Getting started with Shared iPad devices

This week is all around Shared iPad devices with Microsoft Intune. Shared iPad is an iPadOS configuration that easily lets multiple user share the same iPad. That configuration enables a personal experience for a user, on a device that is shared between multiple users. That personal experience enables users to be more productive, as users can simply pick-up where they left off previously. This post will start with a short introduction to Shared iPad devices, followed with the configuration steps for those devices. This post will end by describing and showing the user experience with Shared iPad devices.

Introduction to Shared iPad devices

With shared devices, this post is referring to company-owned multi-user devices that can be used – depending on the use case – as single-purpose or multi-purpose devices. Familiar use cases are frontline workers and students. When looking at iOS/iPadOS devices, there are actually two different methods for addressing shared multi-user devices. That is without considering kiosk mode.

  1. Shared iPad – Shared iPad functionality is provided by Apple with iPadOS 13.4 and later. This functionality enables multiple users to sign in to the same iPad by using a Managed Apple ID. Based on that Managed Apple ID, the user receives access to the different Apple apps, data and resources on the Shared iPad. Besides users with a Managed Apple ID, it’s also possible to provide temporary access for users without an account, by using a guest account. Shared iPad also provides builtin functionality to automatically clean up cached user accounts, depending on the available storage on the device. Microsoft Intune can enable the Shared iPad functionality, by integrating with Apple Business Manager (ABM), and adds on to that functionality by configuring policies and distributing additional apps.
  2. Shared Device Mode – Shared Device Mode functionality is provided by Microsoft for iOS/iPadOS 13 and later. This functionality enables multiple users to sign in to the same Apple device by using an Azure AD account. Based on that Azure AD account, the user will be automatically signed in to any supported app. Microsoft Intune can enable Shared Device Mode, by using the Microsoft Enterprise SSO plug-in, and adds on to that functionality by configuring policies and distributing additional apps.

Unless an organization needs cellphone capabilities, or needs to use iOS devices, Shared iPad is the recommended shared device solution for Microsoft 365 on iPadOS devices. Shared iPad is also the focus of this post and before looking at the configuration in more detail, it’s important to be aware of a few unsupported scenarios. According to the documentation, app-based and device-based conditional access, app protection policies and device compliance policies are currently not supported.

Note: During my initial testing, I could successfully use app-based conditional access policies and apply app protection policies in combination with Shared iPad devices.

Configuration of Shared iPad devices

The configuration of Shared iPad devices contains of a few important configurations that should be in place and that are described below as prerequisites. Besides that, the main configuration of Shared iPad devices consists of the configuration and assignment of an enrollment profile for iPadOS devices.

Requirements and prerequisites for configuring Shared iPad devices

The Shared iPad functionality has the following requirements on the iPad device.

  • iPad Pro, iPad (5th generation or later), iPad Air 2 (or later), iPad mini (4th generation or later)
  • iPadOS 13.4 or later as platform
  • 32GB or more as storage

Note: Not enough storage space can be a reason why the configuration of the iPad will hang during the remote configuration, with the message of “Awaiting final configuration from company“.

The described configuration of Shared iPad devices assumes that the following configurations are in place.

Configuration steps for Shared iPad devices

The actual configuration of Shared iPad devices is achieved by using an enrollment profile for corporate-owned iPadOS devices that synchronized via ABM. That enrollment profile will make sure that those iPadOS devices apply the correct enrollment configuration to bring those iPadOS devices in the correct mode. The following six steps walk through the steps to create an enrollment profile for Shared iPad devices.

