

Yes, Intune per app VPN on iOS lets you route traffic from specific apps through a managed VPN tunnel. This guide walks you through what per-app VPN on iOS is, what you need to set it up, step-by-step configuration in Intune, testing, best practices, security considerations, and common troubleshooting. Whether you’re securing access to corporate resources or ensuring app-level privacy, this post covers practical, real-world steps you can follow today.
- What you’ll learn:
- How per-app VPN works on iOS and why it matters for app-level security
- Prerequisites you must have before configuring Intune per-app VPN
- Step-by-step setup in Microsoft Intune VPN profile creation, app assignment, and deployment
- How to test and validate per-app VPN on devices
- Best practices for security, performance, and user experience
- Common issues and troubleshooting tips
- Real-world use cases and examples
- Alternatives and when to consider them
- NordVPN deal for privacy-conscious testing:

- Useful URLs and Resources unlinked text:
Apple Website – apple.com
Apple Support – support.apple.com
Microsoft Intune documentation – docs.microsoft.com
Microsoft Learn – learn.microsoft.com
OpenVPN – openvpn.net
iOS Developer Documentation – developer.apple.com
VPN industry standards – en.wikipedia.org/wiki/Virtual_private_network
What is Intune per-app VPN on iOS?
Per-app VPN is a feature in modern mobile device management MDM that allows admins to designate which apps should send their traffic through a VPN tunnel. On iOS, this is implemented via a VPN extension that Apple calls an App VPN or per-app VPN. With Intune, you create a VPN profile and assign it to specific apps instead of the entire device, enabling only the traffic from those apps to be routed through the corporate VPN. This approach helps protect sensitive app data while reducing the overhead of forcing all device traffic through the VPN.
Key concepts:
- App-level scope: Only selected apps use the VPN, not the whole device
- Managed VPN: The VPN configuration is delivered and enforced by Intune
- Certificates and authentication: Often recommended for secure, scalable access
- App ID mapping: Each app you want to secure must be associated with the VPN profile
Why it matters: Per-app VPN provides a balance between security and user experience. It helps ensure that sensitive enterprise apps like email, file sharing, CRM, or internal dashboards access corporate resources through a controlled path, while personal apps can remain outside the VPN if you choose.
Data points you’ll find useful:
- Many enterprises report improved data protection for corporate apps with per-app VPN, especially in BYOD scenarios.
- Per-app VPN can be combined with conditional access policies to require compliant devices before traffic is allowed through the VPN.
- When configured correctly, you can minimize battery impact and network latency by routing only necessary app traffic and optimizing VPN server selection.
Prerequisites
Before you start, gather these items: Is protonvpn legal
- An Apple device management environment with Intune Microsoft Intune subscription active
- Devices enrolled in Intune with iOS/iPadOS management enabled
- A reachable VPN gateway that supports iOS App VPN IKEv2/IPsec is common. OpenVPN or other protocols can be bridged through App VPN with the right config
- A valid certificate infrastructure or a trusted method for authenticating VPN connections certificate-based authentication is preferred. PSK/EAP can work but may be less secure
- An app list to prototype with e.g., Microsoft Outlook, WhatsApp Business, or a custom enterprise app with a defined bundle ID
- Access to Apple Business Manager or Apple School Manager for automated device enrollment and integration with Intune if you’re deploying at scale
- A test device or two for validation before broad rollout
Optional but helpful:
- A staging environment to test policies before production
- Documentation for your VPN gateway server addresses, remote IDs, authentication methods, certificate templates
- A plan for certificate distribution and rotation
Step-by-step: configuring per-app VPN in Intune
This is the practical, hands-on part. The goal is to create a robust per-app VPN and assign it to the apps that need the secure tunnel.
