Requesting com.apple.managed-keychain Entitlement for Enterprise S/MIME Cert Visibility
Platform: iOS | Distribution: MDM (Microsoft Intune) | Not App Store
We are developing an internal enterprise iOS app (EMS Assist, com.company.supportcompanion) for Company deployed exclusively to Intune-managed devices.
Our requirement: Read S/MIME certificates pushed to the device via Intune SCEP profiles to:
Confirm cert presence in the MDM-managed keychain
Read expiry date (kSecAttrNotValidAfter) to warn users before expiry
Distinguish between missing, expired, and valid cert states
What we have tried:
Standard SecItemCopyMatching query — returns only app-installed certs, not MDM-pushed certs
Graph API (deviceConfigurationStates) — confirms profile compliance but does not expose actual cert expiry or keychain presence
Our understanding: com.apple.managed-keychain is required for an app to access MDM-managed keychain items on supervised devices, combined with a matching keychain-access-groups entitlement and the cert profile configured as "always available" in MDM.
Questions:
Is com.apple.managed-keychain the correct entitlement for this use case?
Does it apply to SCEP/PKCS-issued certificates specifically, or only other MDM keychain items?
Has anyone successfully accessed Intune-pushed S/MIME certs from an iOS app using this entitlement?
Any guidance from the community or Apple engineers would be appreciated.
Topic:
Business & Education
SubTopic:
Device Management
Tags:
Enterprise
Entitlements
Business and Enterprise
Security
2
0
46