You can make a difference in the Apple Support Community!

When you sign up with your Apple Account, you can provide valuable feedback to other community members by upvoting helpful replies and User Tips.

Looks like no one’s replied in a while. To start the conversation again, simply ask a new question.

What is iOS Account Manager?

Hello there, I was checking my google account security settings and I found out that "iOS Account Manager" is connected to my account but I've no idea what it is. I tried to log out from my account on my iPhone but when I log into YouTube it still appears (so it might can be related to yt but idk why). I also logged into safari and when I check for new logins in my google account setting it just says that safari is connected. You guys have any ideas on what this account manager is? sorry for my bad english.


iPhone 12 mini, iOS 15

Posted on Jun 1, 2022 7:15 AM

Reply
Question marked as Top-ranking reply

Posted on Sep 4, 2022 12:16 PM

I have it on my phone and I know someone who is causing me great damage to my life and business is doing it. It appears it is a fake Google accounts app that installs some malware which makes you think your logging in to your accounts but really your passing your password into people who are hacking into your email. This woman has taken over my website and has had access to all passwords and has been reading , deleting mail and contacting Google support as though she is me. She has got hold of dns records of domain and has set up Google consoles , moved my hosting of website, it’s a nightmare and is ruining my business and life. If you have this on your phone, be very worried ! I can’t even reset my phone properly, going to a apple shop tomorrow for help. It isn’t good though!


Similar questions

202 replies

Aug 3, 2023 3:38 AM in response to Riccardo2424

Hi, All

This is what I have found. But the interesting part is that I have not set it up for School or businesses using my personal Apple ID.


Intro to mobile device management profiles

iOS, iPadOS, macOS, and tvOS have a built-in framework that supports mobile device management (MDM). MDM lets you securely and wirelessly configure devices by sending profiles and commands to the device, whether they’re owned by the user or your organization. MDM capabilities include updating software and device settings, monitoring compliance with organizational policies, and remotely wiping or locking devices. Users can enroll their own devices in MDM, and organization-owned devices can be enrolled in MDM automatically using Apple School Manager or Apple Business Manager. If you’re using Apple Business Essentials, you can also use the device management that’s built right in.

There are a few concepts to understand if you’re going to use MDM, so read the following sections to understand how MDM uses enrollment and configuration profiles, supervision, and payloads.

How devices enroll

Enrollment in MDM involves enrolling client certificate identities using protocols such as Automated Certificate Management Environment (ACME), or Simple Certificate Enrollment Protocol (SCEP). Devices use these protocols to create unique identity certificates for authenticating an organization’s services.

Unless enrollment is automated, users decide whether or not to enroll in MDM, and they can disassociate their devices from MDM at any time. Therefore, you want to consider incentives for users to remain managed. For example, you can require MDM enrollment for Wi-Fi network access by using MDM to automatically provide the wireless credentials. When a user leaves MDM, their device attempts to notify the MDM solution that it can no longer be managed.

For devices your organization owns, you can use Apple School Manager, Apple Business Manager, or Apple Business Essentials to automatically enroll them in MDM and supervise them wirelessly during initial setup; this enrollment process is known as Automated Device Enrollment.

Declarative device management

Declarative device management is an update to the existing protocol for device management that can be used in combination with the existing MDM protocol capabilities. It allows the device to asynchronously apply settings and report status back to the MDM solution without constant polling.

Status reporting allows a device to share information about its current state and if there are any changes, these can be reported to the server proactively without having to poll the device for updates. In addition to device properties, status is now reported for passcode presence and compliance, accounts, and MDM app installation progress and information.

Declarations

There are four types of declarations, which are payloads that the server defines, sends to devices, and represents the policy an organization wants to enforce on devices.

Declaration type

Description

Configurations

Configurations are similar to MDM’s existing profile payloads; for example, accounts, and settings, and restrictions. See Declarative configurations in the MDM settings section.

