How to Manage Trusted Devices on Your Apple ID
Your Apple ID tracks which devices are linked to your account. Learn how to see all connected devices, sign out of ones you no longer use, and remove old phones and computers.
See All Devices Linked to Your Apple ID
~18sView Device Details
~15sRemove an Old or Unrecognized Device
~26sWarning
If you see a device you do not recognize, remove it immediately. An unrecognized device could indicate someone else has access to your Apple ID — consider also changing your Apple ID password.
Remove Devices via Apple ID Website
~22sQuick Tip
Quick Tip: Do this regularly — once a year is a good habit. Review the list of devices and remove anything you no longer own or recognize.
You Did It!
You've completed: How to Manage Trusted Devices on Your Apple ID
Need more help? Get Expert Help from a TekSure Tech
Every Apple device you sign into with your Apple ID — iPhones, iPads, Macs, Apple Watches, and Apple TVs — gets added to your trusted devices list. This list is used for two-factor authentication (the six-digit codes Apple sends when you sign in) and for iCloud services.
Over time, this list can pile up with old phones, tablets, or computers that you no longer own. An old iPhone you sold two years ago might still be linked to your account if you did not remove it. This is a security concern — those devices could potentially receive two-factor authentication codes.
Reviewing and cleaning up your trusted devices list is a good security practice, especially after selling or giving away an Apple device.
Removing a device from your Apple ID does not erase the device — it just unlinks it from your account. The person who has that device cannot access your iCloud data after removal. (You should have erased the device before selling it anyway — see our separate guide on erasing before selling.)
You can manage your trusted devices from any iPhone, iPad, Mac, or from appleid.apple.com on any web browser.
Was this guide helpful?
Your feedback helps us make TekSure better for everyone.
Want to rate with stars?
Still have questions?
Ask TekBrain a follow-up question about this guide. It’s free, no sign-up needed, and the answer will be in plain English.
Official Resources
Sources used to create and verify this guide. View all sources →
← Previous
How to Download YouTube Videos for Offline Viewing
Next →
How to Use Chrome's Password Checkup to Find Weak or Stolen Passwords
Still stuck? No problem.
Sometimes a guide isn’t enough. Our technicians can walk you through it step by step, in plain English, on your schedule.
Related Guides
More from Safety & Privacy
How to Secure Your Home Wi-Fi Network
Simple steps to lock down your home router, keep strangers off your network, and protect every device in your house.
3 min read
Setting Up Two-Factor Authentication (2FA) on Any Account
Add a second layer of security to your most important accounts. This one change stops most account takeovers cold.
3 min read
Staying Safe on Social Media
How to protect your privacy on Facebook and Instagram, spot fake accounts, and avoid the most common social media traps.
3 min read