Skip to main content

How to configure MDM Permissions with Role-Based Access Control (RBAC)

Learn to configure granular MDM permissions for technicians using Role-Based Access Control (RBAC).

Mithra Ravikrishnan avatar
Written by Mithra Ravikrishnan
Updated this week

SuperOps now offers granular Role-Based Access Control (RBAC) for Mobile Device Management (MDM), allowing you to define precisely who can access, configure, and perform key MDM actions. This enhancement provides greater security, accountability, and delegation capabilities for your IT team.
​

These permissions apply to both Android and IOS devices

Understanding MDM Permissions

Under the Asset Management category, you can assign three specific MDM permissions:
​

1. MDM Organisation Settings

This permission grants access to manage global MDM configurations. It is ideal for administrators who oversee the initial MDM setup, integration, and overall policy structure. Technicians with this role can:

  • Link Apple Business Manager (ABM) or Android Enterprise accounts.

  • Set up APN or Android Enterprise tokens.

  • Manage default enrollment and policy configurations.

2. MDM Device Enrollment

This allows users to enroll and assign devices to MDM. By assigning this role, you ensure only authorized technicians can add new devices to your managed environment. This permission allows them to:

  • Add or import new devices.

  • Generate enrollment profiles or QR codes.

  • Assign devices to sites, users, or policy sets.

3. MDM Device Wipe

This critical permission enables the secure remote wipe of managed devices, erasing all data and configurations. It is essential for data security in case of device loss, theft, or reassignment. Due to its irreversible impact, this permission should be limited to trusted senior administrators.

How to Configure MDM Permissions

  1. Navigate to Settings > Technician Roles. You can also create a customised role by clicking on "Create"

    Screenshot 1

  2. On the 'Edit technician role' screen, scroll down to the Asset Management section. To grant MDM permissions, select the checkbox next to 'MDM Organization settings'. This will automatically enable the related sub-permissions for 'MDM device enrollment' and 'MDM device wipe'.

    Screenshot 3

  3. Click Save in the top-right corner to apply the changes.

Understanding MDM Permissions

Under the Asset Management category, you can assign three specific MDM permissions:
​

1. MDM Organisation Settings

This permission grants access to manage global MDM configurations. It is ideal for administrators who oversee the initial MDM setup, integration, and overall policy structure. Technicians with this role can:

  • Link Apple Business Manager (ABM) or Android Enterprise accounts.

  • Set up APN or Android Enterprise tokens.

  • Manage default enrollment and policy configurations.

2. MDM Device Enrollment

This allows users to enroll and assign devices to MDM. By assigning this role, you ensure only authorized technicians can add new devices to your managed environment. This permission allows them to:

  • Add or import new devices.

  • Generate enrollment profiles or QR codes.

  • Assign devices to sites, users, or policy sets.

3. MDM Device Wipe

This critical permission enables the secure remote wipe of managed devices, erasing all data and configurations. It is essential for data security in case of device loss, theft, or reassignment. Due to its irreversible impact, this permission should be limited to trusted senior administrators.

Summary

By leveraging enhanced RBAC for MDM, you can create a more secure and efficient operational workflow. Assigning specific MDM permissions ensures that technicians have access only to the tools they need, reducing the risk of accidental changes or unauthorized actions.

Did this answer your question?