  1. Open the Microsoft Endpoint Manager admin center portal and navigate Devices > iOS/iPadOS > iOS/iPadOS enrollment > Enrollment program tokens > {YourEnrollmentToken} > Profiles to open the {YourEnrollmentToken} | Profiles page
  2. On the {YourEnrollmentToken} | Profiles page, click Create profile > iOS/iPadOS to open the Create profile wizard
  3. On the Basics page, provide the following information and click Next
  • Name: Provide a name for the profile to distinguish it from other similar profiles
  • Description: (Optional) Provide a description for the profile to further differentiate profiles
  • Platform: iOS/iPadOS is preconfigured based on the initial start of the wizard
  1. On the Management Settings page (as shown in Figure 1), provide at least the following information and click Next
  • User affinity: Select Enroll without User Affinity as value, as a Shared iPad can’t have user affinity
  • Supervised: Select Yes as value, as a Shared iPad must be supervised
  • Locked enrollment: Select Yes as value, to make sure that the enrollment is locked on the device
  • Shared iPad: Select Yes, to enable the Shared iPad configuration
  • Maximum cached users: Specify a number of users that should be cached on the device

Note: A maximum of 24 users can be cached on a device with 32GB, or 64GB. Make sure to match this number with the number of user of the device. A too low number can mean that users have to wait longer to be productive and a too high number can mean that the device is running out of space.

  • Sync with computers: Choose between Allow All, Deny All and Allow Apple Configurator by certificate, to specify if the device is allowed to sync with computers

Note: When choosing Deny All, the port will be limited to charging only.

  • Apple Configurator certificates: Specify a certificate when the requirement (and previous configuration) is to only allow Apple Configurator by certificate

Note: It’s important to have local copy of the certificate, as it’s not possible to make changes to the uploaded copy.

  • Apply device name template (supervised devices only): Choose between Yes and No, to specify if the device should follow a specific naming standard
  • Device Name Template: Specify a device name template when the requirement (and previous configuration) is to apply a device name template

Note: The variable {{SERIAL}} can be used as serial number in the device name and the variable {{DEVICETYPE}} can be used as the device type in the device name.

  1. On the Setup Assistant page (as shown in Figure 2), provide at least the following information and click Next
  • Department: Specify the department name that should be displayed in the Setup Assistant during the setup of the Shared iPad
  • Department Phone: Specify the department phone number that should be displayed in the Setup Assistant during the device setup of the Shared iPad
  • Setup Assistant Screens: Specify the screens that should be displayed in the Setup Assistant during the device setup of the Shared iPad
  1. On the Review + create page, verify the configuration and click Create

Once the enrollment profile for Shared iPad devices is created, it can be assigned to devices that are synchronized via ABM. That assignment can be achieved by using one of the following methods.

  • Default profile – Navigate to Devices > iOS/iPadOS > iOS/iPadOS enrollment > Enrollment program tokens > {YourEnrollmentToken} > Profiles and use Set default profile to configure the default profile that is automatically assigned to all synchronized iOS/iPadOS devices for that specific enrollment token.
  • Assign profile – Navigate to Devices > iOS/iPadOS > iOS/iPadOS enrollment > Enrollment program tokens > {YourEnrollmentToken} > Devices and use Assign profile to manually configure the profile that is assigned to the specifically selected iOS/iPadOS devices that are synchronized for that specific enrollment token

Configuration suggestions for Shared iPad devices

Once an iPad is configured as a Shared iPad, it’s possible to do additional configuration and to distribute apps. Below are a few suggestions to use and to keep in mind for further configuring Shared iPad devices.

  • Assign apps and policies to device groups, as user assigned apps and policies will not apply on Shared iPad devices.
  • Assign apps as required to device groups, as available apps (and the Company Portal app and website) are not supported on Shared iPad devices.
  • Only Apple VPP apps, line-of-business apps and weblinks can be distributed to Shared iPad devices, as the App Store can not be used.
  • Disable the App Store via a device configuration profile (setting: Block App store), as the App Store is available on Shared iPad devices but the app installations are disabled.
  • Block guest sign in via a device configuration profile (setting: Block Shared iPad temporary sessions), to prevent temporary sessions and public access to the Shared iPad devices

User experience with Shared iPad devices

Once all the required configurations are in place and the enrollment profile is assigned to an iPad, it’s time to have a look at the user experience. The enrollment is actually really simple and leaves little room for error. The IT administrator (or an user) turns on the iPad, selects the language and the location of the iPad, and connects the iPad to the Wi-Fi. The iPad will activate and will find the remote management configuration after connecting to ABM. That will trigger the Shared iPad configuration. The iPad will restart and the configuration of the iPad will start. Once the configuration is completed, the Shared iPad sign-in screen shown.

