WireGuard configurations can be installed using Configuration Profiles through .mobileconfig files.
A .mobileconfig file is a plist file in XML format. The top-level XML item is a top-level payload dictionary (dict). This payload dictionary should contain the following keys:
-
PayloadDisplayName
(string): The name of the configuration profile, visible when installing the profile -
PayloadType
(string): Should beConfiguration
-
PayloadVersion
(integer): Should be1
-
PayloadIdentifier
(string): A reverse-DNS style unique identifier for the profile file. If you install another .mobileconfig file with the same identifier, the new one overwrites the old one. -
PayloadUUID
(string): A randomly generated UUID for this payload -
PayloadContent
(array): Should contain an array of payload dictionaries. Each of these payload dictionaries can represent a WireGuard tunnel configuration.
Here's an example .mobileconfig with the above fields filled in:
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
<plist version="1.0">
<dict>
<key>PayloadDisplayName</key>
<string>WireGuard Demo Configuration Profile</string>
<key>PayloadType</key>
<string>Configuration</string>
<key>PayloadVersion</key>
<integer>1</integer>
<key>PayloadIdentifier</key>
<string>com.your-org.wireguard.FCC9BF80-C540-44C1-B243-521FDD1B2905</string>
<key>PayloadUUID</key>
<string>F346AAF4-53A2-4FA1-ACA3-EEE74DBED029</string>
<key>PayloadContent</key>
<array>
<!-- An array of WireGuard configuration payload dictionaries -->
</array>
</dict>
</plist>
Each WireGuard configuration payload dictionary should contain the following keys:
-
PayloadDisplayName
(string): Should beVPN
-
PayloadType
(string): Should becom.apple.vpn.managed
-
PayloadVersion
(integer): Should be1
-
PayloadIdentifier
(string): A reverse-DNS style unique identifier for the WireGuard configuration profile. -
PayloadUUID
(string): A randomly generated UUID for this payload -
UserDefinedName
(string): The name of the WireGuard tunnel. This name shall be used to represent the tunnel in the WireGuard app, and in the System UI for VPNs (Settings > VPN on iOS, System Preferences > Network on macOS). -
VPNType
(string): Should beVPN
-
VPNSubType
(string): Should be set as the bundle identifier of the WireGuard app.- iOS:
com.wireguard.ios
- macOS:
com.wireguard.macos
- iOS:
-
VendorConfig
(dict): Should be a dictionary with the following key:WgQuickConfig
(string): Should be a WireGuard configuration in wg-quick(8) / wg(8) format. The keys 'FwMark', 'Table', 'PreUp', 'PostUp', 'PreDown', 'PostDown' and 'SaveConfig' are not supported.
-
VPN
(dict): Should be a dictionary with the following keys:-
RemoteAddress
(string): A non-empty string. This string is displayed as the server name in the System UI for VPNs (Settings > VPN on iOS, System Preferences > Network on macOS). -
AuthenticationMethod
(string): Should bePassword
-
Here's an example WireGuard configuration payload dictionary:
<!-- A WireGuard configuration payload dictionary -->
<dict>
<key>PayloadDisplayName</key>
<string>VPN</string>
<key>PayloadType</key>
<string>com.apple.vpn.managed</string>
<key>PayloadVersion</key>
<integer>1</integer>
<key>PayloadIdentifier</key>
<string>com.your-org.wireguard.demo-profile-1.demo-tunnel</string>
<key>PayloadUUID</key>
<string>44CDFE9F-4DC7-472A-956F-61C68055117C</string>
<key>UserDefinedName</key>
<string>Demo from MobileConfig file</string>
<key>VPNType</key>
<string>VPN</string>
<key>VPNSubType</key>
<string>com.wireguard.ios</string>
<key>VendorConfig</key>
<dict>
<key>WgQuickConfig</key>
<string>
[Interface]
PrivateKey = mInDaw06K0NgfULRObHJjkWD3ahUC8XC1tVjIf6W+Vo=
Address = 10.10.1.0/24
DNS = 1.1.1.1, 1.0.0.1
[Peer]
PublicKey = JRI8Xc0zKP9kXk8qP84NdUQA04h6DLfFbwJn4g+/PFs=
Endpoint = demo.wireguard.com:12912
AllowedIPs = 0.0.0.0/0
</string>
</dict>
<key>VPN</key>
<dict>
<key>RemoteAddress</key>
<string>demo.wireguard.com:12912</string>
<key>AuthenticationMethod</key>
<string>Password</string>
</dict>
</dict>
Configurations added via .mobileconfig will not be migrated into keychain until the WireGuard application is opened once.