Assets

Assets consist of reference data that’s required by configurations for large data items and per-user data; assets have a one-to-many relationship with configurations. See Authentication credentials and identity asset settings.

Activations

Activations are a set of configurations that are applied atomically to the device and can include predicates, such as “device type is iPad” or “operating system version greater than iPadOS 16.1.” There is a many-to-many relationship between activations and configurations. Activations can use an extended predicate syntax—including status items—to support complex predicate expressions.

In addition, a management properties declaration allows servers to set arbitrary properties on the device, which can be directly used in activation predicates.

Management

Management is used to convey overall management state to the device, describing details about the organization and capabilities of the MDM solution.

Status channel


The status channel is a new channel of communication where the device proactively updates the server with new information about itself. Updates of the device state are sent in a status report to the server. The server can subscribe to specific status items, so it receives only updates for the changes it cares about. Status items can also be used as expressions in activation predicates, allowing the device to operate independently, based on state changes. For more information, see Declarative status reports.


Dec 12, 2022 3:09 AM in response to Jphnalabama

In the Iphone setting there is Direct Touch Apps. A hacker continued to make Norton password security app. Their VPN. And several other apps. Accessible by keeping a check next to them. I would uncheck it, and within two seconds they would check it right back. Look for the accessibility UI server./L2TP VPN ( send all traffic

) to be turned on .( even if you don’t have a VPN) that is **** your settings are getting changed? Or that’s how mine seem to be?

Jan 20, 2023 7:00 PM in response to Jphnalabama

Hello

I terribly sorry that you're going through this ordeal. I see that it happened to you last year and hopefully you got some answers.

I went through a similar situation (still am) and in my case, I found out that someone who had a previous access to all my devices, systems and credentials had created remote access to my systems and was accessing them via VMs (Ubuntu, Kali Linux, RedHat etc...). With a gnome installation and freedesktop.org these criminals were able to get into my routers, my computers, androids and IOS devices.

I changed my router 3 times! Even moved out my apartment! The IOS devices (I believe my iPhone), were even turned into network gateways. I will try to attach some screenshots.

I lived through these horrendous moments, seeing the DDOS attacks happening, the random password changes, the redirect to fake websites etc... but was powerless to do anything. I contacted EVERY single company (Apple, Google, ISP) even apple community to no avail.

I changed my router 3 times! Even moved out my apartment!

I finally got some answers when I installed my own VMs, learned how to dig into my machines, and was able to find the prior installations, intrusions on my systems (I'll try to add some screenshots).

P-S: Please pay attention to the Google Play Services App on your phones (mine was android) if applicable.

The adversary had installed a fake Google Play Services app on my phone, I noticed it almost 2 years after the fact. It would show as "Parallel Google Play Services". Which made 80% of the apps I downloaded (including pre-installed Google system apps) considered side-loaded. All these apps were accessed remotely and sending data to someone else. Some of them (Gboard) were even used audio recording apps and apparently were sending these recording somewhere.


It's a real nightmare.

Best of luck!


Jan 20, 2023 7:19 PM in response to Reefhunter

Hello,

I gave an answer earlier. I will copy/paste it here.


I terribly sorry that you're going through this ordeal. I see that it happened to you last year and hopefully you got some answers.

I went through a similar situation (still am) and in my case, I found out that someone who had a previous access to all my devices, systems and credentials had created remote access to my systems and was accessing them via VMs (Ubuntu, Kali Linux, RedHat etc...). With a gnome installation and freedesktop.org these criminals were able to get into my routers, my computers, androids and IOS devices.

I changed my router 3 times! Even moved out my apartment! The IOS devices (I believe my iPhone), were even turned into network gateways. I will try to attach some screenshots.

I lived through these horrendous moments, seeing the DDOS attacks happening, the random password changes, the redirect to fake websites etc... but was powerless to do anything. I contacted EVERY single company (Apple, Google, ISP) even apple community to no avail.

I'll add screenshots of a random windows XP (even stranger since Microsoft has not supported WindowsXP in over 10 years) that was connected to my router at some point. I would also see Linux computers logged in.

