Use the Microsoft Enterprise SSO plug-in on iOS/iPadOS and macOS devices in Microsoft Intune
The Microsoft Enterprise SSO plug-in (preview) provides a single sign-on (SSO) to apps and websites that use Microsoft Azure Active Directory (AD) for authentication, including Microsoft 365. This plug-in uses the Apple single sign on app extension. It reduces the number of authentication prompts users get when using devices managed by Mobile Device Management (MDM), including Microsoft Intune.
Once set up, apps that support the Microsoft Authentication Library (MSAL) automatically take advantage of the Microsoft Enterprise SSO plug-in (preview). Apps that don't support MSAL can be allowed to use the extension. Just add the application bundle ID or prefix to the extension configuration.
For example, to allow a Microsoft app that doesn't support MSAL, add
com.microsoft. to the AppPrefixAllowList property. Be careful with the apps you allow. They automatically use the user's credentials to authenticate.
For more information, see Microsoft Enterprise SSO plug-in for Apple devices - apps that don't use MSAL.
This feature applies to:
This article shows how to deploy the Microsoft Enterprise SSO plug-in (preview) for Apple Devices with Intune.
To use the Microsoft Enterprise SSO plug-in for Apple devices:
The device must support the plug-in:
- iOS/iPadOS 13.0 and newer
- macOS 10.15 and newer
On iOS/iPadOS 13.0 and newer devices, install the Microsoft Authenticator app.
The Microsoft Authenticator app can be installed manually by users, or by deploying an app policy in Intune. For information on how to install the Microsoft Authenticator app, see Manage Apple volume-purchased apps.
On macOS 10.15 and newer devices, install the Company Portal app.
The Company Portal app can be installed manually by users, or by deploying an app policy in Intune. For a list of options on how to install the Company Portal app, see Add the Company Portal for macOS app.
On Apple devices, Apple requires that the SSO app extension and the app (Authenticator or Company Portal) be installed. Users don't need to use the Authenticator or Company Portal apps; they just need to be installed on the device.
Microsoft Enterprise SSO plug-in vs. Kerberos SSO extension
In Intune, when you use the SSO app extension, you use Microsoft Azure AD or Kerberos for authentication. The SSO app extension is designed to improve the sign-in experience for apps and websites that use these authentication methods.
The Microsoft Enterprise SSO plug-in uses the SSO app extension with Microsoft Azure AD authentication. The Microsoft Azure AD and Kerberos extension types can both be used on a device. Be sure to create separate device profiles.
To determine the correct SSO extension type for your scenario, use the following table:
|Microsoft Enterprise SSO plug-in for Apple Devices||Single sign-on app extension with Kerberos|
|Uses the Microsoft Azure AD SSO app extension type||Uses the Kerberos SSO app extension type|
|Supports the following apps:
- Microsoft 365
- Apps, websites or services integrated with Azure AD
|Supports the following apps:
- Apps, websites or services integrated with AD
For more information on the single sign-on extension, see Single sign-on app extension.
Create a single sign-on app extension configuration profile
In the Microsoft Endpoint Manager admin center, you create a device configuration profile. This profile includes the settings to configure the SSO app extension on devices.
Sign in to the Microsoft Endpoint Manager admin center.
Select Devices > Configuration profiles > Create profile.
Enter the following properties:
Platform: Choose your platform:
Profile: Select Device features. Or, select Templates > Device features.
In Basics, enter the following properties:
- Name: Enter a descriptive name for the policy. Name your policies so you can easily identify them later. For example, a good policy name is iOS: Microsoft Enterprise SSO plug-in or macOS: Microsoft Enterprise SSO plug-in.
- Description: Enter a description for the policy. This setting is optional, but recommended.
In Configuration settings, select Single sign-on app extension, and configure the following properties:
SSO app extension type: Select Microsoft Azure AD.
Enable shared device mode:
- Not configured: Intune doesn't change or update this setting. For most scenarios, including Shared iPad, personal devices, and devices with or without user affinity, select this option.
- Yes: Select this option if the targeted devices are using Azure AD Shared device mode. For more information, see Shared device mode overview.
App bundle ID: Enter a list of bundle IDs for apps that don't support MSAL and are allowed to use SSO. For more information, see Applications that don't use MSAL.
Additional configuration: To customize the end user experience, you can add the following properties.
Key Type Value AppPrefixAllowList String Enter a list of prefixes for apps that don't support MSAL and are allowed to use SSO. For example, enter
com.microsoft.to allow all Microsoft apps.
Be sure these apps meet the allowlist requirements.
browser_sso_interaction_enabled Integer When set to
1, users can sign in from Safari browser, and from apps that don't support MSAL. Enabling this setting allows users to bootstrap the extension from Safari or other apps.
browser_sso_disable_mfa Integer Set to
0(default) to require the Microsoft Enterprise SSO plug-in use multi-factor authentication (MFA) during bootstrap. Requiring MFA during bootstrap reduces prompts for MFA in apps that are protected by conditional access and require MFA. Microsoft recommends MFA be enabled to increase security and improve the user experience.
1to disable MFA in bootstrap. Users are prompted by individual apps that require MFA.
disable_explicit_app_prompt Integer Some apps might incorrectly enforce end-user prompts at the protocol layer. If you see this problem, users are prompted to sign in, even though the Microsoft Enterprise SSO plug-in works for other apps.
When set to
1(one), you reduce these prompts.
For more information on these properties, and other properties you can configure, see Microsoft Enterprise SSO plug-in for Apple devices (preview).
Continue creating the profile, and assign the profile to the users or groups that will receive these settings. For the specific steps, see Create the profile.
For guidance on assigning profiles, see Assign user and device profiles.
When the device checks in with the Intune service, it will receive this profile. For more information, see How long does it take for devices to get a policy.
End user experience
If you're not deploying the Microsoft Authenticator or Company Portal app using an app policy, then users must install these apps manually. Remember:
- On iOS/iPadOS devices, users install the Microsoft Authenticator app.
- On macOS devices, users install the Company Portal app.
On Apple devices, Apple requires the SSO app extension and the app (Authenticator or Company Portal) be installed. Users don't need to use the Authenticator or Company Portal apps; they just need to be installed on the device.
Users sign in to any supported app or website to bootstrap the extension. Bootstrap is the process of signing in for the first time, which sets up the extension.
After users sign in successfully, the extension is automatically used to sign in to any other supported app or website.
On macOS, users are prompted to opt in or out of SSO when they sign in to a work or school app. They can select Don’t ask me again to opt out of SSO and block future requests about it.
Users can also manage their SSO preferences in the Company Portal app for macOS. To edit preferences, send them to the Company Portal menu bar > Company Portal > Preferences and tell them to select or deselect Don’t ask me to sign in with single sign-on for this device.
For information about the Microsoft Enterprise SSO plug-in, see Microsoft Enterprise SSO plug-in for Apple devices (preview).
For information from Apple on the single sign-on extension payload, see Single Sign-On Extensions payload settings (opens Apple's web site).