Skip to content

Commit 2b7123a

Browse files
Spacing under numbered list
1 parent 50f1d87 commit 2b7123a

1 file changed

Lines changed: 31 additions & 31 deletions

File tree

memdocs/intune/configuration/use-enterprise-sso-plug-in-ios-ipados-macos-with-jamf-pro.md

Lines changed: 31 additions & 31 deletions
Original file line numberDiff line numberDiff line change
@@ -92,11 +92,11 @@ In the Jamf Pro portal, you create a Computer or Device configuration profile.
9292
1. Sign in to the Jamf Pro portal.
9393
2. Select **Computers** > **Configuration profiles** > **New** to create a macOS profile or select **Devices** > **Configuration profiles** > **New** to create an iOS/iPadOS profile.
9494

95-
:::image type="content" source="media/use-enterprise-sso-plug-in-ios-ipados-macos-with-jamf-pro/jamf-pro-configuration-profiles.png" alt-text="Navigation to Jamf Pro portal configuration profiles for macOS":::
95+
:::image type="content" source="media/use-enterprise-sso-plug-in-ios-ipados-macos-with-jamf-pro/jamf-pro-configuration-profiles.png" alt-text="Navigation to Jamf Pro portal configuration profiles for macOS":::
9696

9797
3. Scroll down in the Options column and select **Single Sign-On Extensions** > **Add**.
9898

99-
:::image type="content" source="media/use-enterprise-sso-plug-in-ios-ipados-macos-with-jamf-pro/sso-extension-creation.png" alt-text="Select configuration profiles SSO option and click add":::
99+
:::image type="content" source="media/use-enterprise-sso-plug-in-ios-ipados-macos-with-jamf-pro/sso-extension-creation.png" alt-text="Select configuration profiles SSO option and click add":::
100100

101101
4. Enter the following properties:
102102

@@ -119,39 +119,39 @@ In the Jamf Pro portal, you create a Computer or Device configuration profile.
119119
- `https://login.usgovcloudapi.net`
120120
- `https://login-us.microsoftonline.com`
121121

122-
:::image type="content" source="media/use-enterprise-sso-plug-in-ios-ipados-macos-with-jamf-pro/sso-extension-basic-settings-1.png" alt-text="Basic configuration settings part 1":::
122+
:::image type="content" source="media/use-enterprise-sso-plug-in-ios-ipados-macos-with-jamf-pro/sso-extension-basic-settings-1.png" alt-text="Basic configuration settings part 1":::
123123

124-
:::image type="content" source="media/use-enterprise-sso-plug-in-ios-ipados-macos-with-jamf-pro/sso-extension-basic-settings-2.png" alt-text="Basic configuration settings part 2":::
124+
:::image type="content" source="media/use-enterprise-sso-plug-in-ios-ipados-macos-with-jamf-pro/sso-extension-basic-settings-2.png" alt-text="Basic configuration settings part 2":::
125125

126126
5. In **Custom Configuration** you will define other required properties. Jamf Pro requires that these properties are configured via an uploaded PLIST file. The full list of configurable properties is covered in the [Azure AD Apple SSO Extension documentation](/azure/active-directory/develop/apple-sso-plugin#manual-configuration-for-other-mdm-services). This is a recommended PLIST file that will meet the needs of most organizations:
127127

128-
```xml
129-
<?xml version="1.0" encoding="UTF-8"?>
130-
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
131-
<plist version="1.0">
132-
<dict>
133-
<key>AppPrefixAllowList</key>
134-
<string>com.microsoft.,com.apple.</string>
135-
<key>browser_sso_interaction_enabled</key>
136-
<integer>1</integer>
137-
<key>disable_explicit_app_prompt</key>
138-
<integer>1</integer>
139-
</dict>
140-
</plist>
141-
```
142-
143-
:::image type="content" source="media/use-enterprise-sso-plug-in-ios-ipados-macos-with-jamf-pro/sso-extension-custom-configuration-plist.png" alt-text="Custom configuration with PLIST file":::
144-
145-
- These PLIST settings configure the following SSO Extension options:
146-
147-
| Key | Type | Value |
148-
| --- | --- | --- |
149-
| **AppPrefixAllowList** | String | Enter a list of prefixes for apps that don't support MSAL **and** are allowed to use SSO. For example, enter `com.microsoft.` to allow all Microsoft apps.<br/><br/>Be sure these apps [meet the allowlist requirements](/azure/active-directory/develop/apple-sso-plugin#enable-sso-for-apps-that-dont-use-a-microsoft-identity-platform-library).|
150-
| **browser_sso_interaction_enabled** | Integer | When set to `1`, users can sign in from Safari browser, and from apps that don't support MSAL. Enabling this setting allows users to bootstrap the extension from Safari or other apps.|
151-
| **disable_explicit_app_prompt** | Integer | Some apps might incorrectly enforce end-user prompts at the protocol layer. If you see this problem, users are prompted to sign in, even though the Microsoft Enterprise SSO plug-in works for other apps. <br/><br/>When set to `1` (one), you reduce these prompts. |
152-
153-
> [!TIP]
154-
> For more information on these properties, and other properties you can configure, see [Microsoft Enterprise SSO plug-in for Apple devices (preview)](/azure/active-directory/develop/apple-sso-plugin#more-configuration-options).
128+
```xml
129+
<?xml version="1.0" encoding="UTF-8"?>
130+
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
131+
<plist version="1.0">
132+
<dict>
133+
<key>AppPrefixAllowList</key>
134+
<string>com.microsoft.,com.apple.</string>
135+
<key>browser_sso_interaction_enabled</key>
136+
<integer>1</integer>
137+
<key>disable_explicit_app_prompt</key>
138+
<integer>1</integer>
139+
</dict>
140+
</plist>
141+
```
142+
143+
:::image type="content" source="media/use-enterprise-sso-plug-in-ios-ipados-macos-with-jamf-pro/sso-extension-custom-configuration-plist.png" alt-text="Custom configuration with PLIST file":::
144+
145+
- These PLIST settings configure the following SSO Extension options:
146+
147+
| Key | Type | Value |
148+
| --- | --- | --- |
149+
| **AppPrefixAllowList** | String | Enter a list of prefixes for apps that don't support MSAL **and** are allowed to use SSO. For example, enter `com.microsoft.` to allow all Microsoft apps.<br/><br/>Be sure these apps [meet the allowlist requirements](/azure/active-directory/develop/apple-sso-plugin#enable-sso-for-apps-that-dont-use-a-microsoft-identity-platform-library).|
150+
| **browser_sso_interaction_enabled** | Integer | When set to `1`, users can sign in from Safari browser, and from apps that don't support MSAL. Enabling this setting allows users to bootstrap the extension from Safari or other apps.|
151+
| **disable_explicit_app_prompt** | Integer | Some apps might incorrectly enforce end-user prompts at the protocol layer. If you see this problem, users are prompted to sign in, even though the Microsoft Enterprise SSO plug-in works for other apps. <br/><br/>When set to `1` (one), you reduce these prompts. |
152+
153+
> [!TIP]
154+
> For more information on these properties, and other properties you can configure, see [Microsoft Enterprise SSO plug-in for Apple devices (preview)](/azure/active-directory/develop/apple-sso-plugin#more-configuration-options).
155155

156156
6. Select the **Scope** tab. Specify the computers or devices that should be targeted to receive the SSO Extension MDM profile.
157157
7. Select **Save**.

0 commit comments

Comments
 (0)