My own laptop would be connected with the mention "this device connected away from home network" which indicated a remote connection.

Hello

I changed my router 3 times! Even moved out my apartment!

I finally got some answers when I installed my own VMs, learned how to dig into my machines, and was able to find the prior installations, intrusions on my systems (I'll try to add some screenshots).

P-S: Please pay attention to the Google Play Services App on your phones (mine was android) if applicable.

The adversary had installed a fake Google Play Services app on my phone, I noticed it almost 2 years after the fact. It would show as "Parallel Google Play Services". Which made 80% of the apps I downloaded (including pre-installed Google system apps) considered side-loaded. All these apps were accessed remotely and sending data to someone else. Some of them (Gboard) were even used audio recording apps and apparently were sending these recording somewhere.

My iPhone seemed to be remotely managed (I never understood that one) and at some point, my very simple access code, just stopped working. I had to reset factory the device, and strangely enough, even after the rest, Google accounts, that are only signed on one device and one laptop, have several sessions opened on iPhones with my name, and some without my name are opened.


It's a real nightmare.

Best of luck!

Aug 14, 2022 12:43 AM in response to Ayush_jack001

its for relationships only

all apps or ads r real people

any seller = the person who answer u if u chat with any support service!

u got money by meeting or flirting with other people who need sexual feeling or real meating.. all products on website r real people and if pay for a product will see her or him exactly details will be in report and u can meet forexample on aliexpress app or fordeal live, when u see video live by seller explanation product details.. she is showing u to other partner. and u will note she is smiling))

Aug 18, 2022 7:02 PM in response to Kimber_L_LeeCloned

Hi I’m sorry however this IOS account manager that is attached to my google account in the open sessions and won’t allow me to tap and view where the sessions are signed into or the ability to close them. NO ONE AT APPLE, NO ONE there can tell me what it is. I get I’ve never heard of that before. If it’s attached to my google then it must be google! That’s not right cuz IOS is Apple!!! Something is going on and NO ONE HAS A CLUE!!! WHATS REALLY GOING ON APPLE???? How are there specialist support that we have to pay for at Apple and they have No Clue!

Aug 22, 2022 8:43 AM in response to LuvMyiPhones-usually

I was told by Google that permission is asked and just be given for iOS to attach. Personally, being as I never gave permission, I’m getting it removed. I’m just not comfortable with it because it’s not checkable on a regular basis, that I can find. I’ll update if you need and if you’ve learned anything since, could you please share? Thank you!

Sep 5, 2022 10:05 AM in response to Riccardo2424

so I went into the apple shop today and it is scary what I was told in regards to my situation. iOS account manager is set up by organisations to have control. The guy said if the recent back up included the malware then my phone is as good as useless as this person can see everything of mine. I took a screenshot of something revealing for evidence and it isn’t there now 😩 I can assure you it is enabling this person to control every aspect of my online life ! She was in my Apple ID as well, really hoping apple can retrieve what she has deleted!

if apple can’t help

with a previous back up then the guy said I need to get a new phone as linked to serial number. Feels like something films are made of 😩

Sep 6, 2022 6:07 AM in response to odds on

odds on wrote:

so I went into the apple shop today and it is scary what I was told in regards to my situation. iOS account manager is set up by organisations to have control. The guy said if the recent back up included the malware then my phone is as good as useless as this person can see everything of mine. I took a screenshot of something revealing for evidence and it isn’t there now 😩 I can assure you it is enabling this person to control every aspect of my online life ! She was in my Apple ID as well, really hoping apple can retrieve what she has deleted!
if apple can’t help
with a previous back up then the guy said I need to get a new phone as linked to serial number. Feels like something films are made of 😩

Was this an actual Apple Store? Or was it a third-party shop that sells apple products? Most of what you're reporting was told to you is nonsense. It sounds as if he was just trying to scare you into buying a new phone.



What is iOS Account Manager?

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.