Now the user can sign in with a Managed Apple ID and the profile will be created and cached locally on the Shared iPad. When it’s the first time of the user with a Shared iPad, the user should configure a language and location. Also, and this is were Shared iPad is a bit tricky from a user perspective, when it’s the first time using a Shared iPad, the user should configure an iPad passcode. All of these configurations are not iPad specific, but Shared iPad specific. The user can now sign in with a Managed Apple ID and the iPad passcode, on any Shared iPad device. That means that from this point, the user has a separate passcode for Shared iPad devices.

Once the user is signed in to a Shared iPad, the name of the user will be visible in the top left corner of every screen (as shown below in Figure 3 and Figure 4). To sign-out of the device, the user can swipe down to get a Sign Out button in the bottom right corner of the screen (as shown below in Figure 4). When the user is signed out, the device will show Recent Users (middle) and Other User (bottom left corner) as options to sign in to the device again. And when guest access is allowed, this screen will also show Guest (bottom right corner) as option to sign in.

When working with Shared iPad devices, there are also a few practical things to keep in mind.

  • Only a limited number of settings and system apps are available on Shared iPad devices.
  • The passcode complexity for Shared iPad devices is complex 8 character alphanumeric.
  • ABM should be used to reset the passcode of a user for a Shared iPad device.
  • The cached user data is removed after a passcode reset of that user for a Shared iPad device.

More information

For more information about Shared iPad devices and Microsoft Intune, refer to the following docs.

53 thoughts on “Getting started with Shared iPad devices”

  1. Thanks for this Peter, I’ve been struggeling a while now to configure a bunch of shared iPads. This guide helped me setting up our devices for this particular use.

  2. Hello Peter,

    any luck to set an VPN client on such device authentication via device certificate? (Pulse Secure)

    Thanks for the article


  3. Hi Peter, this was very helpful! Do you have any recommendations about how (or to you know whether it’s even possible) to remove preinstalled apps such as TV or Podcasts? Thanks!

  4. Hi Peter,
    Great post.
    Did you also tested a cellular data connection?
    We recognized that no LTE Mobile Data Connection is possible (only edge which is almost equal as no internet).
    It seems only possible while setting the device up but after a while no LTE Connection can be established anymore
    which would make the ipad almost not usable when no Wifi is available.

  5. I am having problems setting 6 or 4-digit passcode on the shared iPads. They are enrolled through ABM, and I log on with federated users. I still have to use the full password tied to the Managed Apple ID user.

    How can I change this so that the iPad accepts a passcode?

      • I have setup Shared iPads as Guest only login and have hidden all applications except a few which includes teams. User identities are not federated with ABM. When users login to teams they get sign was successful but does not meet the criteria message because of the conditional access policy.

        The users can access teams and join meetings only as a guest and with the meeting I’d but, We want to allow user to sign in with their credentials to Teams. What is the best possible solution?

          • Hello Peter,

            Thank you for the response. Today we have a block access CA with exclusion of filtered devices = compliant (iPhones and Androids). I have read through the MS documentation, and it states though the device is compliant it is actually not. It also states conditional access policy is not supported fro Shared iPads. I guess I am asking how to exclude the Shared iPad from the condition access policy that is blocking Teams login. I have used device filters: exclude enrollmentprofilename = “the profile name” but it doesn’t work.

          • Hi Ajay,
            I’m afraid that there is no magic switch yet to exclude those device. You have to find something that makes them unique within your environment.
            Regards, Peter

          • Thank you for getting back. I will explore options to mark the device as unique so that I can include those in the CA

  6. Hi Peter,
    thanks for the great content!
    Do you have any experience with SSO?
    When user signs in to Shared iPad and opens any Microsoft application (Teams) it asks for username + password.
    Would be great to use sign-in information for this.


  7. Hi Peter,
    Great writeup. What is the best way to remove a user from a Shared iPad? In Intune we do not see a Users section listed under the device details as the documentation describes.

