Apple’s push relay
Apple Push Notification service is the relay Apple runs on 17.0.0.0/8. Your MDM does not contact devices directly. It hands a push payload to APNs; APNs wakes the device; the device checks in with the MDM over HTTPS.
MDM
There is exactly one rule that separates a five-minute APNs renewal from a three-day outage: renew with the same Apple ID that originally created the certificate. Click the wrong button or sign in with the wrong account and every iPhone, iPad, Mac, Apple TV, and Vision Pro you manage silently drops trust with the MDM. Here’s the full renewal flow, the verification steps, and the disaster recovery plan for when you can’t sign in to the Apple ID anymore.
In this guide
The one rule
The Apple Push Certificates Portal has two buttons that look almost identical: Renew on the existing row, and Create a Certificate at the top of the page. Clicking the wrong one issues a brand-new certificate with a different Topic UID. The moment that new cert lands in the MDM, every previously enrolled device loses trust. Fixing it means unenrolling and re-enrolling everything — on supervised / ADE devices that is a full wipe.
Intune, Jamf, Kandji, and Mosyle all list this as their #1 APNs support escalation. Treat Renew on the existing row as the only safe action.
Context
Apple Push Notification service is the relay Apple runs on 17.0.0.0/8. Your MDM does not contact devices directly. It hands a push payload to APNs; APNs wakes the device; the device checks in with the MDM over HTTPS.
The APNs MDM Push certificate is what tells Apple your MDM is allowed to talk to your fleet. Without a valid cert, profiles stall, commands queue, and remote wipe doesn’t fire.
Each device’s management profile is bound to the cert’s Topic UID. Change the UID (by creating a new cert instead of renewing), and every device rejects the MDM the next time it checks in.
TCP 5223, 443, and 2197 outbound to 17.0.0.0/8 must be allowed and cannot traverse a SOCKS/HTTP proxy. Post-renewal outages are more often a firewall change than a broken cert.
Before you renew
Use an Apple ID like it-apns@yourcompany.com tied to an IT
distribution list, not an individual admin’s email. Ex-employees should
never be able to strand the cert.
The APNs account is almost always a free consumer-style Apple ID. Managed Apple Accounts can technically host the cert, but migration there is only possible via an Apple Support case — not worth the complexity.
Register a shared phone line — Teams, RingCentral, Google Voice, or a SIM in a locked drawer — so anyone on the IT team can receive the 2FA code. Never a personal cell.
Store the Apple ID password and 2FA recovery info in the team password manager (1Password, Bitwarden, Keeper). Document which vault item; include it in offboarding checklists.
Apple will lock an inactive Apple ID or flag it as suspicious. Schedule a quarterly sign-in ping on the shared account so it stays warm.
Intune, Jamf, and Kandji all let you store the Apple ID next to the cert. Fill it in — next year’s admin will thank you at renewal time.
Cadence
APNs MDM Push certs are valid for one year from issue. Apple emails a reminder to the APNs Apple ID about 30 days before expiry; the MDM shows a warning banner in the same window.
For 30 days after expiry, the Renew button on Apple’s portal still works and preserves existing enrollments. Devices stop receiving pushes but haven’t lost trust with the server yet.
Beyond the grace period, the existing row can no longer be renewed. You’re forced into a new cert and a fleet-wide re-enroll — same blast radius as clicking the wrong button at renewal time.
Calendar reminder at 6 months. Actual renewal at 30 days before expiry. A second admin shadows the session so Renew vs. Create a Certificate is verified out loud before the click.
Walkthrough
Intune: Devices → Device onboarding → Enrollment → Apple → Apple MDM Push Certificate. Jamf Pro: Settings → Global → Push Certificates. Kandji, Mosyle: the APNs settings under the integrations or account page.
Click Renew (never “Replace”, “New”, or
“Create”). The MDM generates and downloads a vendor-signed CSR.
Intune produces a .csr; Jamf Pro emits a signed .plist.
