You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: memdocs/intune/developer/app-wrapper-prepare-ios.md
+13-3Lines changed: 13 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -203,16 +203,26 @@ Open the macOS Terminal and run the following command:
203
203
204
204
You can use the following command line parameters with the App Wrapping Tool:
205
205
206
+
> [!NOTE]
207
+
> If you are using MFA authentication the -aa, -ac, and -ar parameters are not optional. You need to specify them in order to allow the MFA redirection to work during the sign-in process.
208
+
>
209
+
>**Example:** The following example command runs the App Wrapping Tool, incorporating the required commands when MFA is used in the authentication process.
210
+
>
211
+
>```bash
212
+
>./IntuneMAMPackager/Contents/MacOS/IntuneMAMPackager -i ~/Desktop/MyApp.ipa -o~/Desktop/MyApp_Wrapped.ipa -p~/Desktop/My_Provisioning_Profile_.mobileprovision -c"12 A3 BC 45 D6 7E F8 90 1A 2B 3C DE F4 AB C5 D6 E7 89 0F AB"-aa https://login.microsoftonline.com/common -ac "Client ID of the input app if the app uses the Microsoft Authentication Library"-ar "Redirect/Reply URI of the input app if the app uses the Microsoft Authentication Library" -v true
|**-i**|`<Path of the input native iOS application file>`. The file name must end in .app or .ipa. |
209
219
|**-o**|`<Path of the wrapped output application>`|
210
220
|**-p**|`<Path of your provisioning profile for iOS apps>`|
211
221
|**-c**|`<SHA1 hash of the signing certificate>`|
212
222
|**-h**| Shows detailed usage information about the available command line properties for the App Wrapping Tool. |
213
-
|**-aa**|(Optional) `<Authority URI of the input app if the app uses the Microsoft Authentication Library>` i.e `https://login.microsoftonline.com/common`|
214
-
|**-ac**|(Optional) `<Client ID of the input app if the app uses the Microsoft Authentication Library>` This is the guid in the Client ID field from your app's listing in the App Registration blade. |
215
-
|**-ar**|(Optional) `<Redirect/Reply URI of the input app if the app uses the Microsoft Authentication Library>` This is the Redirect URI configured in your App Registration. Typically it would be the URL protocol of the application that the Microsoft Authenticator app would return to after brokered authentication. |
223
+
|**-aa**|(Optional when MFA is not used) `<Authority URI of the input app if the app uses the Microsoft Authentication Library>` i.e `https://login.microsoftonline.com/common`|
224
+
|**-ac**|(Optional when MFA is not used) `<Client ID of the input app if the app uses the Microsoft Authentication Library>` This is the guid in the Client ID field from your app's listing in the App Registration blade. |
225
+
|**-ar**|(Optional when MFA is not used) `<Redirect/Reply URI of the input app if the app uses the Microsoft Authentication Library>` This is the Redirect URI configured in your App Registration. Typically it would be the URL protocol of the application that the Microsoft Authenticator app would return to after brokered authentication. |
216
226
|**-v**| (Optional) Outputs verbose messages to the console. It is recommended to use this flag to debug any errors. |
217
227
|**-e**| (Optional) Use this flag to have the App Wrapping Tool remove missing entitlements as it processes the app. See [Setting app entitlements](#setting-app-entitlements) for more details.|
218
228
|**-xe**| (Optional) Prints information about the iOS extensions in the app and what entitlements are required to use them. See [Setting app entitlements](#setting-app-entitlements) for more details. |
0 commit comments