Skip to content

Commit 183f735

Browse files
committed
minor edits; acrolinx
1 parent 7754d5f commit 183f735

2 files changed

Lines changed: 51 additions & 41 deletions

File tree

memdocs/intune/configuration/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -85,6 +85,8 @@ items:
8585
displayName: airprint, home screen, lock screen, sso, single sign-on
8686
- name: Use Enterprise SSO plug-in
8787
href: use-enterprise-sso-plug-in-ios-ipados-macos.md
88+
- name: Use Enterprise SSO plug-in in Jamf Pro
89+
href: use-enterprise-sso-plug-in-ios-ipados-macos-with-jamf-pro.md
8890
- name: Extensions on macOS
8991
href: kernel-extensions-overview-macos.md
9092
displayName: kernel extensions, system extensions

memdocs/intune/configuration/use-enterprise-sso-plug-in-ios-ipados-macos-with-jamf-pro.md

Lines changed: 49 additions & 41 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ keywords:
77
author: mepples21
88
ms.author: miepping
99
manager:
10-
ms.date: 03/9/2022
10+
ms.date: 03/09/2022
1111
ms.topic: how-to
1212
ms.service: microsoft-intune
1313
ms.subservice: configuration
@@ -29,11 +29,11 @@ ms.collection: M365-identity-device-management
2929

3030
# Use the Microsoft Enterprise SSO plug-in on iOS/iPadOS and macOS devices in Jamf Pro
3131

32-
The Microsoft Enterprise SSO plug-in (preview) provides single sign-on (SSO) to apps and websites that use Microsoft Azure Active Directory (AAD) for authentication, including Microsoft 365. This plug-in uses the Apple single sign on app extension framework. It reduces the number of authentication prompts users get when using devices managed by Mobile Device Management (MDM), including Jamf Pro.
32+
The Microsoft Enterprise SSO plug-in (preview) provides single sign-on (SSO) to apps and websites that use Microsoft Azure Active Directory (Azure AD) for authentication, including Microsoft 365. This plug-in uses the Apple single sign-on app extension framework. It reduces the number of authentication prompts users get when using devices managed by Mobile Device Management (MDM), including Jamf Pro.
3333

3434
Once set up, apps that support the Microsoft Authentication Library (MSAL) automatically take advantage of the Microsoft Enterprise SSO plug-in (preview). Apps that don't support MSAL can be allowed to use the extension. Just add the application bundle ID or prefix to the extension configuration.
3535

36-
For example, to allow a Microsoft app that doesn't support MSAL, add `com.microsoft.` to the **AppPrefixAllowList** property. Be careful with the apps you allow, they will be able to bypass interactive login prompts for the signed in user.
36+
For example, to allow a Microsoft app that doesn't support MSAL, add `com.microsoft.` to the **AppPrefixAllowList** property. Be careful with the apps you allow. They can bypass interactive sign-in prompts for the signed in user.
3737

3838
For more information, see [Microsoft Enterprise SSO plug-in for Apple devices - apps that don't use MSAL](/azure/active-directory/develop/apple-sso-plugin#applications-that-dont-use-msal).
3939

@@ -45,7 +45,10 @@ This feature applies to:
4545
This article shows how to deploy the Microsoft Enterprise SSO plug-in (preview) for Apple Devices with Jamf Pro.
4646

4747
> [!IMPORTANT]
48-
> The Microsoft Enterprise SSO plug-in for Apple Devices is in public preview. This preview version is provided without a service level agreement (SLA). It's not recommended to use in production. Certain features might not be supported or might have restricted behavior. For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
48+
> The Microsoft Enterprise SSO plug-in for Apple Devices is in public preview. This preview version is provided without a service level agreement (SLA). It's not recommended to use in production. Certain features might not be supported or might have restricted behavior. For more information, see:
49+
>
50+
> - [Public preview in Microsoft Intune](../fundamentals/public-preview.md)
51+
> - [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/)
4952
5053
## Prerequisites
5154

@@ -65,7 +68,7 @@ To use the Microsoft Enterprise SSO plug-in for Apple devices:
6568
The Company Portal app can be installed manually by users, or by deploying the app through Jamf Pro. For a list of options on how to install the Company Portal app, see [Jamf Pro's documentation](https://docs.jamf.com/10.24.1/jamf-pro/administrator-guide/Managing_macOS_Installers.html).
6669

