You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This update to the MSAL section is to ensure the wording and organization is optimal to increase clarity and reduce some common implementation issues we've been noticing. This also fixes some of the broken links.
Copy file name to clipboardExpand all lines: memdocs/intune/developer/app-sdk-ios.md
+12-6Lines changed: 12 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -172,25 +172,31 @@ In `- startProvidingItemAtURL:completionHandler:` check if you should encrypt fi
172
172
173
173
In `- importDocumentAtURL:toParentItemIdentifier:completionHandler:` check whether the file is encrypted using `isFileEncrytped:` API in `IntuneMAMFileProtectionManager`. If it is then decrypt it using `decryptFile:toCopyPath:` API of `IntuneMAMFileProtectionManager`.
174
174
175
-
## Configure MSAL
175
+
## Setup MSAL
176
176
177
177
The Intune App SDK uses the [Microsoft Authentication Library](https://github.com/AzureAD/microsoft-authentication-library-for-objc) for its authentication and conditional launch scenarios. It also relies on MSAL to register the user identity with the MAM service for management without device enrollment scenarios.
178
178
179
179
Typically, MSAL requires apps to register with Azure Active Directory (AAD) and create a unique client ID and redirect URI, to guarantee the security of the tokens granted to the app. If your app already uses MSAL to authenticate users, the app must use its existing registration values and override the Intune App SDK default values. This ensures that users are not prompted for authentication twice (once by the Intune App SDK and once by the app).
180
180
181
181
If your app does not already use MSAL, you will need to configure an app registration in AAD and specify the client ID and redirect URI that the Intune SDK should use.
182
182
183
+
If your app currently uses ADAL to authenticate users, refer to [this]](https://docs.microsoft.com/en-us/azure/active-directory/develop/migrate-objc-adal-msal) for more information on migrating your app from ADAL to MSAL.
184
+
183
185
It is recommended that your app links to the latest release of [MSAL](https://github.com/AzureAD/microsoft-authentication-library-for-objc/releases).
184
186
185
-
### Link to MSAL binaries
187
+
### Link MSAL to Your Project
188
+
189
+
Follow the [installation](https://github.com/AzureAD/microsoft-authentication-library-for-objc#installation) section to put the MSAL binaries in your app.
186
190
187
-
Follow [these instructions](https://github.com/AzureAD/microsoft-authentication-library-for-objc#installation) to link your app to the MSAL binaries.
191
+
### Configure MSAL
188
192
189
-
1. If your app does not have any keychain access groups defined, add the app's bundle ID as the first group.
193
+
Follow the [configuration](https://github.com/AzureAD/microsoft-authentication-library-for-objc#configuring-msal) section to configure MSAL. Make sure you follow all the steps in the configuration section. Disregard step one if your app is already registered in AAD.
190
194
191
-
2. Enable MSAL single sign-on (SSO) by adding `com.microsoft.adalcache`to the keychain access groups.
195
+
The points below contains additional information to configure MSAL and link to it. Follow these if they apply to you.
192
196
193
-
3. In the case you are explicitly setting the MSAL shared cache keychain group, make sure it is set to `<appidprefix>.com.microsoft.adalcache`. MSAL will set this for you unless you override it. If you want to specify a custom keychain group to replace `com.microsoft.adalcache`, specify that in the Info.plist file under IntuneMAMSettings, by using the key `ADALCacheKeychainGroupOverride`.
197
+
* If your app does not have any keychain access groups defined, add the app's bundle ID as the first group.
198
+
* Enable MSAL single sign-on (SSO) by adding `com.microsoft.adalcache` to the keychain access groups.
199
+
* In the case you are explicitly setting the MSAL shared cache keychain group, make sure it is set to `<appidprefix>.com.microsoft.adalcache`. MSAL will set this for you unless you override it. If you want to specify a custom keychain group to replace `com.microsoft.adalcache`, specify that in the Info.plist file under IntuneMAMSettings, by using the key `ADALCacheKeychainGroupOverride`.
0 commit comments