Navigate to identity.apple.com/pushcert. Use a private / incognito window — ordinary browser sessions frequently surface a personal Apple ID instead of the IT one.
Sign in with the same Apple ID that created the original cert. Before clicking anything, confirm the UID / Topic on the existing row matches the UID your MDM shows for the current cert.
Click Renew on the existing row. Upload the CSR. Add a
note like “Renewed 2026-04-18 by J. Smith, ticket IT-4421” for next
year’s admin. Download the resulting .pem.
Back in the same renewal wizard in the MDM, upload the .pem.
Confirm the new expiration date shown in the MDM is roughly 365 days out.
Worked example
Microsoft Intune admin center → Devices → Device onboarding → Enrollment → Apple → Apple MDM Push Certificate.
Intune displays the Apple ID that was last recorded at initial setup. Confirm the email matches a mailbox you can actually reach before clicking anything.
Click Download your CSR, then click Create your MDM push Certificate (the link label is the same for initial and renewal — it opens identity.apple.com/pushcert).
Sign in with the matching Apple ID, click Renew next to the
existing row, upload the CSR, download the .pem.
Back in Intune, re-enter the Apple ID if prompted, browse to the
.pem, click Upload. Status should read
Active in both Intune and the Apple portal.
Verification
MDM status page should show the new expiration ~365 days out. Apple’s portal should show the same date on the certificate row.
On a test iPhone or iPad: Settings → General → VPN & Device Management → [management profile] → More Details → Management Profile. The Topic GUID must match the UID in the MDM console.
Send a harmless command to a test device — an inventory refresh, a small profile, or a test notification. It should land within a minute or two. If it doesn’t, check ports before blaming the cert.
Pick both an iPhone/iPad and a Mac from the fleet. APNs trust is per-cert, not per-platform, but verifying both models removes any doubt.
Disaster recovery
iforgot.apple.com. Recovery typically takes several days to several weeks. Apple will not expedite for an enterprise APNs use case, so start immediately when you realize the account is stuck.
If you have an AppleCare for Enterprise contract or an existing Apple Business case, open a ticket referencing APNs cert recovery at support.apple.com/en-us/118629.
If recovery won’t complete before the cert expires, export profiles, app assignments, and scoping from the MDM. Create a new cert under a new, properly shared Apple ID. Announce a maintenance window.
Ensure all supervised devices are still assigned to your MDM server in Apple Business. On factory reset (or the first check-in for user-enrolled devices), they pick up the new management profile automatically.
When it breaks
The single biggest cause of mass re-enrollment incidents. Always renew on the existing row. Having a second admin read the button label aloud before the click is a cheap control.
The admin is already signed in to appleid.apple.com with a personal account and Apple’s portal silently uses it. Use a private / incognito window every time.
Discovered at renewal time when no one can receive the SMS. Audit the APNs trusted number at least annually, independent of the renewal itself.
Kandji will bounce this as “This doesn’t appear to be a valid certificate.” Use the MDM’s renewal wizard, not a generic upload field.
Older Jamf Pro and Mosyle builds don’t show it. Cross-check by reading the
Subject or UID of the uploaded .pem and looking up that UID on
Apple’s portal.
If devices stop responding right after renewal, check ports 5223, 443, and 2197 to 17.0.0.0/8 before rolling back the cert. Proxy changes during change windows catch teams out.
Want this handled for you?
The shared Apple ID, the documented 2FA number, the 6-month calendar reminder, the shadow-admin verification, and the disaster-recovery runbook are all part of how Arclion keeps Apple MDM online year after year. If you’d rather not inherit someone else’s APNs skeleton, Foundation covers it.
What to send
Keep reading
The upstream step — how devices end up assigned to the MDM that is now relying on your APNs cert for pushes.
Read the guideIf you do end up having to re-enroll after a bad APNs renewal, this flow keeps in-use Macs in place.
Read the guideThe foundational setup walkthrough — before APNs, before MDM, before any of this.
Read the guide