6770
> [!NOTE]
68-
> On Apple devices, Apple requires that the SSO app extension and the app (Authenticator or Company Portal) be installed. Users don't need to use the Authenticator or Company Portal apps; they just need to be installed on the device. **[Jamf Pro and Intune integration for device compliance](../protect/conditional-access-integrate-jamf.md) is not required to use the SSO app extension.**
71+
> On Apple devices, Apple requires that the SSO app extension and the app (Authenticator or Company Portal) be installed. Users don't need to use the Authenticator or Company Portal apps. The app just need to be installed on the device. **[Jamf Pro and Intune integration for device compliance](../protect/conditional-access-integrate-jamf.md) is not required to use the SSO app extension.**
6972
7073
## Microsoft Enterprise SSO plug-in vs. Kerberos SSO extension
7174

@@ -90,40 +93,42 @@ For more information on the single sign-on extension, see [Single sign-on app ex
9093
In the Jamf Pro portal, you create a Computer or Device configuration profile. This profile includes the settings to configure the SSO app extension on devices.
9194

9295
1. Sign in to the Jamf Pro portal.
93-
2. Select **Computers** > **Configuration profiles** > **New** to create a macOS profile or select **Devices** > **Configuration profiles** > **New** to create an iOS/iPadOS profile.
96+
2. To create a macOS profile, select **Computers** > **Configuration profiles** > **New**. To create an iOS/iPadOS profile, select **Devices** > **Configuration profiles** > **New**.
9497

95-
:::image type="content" source="media/use-enterprise-sso-plug-in-ios-ipados-macos-with-jamf-pro/jamf-pro-configuration-profiles.png" alt-text="Navigation to Jamf Pro portal configuration profiles for macOS":::
98+
:::image type="content" source="media/use-enterprise-sso-plug-in-ios-ipados-macos-with-jamf-pro/jamf-pro-configuration-profiles.png" alt-text="In the Jamf Pro portal, create a configuration profile for macOS devices.":::
9699

97-
3. Scroll down in the Options column and select **Single Sign-On Extensions** > **Add**.
100+
3. In the **Options** column, scroll down and select **Single Sign-On Extensions** > **Add**.
98101

99-
:::image type="content" source="media/use-enterprise-sso-plug-in-ios-ipados-macos-with-jamf-pro/sso-extension-creation.png" alt-text="Select configuration profiles SSO option and click add":::
102+
:::image type="content" source="media/use-enterprise-sso-plug-in-ios-ipados-macos-with-jamf-pro/sso-extension-creation.png" alt-text="In the Jamf Pro portal, select the configuration profiles SSO option, and select add.":::
100103