  8. Hello Peter,

    I am trying to create a shared ipad for 2 users that i have synced. A teacher account and a student account. I wanted to display a set of app for the teacher and a set for the students. I have all apps assigned to the device as required.
    I created a device features config profile to set a homescreen layout for the student, assigned to the student group, but it doesn’t seem to be picked up. I also tried show/hide in device restrictions. Doesn’t seem to apply either.

    Basically i want that when a student logs in it only shows the apps that are pushed to the device. No built-in apps or as little as possible.
    And a teacher should have some additional apps.

  9. Hi Peter,

    I have just setup 25 iPad 64Gb 9gen, as Shared iPads. Everything works perfectly, I only have one serious problem. When I look in Setting, Gerneral, About, the capacity states 12GB, leaving very little room for apps. Have you any idea what is wrong ?

    Many thanks 😉 Peter

  10. If you are using this for a pure ‘guest’ mode is a passcode enforced and when during the setup process? Intune doc mentions the 8 digit complex passcode is enforced but is that still the case if using ONLY for guest mode? Thanks

  11. Hi Peter,

    Thanks for a great article. Can you tell me why Intune policies are not supported with Shared iPad: app-based and device-based conditional access policies, app protection policies, and compliance policies. Is it because they are devices without user affinity? Though Microsoft says its not supported, policies still apply. So is it recommended to use them?

  12. Hi Peter,

    We have created app protection policy for unmanaged devices (MAM) and deployed to all users group, we have couple of shared iPad devices that we have enrolled to Intune but we observed that unmanaged devices app protection policy also getting applied to these shared iPad device when user sign in to device. We had not expected this as Microsoft itself says app protection policy not supported on Shared iPad but in real word its the reverse case. Do you know how we can prevent the policy to get applied ?

    Suraj Malusare

    • Hi Suraj,
      Sadly not supported is not the same as not applied. What you could do is making sure that those apps are considered managed apps on managed devices. In that case, that policy is not applicable.
      Regards, Peter

      • Hi Peter,

        Could you elaborate on ‘making sure that those apps are considered managed apps on managed devices’?
        I’m running into the same issues as Suraj with MAM policies in my setups. The policies are applied and enforced by CA policies.
        What happens is that a Shared iPad device isn’t recognized as a managed device when evaluating CA policies and MAM filters so they can’t exclude them. Currently we’re telling users to run through the securing of apps, but I’m looking into a solution where I can exempt Shared Ipads from such policies aimed at personal devices.

        Last month I created a (premium) support ticket at MS but after a long process of making clear what Shared iPads exactly are we were told that they’d be making it available with the new (application) filtering option which didn’t change anything about this. I’m creating a new ticket as of now, but it would be great to hear your insights on this.

        Thank you!

        Best regards,


  13. I have just configured 20 ipads and wax painful as bought from amazon.
    I used apple configurator on vm to test and creates a profile just with wifi as thought intune would handle the rest.
    In the end due to pull make profile on itune to pull and download intune company app
    Working but user signs in with microsoft account then asks for password to be changed ( apple) I changed security measure in apple school manger to 4 digits as young age school.
    Works but annoying that can’t just use Microsoft passeord as in shared user environment

    I will be enrolling imacs next week any thoughts about this with azure ad and intune ?

  14. Thanks a lot for this wonderful article. In shared iPad : For the Guest login “No password security available and it’s an users risk”. But for the Azure user login “Local device passcode setup is possible ?, we are not getting an prompt for the password setup while logging with managed Apple id”.

    • Hi Govi,
      When using Shared iPad configuration for the iPad, and Entra for the account, the user has a managed Apple ID and will automatically be prompted to create a PIN. That is default Shared iPad behavior, created by Apple.
      Regards, Peter

  15. Also your suggestion is “Shared iPad is recommended for Multiple Users login in iOS device with M365 Apps ? and Shared Device Mode is not recommended due to limitation of SSO enabled M365 Apps ?. and Shared device mode doesnt required a login in an iPad device ?.

    • Hi Govi,
      Shared Device Mode is a different concept that is created by Microsoft. It completely depends on your scenario if it makes sense. For the full experience. the user should eventually sign in with username-password (or whatever is configured).
      Regards, Peter


Leave a Reply to Peter van der Woude Cancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.