- Create a native iOS VPN profile Intune:
- Sign in to Microsoft Endpoint Manager admin center
- Devices > iOS/iPadOS > Configuration profiles > Create profile
- Platform: iOS/iPadOS
- Profile type: VPN App-Proxy or equivalent depending on the portal version
- Connection name: Pick something intuitive like “Corp App VPN”
- Server address, Remote ID, Local ID: Enter your VPN gateway details
- Authentication: certificate-based if available. otherwise, configure EAP or PSK per your gateway
- Encryption: select the recommended cipher and integrity settings your gateway supports
- Save the profile
- Create a per-app VPN policy App-based routing configuration:
- In Intune, go to Apps > App configuration policies or App protection policies where per-app VPN is supported
- Add the app you want to secure with VPN by its bundle identifier e.g., com.contoso.mailapp
- In the policy options, specify that traffic for this app should route through the VPN
- Attach the VPN profile you created in step 1 to this per-app VPN policy
- Save
- Assign the per-app VPN to device groups or user groups:
- Choose the group that includes devices you want to protect
- You can scope by app or by user. common practice is to assign by app for corporate devices
- Ensure the associated app the app with the bundle ID is deployed to the same group
- Deploy the apps that will use the VPN:
- Publish the enterprise app via Intune line-of-business app or store app
- Associate it with the per-app VPN policy you created
- Monitor deployment status for the app and VPN policy
- Verify client behavior on the device:
- On first run of the secured app, the VPN should connect in the background
- The app should show that traffic is going through the VPN depending on the gateway you’re using, you may see a VPN status indicator
- Optional: configure on-demand or automatic reconnect policies:
- Some deployments require the VPN to reconnect if connectivity drops
- You can specify re-connect timings and health checks on the device
Important considerations:
- Always test with a non-production app first to avoid accidental data exposure
- Maintain certificate hygiene: issue, renew, and revoke certificates as needed
- Plan for user experience: some apps may not play well with aggressive VPN reconnects. tune the on-demand behavior accordingly
How to assign per-app VPN to apps and devices
- Pairing apps with VPN: In your Intune console, map each app by its bundle ID to the corresponding VPN policy
- Group scoping: Decide whether the VPN policy will apply to all devices in a group or only to certain app groups
- Certificate delivery: Ensure the certificate if used is present on the device before enabling the VPN for that app
- App updates: When an app is updated, verify that its bundle ID hasn’t changed and reassign if needed
Pro tips: Cyberghost vpn edge extension
- Start with a single test app, then expand to more apps after validating the user experience
- Document the bundle IDs of your apps so you don’t miss one during rollout
- Use a phased rollout to monitor performance and user feedback
Testing and validation
- Connectivity test: Open the secured app and verify that the network traffic is flowing through the VPN
- Resource access: Attempt to access corporate resources intranet sites, Exchange, SharePoint that require VPN access
- Logs and status: Check the Intune logs and the VPN gateway logs for authentication success, tunnel status, and traffic routing
- Battery and performance: Monitor device battery usage and any noticeable latency during app usage
- Failover testing: Simulate network drop and ensure VPN reconnects automatically as configured
Common test scenarios:
- A corporate email app connected to Exchange via VPN
- A file-sharing app accessing the intranet storage through VPN
- A custom internal app that fetches data from an internal API gateway
Security considerations and best practices
- Prefer certificate-based authentication: Certificates reduce the risk of credential leakage and simplify renewal
- Enforce least privilege: Only route traffic for apps that truly need access to corporate resources
- Use split tunneling carefully: In some scenarios, you may want to force all corporate app traffic through VPN no split tunneling to maximize security. in others, you might allow split tunneling for performance, but with strict controls on endpoints
- Combine with conditional access: Require device compliance, MDM enrollment status, and user identity checks before granting VPN access
- Regularly rotate VPN certificates and review gateway configurations
- Monitor usage analytics: Track which apps use the VPN, the volume of data, and unusual patterns
- Encourage users to keep devices updated: Security patches can impact VPN stability and compatibility
- Provide a user-friendly fallback: If VPN cannot connect, give apps a secure fallback path or a clear error message to reduce user frustration
Performance and reliability considerations
- VPN overhead: App VPN often adds some latency due to the tunnel and encryption. Use efficient cipher suites and keep server locations close to users to minimize latency
- Server selection: Use multiple gateway locations to balance load and improve resilience
- Connection stability: iOS updates can affect VPN behavior. ensure you’re on supported iOS versions and keep the Intune management profile up to date
- Battery impact: Per-app VPN should be optimized to minimize background activity. test for battery drain during peak usage
- Bandwidth policies: For bandwidth-intensive apps, ensure the VPN gateway has adequate capacity and watch for throttling
Real-world use cases
- Remote workforce with secure access to internal email, CRM, and document stores
- Bring-your-own-device BYOD programs where only corporate apps are secured with VPN
- Contractors or partner apps that need isolated access to internal APIs
- Compliance-heavy environments where app data must traverse a controlled path
Alternatives and when to consider them
