Users
SimpleMDM allows more than one individual in your organization to manage your SimpleMDM account. Inviting additional users to your account is easy.
To add an administrator to your account:
- Within SimpleMDM, click "Settings" on the left hand side of the screen.
- Select the "Users" sub-menu option below "Settings".
- Enter the email address of the user you'd like to add, select an appropriate user role, and click "Invite User".
Upon completing these steps, SimpleMDM will send an invitation to the email address specified. The individual will have the option to create a SimpleMDM login and will have shared access to your SimpleMDM account.
User Roles
Your company may require different permission levels for different SimpleMDM users. The User roles feature allows you to create custom roles with different permissions that are specific to your organizational needs. The User Roles interface is accessible from the Users management screen, as referenced in the above section.
The configurable permission currently available are:
Allow Devices Actions
This option controls the ability to send specific commands to devices, including:
- Push Assigned Apps and Media
- App Updates (via Device Details)
- Wipe
- Lock
- Clear Passcode
- Update Location
- Send Message
- Enable/Disable Lost Mode
Allow Configuration Changes
This options controls the ability to make configuration changes to devices.
Devices
- Assign/unassign profiles at the device level
- Set timezone
- Refresh cellular plan
- Remove or unenroll devices
Device Groups
- Modify profile assignments at the group level
- Edit group settings
Apps and Media
- Modify app & media assignments
- Modify VPP settings
Profiles
- Create/edit profiles
- Create/edit providers
- Create/edit custom attributes
Scripts
- Create/edit scripts
- Create/edit jobs
Enrollments
- Create/edit enrollments
General
- Modify account settings
- Update Push Certificate
Allow User Management
- Invite new users
- Manage user roles
Allow API Management
- Create API keys
- View and reset API keys
- Modify API key resource permissions
Allow Log Visibility
- View device logs
- View admin logs
Allow Billing Management
- View Billing page
- Update billing information
- View billing history
Allow Secret Information Visibility
This section allows you to control access to view/modify sensitive information, including:
- Activation Lock Bypass Codes: View Activation Lock Bypass Codes and send “Disable Activation Lock” command
- Device Erase & Lock PINs: View PINs set when erasing or locking devices
- Admin Passwords: View, reset, and rotate Auto-Admin passwords
- FileVault Recovery Keys: View and rotate FDE Recovery Keys
- Firmware Passwords: View stored firmware passwords and send “Clear Firmware Password” command
- Profile Passwords: View passwords set in profiles
- Recovery Lock Passwords: View stored recovery lock passwords and send “Clear Recovery Lock” command
- Webhook Passwords: View and modify webhook passwords
- Custom Attributes Marked As Secret: View custom attribute values that have been marked as secret
No Access
Users assigned the “No Access” role will be able to create a user account but will not be able to view or modify anything within the account, and will instead see a access restricted page upon sign in. This is commonly used to limit access for SAML-authenticated users that have not yet been approved or assigned a role by another admin in the account. While SAML access is often controlled on the identity provider side, this provides an alternative when that is not feasible.
Additional Security Options
SimpleMDM offers two advanced security options for User authentication:
Require Two-Factor Authentication
Administrators of a SimpleMDM account can require that all users accessing the administrator interface have two-factor authentication enabled. If they do not, they will be prompted to enable it before accessing the account. Currently, this feature requires the use of a third-party authentication app, such as Google Authenticator, Microsoft Authenticator, Authy, etc.
To enable this:
- Navigate to Account > Users.
- Click the Settings tab.
- Check the box labeled “Require Two-Factor Authentication”.
SAML Authentication
Your company can utilize a third-party identity provider (IdP) such as Microsoft Azure/Entra AD, Google Workspace, OneLogin, Okta, Ping Identity, etc. to grant access to the SimpleMDM administrator interface. SimpleMDM supports Just-In-Time (JIT) provisioning and Single Logout functionality to streamline administrative efforts and increase security.
To enable this:
- Navigate to Account > Users.
- Click the Settings tab.
- Under the “Single Sign On with SAML” section, select “Yes” in the “SAML Enabled” field.
- Additional configuration will be required and steps may vary depending on the identity provider. View the “SAML Integration Guides” section for more information based on your provider.