Chaos215bar2
macrumors regular
Enterprise certificates like this are designed to allow companies to distribute internal corporate apps and give full root access to a device.
This seems to be confusing a root certificate with root access, but they're totally different things.
A root certificate is a top level cryptographic certificate normally used to sign further certificates tied to specific domains. For instance, your browser almost certainly contains a root certificate from GlobalSign, who may then, for instance, use that certificate to sign a certificate tied specifically to the domain google.com. When you then connect to https://www.google.com, your browser knows the remote server can be trusted because it can verify the server's certificate against the already-known root certificate from GlobalSign. (This presumes, of course, that GlobalSign hasn't been compromised and hasn't issued a fraudulent certificate.)
By installing their own root certificate, a third party can impersonate a trusted server under any domain. Combined with a VPN routing all traffic through that third-party's servers, they can intercept and decrypt traffic even to otherwise secure websites.
Root access on the other hand refers to the top-level administrative account on an operating system, and generally allows unfettered access to a device's settings and data.
An enterprise provisioning profile can certainly control a lot of system settings you don't necessarily want a third-party messing with (including installing root certificates and tunneling traffic through a VPN), but it most certainly does not allow root access to the device. Only a jailbreak can do that.