigy console and enable the End User Management beta toggle.
Step 2: Connect your identity provider
Select Setup End User Management. You’ll receive a SCIM URL and Bearer Token to configure in Okta or Entra ID.
Step 3: Let users sync
Once configured, your users and groups sync automatically. Timing depends on your IdP—typically within 30 minutes.
Step 4: Assign users to devices
Enable automatic assignment through Addigy Identity or Enrollment SSO. For existing fleets, assign manually or upload a CSV.
Step 5: Create policies for zero-touch deployment
In Flex Policies, add conditions based on user attributes (department, group membership, role, or any attribute your IdP provides). Devices move into the right policies based on who’s using them—without ongoing manual work.
Get started with End User Management
The Bigger Picture
Apple MDM has historically been device-centric: serial numbers, hardware models, asset tags. Policies applied to machines, not the real-world workflows IT supports.
End User Management bridges that gap so zero-touch workflows are actually possible: when someone joins, their device is ready; when they move teams, their device adapts; when they leave, their device is secured—automatically.
Learn more about zero-touch deployment with Addigy here.