- Full device VPN Always-on vs per-app VPN: If most apps need secure access, a device-wide VPN can be simpler to manage. however, it also routes all traffic, which may have privacy and battery implications
- Third-party VPN apps with MDM integration: Some organizations use vendor VPN apps with dedicated enterprise configurations. ensure compatibility with Intune app protection policies
- App-proxy solutions: When your architecture uses an app proxy rather than a full VPN, you can route specific app traffic through a proxy that presents enterprise resources securely
- Zero-trust network access ZTNA solutions: For highly dynamic environments, ZTNA can provide granular access controls per app and user, often with stronger conditional access
Troubleshooting common issues
- Issue: VPN not connecting for a specific app
- Check that the app’s bundle ID is correctly configured in the per-app VPN policy
- Verify the VPN gateway accepts the authentication method configured
- Inspect device logs for certificate or authentication errors
- Issue: Traffic not routing through VPN even though app is configured
- Confirm the VPN profile is assigned to the correct device group
- Ensure app-level routing rules are properly defined
- Validate the VPN tunnel status on the device
- Issue: VPN disconnects frequently
- Review the on-demand and reconnect settings
- Check network stability and gateway reachability
- Ensure the device has a valid certificate and is not blocked by policy
- Issue: Resource access failure after update
- Verify that app updates did not change the bundle ID
- Recheck VPN policy associations and app assignments
- Issue: Battery drain spikes
- Monitor VPN session duration and adjust reconnect intervals
- Optimize gateway performance and choose closer VPN endpoints
- Issue: Certificate issues
- Confirm certificate trust chain on the device
- Verify certificate expiration dates and renewal workflows
- Issue: Conditional access blocks VPN access
- Ensure user/device compliance policies are up to date and properly assigned
- Check that the user belongs to the groups allowed by the VPN policy
- Issue: App crashes or poor app performance
- Test with a non-secure fallback path to rule out app-specific issues
- Review app behavior under VPN and adjust settings accordingly
Real-world tips and pitfalls
- Start small: Pilot with one app and a small user group before wide rollout
- Document everything: Keep a clear runbook with VPN server details, certificate issuances, and app bundle IDs
- Align with IT governance: Ensure VPN usage aligns with data protection policies and internal security standards
- Plan for certificate lifecycle: Automate renewal and revocation to avoid service interruptions
- Test on multiple device models: iPhone and iPad with various iOS versions to catch edge cases
- Prepare end-user guidance: Provide simple steps for users to understand how VPN affects their apps and what to do if VPN fails
Frequently Asked Questions
What is per-app VPN on iOS?
Per-app VPN on iOS is a feature that allows administrators to route traffic from selected apps through a VPN tunnel while other apps on the device bypass the VPN, giving targeted security without forcing all device traffic through the VPN.
How does Intune configure per-app VPN on iOS?
Intune configures per-app VPN by creating a VPN profile for iOS devices and then associating that profile with specific apps via their bundle IDs. The VPN runs only for those apps, not for the entire device.
Which VPN protocols does Intune support for per-app VPN on iOS?
Most enterprises use IKEv2/IPsec or compatible VPN gateways for App VPN. Some setups can use OpenVPN or other protocols, depending on gateway support and iOS capabilities. Certificate-based authentication is commonly recommended for security.
Do I need certificates to set up per-app VPN?
Certificate-based authentication is highly recommended as it provides strong security and easier certificate lifecycle management. PSK/EAP can be used in some environments but may introduce additional risk. Extension vpn edge
Can per-app VPN be used with BYOD programs?
Yes. Per-app VPN is particularly useful in BYOD scenarios because you can secure only corporate apps with the VPN while keeping personal app traffic outside the VPN.
How do I assign per-app VPN to a specific app in Intune?
You map the app’s bundle ID to the VPN policy within Intune, then deploy that policy to the user or device group that has the app installed.
How do I test per-app VPN after deployment?
Install the corporate app on a test device, ensure the VPN policy is active, and verify that the app can reach corporate resources through the VPN. Check VPN status indicators and gateway logs.
What if VPN traffic isn’t routing correctly for an app?
Double-check the app’s bundle ID, VPN profile details, gateway configuration, certificate trust, and device group assignments. Review Intune logs and VPN gateway logs for error codes.
Is per-app VPN faster than a full device VPN?
Not necessarily. Per-app VPN reduces overall traffic by only routing select apps, which can improve performance for users who don’t need all traffic tunneled. However, the VPN tunnel itself still adds encryption overhead. Unifi edgerouter-x vpn
Can I combine per-app VPN with conditional access?
Yes. You can enforce conditional access policies so that only compliant devices and authenticated users can access resources via the VPN, adding an extra layer of security.
What are common reasons for per-app VPN failures in iOS?
Common reasons include incorrect app bundle IDs, certificate issues, expired or untrusted certificates, misconfigured gateway settings, or policy misalignment between Intune and the VPN gateway.
Are there alternatives to Intune per-app VPN for secure app access?
Yes. Alternatives include device-wide VPN, third-party VPN apps integrated with MDM, app proxy solutions, or modern ZTNA approaches that provide granular, identity-driven access controls.