101104
4. Enter the following properties:
102105

103106
- **Payload Type**: SSO
104107
- **Extension Identifier**:
105-
- **macOS**: com.microsoft.CompanyPortalMac.ssoextension
106-
- **iOS/iPadOS**: com.microsoft.azureauthenticator.ssoextension
108+
- **macOS**: com.microsoft.CompanyPortalMac.ssoextension
109+
- **iOS/iPadOS**: com.microsoft.azureauthenticator.ssoextension
107110
- **Team Identifier**:
108-
- **macOS**: UBF8T346G9
109-
- **iOS/iPadOS**: No value is needed, leave the field blank.
111+
- **macOS**: UBF8T346G9
112+
- **iOS/iPadOS**: No value is needed, leave the field blank.
110113
- **Sign-On Type**: Redirect
111114
- **URLs**:
112-
- `https://login.microsoftonline.com`
113-
- `https://login.microsoft.com`
114-
- `https://sts.windows.net`
115-
- `https://login.partner.microsoftonline.cn`
116-
- `https://login.chinacloudapi.cn`
117-
- `https://login.microsoftonline.de`
118-
- `https://login.microsoftonline.us`
119-
- `https://login.usgovcloudapi.net`
120-
- `https://login-us.microsoftonline.com`
121-
122-
:::image type="content" source="media/use-enterprise-sso-plug-in-ios-ipados-macos-with-jamf-pro/sso-extension-basic-settings-1.png" alt-text="Basic configuration settings part 1":::
123-
124-
:::image type="content" source="media/use-enterprise-sso-plug-in-ios-ipados-macos-with-jamf-pro/sso-extension-basic-settings-2.png" alt-text="Basic configuration settings part 2":::
125-
126-
5. In **Custom Configuration** you will define other required properties. Jamf Pro requires that these properties are configured via an uploaded PLIST file. The full list of configurable properties is covered in the [Azure AD Apple SSO Extension documentation](/azure/active-directory/develop/apple-sso-plugin#manual-configuration-for-other-mdm-services). This is a recommended PLIST file that will meet the needs of most organizations:
115+
- `https://login.microsoftonline.com`
116+
- `https://login.microsoft.com`
117+
- `https://sts.windows.net`
118+
- `https://login.partner.microsoftonline.cn`
119+
- `https://login.chinacloudapi.cn`
120+
- `https://login.microsoftonline.de`
121+
- `https://login.microsoftonline.us`
122+
- `https://login.usgovcloudapi.net`
123+
- `https://login-us.microsoftonline.com`
124+
125+
:::image type="content" source="media/use-enterprise-sso-plug-in-ios-ipados-macos-with-jamf-pro/sso-extension-basic-settings-1.png" alt-text="In the Jamf Pro portal, see the basic configuration settings part 1.":::
126+
127+
:::image type="content" source="media/use-enterprise-sso-plug-in-ios-ipados-macos-with-jamf-pro/sso-extension-basic-settings-2.png" alt-text="In the Jamf Pro portal, see the basic configuration settings part 2.":::
128+
129+
5. In **Custom Configuration**, you'll define other required properties. Jamf Pro requires that these properties are configured using an uploaded PLIST file. To see the full list of configurable properties, go to [Azure AD Apple SSO Extension documentation](/azure/active-directory/develop/apple-sso-plugin#manual-configuration-for-other-mdm-services).
130+
131+
The following example is a recommended PLIST file that meets the needs of most organizations:
127132

128133
```xml
129134
<?xml version="1.0" encoding="UTF-8"?>
@@ -140,43 +145,46 @@ In the Jamf Pro portal, you create a Computer or Device configuration profile.
140145
</plist>
141146
```
142147

143-
:::image type="content" source="media/use-enterprise-sso-plug-in-ios-ipados-macos-with-jamf-pro/sso-extension-custom-configuration-plist.png" alt-text="Custom configuration with PLIST file":::
148+
:::image type="content" source="media/use-enterprise-sso-plug-in-ios-ipados-macos-with-jamf-pro/sso-extension-custom-configuration-plist.png" alt-text="See a sample custom configuration with a PLIST file for Jamf Pro.":::
144149

145150
- These PLIST settings configure the following SSO Extension options:
146151

147-
| Key | Type | Value |
148-
| --- | --- | --- |
149-
| **AppPrefixAllowList** | String | Enter a list of prefixes for apps that don't support MSAL **and** are allowed to use SSO. For example, enter `com.microsoft.` to allow all Microsoft apps.<br/><br/>Be sure these apps [meet the allowlist requirements](/azure/active-directory/develop/apple-sso-plugin#enable-sso-for-apps-that-dont-use-a-microsoft-identity-platform-library).|
150-
| **browser_sso_interaction_enabled** | Integer | When set to `1`, users can sign in from Safari browser, and from apps that don't support MSAL. Enabling this setting allows users to bootstrap the extension from Safari or other apps.|
151-
| **disable_explicit_app_prompt** | Integer | Some apps might incorrectly enforce end-user prompts at the protocol layer. If you see this problem, users are prompted to sign in, even though the Microsoft Enterprise SSO plug-in works for other apps. <br/><br/>When set to `1` (one), you reduce these prompts. |
152+
| Key | Type | Value |
153+
| --- | --- | --- |
154+
| **AppPrefixAllowList** | String | Enter a list of prefixes for apps that don't support MSAL **and** are allowed to use SSO. For example, enter `com.microsoft.` to allow all Microsoft apps.<br/><br/>Be sure these apps [meet the allowlist requirements](/azure/active-directory/develop/apple-sso-plugin#enable-sso-for-apps-that-dont-use-a-microsoft-identity-platform-library).|
155+
| **browser_sso_interaction_enabled** | Integer | When set to `1`, users can sign in from Safari browser, and from apps that don't support MSAL. Enabling this setting allows users to bootstrap the extension from Safari or other apps.|
156+
| **disable_explicit_app_prompt** | Integer | Some apps might incorrectly enforce end-user prompts at the protocol layer. If you see this problem, users are prompted to sign in, even though the Microsoft Enterprise SSO plug-in works for other apps. <br/><br/>When set to `1` (one), you reduce these prompts. |
152157

