Use digital identities
Many operating systems and apps use identities to increase security. You can use Keychain Access on your Mac to see the two files that together create an identity. Apple Configurator 2 goes one step further and includes organization identity information for supervised devices.
An identity: A certificate and its associated private key are known as an identity. Certificates can be freely distributed, but identities must be kept secure. The freely distributed certificate, and especially its public key, are used for encryption that can be decrypted only by the matching private key. The private key part of an identity is stored in a PKCS12 (.p12) file and encrypted with another key that’s protected by a passphrase.
A supervision identity: A supervision identity is created with Apple Configurator 2. It contains the identity for the name of your organization—and optionally a phone number, an email address, and a physical mailing address.
Important: If you change a supervision identity, you must start over—that is, you must erase, prepare, and supervise the devices again. The actual name of the supervision identity often isn’t critical, but you need to standardize on the use of that identity for all instances of mobile device management (MDM) and Apple Configurator 2.