153158
> [!TIP]
154159
> For more information on these properties, and other properties you can configure, see [Microsoft Enterprise SSO plug-in for Apple devices (preview)](/azure/active-directory/develop/apple-sso-plugin#more-configuration-options).
155160

156-
6. Select the **Scope** tab. Specify the computers or devices that should be targeted to receive the SSO Extension MDM profile.
161+
6. Select the **Scope** tab. Enter the computers or devices that should be targeted to receive the SSO Extension MDM profile.
157162
7. Select **Save**.
158163

159-
When the device checks in with the Jamf Pro service, it will receive this profile.
164+
When the device checks in with the Jamf Pro service, it receives this profile.
160165

161166
## End user experience
162167

163-
:::image type="content" source="./media/use-enterprise-sso-plug-in-ios-ipados-macos/flow-chart-end-user.png" alt-text="End user flow chart when installing SSO app app extension on iOS/iPadOS and macOS devices in Jamf Pro.":::
168+
:::image type="content" source="./media/use-enterprise-sso-plug-in-ios-ipados-macos/flow-chart-end-user.png" alt-text="End user flow chart when installing SSO app extension on iOS/iPadOS and macOS devices in Jamf Pro.":::
169+
170+
- If you're not deploying the Microsoft Authenticator or Company Portal app using Jamf Pro, then users must install these apps manually.
171+
172+
Remember:
164173

165-
- If you're not deploying the Microsoft Authenticator or Company Portal app using Jamf Pro, then users must install these apps manually. Remember:
166174
- On iOS/iPadOS devices, users install the Microsoft Authenticator app.
167175
- On macOS devices, users install the Company Portal app.
168176

169-
On Apple devices, Apple requires the SSO app extension and the app (Authenticator or Company Portal) be installed. **Users don't need to use the Authenticator or Company Portal apps; they just need to be installed on the device.**
177+
On Apple devices, Apple requires the SSO app extension and the app (Authenticator or Company Portal) be installed. **Users don't need to use the Authenticator or Company Portal apps. The app just need to be installed on the device.**
170178

171179
- Users sign in to any supported app or website to bootstrap the extension. Bootstrap is the process of signing in for the first time, which sets up the extension.
172180

173181
:::image type="content" source="./media/use-enterprise-sso-plug-in-ios-ipados-macos/user-signs-in.png" alt-text="Users signs in to app or website to bootstrap the SSO app extension on iOS/iPadOS and macOS devices in Jamf Pro.":::
174182

175183
- After users sign in successfully, the extension is automatically used to sign in to any other supported app or website.
176184

177-
On macOS, users are prompted to opt in or out of SSO when they sign in to a work or school app. They can select **Don’t ask me again** to opt out of SSO and block future requests about it.
185+
On macOS, users are prompted to opt in or out of SSO when they sign in to a work or school app. They can select **Don’t ask me again** to opt out of SSO and block future requests.
178186

179-
Users can also manage their SSO preferences in the Company Portal app for macOS. To edit preferences, send them to the Company Portal menu bar > **Company Portal** > **Preferences** and tell them to select or deselect **Don’t ask me to sign in with single sign-on for this device**.
187+
Users can also manage their SSO preferences in the Company Portal app for macOS. To edit preferences, go to the Company Portal menu bar > **Company Portal** > **Preferences**. They can select or deselect **Don’t ask me to sign in with single sign-on for this device**.
180188

181189
## Next steps
182190

0 commit comments

Comments
 (0)